2015-06-07



Professor Messer's CompTIA N10-006 Network+ Training Course

English | mp4 | H264 1280x720 | AAC 2 ch | 14 hrs 53 min | 11.3 Gb

Genre: eLearning

Contents

Section 1: Network Architecture

1.1 - Network Devices

Common Network Devices (8:53)

Intrusion Detection and Prevention Systems (5:13)

Content Filters (4:52) | Load Balancers (2:45)

Packet Shapers (2:32) | VPN Concentrators (2:50)

1.2 - Remote Access

VPN Connections (3:23) | VPN Protocols (5:44)

TACACS and RADIUS (3:54) | Remote Access Services (2:31)

Web Services (3:09) | Unified Voice Services (3:04)

Wireless LAN Controllers (2:38)

1.3 - Network Services

DHCP Addressing Overview (5:15) | DHCP Reservations (3:16)

DHCP Scopes (2:11) | DHCP Leases (4:10) | DHCP Options (2:47)

An Overview of DNS (6:29) | DNS Records (5:54) | Dynamic DNS (3:16)

Proxy Servers (3:47) | Understanding Network Address Translation (7:21)

1.4 - WAN Technologies

SONET, DWDM, and CWDM (4:11) | ATM, Frame Relay, and MPLS (4:52)

Satellite, ISDN, Cable, DSL, and Dialup (8:54) | PPP and Multilink PPP (2:30)

GSM, CDMA, and WiMAX (3:37) | Leased Lines and Metro Ethernet (4:07)

Circuit Switching and Packet Switching (3:21)

1.5 - Cable Types

Copper Connectors (8:05) | Copper Cabling (9:28)

Straight-Through, Crossover, and Rollover Cables (7:42)

Fiber Connectors (3:51) | Fiber Cables (7:37)

Media Converters (3:19) | Network Cabling Tools (8:13)

1.6 - Network Topologies

Common Network Topologies (7:15)

1.7 - Network Infrastructures

Network Infrastructures (6:20)

1.8 - Network Addressing

Binary Math (8:20) | An Overview of IPv6 (7:25)

IPv6 Address Configuration (5:40) | IPv6 Interoperability (3:09)

IPv4 Classes (8:12) | Classless Inter-Domain Routing (8:12)

IPv4 Addresses and Subnetting (17:13) | APIPA (3:35)

Unicast, Multicast, and Broadcast (3:40)

Broadcast Domains and Collision Domains (6:18)

1.9 - Routing

Routing Tables (13:58) | Route Aggregation and Distribution (5:22)

Routing Metrics (2:47) | Static and Dynamic Routing (4:48)

Link State, Distance Vector, and Hybrid Routing (3:39)

IGP and EGP (5:31) | High Availability (5:09)

1.10 - Unified Communications

Unified Communication Technologies (7:12)

1.11 - Cloud and Virtualization Technologies

Virtualization (8:30) | Storage Area Networks (7:09)

Cloud Technologies (5:22)

1.12 - Implementing Networks

Implementing a Basic Network (8:51)

Section 2: Network Operations

2.1 - Monitoring the Network

Using Protocol Analyzers (2:58) | Network Monitoring Tools (8:08)

SIEM (3:28) | Environmental Monitoring Tools (2:20)

Wireless Tools (3:37)

2.2 - Metrics and Reporting

Baselines and Bottlenecks (7:32) | Log Management and Graphing (5:32)

Utilization Statistics (5:57) | Interface Monitoring (4:48)

2.3 - Configuration Management

Configuration Management (4:51)

On-Boarding and Off-Boarding Mobile Devices (7:13)

Network Access Control (4:41) | Documenting the Network (7:38)

2.4 - Network Segmentation

Segmenting the Network (5:17)

2.5 - Patches and Updates

Patches and Updates (5:51)

2.6 - Switch Configuration

Configuring VLANs (7:11) | Spanning Tree Protocol (7:06)

Switch Interface Configuration (4:23) | Power Over Ethernet (3:04)

Switch Management (5:01)

2.7 - Wireless Networks

Wireless Network Devices (5:47) | Wireless Connections (11:05)

Wireless Antenna Technologies (4:13) | Using Wireless Networks (3:42)

Section 3: Network Security

3.1 - Risk

Business Risk (8:52) | Single Point of Failure (2:45)

Vulnerability Scanning (6:31) | Penetration Testing (5:41)

3.2 - Vulnerabilities and Threats

Denial of Service (8:55) | Wireless Network Attacks (8:13)

Wireless Protocol Attacks (7:37) | Brute Force Attacks (6:04)

Session Hijacking (5:11) | Social Engineering (5:14)

Man in the Middle Attacks (4:05) | VLAN Hopping (5:47)

Compromised Systems (4:19) | Insider Threats (4:05)

Zero-Day Attacks (4:12) | Operating System Vulnerabilities (10:57)

3.3 - Network Hardening

Anti-Malware Software (4:23) | Switch Port Security (5:17)

Security Policies (2:00) | Disabling Unneeded Services (4:03)

Using Secure Protocols (4:18) | Access Lists (5:43)

Wireless Security (5:48) | User Authentication (8:44)

Hashing (4:17)

3.4 - Physical Security Controls

Physical Security Controls (5:55)

3.5 - Firewalls

Firewalls (6:52) | Firewall Configurations (6:35)

3.6 - Network Access Control

Network Access Control Models (5:03)

3.7 - Forensics

Basic Forensic Concepts (5:03)

Section 4: Troubleshooting

4.1 - Network Troubleshooting Methodology

Network Troubleshooting Methodology (5:59)

4.2 - Troubleshooting Tools

Command Line Tools (19:47) | Physical Testing Tools (4:09)

Web-based Troubleshooting Tools (3:25) | Protocol Analyzers (2:36)

4.3 - Wireless Issues

Troubleshooting Wireless Signals (6:03) | Troubleshooting Wireless Configurations (6:54)

4.4 - Copper Cable Issues

Troubleshooting Copper Cables (6:19) | Troubleshooting Signal Loss (6:15)

Troubleshooting Network Cabling (4:27)

4.5 - Fiber Issues

Troubleshooting Fiber Issues (5:11)

4.6 - Network Issues

Troubleshooting IP Configurations (4:46)

Troubleshooting DNS and DHCP (3:44)

Troubleshooting Broadcast Storms and Switching Loops (4:30)

Troubleshooting Interface Configurations (4:12)

Troubleshooting VLAN Assignments (2:53)

Troubleshooting Network Connectivity (5:22)

Troubleshooting Mismatched MTUs (4:28)

Troubleshooting NIC Teaming (2:48)

4.7 - Security Issues

Troubleshooting Firewall Security Issues (4:34)

Troubleshooting Operating System Security Issues (6:18)

Troubleshooting Denial of Service (4:34)

Troubleshooting ICMP and ARP Issues (3:28)

Troubleshooting Malicious User Activities (3:14)

Troubleshooting Authentication Issues (4:59)

4.8 - WAN Issues

Troubleshooting WAN Interfaces (4:03)

Troubleshooting Customer Premise Equipment (5:21)

Company Security Policies (3:08)

Section 5: Industry Standards, Practices, and Network Theory

5.1 - The OSI Model

Understanding the OSI Model (8:29)

5.2 - Network Theory and Concepts

Network Fundamentals (6:19) | Modulation Techniques (3:05)

Hexadecimal Math (5:48) | Octal Math (3:25)

CSMA/CD and CSMA/CA (2:36) | The TCP/IP Suite (2:27)

5.3 - Wireless Network Standards

802.11 Wireless Standards (6:12)

5.4 - Wired Network Standards

Ethernet Standards (7:46)

5.5 - Policies and Procedures

Security and Network Policies (3:26)

5.6 - Safety Practices

Safety Practices (4:31) | Understanding Electrostatic Discharge (3:00)

Emergency Procedures (2:53)

5.7 - Installation and Configuration

MDF and IDF (2:54) | Cable and Power Management (3:45)

Rack Systems (3:45) | Labeling and Documentation (3:57)

5.8 - Change Management

Change Management Procedures (3:37)

5.9 - Network Ports and Protocols

Common TCP and UDP Ports (10:58)

5.10 - Application Ports and Protocols

Application Ports and Protocols (6:53)
DOWNLOAD

Code:

http://rapidgator.net/file/1a3f5b81f6ef07ad1070fc7f908562f3/dProfessor.part01.rar.html

http://rapidgator.net/file/b458661ab372f366c647b95157ac7ccd/dProfessor.part02.rar.html

http://rapidgator.net/file/8e6303a2977707409f948ab1bdc9976a/dProfessor.part03.rar.html

http://rapidgator.net/file/d055d1ba6c5c0d5625c0506b5310a31d/dProfessor.part04.rar.html

http://rapidgator.net/file/577e3a481a41033cbd2d94123d3672df/dProfessor.part05.rar.html

http://rapidgator.net/file/b7e91e0fcd1e294059f36426ef54d350/dProfessor.part06.rar.html

http://rapidgator.net/file/d348ed8ca8c3872bf561b8c483c2cefc/dProfessor.part07.rar.html

http://rapidgator.net/file/166c8c7c3e0184fb9dc4bd00d9d38b39/dProfessor.part08.rar.html

http://rapidgator.net/file/68f2cea5370a26d1e2caec19cef381c8/dProfessor.part09.rar.html

http://rapidgator.net/file/a3b9d6c86781f4f66f2b519dcc322069/dProfessor.part10.rar.html

http://rapidgator.net/file/3a22421609fa816df54f97f90061459d/dProfessor.part11.rar.html

http://rapidgator.net/file/f539e7e27b106e919714252662a971a5/dProfessor.part12.rar.html

http://uploaded.net/file/mjvtafba/dProfessor.part01.rar

http://uploaded.net/file/wz2nn2ou/dProfessor.part02.rar

http://uploaded.net/file/zf3ug1h9/dProfessor.part03.rar

http://uploaded.net/file/4ptj6u1j/dProfessor.part04.rar

http://uploaded.net/file/axfo1eyh/dProfessor.part05.rar

http://uploaded.net/file/zq1i0hw5/dProfessor.part06.rar

http://uploaded.net/file/btjlaa4q/dProfessor.part07.rar

http://uploaded.net/file/0q5nptfz/dProfessor.part08.rar

http://uploaded.net/file/e6aubavd/dProfessor.part09.rar

http://uploaded.net/file/p9m3yqb6/dProfessor.part10.rar

http://uploaded.net/file/xz1ml800/dProfessor.part11.rar

http://uploaded.net/file/frnvvq8g/dProfessor.part12.rar

http://www.uploadable.ch/file/NCs2KRvH7ctZ/dProfessor.part01.rar

http://www.uploadable.ch/file/7rueA4fhwtmE/dProfessor.part02.rar

http://www.uploadable.ch/file/Dcq7MHrxgvjU/dProfessor.part03.rar

http://www.uploadable.ch/file/N7Fp9dqnmFbJ/dProfessor.part04.rar

http://www.uploadable.ch/file/UYqZ9UZkN3wK/dProfessor.part05.rar

http://www.uploadable.ch/file/EYFyDfYTPwTu/dProfessor.part06.rar

http://www.uploadable.ch/file/wN4JCxC6smXM/dProfessor.part07.rar

http://www.uploadable.ch/file/ZXfqKRF36C5t/dProfessor.part08.rar

http://www.uploadable.ch/file/BWYCgEPsQDTY/dProfessor.part09.rar

http://www.uploadable.ch/file/fqtzwJpG5SrR/dProfessor.part10.rar

http://www.uploadable.ch/file/zGbdv2qNpRYs/dProfessor.part11.rar

http://www.uploadable.ch/file/pNF8fpFcA3Rb/dProfessor.part12.rar

http://www.hitfile.net/2O4p/dProfessor.part01.rar.html

http://www.hitfile.net/2NMd/dProfessor.part02.rar.html

http://www.hitfile.net/2NXA/dProfessor.part03.rar.html

http://www.hitfile.net/2O3V/dProfessor.part04.rar.html

http://www.hitfile.net/2NJj/dProfessor.part05.rar.html

http://www.hitfile.net/2O8e/dProfessor.part06.rar.html

http://www.hitfile.net/2NNB/dProfessor.part07.rar.html

http://www.hitfile.net/2NR9/dProfessor.part08.rar.html

http://www.hitfile.net/2ODp/dProfessor.part09.rar.html

http://www.hitfile.net/2Nxq/dProfessor.part10.rar.html

http://www.hitfile.net/2Nem/dProfessor.part11.rar.html

http://www.hitfile.net/2NI4/dProfessor.part12.rar.html

Show more