Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Network from Scratch to Advanced Implementation
Materials and extra resources
How to get access to the students portal (3:28)
Introduction
Introduction (10:44)
Course Objective
Course Objective (2:44)
Network Basic
Network Basic (12:02)
IP (16:07)
Private and Public IP (16:43)
The OSI Model Part 1 (14:39)
The OSI Model Part 2 (14:10)
TCP/IP Model (2:45)
Default Gateway (7:05)
Demonstration (11:42)
Network Architecture Components (17:04)
Types of Network (5:08)
TCP Command (8:57)
Setup Your Lab
Setup your lab (7:09)
Client Installation (18:49)
Create more client easily (12:43)
Building a WorkGroup (Basic Network)
Build a Worgroup (Basic Network) (13:00)
Sharing Resources (13:01)
Building a Server Client Network
What is a Server Client Network ? (4:34)
Server Installation (13:00)
Server Configuration (3:40)
Active Directory 1 (19:30)
Active Directory 2 (4:07)
Users and Groups (9:04)
Join the domain (7:02)
Configuring different Server role
Configure DHCP (14:13)
Configure DNS (13:33)
Configuring File Server (13:27)
Control user using Group Policy
What is Group Policy ? (2:29)
GPO Implementation (13:03)
Provide High Availability
What is RAID ? (3:57)
Configure RAID 1 (15:00)
Configure RAID 5 (9:58)
Configure Cluster 1 (16:40)
Configure Cluster 2 (6:51)
Routing and Switching network (CCNA)
Working with CISCO devices (11:59)
WAN (6:59)
Starting a Router (10:14)
Secure Cisco devices (9:24)
Introduction to routing (10:51)
Cisco IOS Modes (6:44)
Dynamic Route (7:37)
Build the WAN 1 (17:02)
Routing Update (6:18)
Build The WAN 2 (6:07)
EIGRP (5:11)
EIGRP Implementation (16:42)
Subnet (22:00)
More Subnet Examples (6:00)
More Subnet Examples 2 (4:02)
Switching (4:23)
VLAN Configuration (15:26)
VLAN Trunk and VTP (20:11)
More about VTP (2:12)
Access Control List
Access Control List (4:39)
Standard Access Control List (8:14)
Build VOIP Networkg and Switching network
Build VOIP Network Scanrio 1 (20:21)
Build VOIP Network Scanrio 2 (18:16)
Building a Wireless Network
Building a Wireless Network (12:59)
Montitor your network
Wireshark (14:44)
Etherape (4:06)
Network Security
Network Security (1:59)
Common Network Attacks (8:58)
Sniffering (Proof of Concept) (30:13)
Man in the Middle attack (11:59)
How to get the course materials and access to the students portal (3:28)
Teach online with
How to get access to the students portal
This video is not available. Please contact the instructor for more information.
Complete and Continue
Completed
Incomplete
Incomplete disabled
Completed
Incomplete
Incomplete disabled
Completed
Incomplete
Incomplete disabled