Vi ste ovdje
Overview/Description
The choice of network media depends on a number of factors. Speed and bandwidth requirements and budgets are probably the two main considerations, although the site itself can play a part. In new construction, for example, it may make sense to install the more expensive fiber optic media rather than incurring the cost of an upgrade down the road. Upgrades to older sites can be expensive and may not even be possible in some cases. This course describes the different available network media, including twisted pair cable, coaxial cable, fiber optic cable, and wireless media...
Overview/Description
There are a number of technologies involved in the delivery of Internet and network services. WAN technologies, such as DSL, provide local area networks with access to remote networks and the Internet, while LAN technologies give access to local computers and resources as well as a gateway to the WAN. This course describes the various WAN technologies in use today. Also covered are some of the properties of LANs such as the different topologies that can be used and Ethernet components. This course prepares the learner for the CompTIA Network+ 2012 certification exam N10-...
Overview/Description
A networkâs security is only as strong as the security of its individual systems. Before connecting individual computers to the network, you need to ensure that the computers are secured using proper security mechanisms. This level of security will help you overcome any potential issues that might occur otherwise. Unsecured systems can result in compromised data and, ultimately, lost revenue. Identifying the appropriate steps and measures you can implement to protect your systems and keeping your resources and revenue safe from potential attacks is a key aspect of...
Overview/Description
Security is a concern of everyone from the home user to the network administrator of a large enterprise. Although the threats and mitigation of threats are similar for both, the scale in which protections and solutions need to be applied is not. Everyone, regardless of their role, should be familiar with the different threats and attacks they may encounter and how to protect against them or clean up an infection. This course describes many of the threats that may be encountered in wired and wireless networks and how to mitigate those threats. This course prepares the...
Overview/Description
Firewalls are a critical part of the defense of all PCs and networks. Firewalls can be either software- or hardware-based, but all firewalls are intended to restrict the connections and types of connection into and out of a host or network. Firewalls can't be the only defense used to guard against the increasing number of threats to computers and networks. Additional security appliances and programs, such as IPS and IDS, port and network scanners, as well as a variety of vulnerability assessment tools should be deployed to ensure that as many precautions as possible are...
Overview/Description
Networks are the basic interconnections for all computers from home computer systems to multinational businesses to the Internet. In order to understand how networks function, you need to start at the beginning and learn the fundamental building blocks of networks and how data travels from one point to another. This course introduces the basic concepts of networking, including network models, such as the OSI model and the TCP/IP model and the protocols and applications that function within these models. This course also explains the basics of routing and switching...
Overview/Description
With everything that need to function correctly and together in networks, there are an equal number of things that can go wrong. This course describes the protocols used on most networks today and the troubleshooting methodology that is recommended when problems arise. This course also explains virtual networking and how it can help reduce costs and ease the burden of administration and recovery when things go wrong. This course prepares the learner for the CompTIA Network+ 2012 certification exam N10-005. Network+ is sometimes referred to as N+ or Net+.
Target Audience...
Overview/Description
Security mechanisms and account management are important parts of creating a secure networking environment. This course examines different authentication services and protocols along with biometric security mechanisms and other access security mechanisms such as tokens and smart cards. This course also examines how LDAP can be used to create security in an environment along with risk reduction mechanisms such as policies for mandatory vacations, job rotation and separation of duties. This course helps prepares the learner to write the CompTIA Security+ Certification SYO-...
Overview/Description
Business continuity, disaster recovery, and computer forensics go hand in hand when a security professional trains on ways to create, maintain, and repair network security. This course examines business continuity plans along with risk assessment techniques and the strategies used when creating a risk management process. This course also examines security training for end users and the methodologies and tools used when performing computer forensics. This course helps prepares the learner to write the CompTIA Security+ Certification SYO-301.
Target Audience
Individuals who...
Overview/Description
Understanding the types of threats that exist in an IT infrastructure is incredibly important when you are attempting to control access to network assets and secure an internetwork environment. This course examines control types, authentication, authorization, and access control strategies, along with the various types of malware, social engineering and spam/phishing attacks that a network can face. This course helps prepares the learner to write the CompTIA Security+ Certification SYO-301.
Target Audience
Individuals who have day to day technical information security...