589689.xyz

CBT Nuggets CompTIA Network+ (N10-007)

  • 收录时间:2020-08-20 04:41:45
  • 文件大小:4GB
  • 下载次数:15
  • 最近下载:2021-01-16 03:58:59
  • 磁力链接:

文件列表

  1. 143 Scanning Monitoring & Patching Network Scanning with NMAP and Zenmap Lab.mp4 65MB
  2. 046 IP Addressing and Subnetting Borrowing Host Bits.mp4 57MB
  3. 130 Business Continuity Backup and Restore Hands On Lab.mp4 53MB
  4. 141 Scanning Monitoring & Patching Packet Capture and Analysis Lab.mp4 39MB
  5. 057 IP Addressing and Subnetting Test Your IPv4 Knowledge Lab.mp4 39MB
  6. 110 WAN Technologies WAN Types ISDNPRI T1-T3 E1-E3 and OC.mp4 37MB
  7. 085 Deploying Appropriate Cabling Solutions Network Termination Points.mp4 35MB
  8. 209 Network Troubleshooting Using CLI Network Tools tracert pathping nmap route.mp4 34MB
  9. 112 WAN Technologies WAN Characteristics Frame Relay ATM MPLS and DMVPN.mp4 33MB
  10. 221 Troubleshooting Wireless Fighting Frequencies.mp4 33MB
  11. 206 Network Troubleshooting Software Tools.mp4 32MB
  12. 207 Network Troubleshooting Using CLI Network Tools ipconfig ping arp.mp4 32MB
  13. 205 Network Troubleshooting Hardware Tools.mp4 32MB
  14. 086 Deploying Appropriate Cabling Solutions Network Transceivers.mp4 31MB
  15. 068 Wireless Technologies and Configurations Designing for Wireless Speed and Coverage.mp4 31MB
  16. 066 Wireless Technologies and Configurations Understanding Radio Channels.mp4 30MB
  17. 083 Deploying Appropriate Cabling Solutions Copper Network Media Types.mp4 30MB
  18. 129 Business Continuity Backups.mp4 29MB
  19. 208 Network Troubleshooting Using CLI Network Tools nslookup dig.mp4 28MB
  20. 217 Wired Connectivity & Performance Issues VLAN Mismatches.mp4 28MB
  21. 070 Wireless Technologies and Configurations Wireless Performance Improvements.mp4 28MB
  22. 223 Troubleshooting Wireless Misconfigurations.mp4 27MB
  23. 119 Network Diagram & Documentation Naming Conventions and Labeling.mp4 27MB
  24. 123 Network Diagram & Documentation Configuration and Monitoring Baselines.mp4 26MB
  25. 210 Network Troubleshooting Using CLI Network Tools ifconfig iptables tcpdump and netstat.mp4 26MB
  26. 084 Deploying Appropriate Cabling Solutions Fiber Network Media Types.mp4 26MB
  27. 187 Basic Wireless Network Security Wireless Authentication and Authorization Types.mp4 26MB
  28. 093 Device Placement and Configuration Configuring a VLAN Interface Lab.mp4 26MB
  29. 220 Troubleshooting Wireless The Nature of Airwaves.mp4 26MB
  30. 067 Wireless Technologies and Configurations Wireless Communication Technologies.mp4 26MB
  31. 121 Network Diagram & Documentation SOPs and Work Instructions.mp4 25MB
  32. 186 Basic Wireless Network Security The Wireless Security Evolution.mp4 25MB
  33. 114 WAN Technologies What is SIP Trunking.mp4 25MB
  34. 194 Mitigation Techniques Switch Port Protections.mp4 25MB
  35. 006 OSI Layers Ports & Protocols How Ports Are Used in TCPIP.mp4 25MB
  36. 152 Identify Policies & Best Practices On-boarding and Off-boarding.mp4 25MB
  37. 224 Common Network Service Issues Troubleshooting Name Resolution.mp4 25MB
  38. 065 Wireless Technologies and Configurations Understanding Radio Frequency.mp4 25MB
  39. 089 Device Placement and Configuration Configure Switch Ports Lab.mp4 24MB
  40. 196 Mitigation Techniques Filtering with Access Control Lists (ACLs).mp4 24MB
  41. 094 Device Placement and Configuration Configuring NAT Lab.mp4 24MB
  42. 091 Device Placement and Configuration Configure IP Routing Lab.mp4 23MB
  43. 111 WAN Technologies WAN Types Cable DSL Dial-up.mp4 23MB
  44. 059 Network Topologies Wired Topologies.mp4 23MB
  45. 061 Network Topologies Types of Networks.mp4 22MB
  46. 126 Business Continuity Load Sharing and Balancing.mp4 22MB
  47. 095 Advanced Networking Devices Multi-Layer Switch Overview.mp4 22MB
  48. 056 IP Addressing and Subnetting Planning and Assigning IP Addresses.mp4 22MB
  49. 008 OSI Layers Ports & Protocols Common Protocols and Their Well-known Ports.mp4 22MB
  50. 079 Network Services DNS Methods Records and Design Options.mp4 22MB
  51. 054 IP Addressing and Subnetting Calculate the Number of Hosts per Subnet.mp4 22MB
  52. 028 IP Routing and Forwarding Introduction to IP Routing.mp4 22MB
  53. 188 Mitigation Techniques Network Device Hardening.mp4 22MB
  54. 176 Physical Security & Network Attacks DNS Spoofing (Poisoning).mp4 22MB
  55. 016 Ethernet Switching Configuring a VLAN.mp4 22MB
  56. 116 Network Diagram & Documentation Network Documentation is Fun!.mp4 22MB
  57. 142 Scanning Monitoring & Patching Remediation and Patch Management.mp4 22MB
  58. 076 Network Services DHCP Overview.mp4 22MB
  59. 088 Device Placement and Configuration Device Configuration Overview.mp4 22MB
  60. 074 Cloud Concepts Security Implications Considerations.mp4 22MB
  61. 011 Ethernet Switching Properties of Network Traffic.mp4 22MB
  62. 017 Ethernet Switching Overview of 802.1Q and Trunks.mp4 22MB
  63. 139 Scanning Monitoring & Patching Logging and Review.mp4 22MB
  64. 177 Physical Security & Network Attacks Man-In-The-Middle with ARP Spoofing.mp4 22MB
  65. 136 Scanning Monitoring & Patching OS Discovery and Fingerprinting.mp4 22MB
  66. 055 IP Addressing and Subnetting Determine the Subnet Based on a Host's IP Address.mp4 22MB
  67. 049 IP Addressing and Subnetting Exercise 1 Identify the New Subnets.mp4 22MB
  68. 211 Wired Connectivity & Performance Issues Attenuation Latency and Jitter.mp4 22MB
  69. 218 Wired Connectivity & Performance Issues Native VLAN Mismatches.mp4 22MB
  70. 062 Network Topologies Introducing the Internet of Things (IoT).mp4 22MB
  71. 104 Virtualization & Network Storage Hypervisor Introduction.mp4 22MB
  72. 003 OSI Layers Ports & Protocols TCPIP Suite Layers.mp4 22MB
  73. 183 Authentication & Access Control Demo Implementing 2FA.mp4 22MB
  74. 052 IP Addressing and Subnetting Exercise 1 ID Valid Host Addresses.mp4 21MB
  75. 040 IP Addressing and Subnetting IPv4 Overview.mp4 21MB
  76. 096 Advanced Networking Devices Configure Multi-Layer Switch Lab.mp4 21MB
  77. 020 Ethernet Switching Predicting the MAC Address Table.mp4 21MB
  78. 087 Device Placement and Configuration Network Device Placement.mp4 21MB
  79. 120 Network Diagram & Documentation Documenting Wiring and Port Locations.mp4 21MB
  80. 041 IP Addressing and Subnetting Binary Basics.mp4 21MB
  81. 043 IP Addressing and Subnetting Converting Binary to Decimal.mp4 21MB
  82. 226 Common Network Service Issues Troubleshooting IP Addressing.mp4 21MB
  83. 175 Physical Security & Network Attacks Cryptolocker and Logic Bombs.mp4 21MB
  84. 009 OSI Layers Ports & Protocols TCP's Three-way Handshake.mp4 21MB
  85. 180 Authentication & Access Control AAA.mp4 21MB
  86. 071 Cloud Concepts Types of Services.mp4 21MB
  87. 037 IP Routing and Forwarding Access Control Lists.mp4 21MB
  88. 092 Device Placement and Configuration Configuring DHCP Services Lab.mp4 21MB
  89. 058 IP Addressing and Subnetting IPv6 Concepts.mp4 21MB
  90. 013 Ethernet Switching How a Layer 2 Switch Works.mp4 21MB
  91. 019 Ethernet Switching How Address Resolution Protocol (ARP) Operates.mp4 21MB
  92. 048 IP Addressing and Subnetting Identifying New Subnets.mp4 21MB
  93. 051 IP Addressing and Subnetting ID Valid Host Addresses on a Subnet.mp4 21MB
  94. 212 Wired Connectivity & Performance Issues Crosstalk EMI OpenShort.mp4 21MB
  95. 044 IP Addressing and Subnetting The IP Mask.mp4 21MB
  96. 178 Physical Security & Network Attacks Wardriving and Deauthentication.mp4 21MB
  97. 167 Physical Security & Network Attacks Locks Asset Tags and Tamper Detection.mp4 21MB
  98. 222 Troubleshooting Wireless Understanding Antenna Types.mp4 20MB
  99. 039 IP Routing and Forwarding Enterprise Network Forwarding.mp4 20MB
  100. 018 Ethernet Switching Configuring an 802.1Q Ethernet Trunk.mp4 20MB
  101. 201 Troubleshooting Methodology Establish a Theory of Probable Cause.mp4 20MB
  102. 042 IP Addressing and Subnetting Converting Decimal to Binary.mp4 20MB
  103. 225 Common Network Service Issues Troubleshooting MAC Addressing.mp4 20MB
  104. 228 Common Network Service Issues Troubleshooting Miscellaneous Service Issues.mp4 20MB
  105. 147 Remote Access Methods VPNs.mp4 20MB
  106. 164 Physical Security & Network Attacks Video Surveillance and Motion Detection.mp4 20MB
  107. 073 Cloud Concepts Connectivity Methods.mp4 20MB
  108. 025 Ethernet Switching STP Reacting to a Network Change.mp4 20MB
  109. 069 Wireless Technologies and Configurations Understanding Wireless Antennas.mp4 20MB
  110. 117 Network Diagram & Documentation Creating Logical Network Diagrams.mp4 20MB
  111. 002 OSI Layers Ports & Protocols The 7 Layers of the OSI Model.mp4 20MB
  112. 227 Common Network Service Issues Troubleshooting Security Settings.mp4 20MB
  113. 113 WAN Technologies What is PPP and PPPoE.mp4 20MB
  114. 004 OSI Layers Ports & Protocols Core TCPIP Protocols.mp4 20MB
  115. 125 Business Continuity Availability Concepts.mp4 20MB
  116. 128 Business Continuity Site Recovery Options.mp4 20MB
  117. 030 IP Routing and Forwarding Options for Static Routes.mp4 20MB
  118. 108 WAN Technologies Understanding the LAN MAN and WAN Difference.mp4 20MB
  119. 192 Mitigation Techniques Privileged User Accounts and Role Separation.mp4 20MB
  120. 081 Network Services Network Time Protocol (NTP).mp4 19MB
  121. 158 Identify Policies & Best Practices Bring Your Own Device (BYOD).mp4 19MB
  122. 090 Device Placement and Configuration Configure IP Addresses Lab.mp4 19MB
  123. 165 Physical Security & Network Attacks Badges and Smart Cards.mp4 19MB
  124. 219 Wired Connectivity & Performance Issues Bottlenecks.mp4 19MB
  125. 098 Advanced Networking Devices IDS and IPS.mp4 19MB
  126. 166 Physical Security & Network Attacks Biometrics.mp4 19MB
  127. 118 Network Diagram & Documentation Creating Physical Diagrams.mp4 19MB
  128. 001 OSI Layers Ports & Protocols A Tale of Two Kings.mp4 19MB
  129. 107 Virtualization & Network Storage Network Storage.mp4 19MB
  130. 122 Network Diagram & Documentation Network Change Management.mp4 19MB
  131. 053 IP Addressing and Subnetting Exercise 2 ID Valid Host Addresses.mp4 19MB
  132. 149 Remote Access Methods Out-of-Band Management.mp4 19MB
  133. 157 Identify Policies & Best Practices Incident Response Policies.mp4 19MB
  134. 198 Mitigation Techniques Penetration Testing.mp4 19MB
  135. 138 Scanning Monitoring & Patching Vulnerability Scanning.mp4 19MB
  136. 010 OSI Layers Ports & Protocols Wireshark Verification of a TCP 3-Way Handshake.mp4 19MB
  137. 215 Wired Connectivity & Performance Issues Bad Ports and LED Status Indicators.mp4 19MB
  138. 195 Mitigation Techniques The Native VLAN.mp4 18MB
  139. 179 Physical Security & Network Attacks Evil Twins and Rogue Access Points.mp4 18MB
  140. 075 Cloud Concepts Local and Cloud Resource Relationships.mp4 18MB
  141. 115 WAN Technologies The Physical Reality of a WAN Connection.mp4 18MB
  142. 100 Advanced Networking Devices Security Network Devices.mp4 18MB
  143. 023 Ethernet Switching Game Predict MAC Table After PC3 Pings PC5.mp4 18MB
  144. 060 Network Topologies Wireless Topologies.mp4 18MB
  145. 031 IP Routing and Forwarding Configuring Static Routes.mp4 18MB
  146. 012 Ethernet Switching Layer 2 Ethernet Addresses.mp4 18MB
  147. 038 IP Routing and Forwarding ACL Demonstration.mp4 18MB
  148. 029 IP Routing and Forwarding How to Train a Router.mp4 18MB
  149. 005 OSI Layers Ports & Protocols Wireshark Views of Core TCPIP Protocols.mp4 18MB
  150. 182 Authentication & Access Control Using Two-Factor Authentication (2FA).mp4 18MB
  151. 063 Network Topologies Internet of Things (IoT) Technologies.mp4 18MB
  152. 181 Authentication & Access Control Multi-factor Authentication Overview.mp4 18MB
  153. 140 Scanning Monitoring & Patching Packet and Traffic Analysis.mp4 17MB
  154. 216 Wired Connectivity & Performance Issues Duplex and Speed Mismatches.mp4 17MB
  155. 204 Troubleshooting Methodology Problem Solving Verification and Documentation.mp4 17MB
  156. 034 IP Routing and Forwarding Address Translation with PAT.mp4 17MB
  157. 173 Physical Security & Network Attacks Social Engineering and Insider Threats.mp4 17MB
  158. 153 Identify Policies & Best Practices Licensing Restrictions.mp4 17MB
  159. 137 Scanning Monitoring & Patching Motivators for Vulnerability Management.mp4 17MB
  160. 169 Physical Security & Network Attacks DDoS (Distributed Denial of Service).mp4 17MB
  161. 047 IP Addressing and Subnetting Practicing the Finger Game.mp4 17MB
  162. 191 Mitigation Techniques File Integrity Monitoring.mp4 17MB
  163. 135 Scanning Monitoring & Patching Port Scanning and Discovery.mp4 17MB
  164. 026 Ethernet Switching Design Considerations and PoE.mp4 17MB
  165. 145 Remote Access Methods Telnet and SSH for CLI Remote Access.mp4 17MB
  166. 032 IP Routing and Forwarding Dynamic Routing Protocol Overview.mp4 17MB
  167. 024 Ethernet Switching Switching Loops and Spanning Tree Protocol (STP).mp4 17MB
  168. 213 Wired Connectivity & Performance Issues Incorrect Pin-Outs or Cable Types.mp4 17MB
  169. 022 Ethernet Switching Game Predict MAC Table After PC1 Pings PC4.mp4 16MB
  170. 036 IP Routing and Forwarding Using Wireshark to Verify IP Translations.mp4 16MB
  171. 045 IP Addressing and Subnetting Practice Using a Different IP Mask.mp4 16MB
  172. 064 Wireless Technologies and Configurations The Purpose of Wireless.mp4 16MB
  173. 161 Identify Policies & Best Practices System Life Cycle.mp4 16MB
  174. 168 Physical Security & Network Attacks DoS and PDoS (Permanent Denial of Service).mp4 16MB
  175. 189 Mitigation Techniques Hardening a Windows Server System.mp4 16MB
  176. 199 Troubleshooting Methodology A Network Troubleshooting Methodology.mp4 16MB
  177. 203 Troubleshooting Methodology Establish a Plan of Action to Solve the Problem.mp4 15MB
  178. 174 Physical Security & Network Attacks Ransomware and Scareware.mp4 15MB
  179. 155 Identify Policies & Best Practices Data Loss Prevention.mp4 15MB
  180. 193 Mitigation Techniques Network Segmentation.mp4 15MB
  181. 148 Remote Access Methods Remote Desktop Access.mp4 15MB
  182. 124 Network Diagram & Documentation Inventory Management.mp4 15MB
  183. 200 Troubleshooting Methodology Identify the Problem.mp4 15MB
  184. 105 Virtualization & Network Storage Virtual Networking Components.mp4 15MB
  185. 160 Identify Policies & Best Practices Non-disclosure Agreements (NDA).mp4 15MB
  186. 144 Scanning Monitoring & Patching Baselines.mp4 15MB
  187. 150 Identify Policies & Best Practices Privileged User Agreement.mp4 15MB
  188. 172 Physical Security & Network Attacks Let's Go Phishing.mp4 15MB
  189. 171 Physical Security & Network Attacks DDoS with DNS and NTP.mp4 15MB
  190. 097 Advanced Networking Devices Load Balancer Overview.mp4 15MB
  191. 035 IP Routing and Forwarding One-to-one Translations with NAT.mp4 15MB
  192. 131 Business Continuity MTTR and MTBF.mp4 15MB
  193. 072 Cloud Concepts Cloud Delivery Models.mp4 15MB
  194. 109 WAN Technologies WAN Transmission over Copper Fiber Wireless and Satellite.mp4 14MB
  195. 101 Advanced Networking Devices AAARADIUS Server.mp4 14MB
  196. 156 Identify Policies & Best Practices Remote Access Policies.mp4 14MB
  197. 151 Identify Policies & Best Practices Password Policy.mp4 14MB
  198. 080 Network Services DNS Testing and Validation.mp4 14MB
  199. 202 Troubleshooting Methodology Test the Theory to Determine the Root Cause.mp4 13MB
  200. 185 Authentication & Access Control Access Control Methods.mp4 13MB
  201. 159 Identify Policies & Best Practices Acceptable Use Policy (AUP).mp4 13MB
  202. 021 Ethernet Switching Validating MAC Address Table Predictions.mp4 13MB
  203. 154 Identify Policies & Best Practices International Export Controls.mp4 13MB
  204. 099 Advanced Networking Devices Proxy Servers and Content Filtering.mp4 13MB
  205. 106 Virtualization & Network Storage Creating a Virtual Switch and VM Lab.mp4 13MB
  206. 197 Mitigation Techniques Honeypots and Honeynets.mp4 13MB
  207. 015 Ethernet Switching Understanding VLANs.mp4 13MB
  208. 007 OSI Layers Ports & Protocols Verifying L4 Ports with Wireshark.mp4 13MB
  209. 078 Network Services DNS Overview.mp4 13MB
  210. 082 Network Services IP Address Management (IPAM).mp4 12MB
  211. 134 Scanning Monitoring & Patching Network Scanning Methodology.mp4 12MB
  212. 214 Wired Connectivity & Performance Issues Mismatched and Damaged Cables.mp4 12MB
  213. 102 Advanced Networking Devices VoIP PBX and Gateway.mp4 12MB
  214. 170 Physical Security & Network Attacks DDoS with ICMP and Smurfing.mp4 12MB
  215. 014 Ethernet Switching Demonstration Switch Dynamic Learning.mp4 12MB
  216. 190 Mitigation Techniques Signature Management.mp4 12MB
  217. 146 Remote Access Methods HTTPS Management URLs.mp4 11MB
  218. 103 Advanced Networking Devices Wireless Controller.mp4 11MB
  219. 077 Network Services Verify DHCP with Wireshark.mp4 11MB
  220. 027 Ethernet Switching Switch Port Mirroring.mp4 11MB
  221. 133 Scanning Monitoring & Patching Scanning Overview.mp4 11MB
  222. 050 IP Addressing and Subnetting Exercise 2 Identify the New Subnets.mp4 11MB
  223. 184 Authentication & Access Control Switch Port Security.mp4 11MB
  224. 127 Business Continuity Power Management.mp4 11MB
  225. 132 Business Continuity SLA Requirements.mp4 10MB
  226. 162 Identify Policies & Best Practices Safety Procedures and Policies.mp4 10MB
  227. 163 Physical Security & Network Attacks Let's Break into a Data Center.mp4 9MB
  228. 033 IP Routing and Forwarding Dynamic Routing Protocol Demonstration.mp4 9MB
  229. image.png 95KB
  230. 143 Scanning Monitoring & Patching Network Scanning with NMAP and Zenmap Lab-caption.srt 35KB
  231. 046 IP Addressing and Subnetting Borrowing Host Bits-caption.srt 26KB
  232. 130 Business Continuity Backup and Restore Hands On Lab-caption.srt 22KB
  233. 141 Scanning Monitoring & Patching Packet Capture and Analysis Lab-caption.srt 19KB
  234. 057 IP Addressing and Subnetting Test Your IPv4 Knowledge Lab-caption.srt 19KB
  235. 209 Network Troubleshooting Using CLI Network Tools tracert pathping nmap route-caption.srt 18KB
  236. 110 WAN Technologies WAN Types ISDNPRI T1-T3 E1-E3 and OC-caption.srt 18KB
  237. 085 Deploying Appropriate Cabling Solutions Network Termination Points-caption.srt 18KB
  238. 112 WAN Technologies WAN Characteristics Frame Relay ATM MPLS and DMVPN-caption.srt 17KB
  239. 206 Network Troubleshooting Software Tools-caption.srt 17KB
  240. 207 Network Troubleshooting Using CLI Network Tools ipconfig ping arp-caption.srt 17KB
  241. 205 Network Troubleshooting Hardware Tools-caption.srt 16KB
  242. 066 Wireless Technologies and Configurations Understanding Radio Channels-caption.srt 16KB
  243. 221 Troubleshooting Wireless Fighting Frequencies-caption.srt 16KB
  244. 083 Deploying Appropriate Cabling Solutions Copper Network Media Types-caption.srt 15KB
  245. 068 Wireless Technologies and Configurations Designing for Wireless Speed and Coverage-caption.srt 15KB
  246. 086 Deploying Appropriate Cabling Solutions Network Transceivers-caption.srt 15KB
  247. 223 Troubleshooting Wireless Misconfigurations-caption.srt 14KB
  248. 123 Network Diagram & Documentation Configuration and Monitoring Baselines-caption.srt 14KB
  249. 208 Network Troubleshooting Using CLI Network Tools nslookup dig-caption.srt 14KB
  250. 070 Wireless Technologies and Configurations Wireless Performance Improvements-caption.srt 14KB
  251. 187 Basic Wireless Network Security Wireless Authentication and Authorization Types-caption.srt 13KB
  252. 084 Deploying Appropriate Cabling Solutions Fiber Network Media Types-caption.srt 13KB
  253. 119 Network Diagram & Documentation Naming Conventions and Labeling-caption.srt 13KB
  254. 220 Troubleshooting Wireless The Nature of Airwaves-caption.srt 13KB
  255. 065 Wireless Technologies and Configurations Understanding Radio Frequency-caption.srt 13KB
  256. 210 Network Troubleshooting Using CLI Network Tools ifconfig iptables tcpdump and netstat-caption.srt 13KB
  257. 186 Basic Wireless Network Security The Wireless Security Evolution-caption.srt 13KB
  258. 093 Device Placement and Configuration Configuring a VLAN Interface Lab-caption.srt 13KB
  259. 114 WAN Technologies What is SIP Trunking-caption.srt 13KB
  260. 121 Network Diagram & Documentation SOPs and Work Instructions-caption.srt 12KB
  261. 089 Device Placement and Configuration Configure Switch Ports Lab-caption.srt 12KB
  262. 091 Device Placement and Configuration Configure IP Routing Lab-caption.srt 12KB
  263. 180 Authentication & Access Control AAA-caption.srt 12KB
  264. 183 Authentication & Access Control Demo Implementing 2FA-caption.srt 12KB
  265. 006 OSI Layers Ports & Protocols How Ports Are Used in TCPIP-caption.srt 12KB
  266. 139 Scanning Monitoring & Patching Logging and Review-caption.srt 12KB
  267. 164 Physical Security & Network Attacks Video Surveillance and Motion Detection-caption.srt 12KB
  268. 111 WAN Technologies WAN Types Cable DSL Dial-up-caption.srt 12KB
  269. 142 Scanning Monitoring & Patching Remediation and Patch Management-caption.srt 12KB
  270. 067 Wireless Technologies and Configurations Wireless Communication Technologies-caption.srt 12KB
  271. 120 Network Diagram & Documentation Documenting Wiring and Port Locations-caption.srt 12KB
  272. 011 Ethernet Switching Properties of Network Traffic-caption.srt 12KB
  273. 094 Device Placement and Configuration Configuring NAT Lab-caption.srt 11KB
  274. 003 OSI Layers Ports & Protocols TCPIP Suite Layers-caption.srt 11KB
  275. 116 Network Diagram & Documentation Network Documentation is Fun!-caption.srt 11KB
  276. 087 Device Placement and Configuration Network Device Placement-caption.srt 11KB
  277. 104 Virtualization & Network Storage Hypervisor Introduction-caption.srt 11KB
  278. 056 IP Addressing and Subnetting Planning and Assigning IP Addresses-caption.srt 11KB
  279. 079 Network Services DNS Methods Records and Design Options-caption.srt 11KB
  280. 167 Physical Security & Network Attacks Locks Asset Tags and Tamper Detection-caption.srt 11KB
  281. 039 IP Routing and Forwarding Enterprise Network Forwarding-caption.srt 11KB
  282. 129 Business Continuity Backups-caption.srt 11KB
  283. 176 Physical Security & Network Attacks DNS Spoofing (Poisoning)-caption.srt 11KB
  284. 088 Device Placement and Configuration Device Configuration Overview-caption.srt 11KB
  285. 028 IP Routing and Forwarding Introduction to IP Routing-caption.srt 11KB
  286. 095 Advanced Networking Devices Multi-Layer Switch Overview-caption.srt 11KB
  287. 136 Scanning Monitoring & Patching OS Discovery and Fingerprinting-caption.srt 11KB
  288. 008 OSI Layers Ports & Protocols Common Protocols and Their Well-known Ports-caption.srt 11KB
  289. 178 Physical Security & Network Attacks Wardriving and Deauthentication-caption.srt 11KB
  290. 076 Network Services DHCP Overview-caption.srt 11KB
  291. 175 Physical Security & Network Attacks Cryptolocker and Logic Bombs-caption.srt 11KB
  292. 165 Physical Security & Network Attacks Badges and Smart Cards-caption.srt 11KB
  293. 037 IP Routing and Forwarding Access Control Lists-caption.srt 11KB
  294. 222 Troubleshooting Wireless Understanding Antenna Types-caption.srt 11KB
  295. 177 Physical Security & Network Attacks Man-In-The-Middle with ARP Spoofing-caption.srt 11KB
  296. 017 Ethernet Switching Overview of 802.1Q and Trunks-caption.srt 11KB
  297. 092 Device Placement and Configuration Configuring DHCP Services Lab-caption.srt 11KB
  298. 138 Scanning Monitoring & Patching Vulnerability Scanning-caption.srt 11KB
  299. 118 Network Diagram & Documentation Creating Physical Diagrams-caption.srt 11KB
  300. 020 Ethernet Switching Predicting the MAC Address Table-caption.srt 11KB
  301. 001 OSI Layers Ports & Protocols A Tale of Two Kings-caption.srt 11KB
  302. 217 Wired Connectivity & Performance Issues VLAN Mismatches-caption.srt 11KB
  303. 147 Remote Access Methods VPNs-caption.srt 11KB
  304. 098 Advanced Networking Devices IDS and IPS-caption.srt 11KB
  305. 113 WAN Technologies What is PPP and PPPoE-caption.srt 10KB
  306. 040 IP Addressing and Subnetting IPv4 Overview-caption.srt 10KB
  307. 009 OSI Layers Ports & Protocols TCP's Three-way Handshake-caption.srt 10KB
  308. 117 Network Diagram & Documentation Creating Logical Network Diagrams-caption.srt 10KB
  309. 002 OSI Layers Ports & Protocols The 7 Layers of the OSI Model-caption.srt 10KB
  310. 025 Ethernet Switching STP Reacting to a Network Change-caption.srt 10KB
  311. 096 Advanced Networking Devices Configure Multi-Layer Switch Lab-caption.srt 10KB
  312. 149 Remote Access Methods Out-of-Band Management-caption.srt 10KB
  313. 013 Ethernet Switching How a Layer 2 Switch Works-caption.srt 10KB
  314. 081 Network Services Network Time Protocol (NTP)-caption.srt 10KB
  315. 018 Ethernet Switching Configuring an 802.1Q Ethernet Trunk-caption.srt 10KB
  316. 166 Physical Security & Network Attacks Biometrics-caption.srt 10KB
  317. 108 WAN Technologies Understanding the LAN MAN and WAN Difference-caption.srt 10KB
  318. 107 Virtualization & Network Storage Network Storage-caption.srt 10KB
  319. 004 OSI Layers Ports & Protocols Core TCPIP Protocols-caption.srt 10KB
  320. 069 Wireless Technologies and Configurations Understanding Wireless Antennas-caption.srt 10KB
  321. 016 Ethernet Switching Configuring a VLAN-caption.srt 10KB
  322. 182 Authentication & Access Control Using Two-Factor Authentication (2FA)-caption.srt 10KB
  323. 042 IP Addressing and Subnetting Converting Decimal to Binary-caption.srt 10KB
  324. 152 Identify Policies & Best Practices On-boarding and Off-boarding-caption.srt 10KB
  325. 019 Ethernet Switching How Address Resolution Protocol (ARP) Operates-caption.srt 10KB
  326. 054 IP Addressing and Subnetting Calculate the Number of Hosts per Subnet-caption.srt 10KB
  327. 055 IP Addressing and Subnetting Determine the Subnet Based on a Host's IP Address-caption.srt 10KB
  328. 122 Network Diagram & Documentation Network Change Management-caption.srt 10KB
  329. 179 Physical Security & Network Attacks Evil Twins and Rogue Access Points-caption.srt 10KB
  330. 194 Mitigation Techniques Switch Port Protections-caption.srt 10KB
  331. 030 IP Routing and Forwarding Options for Static Routes-caption.srt 10KB
  332. 058 IP Addressing and Subnetting IPv6 Concepts-caption.srt 10KB
  333. 090 Device Placement and Configuration Configure IP Addresses Lab-caption.srt 10KB
  334. 115 WAN Technologies The Physical Reality of a WAN Connection-caption.srt 10KB
  335. 059 Network Topologies Wired Topologies-caption.srt 10KB
  336. 061 Network Topologies Types of Networks-caption.srt 9KB
  337. 010 OSI Layers Ports & Protocols Wireshark Verification of a TCP 3-Way Handshake-caption.srt 9KB
  338. 188 Mitigation Techniques Network Device Hardening-caption.srt 9KB
  339. 049 IP Addressing and Subnetting Exercise 1 Identify the New Subnets-caption.srt 9KB
  340. 012 Ethernet Switching Layer 2 Ethernet Addresses-caption.srt 9KB
  341. 224 Common Network Service Issues Troubleshooting Name Resolution-caption.srt 9KB
  342. 140 Scanning Monitoring & Patching Packet and Traffic Analysis-caption.srt 9KB
  343. 041 IP Addressing and Subnetting Binary Basics-caption.srt 9KB
  344. 196 Mitigation Techniques Filtering with Access Control Lists (ACLs)-caption.srt 9KB
  345. 100 Advanced Networking Devices Security Network Devices-caption.srt 9KB
  346. 173 Physical Security & Network Attacks Social Engineering and Insider Threats-caption.srt 9KB
  347. 137 Scanning Monitoring & Patching Motivators for Vulnerability Management-caption.srt 9KB
  348. 038 IP Routing and Forwarding ACL Demonstration-caption.srt 9KB
  349. 168 Physical Security & Network Attacks DoS and PDoS (Permanent Denial of Service)-caption.srt 9KB
  350. 169 Physical Security & Network Attacks DDoS (Distributed Denial of Service)-caption.srt 9KB
  351. 135 Scanning Monitoring & Patching Port Scanning and Discovery-caption.srt 9KB
  352. 048 IP Addressing and Subnetting Identifying New Subnets-caption.srt 9KB
  353. 032 IP Routing and Forwarding Dynamic Routing Protocol Overview-caption.srt 9KB
  354. 005 OSI Layers Ports & Protocols Wireshark Views of Core TCPIP Protocols-caption.srt 9KB
  355. 064 Wireless Technologies and Configurations The Purpose of Wireless-caption.srt 9KB
  356. 051 IP Addressing and Subnetting ID Valid Host Addresses on a Subnet-caption.srt 9KB
  357. 029 IP Routing and Forwarding How to Train a Router-caption.srt 9KB
  358. 052 IP Addressing and Subnetting Exercise 1 ID Valid Host Addresses-caption.srt 9KB
  359. 034 IP Routing and Forwarding Address Translation with PAT-caption.srt 9KB
  360. 071 Cloud Concepts Types of Services-caption.srt 9KB
  361. 174 Physical Security & Network Attacks Ransomware and Scareware-caption.srt 9KB
  362. 044 IP Addressing and Subnetting The IP Mask-caption.srt 9KB
  363. 126 Business Continuity Load Sharing and Balancing-caption.srt 9KB
  364. 145 Remote Access Methods Telnet and SSH for CLI Remote Access-caption.srt 9KB
  365. 172 Physical Security & Network Attacks Let's Go Phishing-caption.srt 9KB
  366. 023 Ethernet Switching Game Predict MAC Table After PC3 Pings PC5-caption.srt 9KB
  367. 073 Cloud Concepts Connectivity Methods-caption.srt 9KB
  368. 074 Cloud Concepts Security Implications Considerations-caption.srt 9KB
  369. 026 Ethernet Switching Design Considerations and PoE-caption.srt 8KB
  370. 226 Common Network Service Issues Troubleshooting IP Addressing-caption.srt 8KB
  371. 031 IP Routing and Forwarding Configuring Static Routes-caption.srt 8KB
  372. 158 Identify Policies & Best Practices Bring Your Own Device (BYOD)-caption.srt 8KB
  373. 181 Authentication & Access Control Multi-factor Authentication Overview-caption.srt 8KB
  374. 218 Wired Connectivity & Performance Issues Native VLAN Mismatches-caption.srt 8KB
  375. 024 Ethernet Switching Switching Loops and Spanning Tree Protocol (STP)-caption.srt 8KB
  376. 228 Common Network Service Issues Troubleshooting Miscellaneous Service Issues-caption.srt 8KB
  377. 036 IP Routing and Forwarding Using Wireshark to Verify IP Translations-caption.srt 8KB
  378. 043 IP Addressing and Subnetting Converting Binary to Decimal-caption.srt 8KB
  379. 105 Virtualization & Network Storage Virtual Networking Components-caption.srt 8KB
  380. 201 Troubleshooting Methodology Establish a Theory of Probable Cause-caption.srt 8KB
  381. 227 Common Network Service Issues Troubleshooting Security Settings-caption.srt 8KB
  382. 124 Network Diagram & Documentation Inventory Management-caption.srt 8KB
  383. 225 Common Network Service Issues Troubleshooting MAC Addressing-caption.srt 8KB
  384. 097 Advanced Networking Devices Load Balancer Overview-caption.srt 8KB
  385. 211 Wired Connectivity & Performance Issues Attenuation Latency and Jitter-caption.srt 8KB
  386. 062 Network Topologies Introducing the Internet of Things (IoT)-caption.srt 8KB
  387. 022 Ethernet Switching Game Predict MAC Table After PC1 Pings PC4-caption.srt 8KB
  388. 212 Wired Connectivity & Performance Issues Crosstalk EMI OpenShort-caption.srt 8KB
  389. 192 Mitigation Techniques Privileged User Accounts and Role Separation-caption.srt 8KB
  390. 144 Scanning Monitoring & Patching Baselines-caption.srt 8KB
  391. 219 Wired Connectivity & Performance Issues Bottlenecks-caption.srt 8KB
  392. 053 IP Addressing and Subnetting Exercise 2 ID Valid Host Addresses-caption.srt 8KB
  393. 198 Mitigation Techniques Penetration Testing-caption.srt 8KB
  394. 101 Advanced Networking Devices AAARADIUS Server-caption.srt 8KB
  395. 047 IP Addressing and Subnetting Practicing the Finger Game-caption.srt 8KB
  396. 128 Business Continuity Site Recovery Options-caption.srt 8KB
  397. 148 Remote Access Methods Remote Desktop Access-caption.srt 8KB
  398. 185 Authentication & Access Control Access Control Methods-caption.srt 7KB
  399. 125 Business Continuity Availability Concepts-caption.srt 7KB
  400. 035 IP Routing and Forwarding One-to-one Translations with NAT-caption.srt 7KB
  401. 060 Network Topologies Wireless Topologies-caption.srt 7KB
  402. 171 Physical Security & Network Attacks DDoS with DNS and NTP-caption.srt 7KB
  403. 045 IP Addressing and Subnetting Practice Using a Different IP Mask-caption.srt 7KB
  404. 215 Wired Connectivity & Performance Issues Bad Ports and LED Status Indicators-caption.srt 7KB
  405. 075 Cloud Concepts Local and Cloud Resource Relationships-caption.srt 7KB
  406. 063 Network Topologies Internet of Things (IoT) Technologies-caption.srt 7KB
  407. 157 Identify Policies & Best Practices Incident Response Policies-caption.srt 7KB
  408. 109 WAN Technologies WAN Transmission over Copper Fiber Wireless and Satellite-caption.srt 7KB
  409. 216 Wired Connectivity & Performance Issues Duplex and Speed Mismatches-caption.srt 7KB
  410. 099 Advanced Networking Devices Proxy Servers and Content Filtering-caption.srt 7KB
  411. 080 Network Services DNS Testing and Validation-caption.srt 7KB
  412. 191 Mitigation Techniques File Integrity Monitoring-caption.srt 7KB
  413. 204 Troubleshooting Methodology Problem Solving Verification and Documentation-caption.srt 7KB
  414. 134 Scanning Monitoring & Patching Network Scanning Methodology-caption.srt 7KB
  415. 213 Wired Connectivity & Performance Issues Incorrect Pin-Outs or Cable Types-caption.srt 7KB
  416. 170 Physical Security & Network Attacks DDoS with ICMP and Smurfing-caption.srt 7KB
  417. 106 Virtualization & Network Storage Creating a Virtual Switch and VM Lab-caption.srt 7KB
  418. 153 Identify Policies & Best Practices Licensing Restrictions-caption.srt 7KB
  419. 195 Mitigation Techniques The Native VLAN-caption.srt 7KB
  420. 189 Mitigation Techniques Hardening a Windows Server System-caption.srt 7KB
  421. 155 Identify Policies & Best Practices Data Loss Prevention-caption.srt 7KB
  422. 078 Network Services DNS Overview-caption.srt 7KB
  423. 021 Ethernet Switching Validating MAC Address Table Predictions-caption.srt 6KB
  424. 082 Network Services IP Address Management (IPAM)-caption.srt 6KB
  425. 102 Advanced Networking Devices VoIP PBX and Gateway-caption.srt 6KB
  426. 161 Identify Policies & Best Practices System Life Cycle-caption.srt 6KB
  427. 184 Authentication & Access Control Switch Port Security-caption.srt 6KB
  428. 103 Advanced Networking Devices Wireless Controller-caption.srt 6KB
  429. 203 Troubleshooting Methodology Establish a Plan of Action to Solve the Problem-caption.srt 6KB
  430. 146 Remote Access Methods HTTPS Management URLs-caption.srt 6KB
  431. 156 Identify Policies & Best Practices Remote Access Policies-caption.srt 6KB
  432. 199 Troubleshooting Methodology A Network Troubleshooting Methodology-caption.srt 6KB
  433. 072 Cloud Concepts Cloud Delivery Models-caption.srt 6KB
  434. 193 Mitigation Techniques Network Segmentation-caption.srt 6KB
  435. 015 Ethernet Switching Understanding VLANs-caption.srt 6KB
  436. 160 Identify Policies & Best Practices Non-disclosure Agreements (NDA)-caption.srt 6KB
  437. 150 Identify Policies & Best Practices Privileged User Agreement-caption.srt 6KB
  438. 007 OSI Layers Ports & Protocols Verifying L4 Ports with Wireshark-caption.srt 6KB
  439. 131 Business Continuity MTTR and MTBF-caption.srt 6KB
  440. 014 Ethernet Switching Demonstration Switch Dynamic Learning-caption.srt 6KB
  441. 133 Scanning Monitoring & Patching Scanning Overview-caption.srt 6KB
  442. 200 Troubleshooting Methodology Identify the Problem-caption.srt 6KB
  443. 151 Identify Policies & Best Practices Password Policy-caption.srt 6KB
  444. 027 Ethernet Switching Switch Port Mirroring-caption.srt 6KB
  445. 077 Network Services Verify DHCP with Wireshark-caption.srt 5KB
  446. 202 Troubleshooting Methodology Test the Theory to Determine the Root Cause-caption.srt 5KB
  447. 159 Identify Policies & Best Practices Acceptable Use Policy (AUP)-caption.srt 5KB
  448. 197 Mitigation Techniques Honeypots and Honeynets-caption.srt 5KB
  449. 214 Wired Connectivity & Performance Issues Mismatched and Damaged Cables-caption.srt 5KB
  450. 154 Identify Policies & Best Practices International Export Controls-caption.srt 5KB
  451. 050 IP Addressing and Subnetting Exercise 2 Identify the New Subnets-caption.srt 5KB
  452. 190 Mitigation Techniques Signature Management-caption.srt 5KB
  453. 163 Physical Security & Network Attacks Let's Break into a Data Center-caption.srt 5KB
  454. 033 IP Routing and Forwarding Dynamic Routing Protocol Demonstration-caption.srt 4KB
  455. 132 Business Continuity SLA Requirements-caption.srt 4KB
  456. 162 Identify Policies & Best Practices Safety Procedures and Policies-caption.srt 4KB
  457. 127 Business Continuity Power Management-caption.srt 4KB