ITProTV CompTIA Network N10-007

Vendor-neutral networking - Official CompTIA online IT training. The Network+ course goes over all you need to know about managing devices on a network for the IT certification exam.

Course Length: 37.5 hours

Quote:
The Network+ certification was introduced by CompTIA in 1999 and was designed to do for Network Technicians what the A+ certification did for Computer Technicians. Obtaining Network+ certification shows that the holder possess the same knowledge and skills of someone who has worked for nine months as a Network Technician. The Network+ exam covers topics ranging from theory (terminology, topology and design) to hardware (routers, switches and cabling) and provides users with a broad, vendor neutral perspective on the topics required to work in the field of Network Administration.

Contents:

Networking Concepts
Overview
Ports and Protocols
Ports and Protocols Part 2
OSI Model
OSI Model Part 2
Network Traffic Properties
Network Traffic Properties Part 2
Switching Technologies
Routing Technologies
Routing Technologies Part 2
Network Performance Concepts
IP Addressing
IP Addressing Part 2
IP Addressing Part 3
IP Addressing Part 4
Classless IPv4 Addressing
Classless IPv4 Addressing Part 2
Classless IPv4 Addressing Part 3
Classless IPv4 Addressing Part 4
IP Address Assignments
IPv6 Addressing
IPv6 Addressing Part 2
Network Topologies
Network Topologies Part 2
Wireless Technologies
Cloud Concepts
Network Service Functions
Network Service Functions Part 2
Network Service Functions Part 3
TCP/IP Model
TCP/IP Model Part 2

Infrastructure
Cabling Solutions-Copper
Cabling Solutions-Copper Part 2
Cabling Solutions-Copper Part 3
Cabling Solutions-Fiber
Cabling Solutions-Fiber Part 2
Network Devices
Advanced Networking Devices
Advanced Networking Devices Part 2
Virtualization and Network Storage
Virtualization and Network Storage Part 2
WAN Technologies
WAN Technologies Part 2
WAN Technologies Part 3

Network Operations
Network Diagrams and Documentation
Business Continuity and Disaster Recovery
Business Continuity and Disaster Recovery Part 2
Scanning, Monitoring and Patching
Remote Access Methods
Remote Access Methods Part 2
Remote Access Methods Part 3
Policies and Best Practices
Policies and Best Practices Part 2

Network Security
Physical Security Devices
Authentication and Access Control
Authentication and Access Control Part 2
Basic Wireless Network Security
Common Networking Attacks
Common Networking Attacks Part 2
Network Device Hardening
Network Device Hardening Part 2
Common Mitigation Techniques
Common Mitigation Techniques Part 2
Common Mitigation Techniques Part 3

Network Troubleshooting and Tools
Network Troubleshooting Method
Network Troubleshooting Tools
Network Troubleshooting Tools Part 2
Network Troubleshooting Tools Part 3
Network Troubleshooting Tools Part 4
Network Troubleshooting Tools Part 5
Common Wired Network Issues
Common Wireless Network Issues
Common Network Service Issues
Common Network Service Issues Part 2
Common Network Service Issues Part 3

Subnetting
Subnetting Step-by-Step
Subnetting Step-by-Step Part 2
Subnetting Step-by-Step Part 3
Subnetting Step-by-Step Part 4
Subnetting Step-by-Step Part 5
Subnetting Step-by-Step Part 6
Subnetting Step-by-Step Part 7
Subnetting Step-by-Step Part 8
Subnetting Step-by-Step Part 9
Subnetting Step-by-Step Part 10

DOWNLOAD LINK

RAR password if asked would be whocares

ITProTV - PowerShell Scripting Course

In this series, you will learn how to write a PowerShell script. We will cover the different components that make up a PowerShell script. We look at variables, arrays and hash tables. We look at comparison operators, logical operators, assignment and arithmetic operators. We look at and constructs, including if, switch, for, foreach, do and while. We will also look at creating a script module.

DOWNLOAD LINK

RAR password if asked would be whocares

ITProTV - Intro to Docker

Getting down with Docker In this episode, Daniel and Justin finish their effort to build a Docker Swarm application. Here they take you through the commands needed to deploy the Swarm as well as the services for the application. Finally, they test to make sure that the application is working as expected; troubleshooting any unforeseen issues.

DOWNLOAD LINK

RAR password if asked would be whocares

ITProTV - Use the Standard Library

The Power of Python Part of the power of Python is the array of tools that come built into the language, known as the Python Standard Library. In this series, we take a look at the Standard Library, import from the Standard Library, as well as take a view of some of the more common modules, or parts, of the Standard Library. If you want to dive a little deeper, then we will see you there.

DOWNLOAD LINK

RAR password if asked would be whocares

ITProTV - Python for Security

In this episode, Daniel and Justin start a new project that will use Python to help us format our RAW packet data into a readable .pcap file. Here you’ll see how to format the data and then send that data to a .pcap file which you can then view using a standard tool like Wireshark or TCPdump.

DOWNLOAD LINK

RAR password if asked would be whocares

    ITProTV - Intro to PHP

    In this episode, we look at a brief history of PHP and what it is used for.

    Getting started with PHP

    We then get our environment set up to b working on our first PHP file.

    DOWNLOAD LINK

    RAR password if asked would be whocares

    ITProTV - CompTIA Server (SK0-004)

    Contents:
    Server Architecture
    Overview
    Server Form Factors
    Server Components
    Server Components Part 2
    Power and Cooling
    Power and Cooling Part 2

    Server Administration
    Installing a Server OS
    Installing a Server OS Part 2
    Installing a Server OS Part 3
    Installing a Server OS Part 4
    Server Roles and Requirements
    Administering a Server
    Server Maintenance
    Server Maintenance Part 2
    Server Maintenance Part 3
    Server Maintenance Part 4
    Asset Management and Documentation
    Asset Management and Documentation Part 2
    Virtualization

    Storage
    Primary Storage Devices
    Configuring RAID
    Configuring RAID Part 2
    Storage Technologies
    Storage Capacity

    Security
    Physical Security
    Server Hardening
    Network Security
    Network Security Part 2
    Secure Storage Disposal
    Logical Access Control
    Logical Access Control Part 2
    Environmental Controls
    Environmental Controls Part 2
    Environmental Controls Part 3

    Networking
    IP Addressing and Services
    IP Addressing and Services Part 2
    Ports and Protocols
    Cable Management
    Cable Management Part 2

    Disaster Recovery
    Disaster Recovery Principles
    Backup Techniques

    Troubleshooting
    Troubleshooting Methodologies
    Troubleshooting Hardware
    Troubleshooting Software
    Troubleshooting Software Part 2
    Troubleshooting Software Part 3
    Troubleshooting Networking
    Troubleshooting Networking Part 2
    Troubleshooting Networking Part 3
    Troubleshooting Storage
    Troubleshooting Security
    Troubleshooting Security Part 2
    Troubleshooting Security Part 3

    DOWNLOAD LINK

    RAR password if asked would be whocares

    ITProTV - Data Representation and Serialization

    What does that data look like?
    In this series, we take a look at common formats for saving, reading, and shuffling data around such as Comma Separated Values (CSV), jаvascript Object Notation (JSON), YAML Ain’t Markup Language (YAML), and eXtensible Markup Language (XML). If you want to know more about these data formats as well as how to interact with these different data representation using Python, then we will see you there!

    DOWNLOAD LINK

    RAR password if asked would be whocares

    ITProTV - Hands-on with CISCO Modeling Labs 2 (CML2)

    Overview
    Are You Ready For CML2
    CML2 INSTALLATION
    Install CML2 On Windows 10
    Install CML2 On MacOS Catalina
    Install CML2 On VMware ESXi
    CML2 OPERATIONS
    Get To Know CML2
    Build And Configure A Simple Lab (GUI)
    Build And Configure A Simple Lab (API)
    Access The CML2 Using Telnet
    Access The CML2 Using SSH
    CML2 ENHANCED OPERATIONS
    Connect A Lab To The Outside World
    Add VIRL 1.X Images To A CML2 Lab

    DOWNLOAD LINK

    RAR password if asked would be whocares

    ITProTV - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)

    The Palo Alto Networks Certified Cybersecurity Associate show is produced for anyone who want to learn the fundamentals of cybersecurity so that they have the knowledge for an entry-level network security career. They will be introduced to the context of cybersecurity knowledge and the Palo Alto technologies that can stop those attacks. There is no pre-requisite required only a desire to learn more about cybersecurity and Palo Alto Security solutions.

    DOWNLOAD LINK

    RAR password if asked would be whocares

    ITProTV - Windows Autopilot Course Video

    Learn the easy way for getting new and recycled devices configured to your company’s needs with Windows Autopilot

    Windows Autopilot is a collection of technologies used to set up and pre-configure new devices, getting them ready for productive use. You can also use Windows Autopilot to reset, repurpose and recover devices. This solution enables an IT department to achieve the above with little to no infrastructure to manage, with a process that’s easy and simple.

    DOWNLOAD LINK

    RAR password if asked would be whocares

    ITProTV - DNS Course Video

    Maintaining the Domain Name SysteM

    This is your go-to guide for the practical application of DNS, the Domain Naming System. Explore topics on supporting websites, mail servers, and more.

    DOWNLOAD LINK

    RAR password if asked would be whocares

    ITProTV - LPIC-2 Linux Engineer (201-450) Course Video

    The LPIC-2 Linux Engineer (201-450) course is designed for IT Professionals who are seeking the LPIC-2 certification. The course covers skills required of any intermediate to advanced systems administrator who is tasked with supporting Linux in a production environment. Topics covered include: capacity planning, kernel maintenance, startup and recovery methods, advanced storage configurations, network connectivity, and systems maintenance. This course is accompanied by the 202-450 course which combine to cover the LPIC-2 exam.

    DOWNLOAD LINK

    Tr1QBRlbKnk7zk8h11Bs6w

    RAR password if asked would be whocares

      ITProTV - Cisco CCNP Enterprise ENSLD (300-420)

      ITProTV’s Cisco CCNP Enterprise ENSLD (300-420) will help you to learn and prepare for the associated exam

      Designing Cisco Enterprise Networks (300-420 ENSLD). This exam is a design focused exam for the new CCNP Enterprise certification from Cisco Systems. In the show, you learn every topic covered in the official exam blueprint from Cisco. These areas include Advanced Addressing and Routing Solutions, Advanced Enterprise Campus Networks, WAN for Enterprise Networks, Network Services, and Automation. Though the show is exam oriented, the ultimate outcome of the show will be to fill you with the core knowledge and skillsets you need to be successful in designing scalable and resilient Enterprise-level networking architectures.

      The show will be lead by Anthony Sequeira (CCIE #15626). Anthony brings his decades of knowledge and experience to help you to learn the topics in a relaxed interactive format that is both engaging and efficient.

      DOWNLOAD LINK

      RAR password if asked would be whocares

      ITProTV - Red Hat Enterprise Linux 8

      The Red Hat Enterprise Linux 8 (RHEL 8) course on ITProTV is designed to introduce the viewer to the RHEL operating system.

      In this course you will learn how to install RHEL, manage networking, configure services like NFS, harden security through features like SELinux, and support virtual machines all on top of the RHEL platform. The course is targeted towards systems administrators tasked with supporting Linux and expects the viewer to already have a working understanding of the Linux operating system.

      DOWNLOAD LINK

      RAR password if asked would be whocares

      ITProTV – MTA – Networking Fundamentals – 98-366

      Networking Fundamentals 11H 12M
      You only need to pass one exam to get the MTA designation and the Microsoft Network Fundamentals is a great certification to earn when you’re just getting started.
      The Microsoft Technology Associate (MTA) validates building-block technology concepts and helps students explore, discover and pursue successful careers in Information Technology (IT) in an exciting and rewarding way! As the first step in the Microsoft Technology Certification Series, this new, entry-level certification provides students with confidence, credibility, and differentiation while focusing on the knowledge required for the 98-366: MTA Networking Fundamentals Exam.

      DOWNLOAD LINK

      RAR password if asked would be whocares

      ITProTV - ITIL: 2019 & Beyond

      If you’re currently ITIL certified or are considering it, this is the webinar for you. Join ITIL Master Jo Peacock for the latest news on ITIL, including:

      – ITIL 4 background
      – A guided talk through the new modules qualification scheme
      – ITIL Managing Professional vs. ITIL Strategic Leader – which one is for you?
      – The transition exams and what’s next
      – The ITIL community

      DOWNLOAD LINK

      RAR password if asked would be whocares

      ITProTV - Microsoft Desktop Optimization Pack

      Technicians and administrators alike need tools to diagnose computer problems, centrally manage encryption and recovery keys, provide consistency in user settings, provide application co-existence and more. These are some of the topics that we will tackle in our series on MDOP.

      DOWNLOAD LINK

      RAR password if asked would be whocares

      ITProTV – Wireshark

      Network protocol analyzer3 H 56 M
      Many network administrators use the popular Wireshark network protocol analyzer for troubleshooting network traffic regularly. Learn how to use Wireshark 2.2.4.
      Wireshark 2.2.4 is a free and open source network packet sniffer and protocol analyzer developed as a first response tool. It is the most widely-used network protocol analyzer. I can be used to examine all network traffic because it’s a mini swiss army knife to network administrators who needs detailed visibility into the traffic on their network. It displays the raw data obtained by the sniffer and turns it into readable and meaningful data so that the user will be able to spot issues as well as correct network problems. It’s power lies in the ability to help an analyst find the proverbial “needle in a haystack” when the user is up to speed on what to look for and how to do it. This show helps the network professional get started with Wireshark!

      DOWNLOAD LINK

      RAR password if asked would be whocares

        ITProTV - Linux Command Line

        Getting started in the Linux command line9 H 12 M
        Learn how to work on Linux computers solely in the Linux Command Line interface. This course also covers and introduction to BASH scripting.
        In this episode, Daniel and Don take a look how to use a Linux terminal to gain access to the command line. They demonstrate Gnome terminal, Xterm, Konsole and several other terminals and walk through their configruation and use.

        DOWNLOAD LINK

        RAR password if asked would be whocares