Get $1 credit for every $25 spent!

The Ultimate Cybersecurity & IT Career Certification Pathway Training Bundle

Ending In:
Add to Cart - $34.99
Add to Cart ($34.99)
$1,592
97% off
wishlist
Courses
8
Lessons
1,442
Enrolled
1,028

What's Included

Product Details

Access
Lifetime
Content
75.0 hours
Lessons
727

Cisco CCNA 200-301 Exam: Complete Course with Practical Labs

Ace the Newest CCNA 200-301 Exam & Be a Cisco Certified Network Associate

By David Bombal | in Online Courses

Networks are all around us and you are using one right now to access this course. The Internet is extremely important in modern life today and this reliance is only predicted to continue with the growth of the Internet of Things (IoT) in the next few years. This course will teach you how networks actually work and how you are able to connect to websites like Facebook, Google, and YouTube. Companies throughout the world (from the smallest to the largest) rely on networks designed, installed, and maintained by networking engineers. Aside from the practical knowledge, this course preps you for the newest CCNA 200-301 exam. This is your first step towards attaining your Cisco certifications.

4.6/5 average rating: ★ ★ ★ ★

  • Access 727 lectures & 75 hours of content 24/7
  • Learn how to configure Cisco Routers & Switches
  • Understand how Kali Linux can be used to hack networks
  • Explore topics such as Wi-Fi, Network Automation & Network Security
  • Apply what you've learned to real-world networking scenarios
  • Prepare for the CCNA 200-301 certification exam
This is a prep course. Cisco certification is NOT included.
David Bombal | CCIE #11023 Emeritus
4.6/5 Instructor Rating: ★ ★ ★ ★

David Bombal passed his Cisco Certified Internetwork Expert Routing and Switching exam in January 2003 and is one of a small percentage of Cisco Engineers that pass their CCIE labs on their first attempt. David qualified as a Cisco Certified Systems Instructor (CCSI #22787) many years ago! He has been training Cisco courses for over 15 years and has delivered instructor-led courses in various countries around the world covering a wide range of Cisco topics from CCNA to CCIE. David is very active on social media and has over 250,000 YouTube subscribers and has posted over 1,000 free videos.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Updates included
  • Experience level required: beginner

Requirements

  • Basic understanding of computers

Course Outline

  • Your First Program
  • Welcome
    • Welcome to the course - 1:57
    • CCNA 200-301 Exam: My Experience - 21:13
    • Answering your questions - 1:53
  • Download and Install Recommended Software
    • Packet Tracer: Windows Installation - 11:55
    • Packet Tracer: macOS Installation - 19:55
    • Packet Tracer Tips and Tricks - 11:31
  • Basic Networking Terms
    • What is a network? - 7:01
    • Most basic type of network - 7:09
    • A bit of networking history - 4:53
    • Servers, Clients, Ports and Protocols - 8:01
    • Practical Demonstration using Packet Tracer - 15:40
    • Networking Devices: Firewalls, IDS, IPS anNetworking Devices: Repeaters, Hubs, Switches and Routersd WLC - 12:48
    • Networking Devices: Firewalls, IDS, IPS and WLC - 6:56
  • TCP/IP Model
    • OSI and TCP-IP Models: Who cares? Rants and arguments - 8:58
    • Life is more complicated: Tips and Tricks - 7:10
    • Practical TCP-IP Model Part 1: Bits, Frames, Packets, Segments and more - 7:14
    • Practical TCP-IP Model Part 2: HTTP captures - 7:24
    • Practical TCP-IP Model Part 3: Port Numbers - 9:06
    • Practical TCP/IP Model Part 4: E-mail and FTP captures - 7:26
  • Binary
    • Binary Introduction - 4:11
    • Binary Math - 9:43
    • Binary Conversion Examples - 5:50
    • Converting IP Addresses to Binary - 9:34
  • Hexadecimal
    • Hexadecimal - why do we care? - 4:20
    • Hexadecimal - Lab demonstration - 8:46
    • Hexadecimal calculations - 16:05
  • IP Addressing
    • IP Addressing Overview and Demonstration - 6:26
    • IP Characteristics and IPv4 Address Format - 7:27
    • Network versus Host portion - 6:56
    • IPv4 Address format (Street Analogy) and Address Classes - 5:57
    • Class A and B addresses - 5:01
    • Class C, D, E, A and B addresses - 7:38
    • Special IPv4 Addresses and Directed Broadcast Address - 5:33
    • Local Broadcast Address - 4:27
    • Local Loopback Address - 4:59
    • RFC1918 - Private Addresses - 4:52
    • RFC1918 - Class A, B, C and IPv4 Link Local Addresses - 6:36
    • Subnet Masks - 8:23
    • Subnet mask demonstrations and Discontiguous Network Masks - 5:09
    • CIDR Notation Part 1 and Part 2 - 2:55
    • CIDR Notation Part 3 - 5:22
  • Initial Device Configuration
    • How to connect to a Cisco router or switch? - 7:00
    • Router initial configuration - 11:26
    • Build a basic Cisco network - 12:27
  • Basic Cisco Configuration Lab
    • Basic Cisco Configuration Lab Overview- Can you complete the lab - 2:15
    • Basic Cisco Configuration Lab- Solution Part 1 - 9:50
    • Basic Cisco Configuration Lab- Solution Part 2 - 4:59
  • IP Subnetting
    • IP Subnetting Part 1 - 14:01
    • IP Subnetting Part 2 - 9:57
    • IP Subnetting Part 3 - 8:46
    • IP Subnetting Part 4 - 10:57
    • IP Subnetting Part 5 - 8:18
  • Subnetting Packet Tracer Lab 1
    • Subnetting Lab 1 Introduction - 4:34
    • Subnetting Lab 1- Answers Part 1 - 9:25
    • Subnetting Lab 1- Answers Part 2 - 9:52
    • Subnetting Lab 1- Answers Part 3 - 4:34
    • Subnetting Lab 1- Answers Part 4 - 8:09
  • Subnetting Packet Tracer Lab 2
    • Subnetting Lab 2 - Can you complete the lab? - 3:32
    • Subnetting Lab 2 - Answers Part 1 - 12:50
    • Subnetting Lab 2 - Answers Part 2 - 14:47
  • IPv4 Subnetting Cheat Sheet
    • IPv4_Subnetting
  • Subnetting VLOGs - do you know the answers?
    • CCNA IP addressing and subnetting: Are these hosts on the same subnet? - 8:50
    • CCNA VLOG #051 CCNA IP addressing and subnetting: Can these hosts ping each other? - 7:32
    • CCNA VLOG #053 CCNA IP addressing and subnetting: Can these hosts ping each other? - 6:51
    • CCNA VLOG #079 IP Addressing and IP Subnetting for the CCNA Exam (Part 1): Practical IP Subnetting - 10:58
    • CCNA VLOG #080 IP Addressing and IP Subnetting for the CCNA Exam (Part 2): Practical IP Subnetting - 8:59
    • CCNA VLOG #081 IP Addressing and IP Subnetting for the CCNA Exam (Part 3). Practical IP Subnetting. - 11:45
    • CCNA VLOG #083 IP Addressing and IP Subnetting for the CCNA Exam (Part 4). Practical IP Subnetting. - 10:34
  • Cabling and Packet Flows
    • How does data flow in hubs, switches and routers? - 6:15
    • Ethernet history - 5:20
    • 10base2, MAC addresses, - 5:30
    • MAC Addresses, CSMACD - 6:26
    • Issues with 10base2, Collision domains - 2:38
    • Broadcast domains, 10BaseT - 2:53
    • Unshielded Twisted Pair (UTP), Cross Over Cables - 6:06
    • Which cable should you use Cross over or straight Auto MDI MDIX - 2:33
    • Cable Categories, Cat 1 to Cat 8 - 6:22
    • DAC cable, SFPs - 1:01
    • Roll Over Cable - 1:57
    • How Devices Operate, Hubs - 4:40
    • How does a Hub forward traffic - 6:10
    • What is a bridge? - 4:37
    • How does a bridge forward traffic? - 6:22
    • What is a switch? - 1:16
    • How do switches forward traffic - 7:16
    • What is half duplex and full duplex? - 5:51
    • What is a router? - 4:03
    • How does a router forward traffic? - 9:43
    • How is traffic routed between subnets - 2:57
    • Routing between subnets - What are the IP address and MAC address values - 2:59
    • Does a router change the MAC address or IP address - 8:35
    • Summary or routing, MAC addresses and IP addresses? - 9:07
    • CCNA VLOG #070 Using Ostinato to prove how networks work for the CCNA Exam. Don't be bitten! - 7:33
  • Physical Terminations Cheat Sheet
    • physical_terminations
  • Life of a Packet: Packet Tracer Labs
    • Life of a packet- Can you answer the questions? - 4:32
    • Life of a Packet- Answers - 11:19
  • Broadcast and collision domains
    • Can you answer the questions? - 3:48
    • Answers Part 1- ARP - 6:38
    • Answers Part 2- Broadcast and Collision domains - 6:25
    • Answers Part 3- Broadcast and Collision domains - 10:40
  • Duplex and Speed Mismatch Demo
    • Duplex and Speed Overview - 2:58
    • Speed & Duplex Demo Introduction - 3:27
    • Speed & Duplex Demo Late Collisions - 6:00
    • Speed & Duplex Demo Fix Issue between router and switch - 4:48
    • Speed & Duplex Demo Fix Other Switch Issues - 8:59
    • Speed & Duplex Demo; PC and Switch - 4:40
  • What is a loopback?
    • What is a loopback Why is it used? - 9:07
    • Another reason to use a loopback - OSPF - 7:54
  • TCP UDP
    • IP Connectionless and Overview - 10:34
    • Comparison - 10:19
    • TCP Header and Applications - 9:04
    • Port Number - 8:33
    • TCP 3 Way Handshake - 10:12
    • TCP Acknowledgement and Windowing - 10:07
    • TCP Seq and Ack - 12:55
  • Wireshark Introduction
    • Why use Wireshark? - 4:00
    • Wireshark Installation- Windows - 5:50
    • Wireshark Installation- Mac OS - 3:06
  • Wireshark Basics
    • The best way to learn! - 2:04
    • Capture frames - packets - segments - 15:11
    • Why are no packets captured? - 9:29
    • Port SPAN - Mirroring - 5:44
  • VLANs v1
    • VLANS Part 1 - 17:54
    • VLANS Part 2 - 21:57
  • VLANS Cheat Sheet
    • VLANS Cheat Sheet
  • VLANs and 802.1Q Demos
    • Demo Overview - 6:36
    • Demo Part 2 Access Ports - 9:31
    • Demo Part 3 - Trunking - 6:43
    • Demo Part 4 - Wireshark - 6:51
    • Demo Part 5 - Wireshark - 8:59
    • Demo InterVLAN Routing Part 1 - 5:53
    • Demo InterVLAN Routing Part 2 - 4:39
    • Demo InterVLAN Routing Part 3 - 1:38
  • VLAN: Basic Campus Network: Packet Tracer Lab
    • Lab Overview- Can you complete the lab - 2:26
    • VLANs Campus Network Answers Part 1 - 8:16
    • VLANs Campus Network Answers Part 2 - 5:53
    • VLANs Campus Network Answers Part 3 - 11:26
  • Dynamic Trunk Protocol - DTP
    • DTP Theory - 2:08
    • DTP GNS3 Demo Part 1 - 7:09
    • DTP GNS3 Demo Part 2 - 3:37
    • DTP GNS3 Demo Part 3 - 7:33
  • Wireshark Practical Test: How well do you know DTP?
    • DTP Lab- Quiz - 0:52
    • DTP Lab- Answers - 8:56
  • Spanning Tree
    • Spanning Tree Overview - 2:05
    • Versions of Spanning Tree - 4:07
    • Why is Spanning Tree Required - 7:27
    • BPDUs and Bridge IDs - 2:38
    • Demo STP Root - 7:36
    • Root Ports and Designated Ports - 8:24
    • Extended Bridge ID - 4:17
    • PortFast - 2:35
    • Path Cost Part 1 - 1:42
    • Path Cost Part 2 - 5:30
    • Path Cost Part 3 - 4:21
    • PVST versus RPVST Port States - 8:23
    • RPVST and PVST Interoperability - 2:36
    • 802.1w and 802.1s Overview - 3:03
    • 802.1w - 7:09
    • Demo 802.1w - 7:19
    • 802.1w Link Types - 3:06
    • 802.1w Proposals - 6:18
    • 802.1s MSTP - 6:22
    • Spanning Tree Comparison Summary - 3:35
  • Disable Spanning Tree - are you crazy?
    • What happens when you disable Spanning Tree? - 3:19
    • I disabled Spanning Tree! What are the Results? - 11:36
  • Spanning Tree PortFast: Packet Tracer Lab
    • Spanning Tree PortFast- Can you complete the lab? - 5:49
    • Spanning Tree PortFast- Answers - 4:43
  • Spanning Tree Cheat Sheet
    • PacketLife.net Spanning Tree Cheat Sheet
  • BPDU Guard
    • BPDU Guard Part 1 - 5:59
    • BPDU Guard Part 2 - 1:00
    • BPDU Guard Part 3 - 2:57
  • CDP Overview
    • CDP Introduction - 9:43
    • CDP Demo - 6:16
  • CCNA Campus VLOGs
    • CCNA VLOG #065 Routed ports, Switchports and SVIs - what and how - 12:25
    • CCNA VLOG #066 How to configure Layer 3 switching and interVLAN routing for the CCNA Exam - 7:44
    • CCNA VLOG #067 How to configure Layer 3 switching and interVLAN routing for the CCNA Exam (Part2) - 9:13
    • CCNA VLOG #068 How to configure Layer 3 switching and interVLAN routing for the CCNA Exam (Part3) - 7:32
    • CCNA VLOG #071 Using Ostinato to prove how broadcasts work for the CCNA Exam (Part 1) - 6:30
    • CCNA VLOG #072 Using Ostinato to prove how broadcasts work for the CCNA Exam (Part 2) - 5:05
  • Campus Network Troubleshooting
    • CCNA VLOG #042 Campus troubleshooting scenario 1 Can you find the issue? - 13:20
    • CCNA VLOG #043 Campus troubleshooting scenario 2 Can you find the issue - 9:18
    • CCNA VLOG #045 Users cannot ping Which layer of the OSI model broke? - 6:12
    • CCNA VLOG #052 Campus troubleshooting scenario 3 Can you find the issue - 7:10
    • CCNA VLOG #060 LAN and WAN troubleshooting Scenario Can you find the issue - 13:00
    • CCNA VLOG #069 MAC Address troubleshooting scenario 1 Can you find the issue - 9:27
  • Packet Tracer Campus Network: Part 1
    • Packet Tracer Campus Network Overview- Can you complete the lab - 8:01
    • Packet Tracer Campus Network- Answers Part 1- Power on and hostname configuration - 7:48
    • Packet Tracer Campus Network- Answers Part 2- Port configuration - 7:29
    • Packet Tracer Campus Network- Answers Part 3- Passwords - 5:02
    • Packet Tracer Campus Network- Answers Part 4- VTP and VLANS - 4:28
    • Packet Tracer Campus Network- Answers Part 5- Access ports and trunk ports - 10:47
  • Packet Tracer Campus Network: Part 2
    • Packet Tracer Campus Network Part 2 Overview- Can you complete the lab - 4:44
    • Packet Tracer Campus Network Part 2- Answers Part 1- CDP & LLDP - 6:16
    • Packet Tracer Campus Network Part 2- Answers Part 2- CDP and LLDP - 5:02
    • Packet Tracer Campus Network Part 2- Answers Part 3- Spanning Tree - 9:43
    • Packet Tracer Campus Network Part 2- Answers Part 4- EtherChannel - 12:42
    • Packet Tracer Campus Network Part 2- Answers Part 5- EtherChannel - 11:00
    • Packet Tracer Campus Network Part 2- Answers Part 6- SVIs, IP addresses, routing - 8:22
    • Packet Tracer Campus Network Part 2- Answers Part 7- Access Switch IP addresses - 3:31
  • CDP and LLDP Wireshark Quiz
    • CDP, LLDP Lab: Quiz - 1:56
    • CDP, LLDP Lab: Answers - 8:32
  • Routing Introduction
    • Introduction to IP Routing - 0:39
    • Overview - 0:35
    • Routed vs. Routing Protocols - 5:55
    • Routed protocols - 2:20
    • Demonstrations - 3:33
    • Static Routes and Dynamic Routes - 6:14
    • Static vs. Dynamic Routing - 4:10
    • Static vs. Dynamic Routing - 1:08
    • How do routers determine the best route? - 3:32
    • Terms AS, IGPs, EGPs - 4:20
    • Types of Routing Protocols -Distance Vector, Link State - 8:23
    • EIGRP - advanced distance vector routing protocol - 2:09
    • Administrative Distance Introduction - 0:46
    • Administrative Distance values - 3:10
    • Additional AD values - 0:33
    • How does a router route when told conflicting information - 2:29
    • Classful routing protocols - 2:51
    • Auto Summarization - 2:58
    • Classless routing protocols - 1:54
    • Administrative Distance versus mask length - 2:30
    • Administrative Distance and multiple routes with the same mask - 1:20
    • Link State Routing Protocols - 3:32
    • OSPF Hierarchy - Multiple areas - 3:33
    • Benefits of link state routing - 2:47
    • Drawbacks of link state routing - 1:39
  • Static Routing
    • Static Routing 1 - 2:26
    • Static Routing 2 - 0:30
    • Static Routing 3 - 3:38
    • Static Routing 4 - 4:59
    • Static Routing 5 - 4:59
    • Static Routing 6 - 8:25
    • Static Routing 7 - 8:53
    • Static Routing 8 - 4:58
    • Static Routing 9 - 2:09
  • Static Routes: Packet Tracer Lab
    • Static Routes- Can you complete the lab? - 2:30
    • Static Routes- Answers Part 1 - 12:28
    • Static Routes- Answers Part 2 - 6:24
  • IP Default-gateway? (CCNA VLOG)
    • IP default gateway versus default route (CCNA VLOG #004) - 6:14
  • Static routing VLOGs
    • CCNA VLOG #076 Static and default IP routes for the CCNA Exam (Part 1) - 9:12
    • CCNA VLOG #077 Static and default IP routes for the CCNA Exam (Part 2) - 6:19
    • CCNA VLOG #078 Administrative Distance and Static routes for the CCNA Exam (Part 3) - 8:14
  • Router on a stick
    • Router on a stick overview - 1:05
    • Create topology - 2:20
    • Router configuration (subinterfaces) - 3:39
    • Wireshark capture of 802.1Q frames - 2:58
  • Router on a stick: Packet Tracer lab
    • Router on a stick lab overview- Can you complete the lab - 2:38
    • Router on a stick solution - 10:58
  • DHCP
    • DHCP Explained Step by Step Part 2 - 10:21
  • Using Cisco IOS Network Devices as a DHCP Server and Client (GNS3)
    • GNS3 DHCP Server Part 1 - 7:27
    • GNS3 DHCP Server Part 2 - 5:31
  • DHCP Server Configuration Lab 1
    • DHCP Server Lab 1 Overview- Can you complete the lab - 1:42
    • DHCP Server Lab 1 Solution - 2:58
  • DHCP Server Configuration Lab 2
    • DHCP Server Lab Overview: Can you complete the lab? - 2:31
    • DHCP Server Lab2 Answers Part 1 - 6:04
    • DHCP Server Lab2 Answers Part 2 - 7:13
  • DHCP Troubleshooting
    • CCNA VLOG #047 DHCP Troubleshooting Scenario 1 - Can you find the issue? - 9:04
    • CCNA VLOG #055 DHCP Troubleshooting Scenario 2 - Can you find the issue? - 7:27
    • CCNA VLOG #056 DHCP Troubleshooting Scenario 3 - Can you find the issue? - 7:10
  • DNS
    • DNS Explained Part 2 - 13:12
  • VLSM
    • VLSM - Part 1 - 16:28
    • VLSM - Part 2 - 18:00
  • Administrative Distance and Route lengths
    • Administrative Distance Part 1 (CCNA VLOG #014) - 7:12
    • Administrative Distance Part 2 (CCNA VLOG #016) - 9:04
    • Administrative Distance Part 3 (CCNA VLOG #017) - 6:15
    • Administrative Distance Part 4 (CCNA VLOG #018) - 5:32
  • Packet Tracer Campus Network: Part 3
    • Packet Tracer Campus Network Part 3: Can you complete the lab? - 1:38
    • Packet Tracer Campus Network Part 3: Answers Part 1: HSRP Part 1 - 8:48
    • Packet Tracer Campus Network Part 3: Answers Part 2: HSRP Part 2 - 8:41
    • Packet Tracer Campus Network Part 3: Answers Part 3: HSRP & testing - 10:23
    • Packet Tracer Campus Network Part 3: Answers Part 4: EIGRP - 5:09
  • First Hop Redundancy Cheat Sheet
    • PacketLife.net First Hop Redundancy Protocol Cheat Sheet
  • Network Time Protocol (NTP)
    • Why do we need NTP? - 1:31
    • Demo Issue on Network - 3:10
    • NTP Overview - 1:33
    • Configure NTP - 8:36
    • Points to remember - 2:38
  • Port SPAN (Mirroring)
    • SPAN Introduction - 1:10
    • SPAN network overview - 1:57
    • Tests before SPAN - 6:27
    • Configure SPAN - 8:27
    • SPAN Ingress Options - 3:40
    • SPAN Options - 6:13
    • SPAN - Multiple Sessions - 3:25
  • Real world network management (Optional)
    • Its not the NETWORK! - 1:59
    • Netpath, NPM12 and GNS3 overview - 0:52
  • Create a GNS3 network and integrate NPM (Optional)
    • How to Guide, Topology Overview, Windows 7 VM for NPM and Windows 2012 VHD - 4:43
    • NPM Download, Access NPM software and Install and Inititial Login to NPM - 6:10
    • Integration of NPM and GNS3, GNS3 VM and Build GNS3 Topology - 6:31
    • Configure Routers, Configure Management network and Test IP connectivity - 7:25
    • Import GNS3 network into NPM - 6:58
  • Network Management Fundamentals
    • Applications covered in course - 1:13
    • You need to know SNMP, OID and Per - 0:16
    • Two main types of Network Protocol - 1:13
    • Query Based Network Based Manageme - 1:33
    • Event Based Network Management Pro - 3:38
    • What are the best practices? - 2:44
    • Network Management Planning - 4:34
    • Reporting - 1:13
    • Network Overhead - 3:02
    • Impact of Network Topology - 1:48
    • ACLs and Firewall rules - 3:11
  • Network Management Protocols
    • Network Management Protocols, Ping, SNMP and WMI - 2:21
    • Ping, SNMP, WMI - 2:01
    • Demo Wireshark, NPM and GNS3 - 2:55
    • Demo: Wireshark, NPM and GNS3 Part 2 - 2:36
    • Demo Wirehshark and NPM ICMP - 1:11
    • Demo; Wireshark and SNMP - 2:22
  • SNMP: Packet Tracer lab
    • SNMP Lab- Can you complete the lab? - 3:07
    • SNMP Lab- Answers - 14:18
  • MIBs OIDs and Performance Counters
    • Overview and RFCs - 4:09
    • Demo MIB Browser - 0:53
    • Demo MIB Browser - 2:43
    • Performance Counters - 0:54
  • Syslog
    • Overview - 0:39
    • Logging levels, monitor, buffer, syslog - 0:16
    • Demo Syslog levels and RFC - 4:55
    • Logging levels and lower levels - 0:27
    • Demo Logging levels - 7:26
    • Demo Telnet (monitor) and logging - 4:50
    • Demo Logging levels and monitor - 1:12
    • Demo Stop logging to console - 1:56
    • Demo Logging Buffer - 3:47
    • Demo Kwi Syslog Server - 5:42
    • Demo Syslog levels and facilities - 1:23
    • Demo GNS3 setup with Syslog server - 1:47
    • Demo GNS3 and Syslog - 4:22
    • Demo Timestamps, dates and other options - 2:56
  • Managing Cisco Devices
    • Cisco Router Components - 4:36
    • Router Components (continued) - 4:03
    • Modules - 1:47
    • Demo Router components - 8:52
    • Demo Router Components - 4:13
    • Configuration Register Part 1 - 4:33
    • Configuration Register Part 2 - 4:03
    • Boot Field and software - 1:31
    • Router Boot Process - POST and load of IOS - 3:26
    • Boot process - 2:35
    • Demo Bootup without startup config - 3:57
    • Image Boot Theory - 1:30
    • Boot System Command - 2:12
    • Boot Process Theory - Startup Config - 0:52
    • IOS Images - 4:06
    • Demo IOS Systems - 3:16
    • IOS Naming Conventions - 3:55
    • Backup IOS to TFTP Server - 4:47
    • Upgrade IOS Theory - 1:00
    • Download IOS from Cisco - 2:09
    • Flash Space - 0:31
    • Demo Upgrade IOS - 4:21
    • Password Recovery - 3:28
    • Demo Password Recovery - 10:29
  • Configuration Register Troubleshooting: Packet tracer
    • Can you fix the network? - 6:08
    • Config Register: Answers Part 1 - 8:17
    • Config Register: Answers Part 2 - 4:59
    • Config Register: Answers Part 3 - 9:55
  • Password Recovery: Packet Tracer Lab
    • Password Recovery: Can you complete the lab? - 4:28
    • Password Recovery: Answers Part 1 - 7:08
    • Password Recovery: Answers Part 2 - 4:39
    • Password Recovery: Answers Part 3 - 8:48
    • Password Recovery: Answers Part 4 - 4:49
  • Restore Cisco IOS images: Packet Tracer Lab
    • Missing IOS operating system! Can you fix the network? - 1:44
    • Missing IOS operating system! Answers - 8:50
  • Backup and restore configurations and operating systems: Packet Tracer Lab
    • Backup and restore configurations and IOS: Can you complete the lab? - 4:07
    • Backup and restore configurations and IOS: Answers Part 1 - 6:07
    • Backup and restore configurations and IOS: Answers Part 2 - 8:12
    • Backup and restore configurations and IOS: Answers Part 3 - 3:09
  • Infrastructure Security
    • Enable and Secret Passwords 1 - 2:13
    • Enable and Secret Passwords 2 - 5:15
    • Enable and Secret Passwords 3 - 4:31
    • Enable and Secret Passwords 4 - 3:19
    • Disable Services - 10:55
    • Disable CDP - 4:44
    • Line console security - 9:53
    • Telnet security - 9:09
    • Sessions and lines - 6:41
    • SSH - 10:03
    • Banners - Introduction - 2:25
    • Banners - MOTD - 4:52
    • Login and Exec Banners - 5:43
  • Troubleshoot Telnet Issues
    • Telnet troubleshooting (CCNA VLOG #006) - 9:08
  • Hacking Networks with Kali Linux
    • Important: Hacking Topics - 3:11
    • Hacking DTP and VTP and VLAN hopping - 14:55
    • Hacking DHCP: Rogue DHCP server and DHCP exhaustion - 20:46
    • ARP poisoning and man-in-the-middle attack - 19:14
    • Kali Linux Wi-Fi - 23:45
  • DHCP Snooping and Dynamic ARP Inspection
    • Dynamic ARP Inspection - 19:14
  • DHCP Snooping: Packet Tracer Lab
    • DHCP Snooping: Can you complete the lab? - 5:01
    • DHCP Snooping: Answers Part 1 - 8:43
    • DHCP Snooping: Answers Part 2 - 6:08
  • Hacking Networks with Wireshark
    • Telnet Passwords - 9:00
    • TFTP Password & Data Capture - 3:06
    • FTP Password & Data Capture - 1:38
    • HTTP Data Capture - 4:58
    • Cisco router HTTP Password Capture - 7:50
  • Hacking VoIP
    • Replay Voice over IP calls (Virtual IP Phones) - 15:56
    • Capture and replay voice calls (Virtual & Physical IP Phones) - 6:47
  • Port Security
    • Port Security Overview - 3:13
    • Port Security and security mechanisms - 1:23
    • MAC addresses Port Security: Static, Dynamic, Sticky - 3:11
    • Port Security Demo Part 1 - 9:03
    • Port Security Demo Part 2 - 9:19
    • Port Security Demo: Sticky - 2:52
    • Port Security Error disable and auto recovery - 5:14
  • Port Security: Packet Tracer Lab
    • Port Security: Can you complete the lab? - 6:25
    • Port Security: Answers Part 1 - 9:34
    • Port Security: Answers Part 2 - 10:52
    • Port Security: Answers Part 3 - 8:50
  • 802.1X, RADIUS, TACACS and ACS
    • 802.1X Overview - 4:31
    • Issues with Local Authentication - 3:57
    • RADIUS and TACACS overview - 2:21
    • AAA Demo Part 1: Configuration - 6:16
    • AAA Demo Part 2 ACS Config and Testing - 10:38
    • AAA Demo Part 3: AAA Groups with IOSv - 9:15
  • AAA, TACACS and RADIUS: packet Tracer Lab
    • AAA, TACACS and RADIUS: Can you complete the lab? - 5:36
    • AAA, TACACS and RADIUS: Answers Part 1 - 7:51
    • AAA, TACACS and RADIUS: Answers Part 2 - 6:22
    • AAA, TACACS and RADIUS: Answers Part 3 - 4:32
    • AAA, TACACS and RADIUS: Answers Part 4 - 6:39
  • Switch Stacking
    • Switch Stacking Part 1 - 1:29
    • Switch Stacking Part 2 - 4:50
    • Switch Stacking Part 3 - 2:11
    • Switch Stacking Part 4 - 1:36
    • Switch Stacking Part 5 - 8:28
  • ACLs
    • Access Control Lists (ACLs) introduction - 15:36
    • ACL demonstrations, wildcard masks Part 1 - 10:12
    • ACL demonstrations, wildcard masks Part 2 - 8:02
    • ACL demonstrations Part 1 - 11:15
    • ACL demonstrations Part 2 - 7:15
    • Extended ACL demonstrations - 16:11
  • Access Lists (ACLs): Packet Tracer Lab 1
    • ACL Lab 1: Can you complete the lab? - 5:11
    • ACL Lab 1: Answers Part 1 - 5:06
    • ACL Lab 1: Answers Part 2 - 12:26
  • Access Lists (ACLs): Packet Tracer Lab 2
    • ACL Lab 2: Can you complete the lab? - 7:16
    • ACL Lab 2: Answers Part 1 - 11:55
    • ACL Lab 2: Answers Part 2 - 7:50
    • ACL Lab 2: Answers Part 3 - 4:20
  • Access List Cheat Sheet
    • PacketLife.net Access List Cheat Sheet
  • Network Address Translation (NAT)
    • NAT Part 1: Overview - 0:48
    • NAT Part 2: RFC1918 and NAT Terms - 3:11
    • NAT Part 3:Private Addresses and NAT Types - 4:26
    • NAT Part 4: Demo: Static NAT - 2:55
    • NAT Part 5 Private Addresses - 1:30
    • NAT Part 6 NAT Types - 2:41
    • NAT Part 7 Demo Static NAT - 7:52
    • NAT Part 8 Wireshark Captures - 5:14
    • NAT Part 9 Show commands - 1:33
    • NAT Part 10 Static NAT summary - 1:02
    • NAT Part 11 GNS3 Server NAT - 1:09
    • NAT Part 12 Static NAT versus Dynamic NAT - 0:57
    • NAT Part 13 Dynamic NAT Overview - 0:39
    • NAT Part 14 GNS3 Static NAT Demo - 3:18
    • NAT Part 15 GNS3 Dynamic NAT Demo - 0:49
    • NAT Part 16 Dynamic NAT Configuration - 7:22
    • NAT Part 17 Show Commands - 0:56
    • NAT Part 18 NAT Overloading PAT - 7:59
    • NAT Part 19 PAT demo - 4:39
    • NAT Part 20 Show commands - 1:11
    • NAT Part 21 Source Address Theory - 5:29
    • NAT Part 22 NAT Theory - 7:41
    • NAT Part 23 PAT Theory - 0:54
    • NAT Part 24 PAT Demo - 6:44
  • NAT: Packet Tracer Lab 1
    • NAT Lab 1 overview- Can you complete the lab - 2:56
    • NAT Lab 1- Answers - 13:08
  • NAT: Packet Tracer Lab 2
    • NAT Lab 2 overview- Can you complete the lab? - 4:47
    • NAT Lab 2- Answers Part 1 - 7:36
    • NAT Lab 2- Answers Part 2 - 11:48
  • Packet Tracer Campus Network Part 4
    • Packet Tracer Campus Network Part 4- NAT - 8:47
    • Packet Tracer Campus Network Part 4- Can you complete the lab? - 1:51
  • NAT Troubleshooting and VLOGs
    • CCNA VLOG #032 Static NAT Part 1 - 10:47
    • CCNA VLOG #033 Static NAT Part 2 - 4:55
    • CCNA VLOG #034 NAT Single IP Multiple Servers - 8:22
    • CCNA VLOG #035 NAT Troubleshooting 1 - Can you find the issue CCNA Exam 200-125 troubleshooting - 8:38
    • CCNA VLOG #036 NAT Troubleshooting 2 - Can you find the issue CCNA Exam 200-125 troubleshooting - 5:01
    • CCNA VLOG #038 NAT Troubleshooting 3 - Can you find the issue CCNA Exam 200-125 troubleshooting - 10:00
    • CCNA VLOG #040 NAT Troubleshooting 4 - Can you find the issue CCNA Exam 200-125 troubleshooting - 6:46
    • CCNA VLOG #046 NAT Troubleshooting Scenario 5 - Can you find the issue CCNA Exam 200-125 trouble - 6:40
  • NAT Cheat Sheet
    • PacketLife.net NAT Cheat Sheet
  • Quality of Service (QOS)
    • QOS Introduction - 2:33
    • Traffic Types and Requirements - 3:48
    • SRND Guide - 4:27
    • QOS mechanisms and Exam details - 5:23
    • Classification and Marking - 3:39
    • COS - 2:26
    • IP Precedence and DSCP - 2:52
    • DSCP AF Classes - 2:24
    • DSCP CS, AF and EF Classes - 5:51
    • Router demo Part 1 - 2:04
    • Router demo Part 2 - 2:15
    • SRND Guide Recommendations - 2:16
    • SRND Switch Examples - 2:45
    • Wireshark showing COS and DSCP - 8:17
    • Trust boundary - 2:56
    • Traffic classes - 3:46
    • Policiers and shapers Part 1 - 3:26
    • Policiers and shapers Part 2 - 2:54
    • Queuing - 3:35
    • Queuing - FIFO, PQ, CQ, WFQ - 5:41
    • Queuing - WFQ and CBWFQ - 2:38
    • CBWFQ and LLQ - 1:58
    • Congestion Avoidance with WRED - 7:32
    • QOS Demo Part 1 - 6:48
    • QOS Demo Part 2 - 5:02
  • Quality of Service (QoS): Packet Tracer Lab
    • QoS: Can you complete the lab? - 6:26
    • QoS: Answers Part 1 - 6:30
    • QoS: Answers Part 2 - 8:54
    • QoS: Answers Part 3 - 8:02
  • Quality of Service Cheat Sheet
    • PacketLife.net QoS Cheat Sheet
  • IP Phone Startup Process
    • IP Phone Startup - Power requirements - 15:00
    • Demonstration of Cisco IP Telephony configuration - 15:33
    • Demonstration: Voice VLAN Configuration - 15:56
    • How does an IP Phone get an IP address and register with a CUCM? - 23:31
  • VoIP: CUCME and Cisco IP Phones: Packet Tracer Lab
    • VoIP Lab: Can you complete the lab? - 6:44
    • VoIP Lab: Answers Part 1 - 5:47
    • VoIP Lab: Answers Part 2 - 9:49
    • VoIP Lab: Answers Part 3 - 10:53
  • OSPF
    • OSPF Part 1 - 10:23
    • OSPF Part 2 - 14:55
    • OSPF Part 3 - 7:08
    • OSPF Part 4 - 6:57
    • OSPF Part 5 - 10:02
    • OSPF Part 6 - 7:07
    • OSPF Part 7 - 8:37
    • OSPF DR, BR, DROTHER (CCNA VLOG #031) - 12:10
    • DR Election Process (CCNA VLOG #039) - 10:40
    • OSPF DR Elections (CCNA VLOG #041) - 3:06
  • OSPF Single Area: Packet Tracer Lab
    • Lab Overview: Can you complete the lab? - 2:08
    • OSPF Single Area Answers Part 1 - 3:50
    • OSPF Single Area Answers Part 2 - 5:49
    • OSPF Single Area Answers Part 3 - 4:11
    • OSPF Single Area Answers Part 4 - 2:29
  • OSPF Wireshark Quiz
    • OSPF Lab: Quiz - 2:36
    • OSPF Lab: Answers Part 1 - 14:08
    • OSPF Lab: Answers Part 2 - 2:05
  • OSPF Troubleshooting
    • OSPF Troubleshooting (CCNA VLOG #001) - 9:31
    • OSPF Troubleshooting (CCNA VLOG #005) - 9:16
    • OSPF Troubleshooting (CCNA VLOG #003) - 6:05
    • OSPF Troubleshooting (CCNA VLOG #037) - 6:15
  • OSPF Troubleshooting: Packet Tracer Lab 1
    • OSPF Troubleshooting Lab 1 Overview- Can you fix the network - 2:07
    • OSPF Troubleshooting Lab 1- Answers Part 1 - 7:37
    • OSPF Troubleshooting Lab 1- Answers Part 2 - 5:37
  • OSPF Troubleshooting: Packet Tracer Lab 2
    • OSPF Troubleshooting Lab 2 Overview- Can you fix the network - 1:23
    • OSPF Troubleshooting Lab 2- Answers Part 1 - 7:25
    • OSPF Troubleshooting Lab 2- Answers Part 2 - 3:48
  • OSPF Troubleshooting: Packet Tracer Lab 3
    • OSPF Troubleshooting Lab 3 Overview- Can you fix the network? - 1:09
    • OSPF Troubleshooting Lab 3- Answers - 9:47
  • OSPF Multi-Area configuration and testing
    • CCNA VLOG #073 OSPF Multi-area configuration and testing for the CCNA Exam (Part 1) - 11:08
    • CCNA VLOG #074 OSPF Multi-area configuration and testing for the CCNA Exam (Part 2) - 9:15
    • CCNA VLOG #075 OSPF Multi-area configuration and testing for the CCNA Exam (Part 3) - 8:06
    • CCNA VLOG #082 OSPF Multi-area configuration - 13:36
  • OSPF Multiple Area: Packet Tracer Lab
    • Lab Overview- Can you complete the lab? - 2:29
    • OSPF Multiple Area Lab Answers Part 1 - 8:10
    • OSPF Multiple Area Lab Answers Part 2 - 8:23
  • OSPF Wireshark Troubleshooting Quiz
    • OSPF Troubleshooting Lab 1- Question - 1:52
    • OSPF Troubleshooting Lab 1- Answers - 11:27
    • OSPF Troubleshooting Lab 2- Question - 1:44
    • OSPF Troubleshooting Lab 2- Answers - 5:30
    • OSPF Troubleshooting Lab 3- Question - 1:24
    • OSPF Troubleshooting Lab 3- Answers - 7:27
  • OSPF Cheat Sheet
    • PacketLife.net OSPF Cheat Sheet
  • Cisco IGP Cheat Sheet
    • PacketLife.net Interior Gateway Protocols Cheat Sheet
  • IPv6
    • IPv6 Part 1 - 24:45
    • IPv6 Part 2 - 15:22
    • IPv6 Part 3 - 23:30
    • IPv6 Part 4 - 22:54
    • IPv6 Part 5 - 15:58
  • IPv6 Configuration: Packet Tracer Lab
    • Lab Overview: Can you complete the lab? - 1:43
    • IPv6 Configuration Lab 1: Answers Part 1 - 5:21
    • IPv6 Configuration Lab 1: Answers Part 2 - 7:03
    • IPv6 Configuration Lab 1: Answers Part 3 - 6:52
  • IPv6 Addressing, routing and troubleshooting
    • CCNA VLOG #048 IPv6 static routing using next hop IPv6 address (IPv6 routing Part 1) - 10:17
    • CCNA VLOG #049 IPv6 static routing using next hop IPv6 address (IPv6 routing Par - 5:55
    • CCNA VLOG #062 Troubleshooting IPv6 networks for the CCNA exam (Part 1) Can you - 6:04
    • CCNA VLOG #063 Troubleshooting IPv6 networks for the CCNA exam (Part 2) - 7:07
    • CCNA VLOG #064 Troubleshooting IPv6 networks for the CCNA exam (Part 3) - 4:25
  • IPv6 Troubleshooting: Packet Tracer Lab
    • Lab Overview- Can you complete the lab? - 1:14
    • IPv6 Troubleshooting Lab- Answers - 6:18
  • IPv6 Cheat Sheet
    • PacketLife.net IPv6 Cheat Sheet
  • Implementing IPv6 addressing on Hosts and Routers
    • IPv6 addressing and SLAAC Part 1 - 2:07
    • IPv6 addressing and SLAAC Part 2 - 2:45
    • IPv6 addressing and SLAAC Part 3 - 1:44
    • IPv6 addressing and SLAAC Demo 1 - 6:29
    • IPv6 addressing and SLAAC Demo 2 - 5:12
    • IPv6 Address and SLAAC Demo 3 - 1:47
    • IPv6 Address and SLAAC Demo 4 - 2:00
    • IPv6 DHCP Server, Relay Agent and Client Part 1 - 2:42
    • IPv6 DHCP Server, Relay Agent and Client Part 2 - 5:39
  • Wide Area Networks (Point-to-point)
    • WAN introduction - 0:45
    • WAN Overview - 3:31
    • WAN Point-to-point link - 3:20
    • CSU DSU - 2:39
    • VPNs versus leased lines - 2:12
    • DTE DCE - 2:58
    • Serial interfaces (WAN Interface Cards) - 1:41
    • Serial Interfaces (continued) - 3:30
    • Serial interface speeds - 3:56
  • HDLC
    • HDLC Introduction - 3:21
    • HDLC Demo Part 1 - 12:04
    • HDLC Demo Part 2 - 5:43
  • IPv6 Routing - OSPF
    • OSPFv3 Overview - 4:43
    • OSPFv3 configuration and show commands- R1 - 7:29
    • OSPFv3 configuration and show commands- R2 - 7:45
    • OSPFv3 full network configuration and testing - 9:02
    • OSPFv3 Troubleshooting - 5:47
    • OSPF IPv6 no ip addresses (CCNA VLOG #044 - 11:06
  • IPv6 Access Lists
    • IPv6 ACLs Part 1 - 1:55
    • IPv6 ACLs Part 2 - 4:04
    • IPv6 ACLs Part 3 - 3:51
    • IPv6 ACLs Part 4 - 5:33
    • IPv6 ACLs Demo 1 - 5:10
    • IPv6 ACLs Demo 2 - 5:52
  • VPNs
    • VPNs Part 1 - 13:20
    • VPNs Part 2 - 14:28
    • VPNs Part 3 - 14:42
    • VPNs Part 4 - 17:57
  • GRE Tunnels
    • GRE Tunnel Theory - 1:54
    • GNS3 GRE Tunnel Demo Overview - 4:27
    • RFCs and Protocol Types - 1:52
    • GNS3 GRE Lab Part 1 IP addressing - 3:36
    • GNS3 GRE Lab Part 2 GRE Tunnel Configuration - 7:05
    • GNS3 GRE Lab Part 3 EIGRP - 4:21
    • GNS3 GRE Lab Part 4 Wireshark captures and show commands - 5:56
    • GNS3 GRE Lab Part 5 GRE and OSPF - 2:56
    • VPN Config Generator - 3:09
  • GRE: Packet Tracer Lab
    • GRE Tunnel- can you complete the lab - 5:58
    • GRE Tunnel- Answers Part 1 - 7:55
    • GRE Tunnel- Answers Part 2 - 7:32
    • GRE Tunnel- Answers Part 3 - 6:22
  • IPSec Cheat Sheet
    • IPsec
  • Cloud Computing
    • Cloud Computing Part 1 Overview - 2:31
    • Cloud Computing Part 2 Hypervisors - 2:33
    • Cloud Computing Part 3 Hypervisors - 5:46
    • Cloud Computing Part 4 Amazon Demonstration - 7:13
    • NFV - 6:44
  • Wireless Networks (Wi-Fi)
    • Wi-Fi Intro - 8:47
    • What are these new terms? - 5:54
    • Channels and Hertz - 9:08
    • Network Types Part 1 - 9:28
    • Network Types Part 2 - 11:47
  • Wi-Fi Demo
    • Cisco WLC lab: Part 1 - 10:55
    • Cisco WLC lab: Part 2 - 14:23
  • Wi-Fi 6 Technical Discussion
    • Wi-Fi Technical Discussion Introduction - 2:39
    • Wi-Fi 6 overview and benefits - 20:53
    • Wi-Fi Technical discussion Part 1 - 23:02
    • Wi-Fi Technical discussion Part 2 - 34:05
  • Network Automation and Programmability
    • Ansible vs Puppet vs Chef - 5:29
  • JSON
    • Why do we care? JSON format examples - 9:43
    • Practical JSON using Cisco Nexus - 5:19
    • JSON with Cisco On-Box Python - 10:55
    • Python, Ubuntu and remote Cisco devices - 5:44
    • JSON, Ubuntu and remote Python scripts - 10:08
    • JSON
  • REST APIs
    • Practical Overview and advice - 8:14
    • REST API Theory - 5:57
    • DNA Center APIs - 3:34
    • Demo: DNA REST APIs - 13:49
    • Free DNA Center Labs - 2:03
    • Demo: Router REST API - 12:50
  • Optional: Real World Examples of Network Automation
    • Linux, TCL and EEM scripts on Cisco devices - 18:30
    • Network Automation: Schedule Config Backups - 15:54
    • How well do you know the Cisco IOS? - 19:02
    • Linux scripts on Cisco IOS? - 10:55
  • Optional PYTHON: Quick Start Guide to Network Automation
    • Quick Start 1: GNS3 Lab Setup and IDEs - 10:22
    • Quick Start 2: Telnet Script creation - 11:20
    • Quick Start 3: Telnet Script Test - 6:04
    • Quick Start 4: Telnet to a switch and create VLANs - 8:15
    • Quick Start 5: Loops - 7:29
    • Quick Start 6: PEP8: Python Style Guide - 2:41
    • Quick Start 7: Configure switch VLANs using loops - 8:55
    • Quick start 8: Create a multiple switch network - 8:16
    • Quick Start 9: Open a file of switch IP addresess - 8:22
    • Quick Start 10 Configure multiple switch with a loop - 3:00
    • Quick Start 11 Loops within loops - 6:51
    • Quick Start 12 Backup Network Device Configurations - 7:09
  • Optional: Network Overlays: Paul and Peter
    • Paul and Peter Issues - 6:57
    • Paul can do things himself now - what about Peter's job - 7:44
    • Layer 2 networks across the DC Is this even possible Layer 2 over Layer 3 - 2:49
  • Capturing Passwords with Python and Wireshark
    • Overview and tshark install and packet capture - 5:49
    • tshark and Pyshark installation - 5:10
    • Basic Pyshark testing - 9:26
    • Termshark - 5:55
    • Pyshark script - 6:34
    • Lab overview and setup - 6:39
    • iPython and interactive OSPF script - 6:10
    • OSPF Password Python script - 6:33
    • FTP Password Capture Python script - 5:03
    • pyshark-telnet.py
    • Telnet Password Capture Python Script - 5:18
  • Introduction to SDN and OpenFlow
    • Welcome without Intro - 2:02
  • What is SDN?
    • What do the inventors say it is? - 0:47
    • Open SDN, SDN via overlays, White box SDN - 3:09
    • SDN Via APIs Cisco ACI (asics) Openstack Nfv_updated - 4:32
  • Optional: Is this actually real? (Optional)
    • Real World Sdn Google_updated - 3:27
    • Real Word- Microsoft - 0:22
    • Real World SDN - NSA - 2:07
    • Real World SDN - Facebook - 0:53
    • Linux on switches - 0:35
    • Which SDN Controller should you use - 0:48
  • GNS3 Campus Network
    • GNS3 Topology Overview - 7:02
    • IOSvL2 Appliance Import - 8:06
    • Switch Hostnames, VTP and VLANs Part 1 - 5:57
    • Hostnames, VTP, VLANs Part 2 - 4:45
    • IP addressing and ping testing - 8:05
    • Static trunk encapsulation and mode - 5:27
    • Disable DTP and configure access ports - 9:06
    • Ping within a VLAN - 2:35
    • Which ports are trunking and which VLANs are permitted - 3:23
    • CDP Demo Basic discovery - 7:28
    • CDP Demo Disable globally and per interface - 6:49
    • CDP Demo Command Options - 4:20
    • LLDP Demo Discover Linux Servers - 6:41
    • Which ports are blocking - 3:58
    • Spanning Tree blocks core switch ports - 7:11
    • CDP & LLDP and STP - what happens - 2:40
    • STP - optimize Core switches - 10:03
    • Optimize campus network using Etherchannel - 14:25
    • STP failover testing - 13:53
    • HSRP Overview - 6:44
    • Demo HSRP Configuration Switch 1 - 6:15
    • Demo HSRP Configuration Switch 2 - 8:22
    • Demo Test connectivity to HSRP router - 2:49
    • Demo HSRP failover test - 6:54
    • EIGRP configuration - 6:16
    • EIGRP Configuration (continued) - 7:43
    • Redistribute Static Route - 5:14
    • Troubleshoot GNS3 cloud issue - 1:41
    • Configure NAT and test - 7:54

View Full Curriculum


Access
Lifetime
Content
4.0 hours
Lessons
64

CompTIA IT Fundamentals ITF+ FC0-U61

Iron Out Your IT Foundation Skills on Computer & Mobile Devices, Software, Networks, Security, and Basic Troubleshooting

By Total Seminars | in Online Courses

Be your own geek. This course is for everyone who has had to call a help desk or a geek friend to help them with basic computer, laptop, mobile, and network issues. You will learn about all kinds of computing devices as well as how to troubleshoot issues. You will also learn about security, safety, and preventative maintenance, as well as the basics of databases and programming, basic IT skills everyone should know these days. With 64 lectures, this course covers everything you need to know to pass the CompTIA IT Fundamentals (ITF+) Certification (FC0-U61) exam, an important first step to higher CompTIA certifications.

4.5/5 average rating: ★ ★ ★ ★

  • Access 64 lectures & 4 hours of content 24/7
  • Identify & understand basic computer components and what they do
  • Understand operating systems, data storage, & sharing
  • Set up & configure a basic computer workstation
  • Work with applications & files
  • Handle basic software installation
  • Set up & configure a mobile device
  • Connect to networks & the Internet
  • Identify/prevent basic security risks
  • Identify compatibility issues
  • Understand safety & preventative maintenance of computers
  • Understand basic database concepts
  • Learn the fundamentals of programming code & languages
This is a prep course. CompTIA certification is NOT included.
Total Seminars | Home of Mike Meyers and His Team of IT Certification Pros
4.6/5 Instructor Rating: ★ ★ ★ ★

Total Seminars provides certification training services and training materials to thousands of schools, corporations, and government agencies including the United Nations, the FBI and all branches of the Department of Defense. Total Seminars produces the #1 selling CompTIA A+ and Network+ Certification books with over 1 million books in print.

Total Seminars has created a number of “Best-Selling” Udemy video courses by Mike Meyers and the Total Seminars team of Instructors. They also develop supplemental materials such as the TotalTester certification practice tests and TotalSims lab simulations to support your certification preparation. These are available on the Total Seminars web site.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Updates included
  • Experience level required: beginner

Requirements

  • Basic user of computers, mobile devices, the Internet and networks

Course Outline

  • How People Use Computers
    • Introduction - 2:49
    • The Case for Computer Literacy - 2:30
    • Features Common to Every Computing Device - 2:25
    • Common General-Purpose Computing Devices - 2:19
    • Networks of Computing Devices - 4:16
    • Remotely-Accessed Computer Systems - 3:37
    • Specialized Computer Systems - 2:01
    • Specialty I/O Devices - 1:17
  • System Hardware
    • CPUs - 3:29
    • Passive and Active Cooling - 3:12
    • RAM and Active Memory - 4:54
    • Motherboards - 2:33
    • Power Supplies - 2:57
    • AMA - Ask Me Anything about System Hardware - 7:07
  • Device Ports and Peripherals
    • Ports and Connectors - 3:13
    • General Use of I/O Devices - 2:23
    • AMA - Ask Me Anything About I/O, Ports and Peripherals - 7:08
  • Data Storage and Sharing
    • Basics of Binary - 3:34
    • Storage Technologies - 3:44
    • Mass Storage Variation - 2:50
    • AMA - Ask Me Anything About Data Storage and Sharing - 6:57
  • Understanding Operating Systems
    • Operating System Functions - 4:18
    • Operating System Interfaces - 4:32
    • AMA - Ask Me Anything About Understanding OSes - 5:13
  • Setting Up and Configuring a PC
    • Preparing the Work Area - 1:54
    • Setting up a Desktop PC - 1:23
    • Completing PC Setup - 4:13
    • AMA - Ask Me Anything About Setting up and Configuring a PC - 8:42
  • Setting Up and Configuring a Mobile Device
    • Personalizing a Tablet - 7:37
    • AMA - Ask Me Anything About Mobile Devices Part 1 - 7:16
    • AMA - Ask Me Anything About Mobile Devices Part 2 - 7:10
  • Managing Files
    • File Management Tools - 2:00
    • File Manipulation - 5:46
    • Backups - 3:04
    • AMA - Ask Me Anything About Managing Files - 7:38
  • Using and Managing Application Software
    • Walking Survey of Applications - 2:46
    • Managing Applications - 2:44
    • Applications and Extensions - 4:12
    • AMA - Ask Me Anything About Working with Applications - 7:10
  • Configuring Network and Internet Connectivity
    • Wi-Fi Setup - 6:20
    • Going High Speed - 3:11
    • Setting Up and Sharing Printers - 4:51
    • AMA - Ask Me Anything About Networks and Internet Connectivity Part 1 - 6:35
    • AMA - Ask Me Anything About Networks and Internet Connectivity Part 2 - 4:50
  • IT Security Threat Mitigation
    • Physical Security - 4:33
    • Dealing with Malware - 3:27
    • Password Management - 2:45
    • Clickworthy - 3:02
    • Perils of Public Internet - 2:14
    • AMA - Ask Me Anything About IT Threat Mitigation Part 1 - 6:43
    • AMA - Ask Me Anything About IT Threat Mitigation Part 2 - 8:24
  • Computer Maintenance and Management
    • Power Management - 1:35
    • Cleaning and Maintaining Computers - 1:53
    • Trash it or Stash it? - 2:25
    • AMA - Ask Me Anything About Computer Maintenance and Management - 10:54
  • IT Troubleshooting
    • Troubleshooting 101 - 2:54
    • AMA - Ask Me Anything About Troubleshooting Computers Part 1 - 10:05
    • AMA - Ask Me Anything About Troubleshooting Computers Part 2 - 10:32
  • Understanding Databases
    • Introduction to Databases - 5:40
    • Database Details - 6:07
    • AMA – Ask Me Anything about Databases - 6:09
  • Developing and Implementing Software
    • Introduction to Programming - 4:23
    • Programming with a PBJ Sandwich - 7:52
    • AMA – Ask Me Anything about Programming - 3:52

View Full Curriculum


Access
Lifetime
Content
17.0 hours
Lessons
131

CompTIA A+ Certification Core 1 (220-1001)

Kickstart Your IT Career by Acing the Industry-Standard Certification for Security to Cloud, Data Management & More

By Total Seminars | in Online Courses

This is the first of a two-course series and is designed to prepare you to take and pass the CompTIA A+ Core 1 (220-1001) exam. CompTIA A+ is the industry standard for establishing a career in IT. Particularly CompTIA A+ 220-1001 covers mobile devices, networking technology, hardware, virtualization and cloud computing, and network troubleshooting. With 131 lectures, this video series will help you better understand these concepts and prepare you to pass the first part of the CompTIA A+ certification.

4.7/5 average rating: ★ ★ ★ ★

  • Access 131 lectures & 17 hours of content 24/7
  • Acquire the skills to be a great IT & computer tech
  • Repair & configure mobile devices
  • Set up & configure basic networks
  • Learn all about hardware: monitors, CPUs, motherboards, hard drives, RAM, & more
  • Build everything from a basic workstation to an awesome gaming system
  • Understand what the cloud is & how virtualization works
  • Troubleshoot hardware & network issues
This is a prep course. CompTIA certification is NOT included.
Total Seminars | Home of Mike Meyers and His Team of IT Certification Pros
4.6/5 Instructor Rating: ★ ★ ★ ★

Total Seminars provides certification training services and training materials to thousands of schools, corporations, and government agencies including the United Nations, the FBI and all branches of the Department of Defense. Total Seminars produces the #1 selling CompTIA A+ and Network+ Certification books with over 1 million books in print.

Total Seminars has created a number of “Best-Selling” Udemy video courses by Mike Meyers and the Total Seminars team of Instructors. They also develop supplemental materials such as the TotalTester certification practice tests and TotalSims lab simulations to support your certification preparation. These are available on the Total Seminars web site.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Updates included
  • Experience level required: beginner

Requirements

  • Basic familiarity with computers and networks is helpful

Course Outline

  • All About the CompTIA A+ Core 1 (220-1001) Exam
    • CompTIA A+ Core 1 (220-1001) Introduction - 2:04
    • What is the CompTIA A+? - 2:12
    • Why get CompTIA A+ Certified? - 2:52
    • What is on the CompTIA A+ Core 1 (220-1001) Exam? - 8:51
    • How to Pass the CompTIA A+ Exams - 4:14
    • How to Use this Video Course - 2:32
  • Book Chapter 1 - Safety and Professionalism
    • Tools of the Trade - 6:18
    • Troubleshooting Theory - 9:59
  • Book Chapter 2: The Visible Computer
    • Primary PC Components - 4:51
    • External Connections - 10:37
    • Inside the PC - 7:48
    • What is a Computer? - 6:55
  • Book Chapter 3 - CPUs
    • What is a CPU? - 15:04
    • CPU Speeds and Cores - 12:02
    • Caching - 7:13
    • CPU Sockets - 12:16
    • Installing a CPU - 11:03
    • Liquid Cooling - 3:58
  • Book Chapter 4 - RAM
    • RAM Technology - 10:36
    • RAM Capacity - 7:59
    • RAM Features - 7:23
    • Installing RAM - 7:24
  • Book Chapter 5 - Firmware
    • What is the BIOS? - 6:02
    • POST - 8:46
    • System Setup - 8:59
    • Troubleshooting Firmware - 11:53
  • Book Chapter 6 - Motherboards
    • Form Factors - 6:22
    • Chipsets - 4:51
    • Touring the Motherboard - 14:11
    • Touring the Case - 6:46
    • Installing a Motherboard - 9:16
  • Book Chapter 7 - Power Supplies
    • The Power Supply - 8:30
    • Mouting a Power Supply - 5:18
    • Choosing a Power Supply - 7:39
    • Cooling Your PC - 11:26
    • Troubleshooting Power Supplies - 9:19
    • Troubleshooting Core Components - 14:19
  • Book Chapter 8 - Mass Storage Technologies
    • Introduction to Mass Storage - 12:32
    • Magnetic Disk Drives - 8:28
    • Solid State Drives - 8:03
    • SCSI - 3:25
    • Boot Order - 6:56
  • Book Chapter 9 - Implementing Mass Storage
    • New Installation - First Drive - 5:23
    • RAID - 11:01
    • Hardware RAID - 7:01
    • Mass Storage Troubleshooting - 8:00
  • Book Chapter 10 - Essential Peripherals
    • Optical Media - 9:53
    • USB Standards - 10:11
    • Understanding USB - 10:47
    • Configuring USB - 7:16
    • Thunder and Lightning - 5:41
    • Keyboards and Mice - 7:57
    • Sight and Sound - 6:35
    • Readers and Scanners - 7:33
    • Using Expansion Cards - 7:55
  • Book Chapter 11 - Building a PC
    • The Right PC for the Job - 12:37
  • Book Chapter 17 - Display Technologies
    • Monitor Technologies - 7:51
    • LCD Breakdown - 4:14
    • Graphics Cards and Connections - 13:06
    • Installing a Graphics Card - 6:47
    • Projectors - 4:52
    • Troubleshooting Monitors - 5:42
  • Book Chapter 18 - Essentials of Networking
    • Introduction to Networking - 8:10
    • Hubs vs. Switches - 5:17
    • Hexadecimal - 7:07
    • WANs and Routers - 9:12
    • Cables and Connectors - 10:35
    • Crimping Cables - 10:03
    • Structured Cabling - 10:40
  • Book Chapter 19 - Local Area Networking
    • Introduction to TCP/IP - 14:22
    • Network IDs and Subnet Masks - 4:44
    • Special IP Addresses - 9:26
    • NAT - 7:23
    • Dynamic IP Addressing - 9:51
    • IPv6 - 7:03
    • Port Numbers - 11:52
    • TCP, UDP, and ICMP - 6:08
    • Understanding DNS - 8:48
    • Working with DNS - 7:26
    • Windows Naming - 7:40
    • Routers - 11:35
    • Basic Router Configuration - 12:02
    • Advanced Router Configuration - 6:15
    • VLANs - 7:22
    • Network Troubleshooting - 5:25
  • Book Chapter 20 - Wireless Networking
    • Wireless Network Hardware - 10:40
    • Wi-Fi Standards - 9:32
    • Basic WAP Setup - 11:09
    • Connecting to a Wi-Fi Network - 8:42
    • It's a Huge Mesh - 4:15
    • Beyond Wi-Fi - 6:56
    • Troubleshooting Wireless Connections - 6:59
  • Book Chapter 21 - The Internet
    • Beyond the LAN - 2:57
    • Internet Tiers - 5:58
    • Dial-up Connections - 8:18
    • Broadband Connections - 10:09
    • Firewalls and Servers - 6:15
    • FTP - 7:09
    • E-Mail - 7:42
    • Proxy Servers - 6:23
    • Virtual Private Networks (VPNs) - 7:59
    • Internet of Things (IoT) - 3:48
  • Book Chapter 22 - Virtualization
    • Understanding Virtualization - 10:14
    • Your First Virtual Machine - 11:27
    • Advanced Virtualization Setup - 10:20
    • Cloud Computing - 7:57
    • Cloud Ownership - 2:35
    • Cloud-Based Applications - 6:23
  • Book Chapter 23 - Portable Computing
    • Laptop Features - 8:09
    • Laptop Hardware Troubleshooting - The Tools - 4:54
    • Laptop Hardware - Core Hardware - 3:41
    • Laptop Hardware - CPU and Motherboard - 6:57
    • Touring Your Laptop Display - 4:08
  • Book Chapter 24 - Understanding Mobile Devices
    • What is a Mobile Device? - 8:48
    • Mobile Connections - 9:39
    • Touring Android - 10:13
    • Touring iOS - 7:39
    • Virtual Reality - 2:48
  • Book Chapter 25 - Care and Feeding of Mobile Devices
    • Maintaining Mobile Devices - 10:44
    • Mobile Devices and E-mail - 9:38
    • Mobile Synchronization - 7:41
  • Book Chapter 26 - Printers and Multifunction Devices
    • Laser Printers - 12:38
    • Inkjet Printers - 7:54
    • Impact Printers - 4:06
    • Thermal Printers - 3:36
    • Installing a Local Printer - 13:55
    • Sharing Printers - 8:27
    • Installing Wireless and Cloud Printers - 10:19
    • Troubleshooting Printers - 10:36
    • 3D Printing - 7:12
  • Book Chapter 27 - Securing Computers
    • Dealing with Threats - 7:24

View Full Curriculum


Access
Lifetime
Content
14.0 hours
Lessons
106

CompTIA A+ Certification Core 2 (220-1002)

Expanded Skills on Configurations, Security Software Troubleshooting & Operational Procedures

By Total Seminars | in Online Courses

The CompTIA A+ certification is an IT credential trusted by employers around the world to identify the go-to person in endpoint management & technical support roles. It requires two exams: Core 1 (220-1001) and Core 2 (220-1002), and this course will help you ace the latter. With 106 lectures, this video series will cover installing and configuring operating systems, expanded security, software troubleshooting, and operational procedures. It will help you with these more advanced concepts and prepare you to complete the CompTIA A+ certification.

4.7/5 average rating: ★ ★ ★ ★

  • Access 106 lectures & 14 hours of content 24/7
  • Learn all about operating systems: Windows, Mac, Linux, iOS, Android
  • Explore scripting basics (JavaScript, Python, Visual Basic, & more)
  • Secure your computer, mobile device, & network
  • Understand security concepts like malware, antivirus, anti-malware, & networking security protocols
  • Trroubleshoot software & mobile issues
  • Use command-line tools in Windows, Mac, & Linux
  • Know the industry standards & best practices for documentation, change management, disaster prevention and recovery, procedures and policies
This is a prep course. CompTIA certification is NOT included.
Total Seminars | Home of Mike Meyers and His Team of IT Certification Pros
4.6/5 Instructor Rating: ★ ★ ★ ★

Total Seminars provides certification training services and training materials to thousands of schools, corporations, and government agencies including the United Nations, the FBI and all branches of the Department of Defense. Total Seminars produces the #1 selling CompTIA A+ and Network+ Certification books with over 1 million books in print.

Total Seminars has created a number of “Best-Selling” Udemy video courses by Mike Meyers and the Total Seminars team of Instructors. They also develop supplemental materials such as the TotalTester certification practice tests and TotalSims lab simulations to support your certification preparation. These are available on the Total Seminars web site.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Updates included
  • Experience level required: beginner

Requirements

  • Basic familiarity with computers and networks is helpful

Course Outline

  • All About the CompTIA A+ Core 2 (220-1002) Exam
    • CompTIA A+ Core 2 (220-1002) Introduction - 2:29
    • What is the CompTIA A+? - 2:12
    • Why get CompTIA A+ Certified? - 2:52
    • What is on the CompTIA A+ Core 2 (220-1002) Exam? - 4:13
    • How to Pass the CompTIA A+ Exams - 4:14
    • How to Use this Video Course - 2:32
  • Book Chapter 1 - Safety and Professionalism
    • Professional Communication, Part 1 - 6:19
    • Professional Communication, Part 2 - 7:28
    • Physical Safety - 7:08
  • Book Chapter 2 - The Visible Computer
    • What is an Operating System? - 9:23
    • Users and Super Users - 5:22
    • Why Windows? - 7:46
    • Windows Editions and Versions - 11:35
    • Touring the macOS - 6:27
    • Touring Linux - 7:55
  • Book Chapter 3 - CPUs
    • 32-Bit vs. 64-Bit Processing - 11:58
  • Book Chapter 4 - RAM
    • Virtual Memory - 6:25
  • Book Chapter 7 - Power Supply
    • Power Protection - 9:40
  • Book Chapter 9 - Implementing Mass Storage
    • Understanding Partitioning - 4:15
    • MBR Partitioning - 11:59
    • GPT Partitioning - 8:33
    • Understanding File Systems - 11:33
    • Popular File Systems - 7:10
    • Formatting in Action - 11:07
    • Dynamic Disks - 8:33
    • Software RAID in Storage Spaces - 9:35
    • Encrypting Mass Storage - 9:28
  • Book Chapter 11 - Building a PC
    • Boot from Everything - 11:53
    • Installing Windows - 12:08
    • Post-Installation Tasks - 11:34
    • Windows Installation options - 6:43
  • Book Chapter 12 - Windows Under the Hood
    • What is the Registry? - 10:38
    • Processes - 7:00
    • Services - 4:25
    • Your Windows Toolset - 8:20
    • Windows 7 Task Manager - 8:53
    • Windows 10 Task Manager - 5:46
    • Information and Configuration Tools - 10:48
    • Performance Monitor - 11:31
    • Event Viewer - 7:09
    • Tools for Programmers - 7:32
  • Book Chapter 13 - Users, Groups, and Permissions
    • Introduction to Users and Groups - 6:28
    • Managing Users and Groups - 12:14
    • NTFS Permissions - 8:18
    • Linux and macOS Permissions - 4:59
    • File Explorer - 13:36
    • Sharing Resources - 10:34
    • Security Policies - 7:52
  • Book Chapter 14 - Maintaining and Optimizing Operating Systems
    • Patch Management - 11:13
    • Working with Disks - 6:20
    • Working with Applications - 7:19
    • System Restore - 4:43
    • Backing up Your Files - 7:25
    • Task Scheduler - 6:48
  • Book Chapter 15 - Working with the Command-Line Interface
    • Understanding the CLI - 11:02
    • Navigating the CLI - 13:40
    • Working with Folders - 6:39
    • Working with Files - 11:06
    • Working with Drives - 13:02
    • Super Copy Commands - 8:32
    • Advanced Windows Command Line - 7:51
    • Advanced Linux Commands - 13:17
    • Command-Line Permissions - 7:34
    • Introduction to Scripting - 9:45
    • Interpreted Languages - 12:25
  • Book Chapter 16 - Troubleshooting Operating Systems
    • Windows Recovery Environment - 5:20
    • Advanced Windows Startup Options - 7:07
    • Troubleshooting Boot Problems - 9:44
    • Troubleshooting at the GUI - 11:25
    • Troubleshooting Applications - 6:42
    • Kernel Panic - 5:10
  • Book Chapter 17 - Display Technologies
    • Resolutions and Aspect Ratios - 6:16
    • Multiple Monitors - 4:49
  • Book Chapter 18 - Essentials of Networking
    • Network Card Troubleshooting - 9:24
  • Book Chapter 19 - Local Area Networking
    • Working with Connections - 9:12
    • Working with Workgroups - 8:11
    • Working with Active Directory - 13:50
    • Windows Sharing with Mac and Linux - 7:15
    • Net Command - 4:27
    • Firewall Configuration - 10:55
    • Windows Firewall - 7:56
    • Port Forwarding - 7:24
  • Book Chapter 20 - Wireless Networking
    • Wireless Encryption - 10:40
    • Enterprise Wireless - 15:41
  • Book Chapter 21 - The Internet
    • Telnet and SSH - 6:59
    • Remote Desktop Connections - 6:17
    • The World Wide Web - 9:07
    • Troubleshooting Internet Connections - 6:59
  • Book Chapter 23 - Portable Computing
    • Power Management - 11:10
  • Book Chapter 25 - Care and Feeding of Mobile Devices
    • Mobile Device Security - 7:52
    • Mobile Security Troubleshooting - 5:48
    • Mobile Device Troubleshooting - 9:36
  • Book Chapter 27 - Securing Computers
    • Threats - 9:48
    • Physical Security - 8:22
    • Passwords and Authentication - 13:48
    • Malware - 13:43
    • Anti-Malware - 11:29
    • Social Engineering - 5:50
    • Licensing - 9:37
    • Incident Response - 5:05
    • Environmental Controls - 6:02
  • Book Chapter 28 - Operational Procedures
    • Documents You Need to Know - 8:54
    • Data You Need to Know - 4:08
    • Change Management - 5:53
    • The Zen of Backup - 11:16
    • Recycling and Data Destruction - 6:37

View Full Curriculum


Access
Lifetime
Content
23.0 hours
Lessons
175

CompTIA Network+ Certification N10-007

Address the Current & Changing Networking Technologies As a CompTIA Network+ Professional

By Total Seminars | in Online Courses

The CompTIA Network+ Certification is a trusted mid-level certification for network technicians. Network+ professionals possess well-grounded knowledge and skills in troubleshooting, configuring, and managing networks. With 23 hours of instruction, this course aims to make you a good Network Tech and, in the process, make sure you are ready to pass the CompTIA exam.

4.7/5 average rating: ★ ★ ★ ★

  • Access 175 lectures & 23 hours of content 24/7
  • Design & implement functional networks
  • Understand & execute network security, standards, and protocols
  • Troubleshoot basic to advanced network problems
  • Land a network tech job
  • Pass the CompTIA Network+ Certification (N10-007) exam
This is a prep course. CompTIA certification is NOT included.
Total Seminars | Home of Mike Meyers and His Team of IT Certification Pros
4.6/5 Instructor Rating: ★ ★ ★ ★

Total Seminars provides certification training services and training materials to thousands of schools, corporations, and government agencies including the United Nations, the FBI and all branches of the Department of Defense. Total Seminars produces the #1 selling CompTIA A+ and Network+ Certification books with over 1 million books in print.

Total Seminars has created a number of “Best-Selling” Udemy video courses by Mike Meyers and the Total Seminars team of Instructors. They also develop supplemental materials such as the TotalTester certification practice tests and TotalSims lab simulations to support your certification preparation. These are available on the Total Seminars web site.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Updates included
  • Experience level required: beginner

Requirements

  • Basic familiarity with networks

Course Outline

  • Introduction
    • Introduction to CompTIA Network+ (N10-007) - 3:14
  • Chapter 1 - Network Models
    • 01 - What is a Model? - 2:07
    • 02 - OSI Model vs. TCP/IP Model - 7:02
    • 03 - Walking Through OSI and TCP/IP - 12:08
    • 04 - Meet the Frame - 5:52
    • 05 - The MAC Address - 7:22
    • 06 - Broadcast vs. Unicast - 4:19
    • 07 - Introduction to IP Addressing - 7:41
    • 08 - Packets and Ports - 4:57
    • Network Models Quiz
  • Chapter 2 - Cabling and Topology
    • 01 - Network Topologies - 10:14
    • 02 - Coaxial Cabling - 5:23
    • 03 - Twisted Pair Cabling - 6:24
    • 04 - Cat Ratings - 6:05
    • 05 - Fiber Optic Cabling - 8:41
    • 06 - Fire Ratings - 5:21
    • 07 - Legacy Network Connections - 7:04
    • Cabling and Topology Quiz
  • Chapter 3 - Ethernet Basics
    • 01 - What is Ethernet? - 6:31
    • 02 - Ethernet Frames - 6:43
    • 03 - Early Ethernet - 7:40
    • 04 - The Daddy of Ethernet: 10BaseT - 3:23
    • 05 - Terminating Twisted Pair - 14:25
    • 06 - Hubs vs. Switches - 12:38
    • Ethernet Basics Quiz
  • Chapter 4 - Modern Ethernet
    • 01 - 100BaseT - 5:24
    • 02 - Connecting Switches - 5:15
    • 03 - Gigabit Ethernet and 10-Gigabit Ethernet - 5:19
    • 04 - Transceivers - 7:10
    • 05 - Connecting Ethernet Scenarios - 13:57
  • Chapter 5 - Installing a Physical Network
    • 01 - Introduction to Structured Cabling - 4:16
    • 02 - Terminating Structured Cabling - 7:54
    • 03 - Equipment Room - 7:18
    • 04 - Alternative Distribution Panels - 3:49
    • 05 - Testing Cable - 8:52
    • 06 - Troubleshooting Structured Cabling, Part 1 - 5:05
    • 07 - Troubleshooting Structured Cabling, Part 2 - 5:27
    • 08 - Using a Toner and Probe - 2:45
    • 09 - Wired Connection Scenarios - 10:30
  • Chapter 6 - TCP/IP Basics
    • 01 - Introduction to IP Addressing and Binary - 12:42
    • 02 - Introduction to ARP - 3:45
    • 03 - Subnet Masks - 12:11
    • 04 - Classful Addressing - 10:23
    • 05 - Subnetting with CIDR - 9:48
    • 06 - More CIDR Subnetting Practice - 10:01
    • 07 - Dynamic and Static IP Addressing - 17:44
    • 08 - Rogue DHCP Servers - 6:29
    • 09 - Special IP Addresses - 7:01
    • 10 - IP Addressing Scenarios - 14:46
  • Chapter 7 - Routing
    • 01 - Introducing Routers - 15:18
    • 02 - Understanding Ports - 5:25
    • 03 - Network Address Translation - 6:24
    • 04 - Implementing NAT - 2:36
    • 05 - Forwarding Ports - 17:38
    • 06 - Tour of a SOHO Router - 12:01
    • 07 - SOHO vs. Enterprise - 8:41
    • 08 - Static Routes - 12:39
    • 09 - Dynamic Routing - 10:35
    • 10 - RIP - 4:26
    • 11 - OSPF - 3:33
    • 12 - BGP - 5:39
  • Chapter 8 - TCP/IP Applications
    • 01 - TCP and UDP - 7:22
    • 02 - ICMP and IGMP - 6:08
    • 03 - Handy Tools - 6:43
    • 04 - Introduction to Wireshark - 10:37
    • 05 - Introduction to netstat - 8:49
    • 06 - Web Servers - 11:52
    • 07 - FTP - 11:48
    • 08 - E-mail Servers and Clients - 9:27
    • 09 - Securing E-mail - 5:47
    • 10 - Telnet and SSH - 9:16
    • 11 - Network Time Protocol - 1:59
    • 12 - Network Service Scenarios - 9:33
  • Chapter 9 - Network Naming
    • 01 - Understanding DNS - 12:10
    • 02 - Applying DNS - 18:56
    • 03 - The HOSTS File - 3:45
    • 04 - Net Command - 8:12
    • 05 - Windows Name Resolution - 11:22
    • 06 - Dynamic DNS - 5:25
    • 07 - DNS Troubleshooting - 13:13
  • Chapter 10 - Securing TCP/IP
    • 01 - Making TCP/IP Secure - 4:25
    • 02 - Symmetric Encryption - 5:32
    • 03 - Asymmetric Encryption - 3:19
    • 04 - Cryptographic Hashes - 4:56
    • 05 - Identification - 12:11
    • 06 - Access Control - 4:20
    • 07 - AAA - 4:59
    • 08 - Kerberos/EAP - 7:33
    • 09 - Single Sign-On - 10:09
    • 10 - Certificates and Trust - 13:51
    • 11 - Certificate Error Scenarios - 8:06
  • Chapter 11 - Advanced Networking Devices
    • 01 - Understanding IP Tunneling - 6:04
    • 02 - Virtual Private Networks (VPNs) - 12:44
    • 03 - Introduction to VLANs - 11:52
    • 04 - InterVLAN Routing - 3:09
    • 05 - Interfacing with Managed Switches - 11:02
    • 06 - Switch Port Protection - 6:41
    • 07 - Port Bonding - 7:15
    • 08 - Port Mirroring - 3:32
    • 09 - Quality of Service - 5:10
    • 10 - IDS vs. IPS - 4:28
    • 11 - Proxy Servers - 12:44
    • 12 - Load Balancing - 8:32
    • 13 - Device Placement Scenarios - 12:59
  • Chapter 12 - IPv6
    • 01 - Intro to IPv6 - 12:52
    • 02 - IPv6 Addressing - 15:09
    • 03 - IPv6 in Action - 13:13
    • 04 - IPv4 and IPv6 Tunneling - 5:20
  • Chapter 13 - Remote Connectivity
    • 01 - Telephony Technologies - 8:59
    • 02 - Optical Carriers - 3:08
    • 03 - Packet Switching - 4:56
    • 04 - Connecting with Dial-up - 4:53
    • 05 - Digital Subscriber Line (DSL) - 4:32
    • 06 - Connecting with Cable Modems - 4:16
    • 07 - Connecting with Satellites - 2:30
    • 08 - ISDN and BPL - 4:01
    • 09 - Remote Desktop Connectivity - 4:49
    • 10 - Advanced Remote Control Systems - 8:42
  • Chapter 14 - Wireless Networking
    • 01 - Introduction to 802.11 - 11:38
    • 02 - 802.11 Standards - 12:17
    • 03 - Power Over Ethernet (PoE) - 3:43
    • 04 - Antennas - 8:38
    • 05 - Wireless Security Standards - 15:46
    • 06 - Implementing Wireless Security - 6:56
    • 07 - Threats to Your Wireless Network - 7:01
    • 08 - Retro Threats - 5:05
    • 09 - Wi-Fi Protected Setup (WPS) - 5:21
    • 10 - Enterprise Wireless - 6:07
    • 11 - Installing a Wireless Network - 14:44
    • 12 - Wireless Scenarios - 7:02
    • 13 - More Wireless Scenarios - 8:50
  • Chapter 15 - Virtualization and Cloud Computing
    • 01 - Virtualization Basics - 7:15
    • 02 - Cloud Ownership - 2:41
    • 03 - Cloud Implementation - 11:36
    • 04 - Your First Virtual Machine - 9:15
    • 05 - NAS and SAN - 16:23
    • 06 - Platform as a Service (PaaS) - 8:54
    • 07 - Software as a Service (SaaS) - 2:39
    • 08 - Infrastructure as a Service (IaaS) - 9:32
  • Chapter 16 - Mobile Networking
    • 01 - Cellular Technologies - 5:13
    • 02 - Mobile Connectivity - 7:12
    • 03 - Deploying Mobile Devices - 5:16
    • 04 - Mobile Access Control - 6:26
  • Chapter 17 - Building a Real-World Network
    • 01 - Network Types - 4:08
    • 02 - Network Design - 9:46
    • 03 - Power Management - 5:59
    • 04 - Unified Communications - 11:09
    • 05 - Network Documentation - 6:31
    • 06 - Contingency Planning - 10:10
    • 07 - Predicting Hardware Failure - 4:31
    • 08 - Backups - 7:43
  • Chapter 18 - Managing Risk
    • 01 - What is Risk Management? - 6:02
    • 02 - Security Policies - 8:28
    • 03 - Change Management - 6:41
    • 04 - User Training - 2:56
    • 05 - Standard Business Documentation - 5:08
    • 06 - Mitigating Network Threats - 4:53
    • 07 - High Availablity - 4:39
  • Chapter 19 - Protecting Your Network
    • 01 - Denial of Service - 8:33
    • 02 - Malware - 10:11
    • 03 - Social Engineering - 3:55
    • 04 - Access Control - 8:05
    • 05 - Man-in-the-Middle - 22:07
    • 06 - Introduction to Firewalls - 4:30
    • 07 - Firewalls - 10:12
    • 08 - DMZ - 5:30
    • 09 - Hardening Devices - 13:49
    • 10 - Physical Security Controls - 8:44
    • 11 - Testing Network Security - 7:57
    • 12 - Network Protection Scenarios - 14:18
  • Chapter 20 - Network Monitoring
    • 01 - SNMP - 15:08
    • 02 - Documenting Logs - 9:15
    • 03 - System Monitoring - 8:01
    • 04 - SIEM - 7:06
  • Chapter 21 - Network Troubleshooting
    • 01 - Network Troubleshooting Theory - 5:12

View Full Curriculum


Access
Lifetime
Content
19.0 hours
Lessons
121

CompTIA Security+ Certification SY0-501

Ace the Globally-Recognized Exam on Network Threats & Risks Identification, Management, and Mitigation

By Total Seminars | in Online Courses

This course covers everything you need to know to pass your CompTIA Security+ Certification SY0-501 Exam. It includes 121 lectures lead by the industry's leading authority on CompTIA Certifications, focusing on the latest trends and techniques in risk management, risk mitigation, threat management, and intrusion detection. The first goal of the course is to make you a good IT security tech and, in the process, make sure you are ready to pass the CompTIA Security+ exam.

4.6/5 average rating: ★ ★ ★ ★

  • Access 121 lectures & 19 hours of content 24/7
  • Detect various types of threats, attacks, & vulnerabilities
  • Assess & troubleshoot system issues with network components
  • Implement secure network architecture concepts
  • Pass the CompTIA Security+ Certification (SY0-501) exam
  • Land a great IT security tech job
This is a prep course. CompTIA certification is NOT included.
Total Seminars | Home of Mike Meyers and His Team of IT Certification Pros
4.6/5 Instructor Rating: ★ ★ ★ ★

Total Seminars provides certification training services and training materials to thousands of schools, corporations, and government agencies including the United Nations, the FBI and all branches of the Department of Defense. Total Seminars produces the #1 selling CompTIA A+ and Network+ Certification books with over 1 million books in print.

Total Seminars has created a number of “Best-Selling” Udemy video courses by Mike Meyers and the Total Seminars team of Instructors. They also develop supplemental materials such as the TotalTester certification practice tests and TotalSims lab simulations to support your certification preparation. These are available on the Total Seminars web site.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Updates included
  • Experience level required: beginner

Requirements

  • Basic familiarity with PCs and networks
  • Understanding of CompTIA A+ and Network+

Course Outline

  • Introduction
    • Introduction to Security+ SY0-501 - 3:21
  • Chapter 1 - Risk Management
    • The CIA of Security - 3:45
    • What is Risk? - 9:53
    • Threat Actors - 6:39
    • Managing Risk - 11:56
    • Using Guides for Risk Assessment - 6:23
    • Security Controls - 7:23
    • Interesting Security Controls - 3:15
    • Defense in Depth - 4:56
    • IT Security Governance - 8:18
    • Security Policies - 8:17
    • Frameworks - 8:21
    • Quantitative Risk Calculations - 8:11
    • Business Impact Analysis - 11:58
    • Organizing Data - 9:59
    • Security Training - 10:01
    • Third-Party Agreements - 8:42
  • Chapter 2 - Cryptography
    • Cryptography Basics - 17:11
    • Cryptographic Methods - 7:24
    • Symmetric Cryptosystems - 11:44
    • Symmetric Block Modes - 7:46
    • RSA Cryptosystems - 10:18
    • Diffie-Hellman - 6:42
    • PGP/GPG - 9:45
    • Hashing - 7:15
    • HMAC - 3:46
    • Steganography - 5:38
    • Certificates and Trust - 14:15
    • Public Key Infastucture - 20:48
    • Cryptographic Attacks - 24:13
  • Chapter 3 - Identity and Access Management
    • Identification - 12:42
    • Authorization Concepts - 5:48
    • Access Control List - 6:28
    • Password Security - 9:13
    • Linux File Permissions - 14:52
    • Windows File Permissions - 13:38
    • User Account Management - 6:43
    • AAA - 8:03
    • Authentication Methods - 19:40
    • Single Sign-On - 10:09
  • Chapter 4 - Tools of the Trade
    • OS Utilties, Part 1 - 14:46
    • OS Utilties, Part 2 - 14:04
    • Network Scanners - 10:47
    • Protocol Analyzers - 10:51
    • SNMP - 15:22
    • Logs - 11:10
  • Chapter 5 - Securing Individual Systems
    • Denial of Service - 8:33
    • Host Threats - 9:01
    • Man-in-the-Middle - 22:07
    • System Resiliency - 11:17
    • RAID - 11:18
    • NAS and SAN - 15:52
    • Physical Hardening - 7:26
    • RFI, EMI, and ESD - 3:12
    • Host Hardening - 16:17
    • Data and System Security - 4:21
    • Disk Encryption - 6:42
    • Hardware/Firmware Security - 9:11
    • Secure OS Types - 7:43
    • Securing Peripherals - 11:03
    • Malware - 10:11
    • Analyzing Output - 14:54
    • IDS and IPS - 4:28
    • Automation Strategies - 4:57
    • Data Destruction - 4:52
  • Chapter 6 - The Basic LAN
    • LAN Review - 8:00
    • Network Topologies Review - 5:03
    • Network Zone Review - 10:26
    • Network Access Controls - 10:31
    • The Network Firewall - 13:05
    • Proxy Servers - 12:44
    • Honeypots - 4:32
    • Virtual Private Networks - 13:46
    • IPSec - 11:55
    • NIDS/NIPS - 6:00
    • SIEM (Security Information and Event Management) - 7:06
  • Chapter 7 - Beyond the Basic LAN
    • Wireless Review - 9:43
    • Living in Open Networks - 9:41
    • Vulnerabilities with Wireless Access Points - 7:01
    • Cracking 802.11, WEP - 11:58
    • Cracking 802.11, WPA and WPA2 - 9:23
    • Cracking 802.11, WPS - 9:47
    • Wireless Hardening - 14:03
    • Wireless Access Points - 13:13
    • Virtualization Basics - 7:15
    • Virtual Security - 15:05
    • Containers - 10:46
    • Infrastucture as a Service (IaaS) - 9:32
    • Platform as a Service (PaaS) - 9:03
    • Software as a Service (SaaS) - 2:39
    • Deployment Models - 8:41
    • Static Hosts - 7:30
    • Mobile Connectivity - 12:03
    • Deploying Mobile Devices - 5:24
    • Mobile Enforcement - 12:32
    • Mobile Device Management - 10:24
    • Physical Controls - 8:44
    • HVAC - 7:25
    • Fire Suppression - 4:02
  • Chapter 8 - Secure Protocols
    • Secure Encryption Applications and Protocols - 10:55
    • Network Models - 6:45
    • Know Your Protocols - TCP/IP - 6:07
    • Know Your Protocols - Applications - 5:42
    • Transport Layer Security (TLS) - 12:04
    • Internet Service Hardening - 6:43
    • Protecting Your Servers - 6:12
    • Secure Code Development - 10:17
    • Secure Deployment Concepts - 12:04
    • Code Quality and Testing - 5:00
  • Chapter 9 - Testing Your Infrastructure
    • Vulnerability Scanning Tools - 9:22
    • Vulnerability Scanning Assessment - 4:43
    • Social Engineering Principles - 2:14
    • Social Engineering Attacks - 7:54
    • Attacking Applications - 10:56
    • Attacking Web Sites - 7:53
    • Exploiting a Target - 11:17
    • Vulnerability Impact - 10:00
  • Chapter 10 - Dealing with Incidents
    • Incident Response - 6:34
    • Digital Forensics - 11:35
    • Contingency Planning - 10:10
    • Backups - 7:43

View Full Curriculum


Access
Lifetime
Content
7.0 hours
Lessons
51

CompTIA CySA+ Cybersecurity Analyst CS0-001

7-Hour Guide on the High-Stakes Security Analyst Certification

By Total Seminars | in Online Courses

Properly trained IT security staff who can analyze, monitor, and protect cybersecurity resources are in high demand. The U.S. Bureau of Labor Statistics (BLS) predicts that information security analysts will be the fastest-growing overall job category, with 37 percent overall growth between 2012 and 2022. And if you're aiming to stack your resumé with a recognized certification and earn big bucks as a security analyst, this course is for you. This class will teach you everything you need to know to respond to cybersecurity threats and attacks. It will make you an outstanding cybersecurity analyst and in the process, make sure you are ready to pass the CompTIA exam.

4.5/5 average rating: ★ ★ ★ ★

  • Access 51 lectures & 7 hours of content 24/7
  • Apply environmental reconnaissance techniques like OS fingerprinting, e-mail harvesting, & social media profiling using tools such as Nmap, Netstat, and syslog
  • Analyze the results of network reconnaissance, & recommend or implement countermeasures
  • Secure a corporate environment by scanning for vulnerabilities
  • Respond to cyber incidents with a forensics toolkit, maintain the chain of custody, & analyze incident severity
This is a prep course. CompTIA certification is NOT included.
Total Seminars | Home of Mike Meyers and His Team of IT Certification Pros
4.6/5 Instructor Rating: ★ ★ ★ ★

Total Seminars provides certification training services and training materials to thousands of schools, corporations, and government agencies including the United Nations, the FBI and all branches of the Department of Defense. Total Seminars produces the #1 selling CompTIA A+ and Network+ Certification books with over 1 million books in print.

Total Seminars has created a number of “Best-Selling” Udemy video courses by Mike Meyers and the Total Seminars team of Instructors. They also develop supplemental materials such as the TotalTester certification practice tests and TotalSims lab simulations to support your certification preparation. These are available on the Total Seminars web site.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Updates included
  • Experience level required: beginner

Requirements

  • Basic familiarity with PCs and networks

Course Outline

  • Introduction to CySA+
    • Introduction - 1:50
  • Conducting Reconnaissance
    • Thinking Like the Enemy - 9:20
    • Tools of the Trade - 7:35
  • Analyzing Reconnaissance Results
    • Recon Results: Part 1 - 13:06
    • Recon Results: Part 2 - 4:52
    • Data Output - 5:01
  • Responding to Network-Based Threats
    • Protecting Your Territory - 4:53
    • Hardening Strategies - 12:42
  • Securing a Corporate Environment
    • Pen Testing - 5:42
    • Training - 4:03
    • Reverse Engineering - 7:42
    • Risk Evaluation - 2:34
  • Vulnerability Management
    • Requirements Identification - 4:50
    • Scanning - 5:49
    • Configuring and Executing Scans - 7:47
    • Reporting and Remediating - 9:24
  • Analyzing Vulnerabilities Scan Results
    • Common Vulnerabilities: Part 1 - 7:58
    • Common Vulnerabilities: Part 2 - 7:50
  • Incident Response
    • Incident Response Process - 6:40
    • IR Roles and Responsibilities - 7:43
  • Preparation Phase
    • IR Active Preparation - 9:45
    • Threat Trends - 7:35
  • Forensic Tools
    • Digital Forensics - 9:37
    • Seizure and Acquisitions - 4:56
    • Forensics Acquisition Tools - 8:57
    • Forensics Analysis: Part 1 - 4:29
    • Forensics Analysis: Part 2 - 7:51
  • Common Symptoms of Compromise
    • Network Symptoms - 3:34
    • Host Symptoms - 8:07
    • Application Symptoms - 4:27
  • Incident Recovery and Post-Incident Response Process
    • Moving Forward: Part 1 - 13:06
    • Moving Forward: Part 2 - 8:02
  • Frameworks, Common Policies, Controls, and Procedures
    • Frameworks - 13:06
    • Policies - 7:31
    • Controls & Procedures - 7:44
    • Verifications - 6:16
  • Identity and Access Management
    • Context-Based Authentication - 6:20
    • Identities - 15:17
    • Managing Identities - 9:43
    • Exploits - 8:12
  • Defense Strategies
    • Data Analytics - 9:48
    • Defense in Depth - 14:14
  • Software Development Life Cycle (SDLC)
    • Secure Software Development - 7:47
    • Best Coding Practices - 4:12
  • Tools and Technologies
    • Preventative Tools: Part 1 - 20:35
    • Preventative Tools: Part 2 - 6:20
    • Collective Tools - 8:57
    • Vulnerability Scanning - 15:54
    • Packet Capture - 11:40
    • Connectivity Tools - 8:00
    • Pen Testing Tools - 11:55

View Full Curriculum


Access
Lifetime
Content
10.0 hours
Lessons
67

CompTIA PenTest+ (PT0-001): Ethical Hacking

Be Proficient in Penetration Testing & Vulnerability Management and Land a Career in One of the Fastest-Growing Job Markets

By Total Seminars | in Online Courses

Did you know penetration testers' average salary is $71,929? And this career is one of the fastest-growing job markets. Whether you're looking to pass the CompTIA PenTest+ certification exam or just looking to learn some awesome ethical hacking skills, you’re in the right place. This course covers ethical hacking, securing networks, and penetration testing. A pen tester plans and scopes a pen test engagement with a client, finds vulnerabilities, exploits them to get into a network, then reports on those findings to the client.

4.1/5 average rating: ★ ★ ★ ★

  • Access 67 lectures & 10 hours of content 24/7
  • Use the tools you’ll need to scan networks, crack passwords, analyze & intercept traffic, discover code vulnerabilities, and compromise resources
  • Recognize vulnerabilities within a system, run exploits, & suggest solutions to a client to remediate the weak points
  • Work within a virtual environment to practice your pen-testing skills, including using Oracle VM manager, Kali Linux, Metasploitable, & DVWA
  • Scope, plan, & execute a pen test engagement from start to finish
This is a prep course. CompTIA certification is NOT included.
Total Seminars | Home of Mike Meyers and His Team of IT Certification Pros
4.6/5 Instructor Rating: ★ ★ ★ ★

Total Seminars provides certification training services and training materials to thousands of schools, corporations, and government agencies including the United Nations, the FBI and all branches of the Department of Defense. Total Seminars produces the #1 selling CompTIA A+ and Network+ Certification books with over 1 million books in print.

Total Seminars has created a number of “Best-Selling” Udemy video courses by Mike Meyers and the Total Seminars team of Instructors. They also develop supplemental materials such as the TotalTester certification practice tests and TotalSims lab simulations to support your certification preparation. These are available on the Total Seminars web site.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Updates included
  • Experience level required: beginner

Requirements

  • Network+, Security+ or equivalent knowledge

Course Outline

  • Introduction to PenTest+
    • Welcome to CompTIA PenTest+ (PT0-001) Ethical Hacking - 8:40
  • Chapter 1: Planning and Scoping
    • Planning a Pen Test - 8:54
    • Rules of Engagement - 10:41
    • Resources and Budgets - 7:21
    • Impact and Constraints - 5:17
    • Support Resources - 13:26
    • Legal Groundwork - 11:57
    • Scope Considerations - 10:51
    • Lab Environment Setup - 22:56
    • Project Strategy and Risk - 9:24
    • Scope Vulnerabilities - 13:32
    • Compliance-Based Assessments - 5:25
  • Chapter 2: Surveying the Target
    • Scanning and Enumeration - 4:35
    • Scanning and Enumeration Demo - 10:59
    • Packet Investigation - 8:03
    • Packet Inspection Demo - 6:02
    • Application and Open-Source Resources - 11:52
    • Vulnerability Scanning - 8:50
    • Vulnebarility Scanning Demo - 16:31
    • Target and Asset Considerations - 15:39
    • Nmap Timing and Performance Options - 6:43
    • Prioritization of Vulnerabilities - 9:17
    • Common Attack Techniques - 12:17
    • Credential Attacks - 14:41
    • Weaknesses in Specialized Systems - 18:08
  • Chapter 3: Selecting Your Attack Vector
    • Remote Social Engineering - 6:50
    • Spear Phishing Demo - 10:19
    • In-Person Social Engineering - 12:00
    • Network-Based Exploits - 7:19
    • FTP Exploit Demo - 8:28
    • Man-in-the Middle Exploits - 7:18
    • Wireless Exploits - 13:29
    • Application Exploits, Part 1 - 5:41
    • SQL Injection Demo - 8:48
    • Application Exploits, Part 2 - 8:14
    • Application Exploits, Part 3 - 9:15
    • Cross-Site Scripting Demo - 7:11
    • Code Vulnerabilities - 16:48
    • Local Host Vulnerabilities - 5:08
    • Privilege Escalation (Linux) - 9:49
    • Privilege Escalation (Windows) - 6:17
    • Misc. Privilege Escalation - 8:07
    • Misc. Local Host Vulnerabilities - 8:17
    • Physical Security - 11:27
    • Post-Exploitation Techniques - 11:23
    • Persistence and Stealth - 10:55
  • Chapter 4: Selecting Pen Testing Tools
    • Nmap Scoping and Output Options - 21:15
    • Pen Testing Toolbox - 6:59
    • Using Kali Linux - 6:27
    • Scanners and Credential Tools - 10:22
    • Code Cracking Tools - 4:35
    • Open-Source Research Tools - 6:36
    • Wireless and Web Pen Testing Tools - 11:03
    • Remote Access Tools - 6:28
    • Analyzers and Mobile Pen Testing Tools - 2:43
    • Other Pen Testing Tools - 4:39
    • Using Scripting in Pen Testing - 12:46
    • Bash Scripting Basics - 15:10
    • Bash Scripting Techniques - 10:21
    • PowerShell Scripts - 4:16
    • Ruby Scripts - 6:43
    • Python Scripts - 5:59
    • Scripting Languages Comparison - 11:06
  • Chapter 5: Reporting and Communication
    • Writing Reports - 16:02
    • Post-Report Activities - 5:36
    • Mitigation Strategies - 5:13
    • Communication - 9:54

View Full Curriculum



Terms

  • Unredeemed licenses can be returned for store credit within 30 days of purchase. Once your license is redeemed, all sales are final.