Networking Core Concepts: Intermediate
  • 27 Courses | 33h 27m 58s
  • 8 Books | 91h 16m
  • 16 Courses | 15h 52m 4s
  • 8 Books | 72h 2m
  • 1 Audiobook | 13h 28m 12s
Likes 171
Networks can range from the very small to the very large and complex. Master the basics of networking technologies here.


Networking Fundamentals

  • Playable
    Network Masks and CIDR Notation
    4m 52s
  • Playable
    Distinguishing between Private and Public IP Addresses
    2m 31s


CompTIA A+ 220-1001: Networking

  • Playable
    Hubs & Bridges
    8m 58s
  • Playable
    7m 33s


Networking Fundamentals
For both Linux servers and clients, an administrator must be able to configure and use the Linux network interfaces. Master the fundamentals of Internet protocols, network configuration and troubleshooting, and configuring DNS.
16 videos | 1h 6m available Badge
Ports, Protocols, & the OSI Model
The OSI model is a conceptual model used to partition network communication. Explore the OSI layers, and discover where devices, services, and protocols reside. Also, explore well-known protocols and their associated port numbers.
17 videos | 1h 36m has Assessment available Badge
Concepts & Characteristics of Networking
Networks are the basic interconnections for all computing devices. Discover fundamental elements in network communiction, including routing and switching concepts as well as IP addressing components.
15 videos | 1h 44m has Assessment available Badge
IP Addressing
Each device belonging to a network is assigned a unique IP address by which it can be identified. Explore various addressing schemes that are used in networks.
8 videos | 1h 11m has Assessment available Badge
Network Topologies & Technologies
Network architecture is the complete framework of a computer network. Explore architectural concepts, including wired and wireless topologies, network types, technologies facilitating the Internet of Things (IoT), and wireless technologies.
15 videos | 1h 32m has Assessment available Badge
Cloud Concepts & Network Services
Explore cloud services, delivery models, and security considerations, and discover networking services, including various DNS record types, as well as DHCP, NTP, and IPAM features.
14 videos | 1h 32m has Assessment available Badge
Cabling Solutions
There are many technologies involved in network connections. Explore the different types of cables, connectors, and standards used in a network environment.
10 videos | 58m has Assessment available Badge
Networking Devices
Networking devices mediate communications within computer networks. Explore various networking devices, including modems, bridges, hubs, switches, and routers.
10 videos | 54m has Assessment available Badge
Advanced Networking Devices
Networking devices mediate communications within computer networks. Explore advanced networking devices, including proxy servers, load balancers, VPN concentrators, RADIUS servers, IDSs, and IPSs.
12 videos | 59m has Assessment available Badge
Network Storage, Virtualization, & WAN Technologies
Explore virtual networking components, network storage types, and connection types. Also, discover WAN concepts, including service types, transmission mediums, service characteristics, and termination.
14 videos | 1h 33m has Assessment available Badge
Documentation and Diagrams & Business Continuity
Documentation helps ensure an efficient business structure, while disaster recovery plans help ensure business continuity. Explore documentation concepts, such as diagrams and SOPs, and business continuity concepts, such as fault tolerance.
19 videos | 1h 40m has Assessment available Badge
Network Monitoring & Remote Access Methods
Continuous network monitoring is instrumental in obtaining peak performance. Explore monitoring concepts, including event logs, alerts, and patch management. Also, discover remote access methods, such as VPNs, RDP, SSH, VNC, and telnet.
15 videos | 1h 38m has Assessment available Badge
Policies and Best Practices
Best practices and guidelines should be implemented to ensure optimal network performance and security. Explore these guidelines, including password policies, data loss prevention techniques, NDAs, and safety procedures and policies.
12 videos | 1h 16m has Assessment available Badge
Security Devices, Wireless Security, & Access Control
Discover how to protect organizational assets, like personnel, devices, and infrastructure and explore physical security devices, wireless security, and authentication and access controls.
15 videos | 1h 42m has Assessment available Badge
Network Attacks
Explore various types of attacks that can compromise a network, including DoS, insider threats, and ransomware.
12 videos | 1h 19m has Assessment available Badge
Network Device Hardening
It's important to make devices on a network secure as possible. Explore network device hardening techniques to reduce vulnerabilities and improve security.
10 videos | 1h 13m has Assessment available Badge
Mitigation Techniques
Mitigating security threats can lessen the overall impact that an attack can have on network devices, hosts, and applications. Explore common mitigation techniques.
13 videos | 1h 20m has Assessment available Badge
Troubleshooting Methodology & Tools
By using the appropriate troubleshooting tools, network problems can be identified and resolved quickly. Discover how to identify a network problem and resolve it using different techniques and tools.
16 videos | 58m has Assessment available Badge
Troubleshooting Connectivity & Performance Issues
Connectivity issues, such as crosstalk, jitter, reflection, and interference, can greatly impact network performance. Discover how to troubleshoot common wired and wireless connectivity issues.
18 videos | 1h 21m has Assessment available Badge
Troubleshooting Common Network Service Issues
Network services, such as DNS and DHCP, help business operations run smoothly. Explore common issues that occur with network services as well as how to resolve them, including incorrect gateways, duplicate IP addresses, and incorrect times.
9 videos | 57m has Assessment available Badge
Network Survey & Extraction: Network Analysis
Knowing what devices and services are running on a network is an essential part of computer security. Being able to effectively scan a network is the first step in securing it. In this course, you'll learn how to discover and analyze networks through scanning. First, you'll explore common network scanning tools, how to identify network vulnerabilities, and how to perform reverse IP lookup. You'll then move on to learn how to identify services and operating systems, and about scanning techniques such as UDP, stealth, connect, zombie, and ARP scanning.
14 videos | 57m has Assessment available Badge
Network Survey & Extraction: Network Monitoring
Developing techniques to scan and monitor networks is a process of discovery. Being able to continuously monitor or schedule regular tests for vulnerabilities is part of the ongoing battle of network security. In this course, you'll learn to test and take inventory of network hosts so you can monitor more effectively. First, you'll examine methods for actively monitoring and collecting data, as well as strategies for reporting and sharing results. You'll then move on to tools to catalog, compare, filter, and test services, so that any anomaly can be picked up in your scanning activities.
14 videos | 52m has Assessment available Badge
Network & Host Analysis: Protocol Analysis
Wireshark is the de facto tool for network protocol analysis. The ability to live capture, deeply inspect, filter, decrypt, and export network data comprises Wireshark's feature-rich capabilities. In this course, you'll examine the vital elements of network protocol analysis and learn how to reap the benefits of Wireshark's features. You'll start by exploring some common network analysis patterns. You'll then outline the Open Systems Interconnection (OSI) reference model. Next, you'll differentiate between passive and active network scanning. Moving on, you'll use Wireshark to capture and filter network traffic and customize packet capturing. Finally, you'll use Wireshark to save and then export packet captures, apply highlighting rules, extract files, configure profiles, apply display filters, and implement advanced capture and display filtering.
14 videos | 58m has Assessment available Badge
Network & Host Analysis: Network Protocols
The ability to filter based on the protocols in use over a network gives a window into how it is used. Knowing what good and bad traffic looks like and identifying unencrypted traffic and potential avenues for security compromise is essential. In this course, you'll apply various filters to network traffic using Wireshark and explore factors to look out for based on the protocol being examined. You'll learn to filter DHCP and DNS traffic. You'll differentiate between TCP, UDP, ICMP, and ARP traffic. You'll watch insecure protocols like POP, IMAP, Telnet, and FTP. You'll examine what can be discovered by looking at secure traffic over SSH and HTTPS and secure POP and IMAP variants. Finally, you'll examine IPv6 packets.
14 videos | 59m has Assessment available Badge
Network & Host Analysis: Network Observations
Knowing what goes on over a network requires a high-level picture of it. The ability to conceptualize your network's structure, capabilities, and events is essential to protecting it. In this course, you'll explore the concepts and tools required to identify and visualize your network components. You'll work mostly with the open source network protocol analyzer, Wireshark. You'll start by displaying protocol hierarchies and identifying network endpoints. You'll then describe considerations for visualizing networks and create a network diagram using Visio. Next, you'll outline network security assessment methods, recognize the use of baselines for network management, and carry out baseline activity monitoring. You'll also look at ways of capturing network data. Lastly, you'll explore how Wireshark combines with other tools such as Nmap, SSH, and firewalls.
13 videos | 59m has Assessment available