Networking is a complex but essential area of study for system administrators. This course covers the ways users can connect to a network; the concepts of switching, routing, and internetworking; end-to-end protocols; congestion control and resource allocation; end-to-end data; network security; and network applications such as e-mail and the Web, IP telephony and video streaming, and peer-to-peer file …
Networking for Sysadmins
Video description
Master the nuts and bolts of computer networking
Networking is a complex but essential area of study for system administrators. This course covers the ways users can connect to a network; the concepts of switching, routing, and internetworking; end-to-end protocols; congestion control and resource allocation; end-to-end data; network security; and network applications such as e-mail and the Web, IP telephony and video streaming, and peer-to-peer file sharing. A basic understanding of system administration is recommended for this course.
Makes And Models - BIND, The Windows DNS Server, And More
Resource Records
The A Record
The AAAA Record
The PTR Record
The CNAME Record
The MX Record
The SRV Record
The TXT Record
Infrastructure Records
Wildcards
RRset Order
Tracing Resolution With dig
Timeouts And Retransmissions
Default Domains And Search Lists
Dynamic Update
NOTIFY
IXFR
Sender Policy Framework
nslookup
dig
Conclusion
What You Should Expect From This Video
What You Should Know
What You Will Learn
History Of TCP/IP
Using TCP/IP For Communication
OSI Model
TCP/IP Model
Capturing Packets
Using Wireshark
IETF
Protocols
Networking Utilities
Ethernet
Layer 2 Addresses (Mac)
PPP/Slip/PPPoe
WAN Protocols - Sonet, ATM And Frame Relay
VLANs And 802.1Q
Purposes Of The Network Layer
IP Headers
IP Addresses And Subnets
Routing
BGP
RIP
OSPF
ARP
ARP Spoofing
RARP
Internet Registries
Autoconfiguration - BootP And DHCP
IP Configuration
IP Fragmentation
Uses Of ICMP
ICMP Message Types
Ping
Error Messages And Handling
ICMP Attacks
Purposes Of The Transport Layer
TCP Headers
TCP Handshake
Acknowledgements
Sliding Windows
Session Teardown
TCP States
Port Behavior
Uses Of UDP
Flags/Headers
Streaming Audio And Video
Purposes Of The Session Layer
SSL/TLS
SSH
RTP Control Protocol
RPC
Purposes Of The Application Layer
HTTP
Telnet
FTP
SMTP
POP3 And IMAP
Windows File Sharing - SMB And CIFS
DNS Basics
DNS Protocol
Firewalls
Stateful - Determining State
Stateless - Access Control Lists
Application Layer Firewalls
Intrusion Detection
Spoofing Traffic
Malicious Traffic
Building Packets - PackETH
Building Packets - HPing
Wireless Fundamentals
Searching For Wireless Networks
Examining Wireless Packets
Protecting Wireless With WEP
Protecting Wireless With WPA
Why IPv6
IPv6 Vs. IPv4
Using TCP With IPv6
Using ICMPv6
Next Steps
About The Author
About The Author And Introduction.mp4
OSI - Part 1.mp4
OSI - Part 2.mp4
TCP / IP Protocols.mp4
IPv4 Addressing.mp4
Ports And IPv6 Addressing.mp4
TCP / IP Review.mp4
Network Media.mp4
Network Media Terms - Part 1.mp4
Network Media Terms - Part 2.mp4
Ethernet.mp4
Wireless.mp4
Modulation And Encoding.mp4
Topologies.mp4
Network Sizes.mp4
Transmission Types.mp4
Media Access Methods.mp4
Segments, Subnets And Domains.mp4
Terms And Definitions.mp4
Network Layer Devices - Part 1.mp4
Network Layer Devices - Part 2.mp4
Data Link Layer Devices.mp4
Routers.mp4
Firewalls - Part 1.mp4
Firewalls - Part 2.mp4
Firewalls - Part 3.mp4
Firewall Rules.mp4
Firewall Architecture.mp4
Network Services.mp4
DHCP.mp4
Domain Name Systems.mp4
DNS Architecture.mp4
DNS Resolver.mp4
Authentication Introduction.mp4
Authentication Protocols.mp4
Directory Services - Part 1.mp4
Directory Services - Part 2.mp4
DS Kerberos.mp4
DS Kerberos RAS.mp4
Diameter.mp4
RAS VPN.mp4
NAT PAT.mp4
Bastion Host.mp4
Endpoint Systems.mp4
Virtual Machines.mp4
Mainframe.mp4
Wireless Introduction - Part 1.mp4
Wireless Introduction - Part 2.mp4
Wireless Security - WEP.mp4
Wireless Security - Authenticating.mp4
Wireless Security - WPA WPA2.mp4
Wireless Security - 802.11i.mp4
Wireless Security - Attacks.mp4
Wireless Security Review.mp4
MIMO And Cellular.mp4
Browsing.mp4
DoS / DDoS.mp4
Information Theft.mp4
APT And Cellular.mp4
Course Review.mp4
Start your Free Trial Self paced Go to the Course We have partnered with providers to bring you collection of courses, When you buy through links on our site, we may earn an affiliate commission from provider.
This site uses cookies. By continuing to use this website, you agree to their use.I Accept