CBT Nuggets CompTIA Network+ (N10-007) 收录时间:2020-08-20 04:41:45 文件大小:4GB 下载次数:15 最近下载:2021-01-16 03:58:59 磁力链接: magnet:?xt=urn:btih:a1a6bbcdd8d01ac888b388379e978a662a2af0e4 立即下载 复制链接 文件列表 143 Scanning Monitoring & Patching Network Scanning with NMAP and Zenmap Lab.mp4 65MB 046 IP Addressing and Subnetting Borrowing Host Bits.mp4 57MB 130 Business Continuity Backup and Restore Hands On Lab.mp4 53MB 141 Scanning Monitoring & Patching Packet Capture and Analysis Lab.mp4 39MB 057 IP Addressing and Subnetting Test Your IPv4 Knowledge Lab.mp4 39MB 110 WAN Technologies WAN Types ISDNPRI T1-T3 E1-E3 and OC.mp4 37MB 085 Deploying Appropriate Cabling Solutions Network Termination Points.mp4 35MB 209 Network Troubleshooting Using CLI Network Tools tracert pathping nmap route.mp4 34MB 112 WAN Technologies WAN Characteristics Frame Relay ATM MPLS and DMVPN.mp4 33MB 221 Troubleshooting Wireless Fighting Frequencies.mp4 33MB 206 Network Troubleshooting Software Tools.mp4 32MB 207 Network Troubleshooting Using CLI Network Tools ipconfig ping arp.mp4 32MB 205 Network Troubleshooting Hardware Tools.mp4 32MB 086 Deploying Appropriate Cabling Solutions Network Transceivers.mp4 31MB 068 Wireless Technologies and Configurations Designing for Wireless Speed and Coverage.mp4 31MB 066 Wireless Technologies and Configurations Understanding Radio Channels.mp4 30MB 083 Deploying Appropriate Cabling Solutions Copper Network Media Types.mp4 30MB 129 Business Continuity Backups.mp4 29MB 208 Network Troubleshooting Using CLI Network Tools nslookup dig.mp4 28MB 217 Wired Connectivity & Performance Issues VLAN Mismatches.mp4 28MB 070 Wireless Technologies and Configurations Wireless Performance Improvements.mp4 28MB 223 Troubleshooting Wireless Misconfigurations.mp4 27MB 119 Network Diagram & Documentation Naming Conventions and Labeling.mp4 27MB 123 Network Diagram & Documentation Configuration and Monitoring Baselines.mp4 26MB 210 Network Troubleshooting Using CLI Network Tools ifconfig iptables tcpdump and netstat.mp4 26MB 084 Deploying Appropriate Cabling Solutions Fiber Network Media Types.mp4 26MB 187 Basic Wireless Network Security Wireless Authentication and Authorization Types.mp4 26MB 093 Device Placement and Configuration Configuring a VLAN Interface Lab.mp4 26MB 220 Troubleshooting Wireless The Nature of Airwaves.mp4 26MB 067 Wireless Technologies and Configurations Wireless Communication Technologies.mp4 26MB 121 Network Diagram & Documentation SOPs and Work Instructions.mp4 25MB 186 Basic Wireless Network Security The Wireless Security Evolution.mp4 25MB 114 WAN Technologies What is SIP Trunking.mp4 25MB 194 Mitigation Techniques Switch Port Protections.mp4 25MB 006 OSI Layers Ports & Protocols How Ports Are Used in TCPIP.mp4 25MB 152 Identify Policies & Best Practices On-boarding and Off-boarding.mp4 25MB 224 Common Network Service Issues Troubleshooting Name Resolution.mp4 25MB 065 Wireless Technologies and Configurations Understanding Radio Frequency.mp4 25MB 089 Device Placement and Configuration Configure Switch Ports Lab.mp4 24MB 196 Mitigation Techniques Filtering with Access Control Lists (ACLs).mp4 24MB 094 Device Placement and Configuration Configuring NAT Lab.mp4 24MB 091 Device Placement and Configuration Configure IP Routing Lab.mp4 23MB 111 WAN Technologies WAN Types Cable DSL Dial-up.mp4 23MB 059 Network Topologies Wired Topologies.mp4 23MB 061 Network Topologies Types of Networks.mp4 22MB 126 Business Continuity Load Sharing and Balancing.mp4 22MB 095 Advanced Networking Devices Multi-Layer Switch Overview.mp4 22MB 056 IP Addressing and Subnetting Planning and Assigning IP Addresses.mp4 22MB 008 OSI Layers Ports & Protocols Common Protocols and Their Well-known Ports.mp4 22MB 079 Network Services DNS Methods Records and Design Options.mp4 22MB 054 IP Addressing and Subnetting Calculate the Number of Hosts per Subnet.mp4 22MB 028 IP Routing and Forwarding Introduction to IP Routing.mp4 22MB 188 Mitigation Techniques Network Device Hardening.mp4 22MB 176 Physical Security & Network Attacks DNS Spoofing (Poisoning).mp4 22MB 016 Ethernet Switching Configuring a VLAN.mp4 22MB 116 Network Diagram & Documentation Network Documentation is Fun!.mp4 22MB 142 Scanning Monitoring & Patching Remediation and Patch Management.mp4 22MB 076 Network Services DHCP Overview.mp4 22MB 088 Device Placement and Configuration Device Configuration Overview.mp4 22MB 074 Cloud Concepts Security Implications Considerations.mp4 22MB 011 Ethernet Switching Properties of Network Traffic.mp4 22MB 017 Ethernet Switching Overview of 802.1Q and Trunks.mp4 22MB 139 Scanning Monitoring & Patching Logging and Review.mp4 22MB 177 Physical Security & Network Attacks Man-In-The-Middle with ARP Spoofing.mp4 22MB 136 Scanning Monitoring & Patching OS Discovery and Fingerprinting.mp4 22MB 055 IP Addressing and Subnetting Determine the Subnet Based on a Host's IP Address.mp4 22MB 049 IP Addressing and Subnetting Exercise 1 Identify the New Subnets.mp4 22MB 211 Wired Connectivity & Performance Issues Attenuation Latency and Jitter.mp4 22MB 218 Wired Connectivity & Performance Issues Native VLAN Mismatches.mp4 22MB 062 Network Topologies Introducing the Internet of Things (IoT).mp4 22MB 104 Virtualization & Network Storage Hypervisor Introduction.mp4 22MB 003 OSI Layers Ports & Protocols TCPIP Suite Layers.mp4 22MB 183 Authentication & Access Control Demo Implementing 2FA.mp4 22MB 052 IP Addressing and Subnetting Exercise 1 ID Valid Host Addresses.mp4 21MB 040 IP Addressing and Subnetting IPv4 Overview.mp4 21MB 096 Advanced Networking Devices Configure Multi-Layer Switch Lab.mp4 21MB 020 Ethernet Switching Predicting the MAC Address Table.mp4 21MB 087 Device Placement and Configuration Network Device Placement.mp4 21MB 120 Network Diagram & Documentation Documenting Wiring and Port Locations.mp4 21MB 041 IP Addressing and Subnetting Binary Basics.mp4 21MB 043 IP Addressing and Subnetting Converting Binary to Decimal.mp4 21MB 226 Common Network Service Issues Troubleshooting IP Addressing.mp4 21MB 175 Physical Security & Network Attacks Cryptolocker and Logic Bombs.mp4 21MB 009 OSI Layers Ports & Protocols TCP's Three-way Handshake.mp4 21MB 180 Authentication & Access Control AAA.mp4 21MB 071 Cloud Concepts Types of Services.mp4 21MB 037 IP Routing and Forwarding Access Control Lists.mp4 21MB 092 Device Placement and Configuration Configuring DHCP Services Lab.mp4 21MB 058 IP Addressing and Subnetting IPv6 Concepts.mp4 21MB 013 Ethernet Switching How a Layer 2 Switch Works.mp4 21MB 019 Ethernet Switching How Address Resolution Protocol (ARP) Operates.mp4 21MB 048 IP Addressing and Subnetting Identifying New Subnets.mp4 21MB 051 IP Addressing and Subnetting ID Valid Host Addresses on a Subnet.mp4 21MB 212 Wired Connectivity & Performance Issues Crosstalk EMI OpenShort.mp4 21MB 044 IP Addressing and Subnetting The IP Mask.mp4 21MB 178 Physical Security & Network Attacks Wardriving and Deauthentication.mp4 21MB 167 Physical Security & Network Attacks Locks Asset Tags and Tamper Detection.mp4 21MB 222 Troubleshooting Wireless Understanding Antenna Types.mp4 20MB 039 IP Routing and Forwarding Enterprise Network Forwarding.mp4 20MB 018 Ethernet Switching Configuring an 802.1Q Ethernet Trunk.mp4 20MB 201 Troubleshooting Methodology Establish a Theory of Probable Cause.mp4 20MB 042 IP Addressing and Subnetting Converting Decimal to Binary.mp4 20MB 225 Common Network Service Issues Troubleshooting MAC Addressing.mp4 20MB 228 Common Network Service Issues Troubleshooting Miscellaneous Service Issues.mp4 20MB 147 Remote Access Methods VPNs.mp4 20MB 164 Physical Security & Network Attacks Video Surveillance and Motion Detection.mp4 20MB 073 Cloud Concepts Connectivity Methods.mp4 20MB 025 Ethernet Switching STP Reacting to a Network Change.mp4 20MB 069 Wireless Technologies and Configurations Understanding Wireless Antennas.mp4 20MB 117 Network Diagram & Documentation Creating Logical Network Diagrams.mp4 20MB 002 OSI Layers Ports & Protocols The 7 Layers of the OSI Model.mp4 20MB 227 Common Network Service Issues Troubleshooting Security Settings.mp4 20MB 113 WAN Technologies What is PPP and PPPoE.mp4 20MB 004 OSI Layers Ports & Protocols Core TCPIP Protocols.mp4 20MB 125 Business Continuity Availability Concepts.mp4 20MB 128 Business Continuity Site Recovery Options.mp4 20MB 030 IP Routing and Forwarding Options for Static Routes.mp4 20MB 108 WAN Technologies Understanding the LAN MAN and WAN Difference.mp4 20MB 192 Mitigation Techniques Privileged User Accounts and Role Separation.mp4 20MB 081 Network Services Network Time Protocol (NTP).mp4 19MB 158 Identify Policies & Best Practices Bring Your Own Device (BYOD).mp4 19MB 090 Device Placement and Configuration Configure IP Addresses Lab.mp4 19MB 165 Physical Security & Network Attacks Badges and Smart Cards.mp4 19MB 219 Wired Connectivity & Performance Issues Bottlenecks.mp4 19MB 098 Advanced Networking Devices IDS and IPS.mp4 19MB 166 Physical Security & Network Attacks Biometrics.mp4 19MB 118 Network Diagram & Documentation Creating Physical Diagrams.mp4 19MB 001 OSI Layers Ports & Protocols A Tale of Two Kings.mp4 19MB 107 Virtualization & Network Storage Network Storage.mp4 19MB 122 Network Diagram & Documentation Network Change Management.mp4 19MB 053 IP Addressing and Subnetting Exercise 2 ID Valid Host Addresses.mp4 19MB 149 Remote Access Methods Out-of-Band Management.mp4 19MB 157 Identify Policies & Best Practices Incident Response Policies.mp4 19MB 198 Mitigation Techniques Penetration Testing.mp4 19MB 138 Scanning Monitoring & Patching Vulnerability Scanning.mp4 19MB 010 OSI Layers Ports & Protocols Wireshark Verification of a TCP 3-Way Handshake.mp4 19MB 215 Wired Connectivity & Performance Issues Bad Ports and LED Status Indicators.mp4 19MB 195 Mitigation Techniques The Native VLAN.mp4 18MB 179 Physical Security & Network Attacks Evil Twins and Rogue Access Points.mp4 18MB 075 Cloud Concepts Local and Cloud Resource Relationships.mp4 18MB 115 WAN Technologies The Physical Reality of a WAN Connection.mp4 18MB 100 Advanced Networking Devices Security Network Devices.mp4 18MB 023 Ethernet Switching Game Predict MAC Table After PC3 Pings PC5.mp4 18MB 060 Network Topologies Wireless Topologies.mp4 18MB 031 IP Routing and Forwarding Configuring Static Routes.mp4 18MB 012 Ethernet Switching Layer 2 Ethernet Addresses.mp4 18MB 038 IP Routing and Forwarding ACL Demonstration.mp4 18MB 029 IP Routing and Forwarding How to Train a Router.mp4 18MB 005 OSI Layers Ports & Protocols Wireshark Views of Core TCPIP Protocols.mp4 18MB 182 Authentication & Access Control Using Two-Factor Authentication (2FA).mp4 18MB 063 Network Topologies Internet of Things (IoT) Technologies.mp4 18MB 181 Authentication & Access Control Multi-factor Authentication Overview.mp4 18MB 140 Scanning Monitoring & Patching Packet and Traffic Analysis.mp4 17MB 216 Wired Connectivity & Performance Issues Duplex and Speed Mismatches.mp4 17MB 204 Troubleshooting Methodology Problem Solving Verification and Documentation.mp4 17MB 034 IP Routing and Forwarding Address Translation with PAT.mp4 17MB 173 Physical Security & Network Attacks Social Engineering and Insider Threats.mp4 17MB 153 Identify Policies & Best Practices Licensing Restrictions.mp4 17MB 137 Scanning Monitoring & Patching Motivators for Vulnerability Management.mp4 17MB 169 Physical Security & Network Attacks DDoS (Distributed Denial of Service).mp4 17MB 047 IP Addressing and Subnetting Practicing the Finger Game.mp4 17MB 191 Mitigation Techniques File Integrity Monitoring.mp4 17MB 135 Scanning Monitoring & Patching Port Scanning and Discovery.mp4 17MB 026 Ethernet Switching Design Considerations and PoE.mp4 17MB 145 Remote Access Methods Telnet and SSH for CLI Remote Access.mp4 17MB 032 IP Routing and Forwarding Dynamic Routing Protocol Overview.mp4 17MB 024 Ethernet Switching Switching Loops and Spanning Tree Protocol (STP).mp4 17MB 213 Wired Connectivity & Performance Issues Incorrect Pin-Outs or Cable Types.mp4 17MB 022 Ethernet Switching Game Predict MAC Table After PC1 Pings PC4.mp4 16MB 036 IP Routing and Forwarding Using Wireshark to Verify IP Translations.mp4 16MB 045 IP Addressing and Subnetting Practice Using a Different IP Mask.mp4 16MB 064 Wireless Technologies and Configurations The Purpose of Wireless.mp4 16MB 161 Identify Policies & Best Practices System Life Cycle.mp4 16MB 168 Physical Security & Network Attacks DoS and PDoS (Permanent Denial of Service).mp4 16MB 189 Mitigation Techniques Hardening a Windows Server System.mp4 16MB 199 Troubleshooting Methodology A Network Troubleshooting Methodology.mp4 16MB 203 Troubleshooting Methodology Establish a Plan of Action to Solve the Problem.mp4 15MB 174 Physical Security & Network Attacks Ransomware and Scareware.mp4 15MB 155 Identify Policies & Best Practices Data Loss Prevention.mp4 15MB 193 Mitigation Techniques Network Segmentation.mp4 15MB 148 Remote Access Methods Remote Desktop Access.mp4 15MB 124 Network Diagram & Documentation Inventory Management.mp4 15MB 200 Troubleshooting Methodology Identify the Problem.mp4 15MB 105 Virtualization & Network Storage Virtual Networking Components.mp4 15MB 160 Identify Policies & Best Practices Non-disclosure Agreements (NDA).mp4 15MB 144 Scanning Monitoring & Patching Baselines.mp4 15MB 150 Identify Policies & Best Practices Privileged User Agreement.mp4 15MB 172 Physical Security & Network Attacks Let's Go Phishing.mp4 15MB 171 Physical Security & Network Attacks DDoS with DNS and NTP.mp4 15MB 097 Advanced Networking Devices Load Balancer Overview.mp4 15MB 035 IP Routing and Forwarding One-to-one Translations with NAT.mp4 15MB 131 Business Continuity MTTR and MTBF.mp4 15MB 072 Cloud Concepts Cloud Delivery Models.mp4 15MB 109 WAN Technologies WAN Transmission over Copper Fiber Wireless and Satellite.mp4 14MB 101 Advanced Networking Devices AAARADIUS Server.mp4 14MB 156 Identify Policies & Best Practices Remote Access Policies.mp4 14MB 151 Identify Policies & Best Practices Password Policy.mp4 14MB 080 Network Services DNS Testing and Validation.mp4 14MB 202 Troubleshooting Methodology Test the Theory to Determine the Root Cause.mp4 13MB 185 Authentication & Access Control Access Control Methods.mp4 13MB 159 Identify Policies & Best Practices Acceptable Use Policy (AUP).mp4 13MB 021 Ethernet Switching Validating MAC Address Table Predictions.mp4 13MB 154 Identify Policies & Best Practices International Export Controls.mp4 13MB 099 Advanced Networking Devices Proxy Servers and Content Filtering.mp4 13MB 106 Virtualization & Network Storage Creating a Virtual Switch and VM Lab.mp4 13MB 197 Mitigation Techniques Honeypots and Honeynets.mp4 13MB 015 Ethernet Switching Understanding VLANs.mp4 13MB 007 OSI Layers Ports & Protocols Verifying L4 Ports with Wireshark.mp4 13MB 078 Network Services DNS Overview.mp4 13MB 082 Network Services IP Address Management (IPAM).mp4 12MB 134 Scanning Monitoring & Patching Network Scanning Methodology.mp4 12MB 214 Wired Connectivity & Performance Issues Mismatched and Damaged Cables.mp4 12MB 102 Advanced Networking Devices VoIP PBX and Gateway.mp4 12MB 170 Physical Security & Network Attacks DDoS with ICMP and Smurfing.mp4 12MB 014 Ethernet Switching Demonstration Switch Dynamic Learning.mp4 12MB 190 Mitigation Techniques Signature Management.mp4 12MB 146 Remote Access Methods HTTPS Management URLs.mp4 11MB 103 Advanced Networking Devices Wireless Controller.mp4 11MB 077 Network Services Verify DHCP with Wireshark.mp4 11MB 027 Ethernet Switching Switch Port Mirroring.mp4 11MB 133 Scanning Monitoring & Patching Scanning Overview.mp4 11MB 050 IP Addressing and Subnetting Exercise 2 Identify the New Subnets.mp4 11MB 184 Authentication & Access Control Switch Port Security.mp4 11MB 127 Business Continuity Power Management.mp4 11MB 132 Business Continuity SLA Requirements.mp4 10MB 162 Identify Policies & Best Practices Safety Procedures and Policies.mp4 10MB 163 Physical Security & Network Attacks Let's Break into a Data Center.mp4 9MB 033 IP Routing and Forwarding Dynamic Routing Protocol Demonstration.mp4 9MB image.png 95KB 143 Scanning Monitoring & Patching Network Scanning with NMAP and Zenmap Lab-caption.srt 35KB 046 IP Addressing and Subnetting Borrowing Host Bits-caption.srt 26KB 130 Business Continuity Backup and Restore Hands On Lab-caption.srt 22KB 141 Scanning Monitoring & Patching Packet Capture and Analysis Lab-caption.srt 19KB 057 IP Addressing and Subnetting Test Your IPv4 Knowledge Lab-caption.srt 19KB 209 Network Troubleshooting Using CLI Network Tools tracert pathping nmap route-caption.srt 18KB 110 WAN Technologies WAN Types ISDNPRI T1-T3 E1-E3 and OC-caption.srt 18KB 085 Deploying Appropriate Cabling Solutions Network Termination Points-caption.srt 18KB 112 WAN Technologies WAN Characteristics Frame Relay ATM MPLS and DMVPN-caption.srt 17KB 206 Network Troubleshooting Software Tools-caption.srt 17KB 207 Network Troubleshooting Using CLI Network Tools ipconfig ping arp-caption.srt 17KB 205 Network Troubleshooting Hardware Tools-caption.srt 16KB 066 Wireless Technologies and Configurations Understanding Radio Channels-caption.srt 16KB 221 Troubleshooting Wireless Fighting Frequencies-caption.srt 16KB 083 Deploying Appropriate Cabling Solutions Copper Network Media Types-caption.srt 15KB 068 Wireless Technologies and Configurations Designing for Wireless Speed and Coverage-caption.srt 15KB 086 Deploying Appropriate Cabling Solutions Network Transceivers-caption.srt 15KB 223 Troubleshooting Wireless Misconfigurations-caption.srt 14KB 123 Network Diagram & Documentation Configuration and Monitoring Baselines-caption.srt 14KB 208 Network Troubleshooting Using CLI Network Tools nslookup dig-caption.srt 14KB 070 Wireless Technologies and Configurations Wireless Performance Improvements-caption.srt 14KB 187 Basic Wireless Network Security Wireless Authentication and Authorization Types-caption.srt 13KB 084 Deploying Appropriate Cabling Solutions Fiber Network Media Types-caption.srt 13KB 119 Network Diagram & Documentation Naming Conventions and Labeling-caption.srt 13KB 220 Troubleshooting Wireless The Nature of Airwaves-caption.srt 13KB 065 Wireless Technologies and Configurations Understanding Radio Frequency-caption.srt 13KB 210 Network Troubleshooting Using CLI Network Tools ifconfig iptables tcpdump and netstat-caption.srt 13KB 186 Basic Wireless Network Security The Wireless Security Evolution-caption.srt 13KB 093 Device Placement and Configuration Configuring a VLAN Interface Lab-caption.srt 13KB 114 WAN Technologies What is SIP Trunking-caption.srt 13KB 121 Network Diagram & Documentation SOPs and Work Instructions-caption.srt 12KB 089 Device Placement and Configuration Configure Switch Ports Lab-caption.srt 12KB 091 Device Placement and Configuration Configure IP Routing Lab-caption.srt 12KB 180 Authentication & Access Control AAA-caption.srt 12KB 183 Authentication & Access Control Demo Implementing 2FA-caption.srt 12KB 006 OSI Layers Ports & Protocols How Ports Are Used in TCPIP-caption.srt 12KB 139 Scanning Monitoring & Patching Logging and Review-caption.srt 12KB 164 Physical Security & Network Attacks Video Surveillance and Motion Detection-caption.srt 12KB 111 WAN Technologies WAN Types Cable DSL Dial-up-caption.srt 12KB 142 Scanning Monitoring & Patching Remediation and Patch Management-caption.srt 12KB 067 Wireless Technologies and Configurations Wireless Communication Technologies-caption.srt 12KB 120 Network Diagram & Documentation Documenting Wiring and Port Locations-caption.srt 12KB 011 Ethernet Switching Properties of Network Traffic-caption.srt 12KB 094 Device Placement and Configuration Configuring NAT Lab-caption.srt 11KB 003 OSI Layers Ports & Protocols TCPIP Suite Layers-caption.srt 11KB 116 Network Diagram & Documentation Network Documentation is Fun!-caption.srt 11KB 087 Device Placement and Configuration Network Device Placement-caption.srt 11KB 104 Virtualization & Network Storage Hypervisor Introduction-caption.srt 11KB 056 IP Addressing and Subnetting Planning and Assigning IP Addresses-caption.srt 11KB 079 Network Services DNS Methods Records and Design Options-caption.srt 11KB 167 Physical Security & Network Attacks Locks Asset Tags and Tamper Detection-caption.srt 11KB 039 IP Routing and Forwarding Enterprise Network Forwarding-caption.srt 11KB 129 Business Continuity Backups-caption.srt 11KB 176 Physical Security & Network Attacks DNS Spoofing (Poisoning)-caption.srt 11KB 088 Device Placement and Configuration Device Configuration Overview-caption.srt 11KB 028 IP Routing and Forwarding Introduction to IP Routing-caption.srt 11KB 095 Advanced Networking Devices Multi-Layer Switch Overview-caption.srt 11KB 136 Scanning Monitoring & Patching OS Discovery and Fingerprinting-caption.srt 11KB 008 OSI Layers Ports & Protocols Common Protocols and Their Well-known Ports-caption.srt 11KB 178 Physical Security & Network Attacks Wardriving and Deauthentication-caption.srt 11KB 076 Network Services DHCP Overview-caption.srt 11KB 175 Physical Security & Network Attacks Cryptolocker and Logic Bombs-caption.srt 11KB 165 Physical Security & Network Attacks Badges and Smart Cards-caption.srt 11KB 037 IP Routing and Forwarding Access Control Lists-caption.srt 11KB 222 Troubleshooting Wireless Understanding Antenna Types-caption.srt 11KB 177 Physical Security & Network Attacks Man-In-The-Middle with ARP Spoofing-caption.srt 11KB 017 Ethernet Switching Overview of 802.1Q and Trunks-caption.srt 11KB 092 Device Placement and Configuration Configuring DHCP Services Lab-caption.srt 11KB 138 Scanning Monitoring & Patching Vulnerability Scanning-caption.srt 11KB 118 Network Diagram & Documentation Creating Physical Diagrams-caption.srt 11KB 020 Ethernet Switching Predicting the MAC Address Table-caption.srt 11KB 001 OSI Layers Ports & Protocols A Tale of Two Kings-caption.srt 11KB 217 Wired Connectivity & Performance Issues VLAN Mismatches-caption.srt 11KB 147 Remote Access Methods VPNs-caption.srt 11KB 098 Advanced Networking Devices IDS and IPS-caption.srt 11KB 113 WAN Technologies What is PPP and PPPoE-caption.srt 10KB 040 IP Addressing and Subnetting IPv4 Overview-caption.srt 10KB 009 OSI Layers Ports & Protocols TCP's Three-way Handshake-caption.srt 10KB 117 Network Diagram & Documentation Creating Logical Network Diagrams-caption.srt 10KB 002 OSI Layers Ports & Protocols The 7 Layers of the OSI Model-caption.srt 10KB 025 Ethernet Switching STP Reacting to a Network Change-caption.srt 10KB 096 Advanced Networking Devices Configure Multi-Layer Switch Lab-caption.srt 10KB 149 Remote Access Methods Out-of-Band Management-caption.srt 10KB 013 Ethernet Switching How a Layer 2 Switch Works-caption.srt 10KB 081 Network Services Network Time Protocol (NTP)-caption.srt 10KB 018 Ethernet Switching Configuring an 802.1Q Ethernet Trunk-caption.srt 10KB 166 Physical Security & Network Attacks Biometrics-caption.srt 10KB 108 WAN Technologies Understanding the LAN MAN and WAN Difference-caption.srt 10KB 107 Virtualization & Network Storage Network Storage-caption.srt 10KB 004 OSI Layers Ports & Protocols Core TCPIP Protocols-caption.srt 10KB 069 Wireless Technologies and Configurations Understanding Wireless Antennas-caption.srt 10KB 016 Ethernet Switching Configuring a VLAN-caption.srt 10KB 182 Authentication & Access Control Using Two-Factor Authentication (2FA)-caption.srt 10KB 042 IP Addressing and Subnetting Converting Decimal to Binary-caption.srt 10KB 152 Identify Policies & Best Practices On-boarding and Off-boarding-caption.srt 10KB 019 Ethernet Switching How Address Resolution Protocol (ARP) Operates-caption.srt 10KB 054 IP Addressing and Subnetting Calculate the Number of Hosts per Subnet-caption.srt 10KB 055 IP Addressing and Subnetting Determine the Subnet Based on a Host's IP Address-caption.srt 10KB 122 Network Diagram & Documentation Network Change Management-caption.srt 10KB 179 Physical Security & Network Attacks Evil Twins and Rogue Access Points-caption.srt 10KB 194 Mitigation Techniques Switch Port Protections-caption.srt 10KB 030 IP Routing and Forwarding Options for Static Routes-caption.srt 10KB 058 IP Addressing and Subnetting IPv6 Concepts-caption.srt 10KB 090 Device Placement and Configuration Configure IP Addresses Lab-caption.srt 10KB 115 WAN Technologies The Physical Reality of a WAN Connection-caption.srt 10KB 059 Network Topologies Wired Topologies-caption.srt 10KB 061 Network Topologies Types of Networks-caption.srt 9KB 010 OSI Layers Ports & Protocols Wireshark Verification of a TCP 3-Way Handshake-caption.srt 9KB 188 Mitigation Techniques Network Device Hardening-caption.srt 9KB 049 IP Addressing and Subnetting Exercise 1 Identify the New Subnets-caption.srt 9KB 012 Ethernet Switching Layer 2 Ethernet Addresses-caption.srt 9KB 224 Common Network Service Issues Troubleshooting Name Resolution-caption.srt 9KB 140 Scanning Monitoring & Patching Packet and Traffic Analysis-caption.srt 9KB 041 IP Addressing and Subnetting Binary Basics-caption.srt 9KB 196 Mitigation Techniques Filtering with Access Control Lists (ACLs)-caption.srt 9KB 100 Advanced Networking Devices Security Network Devices-caption.srt 9KB 173 Physical Security & Network Attacks Social Engineering and Insider Threats-caption.srt 9KB 137 Scanning Monitoring & Patching Motivators for Vulnerability Management-caption.srt 9KB 038 IP Routing and Forwarding ACL Demonstration-caption.srt 9KB 168 Physical Security & Network Attacks DoS and PDoS (Permanent Denial of Service)-caption.srt 9KB 169 Physical Security & Network Attacks DDoS (Distributed Denial of Service)-caption.srt 9KB 135 Scanning Monitoring & Patching Port Scanning and Discovery-caption.srt 9KB 048 IP Addressing and Subnetting Identifying New Subnets-caption.srt 9KB 032 IP Routing and Forwarding Dynamic Routing Protocol Overview-caption.srt 9KB 005 OSI Layers Ports & Protocols Wireshark Views of Core TCPIP Protocols-caption.srt 9KB 064 Wireless Technologies and Configurations The Purpose of Wireless-caption.srt 9KB 051 IP Addressing and Subnetting ID Valid Host Addresses on a Subnet-caption.srt 9KB 029 IP Routing and Forwarding How to Train a Router-caption.srt 9KB 052 IP Addressing and Subnetting Exercise 1 ID Valid Host Addresses-caption.srt 9KB 034 IP Routing and Forwarding Address Translation with PAT-caption.srt 9KB 071 Cloud Concepts Types of Services-caption.srt 9KB 174 Physical Security & Network Attacks Ransomware and Scareware-caption.srt 9KB 044 IP Addressing and Subnetting The IP Mask-caption.srt 9KB 126 Business Continuity Load Sharing and Balancing-caption.srt 9KB 145 Remote Access Methods Telnet and SSH for CLI Remote Access-caption.srt 9KB 172 Physical Security & Network Attacks Let's Go Phishing-caption.srt 9KB 023 Ethernet Switching Game Predict MAC Table After PC3 Pings PC5-caption.srt 9KB 073 Cloud Concepts Connectivity Methods-caption.srt 9KB 074 Cloud Concepts Security Implications Considerations-caption.srt 9KB 026 Ethernet Switching Design Considerations and PoE-caption.srt 8KB 226 Common Network Service Issues Troubleshooting IP Addressing-caption.srt 8KB 031 IP Routing and Forwarding Configuring Static Routes-caption.srt 8KB 158 Identify Policies & Best Practices Bring Your Own Device (BYOD)-caption.srt 8KB 181 Authentication & Access Control Multi-factor Authentication Overview-caption.srt 8KB 218 Wired Connectivity & Performance Issues Native VLAN Mismatches-caption.srt 8KB 024 Ethernet Switching Switching Loops and Spanning Tree Protocol (STP)-caption.srt 8KB 228 Common Network Service Issues Troubleshooting Miscellaneous Service Issues-caption.srt 8KB 036 IP Routing and Forwarding Using Wireshark to Verify IP Translations-caption.srt 8KB 043 IP Addressing and Subnetting Converting Binary to Decimal-caption.srt 8KB 105 Virtualization & Network Storage Virtual Networking Components-caption.srt 8KB 201 Troubleshooting Methodology Establish a Theory of Probable Cause-caption.srt 8KB 227 Common Network Service Issues Troubleshooting Security Settings-caption.srt 8KB 124 Network Diagram & Documentation Inventory Management-caption.srt 8KB 225 Common Network Service Issues Troubleshooting MAC Addressing-caption.srt 8KB 097 Advanced Networking Devices Load Balancer Overview-caption.srt 8KB 211 Wired Connectivity & Performance Issues Attenuation Latency and Jitter-caption.srt 8KB 062 Network Topologies Introducing the Internet of Things (IoT)-caption.srt 8KB 022 Ethernet Switching Game Predict MAC Table After PC1 Pings PC4-caption.srt 8KB 212 Wired Connectivity & Performance Issues Crosstalk EMI OpenShort-caption.srt 8KB 192 Mitigation Techniques Privileged User Accounts and Role Separation-caption.srt 8KB 144 Scanning Monitoring & Patching Baselines-caption.srt 8KB 219 Wired Connectivity & Performance Issues Bottlenecks-caption.srt 8KB 053 IP Addressing and Subnetting Exercise 2 ID Valid Host Addresses-caption.srt 8KB 198 Mitigation Techniques Penetration Testing-caption.srt 8KB 101 Advanced Networking Devices AAARADIUS Server-caption.srt 8KB 047 IP Addressing and Subnetting Practicing the Finger Game-caption.srt 8KB 128 Business Continuity Site Recovery Options-caption.srt 8KB 148 Remote Access Methods Remote Desktop Access-caption.srt 8KB 185 Authentication & Access Control Access Control Methods-caption.srt 7KB 125 Business Continuity Availability Concepts-caption.srt 7KB 035 IP Routing and Forwarding One-to-one Translations with NAT-caption.srt 7KB 060 Network Topologies Wireless Topologies-caption.srt 7KB 171 Physical Security & Network Attacks DDoS with DNS and NTP-caption.srt 7KB 045 IP Addressing and Subnetting Practice Using a Different IP Mask-caption.srt 7KB 215 Wired Connectivity & Performance Issues Bad Ports and LED Status Indicators-caption.srt 7KB 075 Cloud Concepts Local and Cloud Resource Relationships-caption.srt 7KB 063 Network Topologies Internet of Things (IoT) Technologies-caption.srt 7KB 157 Identify Policies & Best Practices Incident Response Policies-caption.srt 7KB 109 WAN Technologies WAN Transmission over Copper Fiber Wireless and Satellite-caption.srt 7KB 216 Wired Connectivity & Performance Issues Duplex and Speed Mismatches-caption.srt 7KB 099 Advanced Networking Devices Proxy Servers and Content Filtering-caption.srt 7KB 080 Network Services DNS Testing and Validation-caption.srt 7KB 191 Mitigation Techniques File Integrity Monitoring-caption.srt 7KB 204 Troubleshooting Methodology Problem Solving Verification and Documentation-caption.srt 7KB 134 Scanning Monitoring & Patching Network Scanning Methodology-caption.srt 7KB 213 Wired Connectivity & Performance Issues Incorrect Pin-Outs or Cable Types-caption.srt 7KB 170 Physical Security & Network Attacks DDoS with ICMP and Smurfing-caption.srt 7KB 106 Virtualization & Network Storage Creating a Virtual Switch and VM Lab-caption.srt 7KB 153 Identify Policies & Best Practices Licensing Restrictions-caption.srt 7KB 195 Mitigation Techniques The Native VLAN-caption.srt 7KB 189 Mitigation Techniques Hardening a Windows Server System-caption.srt 7KB 155 Identify Policies & Best Practices Data Loss Prevention-caption.srt 7KB 078 Network Services DNS Overview-caption.srt 7KB 021 Ethernet Switching Validating MAC Address Table Predictions-caption.srt 6KB 082 Network Services IP Address Management (IPAM)-caption.srt 6KB 102 Advanced Networking Devices VoIP PBX and Gateway-caption.srt 6KB 161 Identify Policies & Best Practices System Life Cycle-caption.srt 6KB 184 Authentication & Access Control Switch Port Security-caption.srt 6KB 103 Advanced Networking Devices Wireless Controller-caption.srt 6KB 203 Troubleshooting Methodology Establish a Plan of Action to Solve the Problem-caption.srt 6KB 146 Remote Access Methods HTTPS Management URLs-caption.srt 6KB 156 Identify Policies & Best Practices Remote Access Policies-caption.srt 6KB 199 Troubleshooting Methodology A Network Troubleshooting Methodology-caption.srt 6KB 072 Cloud Concepts Cloud Delivery Models-caption.srt 6KB 193 Mitigation Techniques Network Segmentation-caption.srt 6KB 015 Ethernet Switching Understanding VLANs-caption.srt 6KB 160 Identify Policies & Best Practices Non-disclosure Agreements (NDA)-caption.srt 6KB 150 Identify Policies & Best Practices Privileged User Agreement-caption.srt 6KB 007 OSI Layers Ports & Protocols Verifying L4 Ports with Wireshark-caption.srt 6KB 131 Business Continuity MTTR and MTBF-caption.srt 6KB 014 Ethernet Switching Demonstration Switch Dynamic Learning-caption.srt 6KB 133 Scanning Monitoring & Patching Scanning Overview-caption.srt 6KB 200 Troubleshooting Methodology Identify the Problem-caption.srt 6KB 151 Identify Policies & Best Practices Password Policy-caption.srt 6KB 027 Ethernet Switching Switch Port Mirroring-caption.srt 6KB 077 Network Services Verify DHCP with Wireshark-caption.srt 5KB 202 Troubleshooting Methodology Test the Theory to Determine the Root Cause-caption.srt 5KB 159 Identify Policies & Best Practices Acceptable Use Policy (AUP)-caption.srt 5KB 197 Mitigation Techniques Honeypots and Honeynets-caption.srt 5KB 214 Wired Connectivity & Performance Issues Mismatched and Damaged Cables-caption.srt 5KB 154 Identify Policies & Best Practices International Export Controls-caption.srt 5KB 050 IP Addressing and Subnetting Exercise 2 Identify the New Subnets-caption.srt 5KB 190 Mitigation Techniques Signature Management-caption.srt 5KB 163 Physical Security & Network Attacks Let's Break into a Data Center-caption.srt 5KB 033 IP Routing and Forwarding Dynamic Routing Protocol Demonstration-caption.srt 4KB 132 Business Continuity SLA Requirements-caption.srt 4KB 162 Identify Policies & Best Practices Safety Procedures and Policies-caption.srt 4KB 127 Business Continuity Power Management-caption.srt 4KB