Networking Core Concepts: Beginner

https://www.skillsoft.com/channel/networking-core-concepts-9eb0ab00-e253-11e6-91a7-0242c0a80704?expertiselevel=3341401 https://www.skillsoft.com/channel/networking-core-concepts-9eb0ab00-e253-11e6-91a7-0242c0a80704?expertiselevel=3341402
  • 35 Courses | 40h 16m 30s
  • 8 Books | 91h 16m
  • Includes Lab
  • Includes Test Prep
  • 25 Courses | 23h 58m 59s
  • 8 Books | 72h 50m
  • Includes Lab
  • 1 Audiobook | 13h 28m 12s
Likes 202 Likes 202
 
Networks can range from the very small to the very large and complex. Master the basics of networking technologies here.

GETTING STARTED

Networking Fundamentals

  • Playable
    1. 
    Network Masks and CIDR Notation
    4m 49s
    NOW PLAYING
  • Playable
    2. 
    Distinguishing between Private and Public IP Addresses
    2m 28s
    UP NEXT

GETTING STARTED

Introduction to Networking

  • Playable
    1. 
    Course Introduction
    1m 37s
    NOW PLAYING
  • Playable
    2. 
    Introduction to Computer Networking
    2m 22s
    UP NEXT

COURSES INCLUDED

Networking Fundamentals
For both Linux servers and clients, an administrator must be able to configure and use the Linux network interfaces. Master the fundamentals of Internet protocols, network configuration and troubleshooting, and configuring DNS.
16 videos | 1h 11m available Badge
Ports, Protocols, & the OSI Model
The OSI model is a conceptual model used to partition network communication. Explore the OSI layers, and discover where devices, services, and protocols reside. Also, explore well-known protocols and their associated port numbers
17 videos | 1h 36m has Assessment available Badge
Concepts & Characteristics of Networking
Networks are the basic interconnections for all computing devices. Discover fundamental elements in network communiction, including routing and switching concepts as well as IP addressing components
15 videos | 1h 43m has Assessment available Badge
IP Addressing
Each device belonging to a network is assigned a unique IP address by which it can be identified. Explore various addressing schemes that are used in networks
8 videos | 1h 11m has Assessment available Badge
Network Topologies & Technologies
Network architecture is the complete framework of a computer network. Explore architectural concepts, including wired and wireless topologies, network types, technologies facilitating the Internet of Things (IoT), and wireless technologies
15 videos | 1h 32m has Assessment available Badge
Cloud Concepts & Network Services
Explore cloud services, delivery models, and security considerations, and discover networking services, including various DNS record types, as well as DHCP, NTP, and IPAM features
14 videos | 1h 31m has Assessment available Badge
Cabling Solutions
There are many technologies involved in network connections. Explore the different types of cables, connectors, and standards used in a network environment
10 videos | 58m has Assessment available Badge
Networking Devices
Networking devices mediate communications within computer networks. Explore various networking devices, including modems, bridges, hubs, switches, and routers
10 videos | 54m has Assessment available Badge
Advanced Networking Devices
Networking devices mediate communications within computer networks. Explore advanced networking devices, including proxy servers, load balancers, VPN concentrators, RADIUS servers, IDSs, and IPSs
12 videos | 58m has Assessment available Badge
Network Storage, Virtualization, & WAN Technologies
Explore virtual networking components, network storage types, and connection types. Also, discover WAN concepts, including service types, transmission mediums, service characteristics, and termination
14 videos | 1h 32m has Assessment available Badge
Documentation and Diagrams & Business Continuity
Documentation helps ensure an efficient business structure, while disaster recovery plans help ensure business continuity. Explore documentation concepts, such as diagrams and SOPs, and business continuity concepts, such as fault tolerance
19 videos | 1h 39m has Assessment available Badge
Network Monitoring & Remote Access Methods
Continuous network monitoring is instrumental in obtaining peak performance. Explore monitoring concepts, including event logs, alerts, and patch management. Also, discover remote access methods, such as VPNs, RDP, SSH, VNC, and telnet
15 videos | 1h 37m has Assessment available Badge
Policies and Best Practices
Best practices and guidelines should be implemented to ensure optimal network performance and security. Explore these guidelines, including password policies, data loss prevention techniques, NDAs, and safety procedures and policies
12 videos | 1h 16m has Assessment available Badge
Security Devices, Wireless Security, & Access Control
Discover how to protect organizational assets, like personnel, devices, and infrastructure. During this course, you will begin by about motion detection and video surveillance, asset tracking, tamper detection, and security risk prevention devices, such as badges, biometrics, smart cards, key fobs, and locks. Next, you will learn when to implement physical security devices. You'll move on to study authentication types, LDAP, certificates, authorization, and accounting features, such as Kerberos, Single Sign-On, auditing, and logging. Other topics include recognizing cyber access control features such as 802.1x, NAC, WPA, WPA2, TKIP-RC4, port security, geofencing, MAC filtering, captive portal, and access control lists. As an exercise, you will review the steps to secure a wireless network
15 videos | 1h 41m has Assessment available Badge
Network Attacks
Explore various types of attacks that can compromise a network, including DoS, insider threats, and ransomware
12 videos | 1h 18m has Assessment available Badge
Network Device Hardening
It's important to make devices on a network secure as possible. Explore network device hardening techniques to reduce vulnerabilities and improve security
10 videos | 1h 12m has Assessment available Badge
Mitigation Techniques
Mitigating security threats can lessen the overall impact that an attack can have on network devices, hosts, and applications. Explore common mitigation techniques
13 videos | 1h 20m has Assessment available Badge
Troubleshooting Methodology & Tools
By using the appropriate troubleshooting tools, network problems can be identified and resolved quickly. In this course, you will learn how to quickly identify problems, establish a cause, test theories, determine a plan of action, and recognize potential effects of the treatment. Begin by finding out how to implement an appropriate solution or escalate it, if required. Next, verify that things work after the solution. This involves documenting findings, actions, and outcomes. Conclude by reviewing troubleshooting equipment and software tools, such as network testers, packet sniffers, WiFi analyzers, bandwidth speed testers, command line tools, and Linux commands
16 videos | 58m has Assessment available Badge
Troubleshooting Connectivity & Performance Issues
What do crosstalk, jitter, reflection, and interference have in common? They all cause problems with networks. In this course, you will discover how to troubleshoot common wired and wireless connectivity issues related to attenuation, latency, crosstalk, electromagnetic interference (EMI), opens, shorts, crossed connections, transceiver mismatches and bad ports. Other issues include bottlenecks, VLAN mismatches, damaged cables, and bent pins. Additionally, you will learn how to troubleshoot incorrect antenna types and antenna placements; look at interference, overcapacity, channel overlap, distance limitations, frequency mismatches, wrong SSIDs, and mangled passphrases. Conclude by considering security type mismatches, power levels, and the need for optimized signal to noise ratios
18 videos | 1h 20m has Assessment available Badge
Troubleshooting Common Network Service Issues
Network services, such as DNS and DHCP, help business operations run smoothly. Explore common issues that occur with network services as well as how to resolve them, including incorrect gateways, duplicate IP addresses, and incorrect times
9 videos | 57m has Assessment available Badge
Network Survey & Extraction: Network Analysis
Knowing what devices and services are running on a network is an essential part of computer security. Being able to effectively scan a network is the first step in securing it. In this course, you'll learn how to discover and analyze networks through scanning. First, you'll explore common network scanning tools, how to identify network vulnerabilities, and how to perform reverse IP lookup. You'll then move on to learn how to identify services and operating systems, and about scanning techniques such as UDP, stealth, connect, zombie, and ARP scanning.
14 videos | 1h 3m has Assessment available Badge
Network Survey & Extraction: Network Monitoring
Developing techniques to scan and monitor networks is a process of discovery. Being able to continuously monitor or schedule regular tests for vulnerabilities is part of the ongoing battle of network security. In this course, you'll learn to test and take inventory of network hosts so you can monitor more effectively. First, you'll examine methods for actively monitoring and collecting data, as well as strategies for reporting and sharing results. You'll then move on to tools to catalog, compare, filter, and test services, so that any anomaly can be picked up in your scanning activities.
14 videos | 57m has Assessment available Badge
Network & Host Analysis: Protocol Analysis
Wireshark is the de facto tool for network protocol analysis. The ability to live capture, deeply inspect, filter, decrypt, and export network data comprises Wireshark's feature-rich capabilities. In this course, you'll examine the vital elements of network protocol analysis and learn how to reap the benefits of Wireshark's features. You'll start by exploring some common network analysis patterns. You'll then outline the Open Systems Interconnection (OSI) reference model. Next, you'll differentiate between passive and active network scanning. Moving on, you'll use Wireshark to capture and filter network traffic and customize packet capturing. Finally, you'll use Wireshark to save and then export packet captures, apply highlighting rules, extract files, configure profiles, apply display filters, and implement advanced capture and display filtering.
14 videos | 1h 3m has Assessment available Badge
Network & Host Analysis: Network Protocols
The ability to filter based on the protocols in use over a network gives a window into how it is used. Knowing what good and bad traffic looks like and identifying unencrypted traffic and potential avenues for security compromise is essential. In this course, you'll apply various filters to network traffic using Wireshark and explore factors to look out for based on the protocol being examined. You'll learn to filter DHCP and DNS traffic. You'll differentiate between TCP, UDP, ICMP, and ARP traffic. You'll watch insecure protocols like POP, IMAP, Telnet, and FTP. You'll examine what can be discovered by looking at secure traffic over SSH and HTTPS and secure POP and IMAP variants. Finally, you'll examine IPv6 packets.
14 videos | 1h 4m has Assessment available Badge
Network & Host Analysis: Network Observations
Knowing what goes on over a network requires a high-level picture of it. The ability to conceptualize your network's structure, capabilities, and events is essential to protecting it. In this course, you'll explore the concepts and tools required to identify and visualize your network components. You'll work mostly with the open source network protocol analyzer, Wireshark. You'll start by displaying protocol hierarchies and identifying network endpoints. You'll then describe considerations for visualizing networks and create a network diagram using Visio. Next, you'll outline network security assessment methods, recognize the use of baselines for network management, and carry out baseline activity monitoring. You'll also look at ways of capturing network data. Lastly, you'll explore how Wireshark combines with other tools such as Nmap, SSH, and firewalls.
13 videos | 1h 4m has Assessment available Badge
Network & Host Analysis: Network Analysis Formats
A variety of formats and protocols are used to help manage networks. Knowing what you have at your disposal to integrate into your operational duties is essential in defensive CyberOps. In this course, you'll learn the format and tools required to manage, operate, and analyze your networks. You'll start by recognizing the purpose and characteristics of NetFlow and IPFIX network flow protocols. You'll then outline how NetFlow is used to baseline a network. Next, you'll identify the importance of logging, access control, and event queues. You'll examine techniques for tapping network traffic and collecting and forwarding logs. You'll explore SNMP, the PCAP format, and whitelisting. Finally, you'll set up Wireshark to detect potentially harmful events and import and export captured traffic in the PCAP format.
14 videos | 1h 5m has Assessment available Badge
Network & Host Analysis: Network Operations
Securely operating a network requires tools to monitor, detect, and prevent breaches. Knowing what goes on and how to stop malicious traffic involves the use of Network Security Monitoring (NSM), security information and event management (SIEM), and intrusion detection and prevention systems (IDS/IPS). In this course, you'll explore these tools and implement Suricata and Kibana as NSM, IDS, IPS, and SIEM solutions. Furthermore, you'll compare and contrast network defense tools. You'll examine NSM and SIEM's purpose and characteristics and outline how to implement and benefit from these techniques. Next, you'll install Suricata and Kibana, and use their features for rule creation, alerts, logging, scripting, and integration. Finally, you'll integrate Suricata and Wireshark to leverage both tools' capabilities so that you can operate your network securely.
14 videos | 1h 5m has Assessment available Badge
Getting Started with TCP/IP and Numbering Systems
TCP/IP is the globally accepted group of protocols at the core of the Internet and organizational intranets. In this course, you'll start at the beginning and learn about the origins of the protocols that underpin the Internet and enterprise networks. You'll explore each of the layers of the TCP/IP networking model, as well as the concept of peer protocols. You'll also examine the standardization process that is overseen by the Internet Engineering Task Force. Finally, you'll learn about the types of requests for comments that are used by this task force. Depending upon the type of information you have and who is using it, information is stored, transmitted, and displayed in different ways. As a result, different numbering systems are used to represent that information. Understanding these number systems, which can be binary, decimal, or hexadecimal, is an important skill for those who interpret and troubleshoot network systems. In this course, you'll also learn about the four numbering systems used by data systems. You'll also explore positional number system representations, how values are represented using numbering systems, and how to convert values between them. Finally, you'll learn different methods for determining the base of a value when the base is unknown. This course was originally created by Global Knowledge (GK).
20 videos | 38m has Assessment available Badge
Ethernet, Network Access, and IPv4 Addressing
Technically, the network interface layer of the TCP/IP model is not described in the family of protocols. But an IP packet cannot travel between devices without using physical media and protocols to access that media. In this course, you'll review how to identify physical layer connectivity options. You'll learn three types of MAC addresses and how to identify different Ethernet frame formats and modifications. You'll also explore the header fields of Ethernet and how they are used, as well as modifications of the Ethernet frame format. Finally, you'll learn about the use of protocol analyzers. In order for internetworking to work, there has to be a way to distinguish which network a device belongs to. This is accomplished with a form of addressing called logical addressing, which is presented by an IP address. In this course, you'll also learn the evolution of IP addressing from classical addressing through class-less addressing. You'll examine how network masking operates. Finally, you'll explore network address translation and the value of variable length subnet masking. This course was originally created by Global Knowledge (GK).
27 videos | 47m has Assessment available Badge
VLSM, ARP, and Multicasting
Subnetting is the practice of dividing a given block of addresses into sub-units. This is done to meet organizational, security, and performance needs. In this course, you'll learn the differences between fixed-length subnet masks and variable-length subnet masks. You'll explore how subnet values are calculated and how to use VLSM to subnet a given block address. Finally, you'll learn how VLSM relates to Classless Inter-Domain routing. Address Resolution Protocol is a fundamental protocol that maps an IP address to a target MAC address. In this course, you'll also learn the purpose of address mapping, the characteristics of the ARP cache, and ARP commands. In addition, you'll learn about each of the fields in an ARP message and other ARP capabilities. While the majority of network communications gets done using a one-to-one transmission, some forms of communication are better served using a one-to-man transmission, like a television broadcast. The Internet Protocol supports this one-to-many type of communication with the Internet Group Management Protocol. You'll learn about the uses of multicasting and its main characteristics. You'll also explore the role of IGMP in multicasting and how multicast routing works. This course was originally created by Global Knowledge (GK).
29 videos | 51m has Assessment available Badge
IPv4 and IP Routing
The Internet Protocol is one of the key protocols in TCP/IP networking. In fact, it's so important that it forms the IP in TCP/IP. In this course, you'll learn key facts about IP and IP networks. You'll explore the various fields of the IPv4 header and their uses. You'll also learn about IP fragmentation, IP options, and the layout of the options field. Logical or IP addressing provides for the identification of the network to which a device belong. The transmission of those packets, from one network to another, is controlled by routers. Routing is accomplished with routing protocols that define how routers make decisions and how they communication with one another. In this course, you'll also learn how IP datagrams are routed between networks. You'll explore list components found in routing tables and the differences between common routing protocols. You'll also examine the routing metrics uses by RIP, OSPF, and EIGRP, as well as administrative distance and how it relates to router metrics. Finally, you'll learn about RIP routing loops, the use of the Border Gateway Protocol, and Layer 3 switching. This course was originally created by Global Knowledge (GK).
31 videos | 48m has Assessment available Badge
UDP and TCP Sessions
At the transport layer of the TCP/IP model, you find the User Datagram Protocol. When fast, connectionless transport is desired, then UDP is the protocol to use. In this course, you'll learn about the features associated with connectionless protocols. You'll explore the header fields of UPD, the functions and ranges of port numbers, and the port numbers that are used with UDP. You'll also learn what a socket is and how it is used with TCP/IP. When reliability is necessary for network communications, the Transmission Control Protocol is the protocol of choice. In this course, you'll also learn characteristics of connection-oriented protocols and TCP, as well as the names, sizes, and functions of each TCP header field. You'll explore the importance of eight session flags in the TCP header and how the window size field and maximum segment size options are used to provide flow control. Also, you'll explore the TCP options and their uses, along with the TCP connection and termination process. Finally, you'll learn about the use of sequence and acknowledgment numbers in providing reliable transport and the methods by which TCP manages network congestion. This course was originally created by Global Knowledge (GK).
31 videos | 43m has Assessment available Badge
Address Autoconfiguration, DNS, and ICMP
Every device that communicates in a TCP/IP network must have an IP address configured. The most efficient way to configure end devices in the network is to do so automatically. The Dynamic Host Configuration Protocol is used for such automatic configurations. In this course, you'll explore the disadvantages of static IP configuration and the steps for autoconfiguration using DHCP. You'll also learn about DHCP, including the message format, scopes, renewal process, how it works in a routed network, and troubleshooting techniques. The sheer volume of resources available on the Internet and enterprise networks is astounding. Trying to remember the IP address of even a fraction of these resources would be quite difficult. However, we can assign names to these resources and use the Domain Name System to translate easy to remember names into their specific IP addresses. In this course, you'll also learn about the organizations that coordinate the global DNS. You'll explore the organization and structure of the DNS namespace, the types of top level domains, the purpose of the root name servers and primary and secondary name servers, the DNS name resolution process, and the DNS message format. You'll also learn to match the abbreviations with the resource record function when give a list of resource record abbreviations. Finally, you'll examine the advantages of DDNS and DNS troubleshooting tools. The size and complexity of modern networks almost ensures that problems will sometimes occur in the delivery of IP packets. The Internet Protocol provides a mechanism for reporting error information when those problems arise. The Internet Control Messaging Protocol provides for diagnostic and error reporting in a TCP/IP network. You'll learn how ICMP provides error reports and diagnostic messages. You'll explore the layout of ICMP messages, as well as the common ICMP message types and their functions. You'll also learn to recognize several common types of ICMP messages by examining output from a protocol analyzer. Finally, you'll examine how the ICMP time exceeded message is used with traceroute. This course was originally created by Global Knowledge (GK).
31 videos | 43m has Assessment available Badge
Common TCP and UDP Applications and VoIP
From web browsing to e-mail, the most widely used applications in TCP/IP networks use application layer protocols that rely on TCP to provide reliable delivery. In this course, you'll explore the features and functions of Telnet and the internal operations of FTP. You'll also learn about the codes used in FTP, SMTP, and HTTP and examine the differences between SMTP, POP, and IMAP. Key network support activities are supported by application layer protocols that rely on the User Datagram Protocol. In this course, you'll also learn about the Trivial File Transfer Protocol and how to identify the different TFTP messages. You'll explore the use of Simple Network Management Protocol in network management, as well as the role of the network management station SNMP agent and Management Information Base in SNMP. Finally, you'll learn about the use of remote networking monitoring. Voice over IP is a good example of applying the TCP/IP protocols to carry time sensitive information such as voice or video. VoIP relies on various protocols to deliver new and innovative ways of communicating over TCP/IP networks. You'll learn about the TCP/IP protocols that support VoIP, the benefits of VoIP, and the basic components of a VoIP system. You'll explore how Session Initiation Protocol sets up a telephone call, the use of session description protocol, and some common VoIP codecs. You'll also learn about Real-time Transport Protocol. This course was originally created by Global Knowledge (GK).
35 videos | 54m has Assessment available Badge
TCP/IP Security and IPv6
Any discussion of networking would not be complete without addressing information security. The TCP/IP protocols were not originally designed with security in mind. In this course, you'll explore common vulnerabilities at each layer of the TCP/IP module and common mitigations for those security weaknesses. You'll learn the components of the CIA triad, as well as some vulnerabilities and attacks at each of the four layers of the TCP/IP model. Next, you'll examine the network access layer security protocols, the components of IPsec, and the phases of an IPsec session. You'll learn about the role of virtual private networking in providing TCP/IP security. Finally, you'll explore how Transport Layer Security, Domain Name System Security Extensions, and Secure Shell Protocol are involved in TCP/IP security. Internet Protocol version 4 is now more than 30 years old. Among other consequences of its advancing age, the public Internet has depleted the available addresses that can be assigned. While several efforts have been developed to address this problem, the true solution is in the implementation of Internet Protocol version 6. In this course, you'll also explore the three categories of IPv6 address and their format and structure. You'll learn the process of mapping an IEEE MAC address into a 64-bit EUI format for IPv6 address. You'll also examine the types of IPv6 address, the characteristics of the IPv6 header, and the common types of ICMPv6 messages. Finally, you'll learn to describe changes to the DNS records with IPv6 and about modifications to common routing protocols used with IPv6. This course was originally created by Global Knowledge (GK).
25 videos | 52m has Assessment available Badge
SHOW MORE
FREE ACCESS

COURSES INCLUDED

Introduction to Networking
The fundamental components and concepts that comprise networking represent a collection of technology and resources used to deliver a single web page or fuel an entire enterprise. In this course, you'll explore the fundamentals of networking technology, beginning with the building blocks of networking, the various devices that can be connected to networks, and the basics of network infrastructure. You'll go onto discover the role of media in networking, the purpose of switches, access points, and routers, network services, types, and topologies. Finally, you'll learn about peer-to-peer and client-server networking, virtual computing, and cloud computing. This course was originally created by Global Knowledge (GK).
18 videos | 40m has Assessment available Badge
Networking Standards and Connections
Networking standards define how communication occurs during transmission and between devices. When you want devices to communicate with each other, you need to be able to connect them, and there's a variety of ways to do that. In this course, you’ll explore the fundamentals of networking standards, beginning with the organizations that create and maintain them and the process surrounding networking standards creation. Then you'll explore the OSI model and its various layers and discover the backbone of computer networking, the TCP/IP model. You'll discover the various networking media types, cables, standards, and categories. Then you'll explore half and full duplex communication and structured cabling systems and how to design and install them. Then you'll learn how to properly examine and test cabling. Finally, you'll delve into fiber optic cabling and wireless network connections. This course was originally created by Global Knowledge (GK). 
38 videos | 1h 20m has Assessment available Badge
Ethernet LANs and Switching
The predominant technology that fuels network connections is Ethernet. Switching is the process of sending networking signals to the right destination. In this course you'll learn about the history of Ethernet, NIC and MAC addresses, and unicast, multicast, and broadcast addresses. Then you'll explore Ethernet standards and Ethernet frame structures, as well as Ethernet equipment. You'll learn about Ethernet connectors and performance issues associated with Ethernet communication. You'll learn about Ethernet switches and the benefits of switching. Then you'll explore switch functionality, connectivity issues surrounding switching, and spanning tree protocol. You'll go onto discover how to configure switches and the importance of port security. Finally, you'll learn about Power Over Ethernet (POE), port mirroring, and Virtual LANs (VLANs). This course was originally created by Global Knowledge (GK). 
38 videos | 1h 5m has Assessment available Badge
Wireless LANs
When computer networking technology effectively cut the cord, a new era of computer communication emerged. In this course, you'll explore wireless technology including the standards and organizations that govern wireless networking. Then you'll discover Wi-Fi concepts such as access points, WLAN controllers, SSIDs, and Wi-Fi channels. Finally, you'll learn about wireless tools, security, authentication, encryption, and performance. This course was originally created by Global Knowledge (GK). 
16 videos | 34m has Assessment available Badge
IP Addressing and IPv4 Subnetting
Internet Protocol (IP) is the backbone of internet communication. Subnetting is the process of dividing a network into subnetworks and it's an important part of designing computer networks. In this course, you'll discover IP addressing concepts such as addressing, binary numbering, and dotted decimal notation. Then you'll explore classful addressing, reserved and private addresses, and network masks. You'll learn about classless addressing and the new format for IP addresses, IPv6. You'll explore subnetting and its purpose and subnet mask rules. Then you'll discover the art and the science of subnetting and how to calculate subnets. Finally, you'll learn about key subnet addresses and how to implement a subnet plan. This course was originally created by Global Knowledge (GK). 
23 videos | 53m has Assessment available Badge
TCP, UDP, Support and Management Protocols
Transmission Control Protocol/Internet Protocol (TCP/IP) is the underlying communication mechanism of all networked devices. A number of protocols perform specific functions when facilitating network communication. In this course, you'll learn about TCP and User Datagram Protocol and connection-oriented vs. connectionless protocols. Then you'll learn how messages are packaged and source and destination port numbers. You'll learn about Network Address Translation. You'll learn about Address Resolution Protocol, ARP messages, and the ARP cache. Then you'll explore Dynamic Host Configuration Protocol, the Domain Name System, Internet Control Message Protocol, ICMP and the Ping command, and Internet Group Management Protocol. Finally, you'll learn about telnet, Simple Network Management Protocol, and legacy protocols. This course was originally created by Global Knowledge (GK). 
29 videos | 59m has Assessment available Badge
Routing and Wide Area Networks
Routers play a crucial role in computer networking. Networking technologies have made it possible to implement connectivity over broad geographical areas. In this course, you'll discover the inner workings of routers including logical segmentation, static and dynamic routing and the ways routers make decisions. Then you'll learn about routing metrics and tables. You'll explore the various routing protocols and how basic router configuration is performed. You'll then explore Wide Area Networks (WANs) and their related technologies including WAN providers, circuit-switched and packet-switched networks, and SONET. Then you'll discover Multiprotocol Label Switching (MPLS) and Carrier Ethernet networks. Finally, you'll learn about cloud-based networks and how they can provide connectivity over the internet. This course was originally created by Global Knowledge (GK). 
31 videos | 55m has Assessment available Badge
Communication and Web Protocols
In networking, communications are facilitated using a number of communication protocols. In this course you'll explore the various protocols used for transmitting information including email protocols SMTP, POP3, and IMAP. Then you'll learn about instant messaging and the SIMPLE and XMPP protocols. You'll discover VoIP, SIP, RTP, H.323 and MGCP, and unified communications. There are several protocols used to facilitate communication on the Worldwide Web. So, you'll explore HTTP and URLs. Then you'll learn about SSL and TLS. Finally, you'll discover RDP and FTP. This course was originally created by Global Knowledge (GK). 
18 videos | 28m has Assessment available Badge
Network Security and Emerging Technologies
Computer networking is an indispensable tool for single users and large enterprises alike, but unfortunately there are those who want to steal your information or profit off of you. Also, technology changes faster than most of us can keep up with it. In this course, you'll discover the elements of securing networks against attackers, including common security threats, malware, and social engineering. Then you'll learn about the risks of unsecured networks and how attackers compromise networks. You'll explore threat mitigation techniques, types of network security software, VPNs, perimeter networks, intrusion detection systems, security training, and information security planning. You'll learn about emerging technologies, including new wireless technologies and enterprise mobility. Then you'll explore the Internet of Things (IoT) and software defined networks. Finally, you'll discover the importance of keeping up with new technologies and methods for staying current. This course was originally created by Global Knowledge (GK). 
22 videos | 47m has Assessment available Badge
CompTIA A+ 220-1001: Networking
Explore networking fundamentals, including TCP and UDP and review common networking hardware devices. In this course you will recognize the differences between hubs and bridges. Learn when to use a network switch. See how a router protects your systems. Find the differences between access points, repeaters, and extenders. Learn when to use network controllers. Differentiate between cable and DSL modems. Describe the purpose of patch panels. List the benefits of Power over Ethernet (PoE), and compare it with Ethernet over Power, which uses common electrical wiring to convey Ethernet connectivity. Conclude by finding out how cloud-based network controllers work
12 videos | 1h 7m has Assessment available Badge
CompTIA A+ 220-1001: Configuring a Wired/Wireless Network
Wired and wireless networks are everywhere. Explore how to install and configure them. In this course, you will learn what is needed to configure a basic router and switch, set network access points, and work with your Network Interface Controller (NIC). See how to configure end user devices, including Internet of Things (IoT) equipment, such as thermostats, security systems, appliances, and vehicles. Compare DSL and cable modems. Perform basic configurations for your firewall, Quality of Service (QoS) data traffic prioritization, and communication frequency. Conclude by understanding the elements of an IP address and a subnet mask
11 videos | 1h 22m has Assessment available Badge
CompTIA A+ 220-1001: Wireless Networking Protocols
As wireless gadgets proliferate, so do their network protocols. This course helps you distinguish between WiFi standards 802.11a, 802.11b, 802.11g, 802.11n, and 802.11ac; the frequencies they use, the channels they offer, and how well they perform against one another. Other wireless standards discussed include Bluetooth, Near Field Communication (NFC), Radio Frequency Identification (RFID), and Zigbee and Z-Wave for Iot devices and low power applications. Finally, this course compares 3G, 4G, 5G, and LTE cellular communication standards and their application to mobile devices
12 videos | 56m has Assessment available Badge
CompTIA A+ 220-1001: Network Hosts
Explore what computer network servers provide to ease administration and service clients. This course introduces you to the purpose of multiple server types. These include web servers, file servers, print servers, DHCP servers, DNS servers, proxy servers, mail servers, and authentication servers. You will also learn about the syslog, which sends event messages to a logging server. Finally, this course compares network security technologies, such as UTM, IDS, IPS, and end-point management. It also discusses how to handle a mix of current and older, legacy equipment on a network
12 videos | 1h 2m has Assessment available Badge
CompTIA A+ 220-1001: Implementing Network Concepts
In this course, you will examine IP (Internet Protocol) addresses, which are assigned to network-equipped devices that are part of a TCP (Transitional Control Protocol)/IP-based network. Learners explore the basics of IP addressing and networking concepts such as DNS (Domain Name System), DHCP (Dynamic Host Configuration Protocol), and NAT (Network Address Translation). Begin with an overview of DNS and its benefits. Then, take a closer look at the DHCP, its features and reservations. Explore some of the basic characteristics of IP version 4, the fourth revision of the Internet protocol. Next, look at IP version 6, the successor to version 4; version 5's functionality was worked into version 6. Study the purpose of the Subnet Mask, a key component of IP address configurations, and the Default Gateway, commonly found as a value in an IP configuration. Recognize when to use VPNs (Virtual Private Networks), and look at virtual local area networks, or VLANs. Finally, explore the benefits of NAT. A closing exercise assesses skills in configuring network settings and components. This course can be used to help prepare for the 220-1001: CompTIA A+ certification exam
11 videos | 1h 30m has Assessment available Badge
CompTIA A+ 220-1001: Network Types
This course helps learners explore the common network and Internet connection types available to connect devices and businesses. First, you will take a look at the basic characteristics of a local area network, or LAN, a network of computers and other components such as printers located relatively closely together. Then explore the wide area network (WAN), effectively the complete opposite of the LAN. Learn about the personal area network, PAN, which refers to an interconnection of personal devices all within the range of an individual. Examine the features of the Metropolitan Area Network, MAN, larger than the LAN but not as large as the WAN. Next, the Wireless Mesh Network and the high-speed Internet service known as Cable Internet. Further tutorials look at the digital subscriber line or DSL Internet service; the benefits of using Fiber Optic connections; dial-up and satellite Internet access, and the Integrated Services Digital Network, or ISDN. You will learn about the Line-of-Sight, or LOS Internet service and look at Cellular Networks. Close out with an exercise on configuring Internet connections. This course can be used to help prepare for the 220-1001: CompTIA A+ certification exam
13 videos | 1h 7m has Assessment available Badge
CompTIA A+ 220-1001: Networking Tools
In this course, explore the numerous networking tools available to help identify, diagnose, and resolve problems and issues occurring on a computer network. The first tutorial looks at the tool to use if you find yourself working with cabling, the crimper. Next, another essential tool for anyone working in cabling, the cable stripper. Then take a look at the multimeter, an electronic tool used to measure voltage, amps, and resistance, among other things. You will learn about another useful tool and when to use it, the tone generator and probe. The next is the cable tester, and as it says, it is a device used to test cable connectivity. Moving on, learners can examine the loopback plug and the punch down tool. Finally, explore the Wi-Fi analyzer, a tool that you might find yourself using if you need to really optimize the coverage of a fairly large area with Wi-Fi. Conclude by reviewing your nr knowledge with an exercise recognizing when and where to use some of these common networking tools. This course can be used to help prepare for the 220-1001: CompTIA A+ certification exam
9 videos | 30m has Assessment available Badge
Configuring Wired & Wireless Networks
Networking allows devices and users to communicate and share data. Learn the core TCP/IP protocols, networking services, and command-line tools needed to build your basic networking capabilities.
17 videos | 1h 6m available Badge
Configuring Firewalls
Understanding your network includes characterizing and controlling traffic flow. Explore the role of firewalls, routers, and wireless settings in securing your network transmissions and access.
13 videos | 49m available Badge
Creating & Configuring Network Shares
Shared files and folders provide users access to information. Ensure networks are running properly and information is accessed quickly by becoming proficient at creating and managing network shares.
16 videos | 1h 11m available Badge
Remote Connections & Mac OS X Networking
Learn how to monitor network connections and remotely access computers and resources. Explore management tools used when working with Windows connectivity, wireless network settings, and shared files and printers.
14 videos | 39m available Badge
Software-Defined Networking Fundamentals
Software-defined networking (SDN) enables holistic network management, and intelligent use of network resources, both physical and virtual. Explore a vendor neutral overview of SDN and how it works.
17 videos | 1h 8m has Assessment available Badge
Network Function Virtualization Fundamentals
What’s the difference between network function virtualization (NFV) and software-defined networking (SDN)? Learn about the benefits, use cases, and components of the NFV network architecture concept.
6 videos | 26m has Assessment available Badge
Benefits & Allocating Addresses
IPv6 is here to stay and will eventually replace IPv4. Develop a solid foundation around IPv6 by discovering IPv6 addressing and how IPv6 addressing will be deployed.
7 videos | 50m has Assessment available Badge
Exploring Addresses
IPv6 is here to stay and will eventually replace IPv4. Develop a solid foundation around IPv6 by exploring IPv6 addresses and how they can be allocated in network environments.
11 videos | 1h 20m has Assessment available Badge
Decoding the Packet Header & Discovering ICMPv6
IPv6 is here to stay and will eventually replace IPv4. Discover how the packet header is decoded and how ICMPv6 factors into IPv6.
8 videos | 1h 1m has Assessment available Badge
SHOW MORE
FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THESE COURSES

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

BOOKS INCLUDED

Book

Networking All-in-One for Dummies, 7th Edition
Whether you're in charge of a small network or a large network, this comprehensive guide is full of the information you’ll need for setting up, managing, and securing a successful network.
Book Duration 12h 33m Book Authors By Doug Lowe

Book

Microsoft Windows Networking: Essentials
Focusing on the new Microsoft Technology Associate (MTA) program, this book pares down to just the essentials, showing beginners how to gain a solid foundation for understanding networking concepts upon which more advanced topics and technologies can be built.
Book Duration 6h 9m Book Authors By Darril Gibson

Book

Introduction to Storage Area Networks and System Networking
This IBM Redbook provides an introduction to the SAN and Ethernet networking, and how these networks help to achieve a smarter data center.
Book Duration 5h 48m Book Authors By Jon Tate, et al.

Book

Networking Self-Teaching Guide: OSI, TCP/IP, LAN's, MAN's, WAN's, Implementation, Management, and Maintenance
For those seeking to move into a networking career, this hands-on guide is designed so that you can select, design, and implement an actual network using the tutorials and steps provided.
Book Duration 13h 9m Book Authors By James Edwards, Richard Bramante

Book

Networking Systems Design and Development
Grounded in real-world applications, this book provides the ideal blend of conceptual instruction and lab work to give students and IT professionals a quick start in developing network systems using the Linux operating system.
Book Duration 8h 8m Book Authors By Lee Chao

Book

CompTIA Network+ Study Guide, Third Edition (Exam N10-006 )
Detailing the fundamental concepts you will need to know to prepare for the CompTIA Network+ certification exam, this one-stop, comprehensive resource covers network technologies, installation and configuration, media and topologies, security, and much more, plus practical examples drawn from real-world situations.
Book Duration 17h 18m Book Authors By Todd Lammle

Book

Networking Bible
Packed with practical, professional techniques and the very latest information, this comprehensive book is your complete, step-by-step guide to networking—from different architectures and hardware to security, diagnostics, Web services, and much more.
Book Duration 16h 25m Book Authors By Barrie Sosinsky

Book

Networking: The Complete Reference, Third Edition
Filled with proven solutions to a wide array of networking issues, as well as concise explanations, start-to-finish deployment plans, real-world examples, and expert tips, this detailed resource will show you how to build and administer high-performance networks of all sizes, from small home systems to enterprise internetworks.
Book Duration 11h 46m Book Authors By Bobbi Sandberg
SHOW MORE
FREE ACCESS

BOOKS INCLUDED

Book

Networking for Dummies, 12th Edition
Jam-packed with tons of helpful step-by-step instructions, this thoroughly updated book helps both beginning network administrators and home users to set up and maintain a network.
Book Duration 6h 42m Book Authors By Doug Lowe

Book

Networking All-in-One for Dummies, 7th Edition
Whether you're in charge of a small network or a large network, this comprehensive guide is full of the information you’ll need for setting up, managing, and securing a successful network.
Book Duration 12h 33m Book Authors By Doug Lowe

Book

Networking Fundamentals
A clear and concise resource on Windows networking, perfect for IT beginners, this practical guide covers everything you need to know about network infrastructures, hardware, protocols, and services.
Book Duration 5h 6m Book Authors By Crystal Panek

Book

Network Storage: Tools and Technologies for Storing Your Company's Data
In an effort to help IT managers create a solid foundation for coming decades, this complete resource explains the changes occurring in storage, what they mean, and how to negotiate the minefields of conflicting technologies that litter the storage arena.
Book Duration 6h 27m Book Authors By James O'Reilly

Book

Next-Generation Wireless Networks Meet Advanced Machine Learning Applications
Featuring coverage on a broad range of topics, this book discusses various technologies of next-generation wireless networks to enable the dynamic optimization of system configuration and applications within the fields of wireless networks, broadband networks, and wireless communication.
Book Duration 7h 44m Book Authors By Ioan-Sorin Comşa, Ramona Trestian

Book

Networking: The Complete Reference, Third Edition
Filled with proven solutions to a wide array of networking issues, as well as concise explanations, start-to-finish deployment plans, real-world examples, and expert tips, this detailed resource will show you how to build and administer high-performance networks of all sizes, from small home systems to enterprise internetworks.
Book Duration 11h 46m Book Authors By Bobbi Sandberg

Book

Windows Networking Tools: The Complete Guide to Management, Troubleshooting, and Security
Placing the proven methods of an industry veteran at your fingertips, this book explains how to use built-in Windows networking tools and third-party networking products to diagnose network problems, address performance issues, and enhance the overall security of your system and network.
Book Duration 6h 7m Book Authors By Gilbert Held

Book

Networking Bible
Packed with practical, professional techniques and the very latest information, this comprehensive book is your complete, step-by-step guide to networking—from different architectures and hardware to security, diagnostics, Web services, and much more.
Book Duration 16h 25m Book Authors By Barrie Sosinsky
SHOW MORE
FREE ACCESS

AUDIOBOOKS INCLUDED

Audiobook

Networking for Dummies, 11th Edition
This audio edition seamlessly gets you connected with the basics and gives you the knowledge to work out whatever kinks may come your way-in no time.
Audiobook Duration 13h 28m 12s Audiobook Authors By Doug Lowe

YOU MIGHT ALSO LIKE

Likes 2 Likes 2  
Likes 16 Likes 16