Spanning Tree ProtocolSpanning Tree ProtocolBy Mark Jacob and Rick TraderBUY NOW $495 Buy for Teams Video Courses > CompTIA Network+ 007 Certification Video Course Share LOGIN Course Introduction– Welcome to the Course! 1:50 Lab Introduction 2:03 Optimizing Your Lab Experience 5:35Module 1: Basic Networking Concepts– Module 1 Introduction 0:32 Network Types 5:38 Types of Servers 2:42 LAN Topologies 5:25 Plan a Network Design 2:30 Design Basic Networks 3:01 Networking Best Practices 4:57Module 2: The OSI Model– Module 2 Introduction 0:56 The Purpose of the OSI Model 3:01 OSI Physical Layer 1:43 OSI Data Link Layer 2:43 OSI Network Layer 2:42 OSI Transport Layer 4:01 OSI Session Layer 2:20 OSI Presentation Layer 2:08 OSI Application Layer 2:07 Mnemonics OSI Model 4:56Module 3: Networking Adapters– Module 3 Introduction 0:59 Identify Network Adapters 15:40Module 4: Networking Protocols– Module 4 Introduction 0:40 Access Protocols 2:37 Transport Protocols 3:01 Security Protocols 3:28Module 5: Networking Cabling and Devices– Module 5 Introduction 1:17 Network Communication Basics 4:33 Copper Media – Twisted Pair 10:08 How Twisted Pair Cabling is Connected. 7:51 Copper Media – Coaxial 8:59 Copper Media – Firewire 4:19 Fiber Optic 11:35 Cable Testing Tools 13:42 Transceivers 6:06 Media Converter 4:49 Placement of a Firewall 2:55 Placement of a Hub 3:00 Placement of a Switch 2:29 Placement of a Router 1:59 Placement of a Modem 3:03 Placement of a Wireless Access Point 2:47 Placement of a Wireless Range Extender 3:50 Placement of a VOIP Endpoint 2:06 Tying It All Together 10:12Module 6: Internetworking Components– Module 6 Introduction 0:42 Concepts of Switching 4:30 Concepts of Routing 4:02 Understand Ports and Protocols 5:55 Traffic Shaping 6:03 NAT/PAT 8:03 LAUNCH LAB ENVIRONMENT Video Lab Answer Key: NAT Does Change IP Header Information 7:01 DOWNLOAD LAB SCENARIO Port Forwarding 3:16 Access Control Lists (ACLs) 6:19 Distributed Switching 2:14 Packet Switched / Circuit Switched 5:00 Software Defined Networking (SDN) 3:20 Static Routing 5:55 LAUNCH LAB ENVIRONMENT Video Lab Answer Key: Configure Static Routes 4:34 DOWNLOAD LAB SCENARIO Dynamic Routing 3:55 LAUNCH LAB ENVIRONMENT Video Lab Answer Key: Configure a Dynamic Routing Neighbor 3:12 DOWNLOAD LAB SCENARIO Default Route 5:03 Routing Protocols 4:44Module 7: Remote and WAN Connectivity– Module 7 Introduction 0:42 Install WAN Links 7:55 Install Remote Access Methods 4:09Module 8: Troubleshooting Hardware Components– Module 8 Introduction 0:55 Appropriate Software Tool 12:14 Ping Command 7:26 LAUNCH LAB ENVIRONMENT Video Lab Answer Key: Confirming Connectivity to a Remote Address 2:33 DOWNLOAD LAB SCENARIO TraceRT 5:22 LAUNCH LAB ENVIRONMENT Video Lab Answer Key: Verifying End-to-End Connectivity 2:32 DOWNLOAD LAB SCENARIO IPConfig / IFConfig 11:40 NSLookup 8:35 ARP Command 6:08 Netstat 6:59 Nbstat 7:36 Route Command 8:12 PathPing Command 6:33 TCP Dump 4:09 Nmap Command in a Linux Environment 3:50 IPTables 5:52 LAUNCH LAB ENVIRONMENT Video Lab Answer Key: Configuring a Simple Firewall 4:09 DOWNLOAD LAB SCENARIO Dig Command 3:25Module 9: TCP/IP Fundamentals– Module 9 Introduction 0:54 Characteristics of Ethernet 3:43 Internet Protocol 4:35 LAUNCH LAB ENVIRONMENT Video Lab Answer Key: Obtaining IP Address Information 5:42 DOWNLOAD LAB SCENARIO DHCP and APIPA 5:27 LAUNCH LAB ENVIRONMENT Video Lab Answer Key: DHCP with Wireshark Capture 4:14 DOWNLOAD LAB SCENARIOModule 10: TCP/IP Addressing and Subnetting– Module 10 Introduction 0:56 Binary, Decimal, and Hexadecimal Numbers 8:19 Install and configure TCP/IP 2:43 LAUNCH LAB ENVIRONMENT Video Lab Answer Key: Capture the 3-Way Handshake 3:11 DOWNLOAD LAB SCENARIO Install Configure IPv4 4:25 Private Addresses and Conservation 7:24 IPv6 Address Compression 3:13 Install Configure IPv6 6:58 Interpret Subnet Masks 7:01 Boolean ANDing 5:19 Classful / Classless Addresses 5:43 Overview of Subnetting 4:54 Subnet a Class C Address 10:38 Subnet a Class B Address 8:58 Subnet a Class A Address 10:05 Transition from IPv4 to IPv6 4:43 Manage IPv4 & IPv6 Addresses 2:49Module 11: Name Resolution– Module 11 Introduction 1:35 Hostname vs NetBIOS Names 8:01 Identify and Use Static Files Used for Name Resolution 5:32 Dynamic Name Resolution Services 5:28 Name Resolution 5:12 The Purpose of DNS 3:05 How DNS Resolves Names 9:46 DNS Server Installations 9:09 Installing DNS 10:49 DNS Zones 9:19 DNS Records 17:33 Dynamic DNS 12:26 Troubleshoot Name Resolution 16:20 Tools Used to Troubleshoot Name Resolution 5:22 LAUNCH LAB ENVIRONMENT Video Lab Answer Key: Troubleshoot Name Resolution 5:36 DOWNLOAD LAB SCENARIO Command Line Tools to Troubleshoot Name Resolution 10:04 PowerShell Cmdlets to Troubleshoot Name Resolution 7:54 The Purpose of IPAM 3:47Module 12: Security Devices and Applications– Module 12 Introduction 0:34 Applications and Services 3:53 Network Services (Deeper) 6:49 DNS Terminology 5:51 DHCP Terminology 6:45 Virtualization 2:42 SAN 2:47 Cloud Services 2:58 Security in Network Design 4:25 Physical Security 3:08 Authentication Methods 6:28 Multifactor Authentication 2:52 Network Access Control 3:53 Port Security 3:24 Access Control Lists 5:47 Geofencing 2:13 Exploits and Vulnerabilities 4:52 Common Network Attacks - DoS 3:09 Social Engineering, Insider Threat, Phishing 3:37 Rogue AP, Evil Twin, Deauthentication 3:44 War Driving, Logic Bomb, Ransomware 3:14 DNS Poisoning, ARP Poisoning, VLAN Hopping 5:58 Spoofing, Brute Force, M-I-T-M 4:20 Default Credentials, Common Passwords 3:06 Firmware Upgrades, Updates & Patching 3:31 Secure Protocols, New Keys 5:47 Change Native VLAN 7:28 Spanning Tree Protocol 8:33 Flood Guard, BPDU Guard 5:47 Root Guard, DHCP Snooping 4:22 Dynamic ARP Inspection, Demilitarized Zone 2:51 Segmentation: VLANs and Subnets From Security Perspective 3:04 Disable Unnecessary Services and Ports 6:20 Disable Unused Physical/Virtual Ports 4:27 File Integrity Monitoring, File Hashing 9:32 Privileged User Account 3:42 Restricting Access Via ACLs 6:04 Honeypot, Honeynet 3:47 Penetration Testing 1:55 Mitigation Techniques 3:49 Signature Management 2:29 Attack and Mitigation Example 9:05Module 13: Troubleshooting Network Connectivity– Module 13 Introduction 1:11 Network Troubleshooting Methodology 3:45 Identifying the Problem 7:26 How to Establish a Theory of Probable Cause 4:58 Testing the Probable Cause and Escalating 4:06 Plan of Action 4:01 Implementing the Solution 2:48 Verifying System Functionality 2:04 Documentation 5:14 Troubleshoot Network Connectivity 3:04 Latency 2:06 Jitter 1:35 Crosstalk 1:57 Electromagnetic Interface (EMI) 3:35 Incorrect Pinout 2:42 Incorrect Cable 3:13 Bad Port 2:14 Transceiver Mismatch 2:13 TX /RX Reversed 3:48 Duplex / Speed Mismatch 3:37 Damaged Cables 2:25 Bent Pins 1:49 Bottlenecks 3:42 VLAN Mismatch 3:32Module 14: Monitoring and Troubleshooting– Module 14 Introduction 0:45 Monitor, Scan and Analyze Networks 7:22 Network Site Management Concepts 3:09Module 15: Fault tolerance and Disaster Recovery– Module 15 Introduction 0:42 Data Backup Strategies 5:28 Fault Tolerant Network Design 6:05 Load Balancing 2:09 NIC Teaming / Link Aggregation 3:17 Power Options 4:52 Site Backup Options 2:32 Failure Management 5:11 Demo: Default Gateway Redundancy 6:12Module 16: Routine Maintenance– Module 16 Introduction 0:33 Change Control 2:23 Maintenance Windows 1:31 Key Performance Indicators (KPIs) 2:50Module 17: Troubleshooting Common Network Service Issues– Module 17 Introduction 1:24 Common Network Service Issues 4:24 Common Network Service Issues - Demo 6:05 Troubleshoot Incorrect Gateway 5:54 Incorrect Subnet Mask 4:11 Duplicate IP Addresses 4:33 Duplicate MAC Addresses 2:14 Expired IP Address 4:08 LAUNCH LAB ENVIRONMENT Video Lab Answer Key: Troubleshoot a Missing IP Address 6:50 DOWNLOAD LAB SCENARIO Rogue DHCP Server 2:44 Untrusted SSL Certificates 4:43 Incorrect System Time 4:11 Exhausted DHCP Scope 5:02 Locked TCP/UDP Ports 3:12 Incorrect Host-Based Firewall Settings 4:58 Incorrect ACL Settings 2:24 Unresponsive Service 3:15Module 18: Wireless Networking– Module 18 Introduction 0:54 Wireless Topologies 3:17 Cellular Technologies 5:02 Wireless Methodologies 4:20 Wireless Access Methods 5:16 Wireless Network Authentication 5:39 Wireless Troubleshooting 3:05Preparing for the Exam– Network + Exam 1:18 How to Get Your Exam Voucher 1:23View Entire CourseSpanning Tree ProtocolPlease SIGN IN to view the full course.