Example Curriculum
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- What is Networking? (2:44)
- Open Systems Interconnection (OSI) Model (9:20)
- Encapsulation and Decapsulation (11:12)
- Network Topologies (12:50)
- Network Types and Characteristics (8:35)
- Service Related Entry Point (3:13)
- Virtual Network Concepts (5:45)
- Provider Links (4:26)
- Let's Have Some Fun (+ More Resources)
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- IP Protocol Types (5:09)
- What are Ports? (4:15)
- File Transfer Protocol (FTP), SSH File Transfer Protocol (SFTP), Telnet, Secure Shell (SSH) (9:23)
- Simple Mail Transfer Protocol (SMTP), Post Office Protocol 3 (POP3), Internet Message Access Protocol Version 4 (IMAP4) (2:39)
- Domain Name System (DNS), Dynamic Host Configuration Protocol (DHCP), Simple Network Management Protocol (SNMP) (4:32)
- Hypertext Transfer Protocol (HTTP), HTTPS (Secure) (3:21)
- Server Message Block (SMB), Lightweight Directory Access Protocol (LDAP), Network Time Protocol (NTP), Syslog (4:07)
- MySQL, SQLNet (2:51)
- Remote Desktop Protocol (RDP), Session Initiation Protocol (SIP) (2:27)
- Course Check-In
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- Networking Devices (13:02)
- Networked Devices (10:52)
- Routing (9:09)
- Virtual Local Area Network (VLAN) (11:50)
- Port Configuration (7:24)
- MAC Address (4:38)
- Power Over Ethernet (PoE), PoE+ (Plus), Spanning Tree Protocol (STP), Carrier Sense Multiple Access (CSMA (5:11)
- Address Resolution Protocol (ARP) (4:31)
- Neighbour Discovery Protocol (NDP) (2:38)
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- Performance Metrics (5:42)
- Simple Network Management Protocol (SNMP) (4:04)
- Network Device Logs (4:11)
- Interface Status (2:11)
- Environmental Factors (2:54)
- Plans and Procedures (4:31)
- Hardening and Security Policies (4:12)
- Common Documentation (3:08)
- Common Agreements (4:17)
- Load Balancing, Multipathing and Network Interface Cards (NIC) Teaming (3:37)
- Redundant Hardware and Clusters (7:05)
- Redundancy and High Availability (HA) Concepts (7:37)
Available in
days
days
after you enroll
- Confidentiality, Integrity and Availability (CIA) Triangle and Security Basics (8:38)
- Threats and Vulnerabilities (4:29)
- Defense (6:19)
- Authentication, Authorization and Accounting (AAA) Servers (7:17)
- Types of Authentication and Authentication Management (11:31)
- Existing Authentication and Authorization Mechanisms (12:56)
- Risk Management (3:51)
- Security Information and Event Management (SIEM) (3:37)
- Technology Based Attacks (4:50)
- Social Engineering (2:01)
- Network Hardening (6:18)
- Wireless Hardening Techniques (4:37)
- Importance of Physical Security (6:03)
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll