Search

Sitemap - OmniSecu.com

Home

About

Faq

Terms of Use

Trademarks

Privacy Policy

Sitemap

Knowledge Base

Blog

Disclaimer

Support Us

FeedBack

Contact Us

Basic Networking

Lesson 01 - Introduction to Computer Networking

Lesson 02 - Responsibilities of a network engineer

Lesson 03 - What is a Computer Network?

Lesson 04 - Why we need computer networks?

Lesson 05 - Different types devices used to create a computer network

Lesson 06 - Client Operating Systems and Network Operating Systems (NOS)

Lesson 07 - Common Network Application Software

Lesson 08 - Local Area Networks (LAN) and Wide Area Networks (WAN)

Lesson 09 - Campus Area Networks (CAN) and Metropolitan Area Network (MAN)

Lesson 10 - Logical Classification of Computer Networks - Peer to Peer Networks and Client/Server Networks

Lesson 11 - Logical Classification of Computer Networks - Centralized and Distributed Computer Network Models

Lesson 12 - Internetworks, Internet, Intranet and Extranet

Lesson 13 - What is a Network Protocol

Lesson 14 - Difference between Proprietary and Standard Protocols

Lesson 15 - What are RFCs (Request for Comments)

Lesson 16 - Organizations which control Internet, Network Protocols and Standards

Lesson 17 - What is network topology

Lesson 18 - Difference between physical topology and logical topology

Lesson 19 - Network Topologies - Bus Topology

Lesson 20 - Network Topologies - Star Topology

Lesson 21 - Network Topologies - Mesh, Ring and Hybrid Topologies

Lesson 22 - Network Topologies - Partial-Mesh Topology

Lesson 23 - Network Topologies - Full-Mesh Topology

Lesson 24 - Advantages and disadvantages of full-mesh topology

Lesson 25 - Network Topologies - Ring Topology

Lesson 26 - Network Topologies - Dual Ring Topology

Lesson 27 - Network Topologies - Hybrid Topology

Lesson 28 - Network Topologies - Tree Topology

Lesson 29 - Point-to-point Topology and Point-to-multipoint Topology

Lesson 30 - What are wireless networks? Advantages and disadvantages of wireless networks.

Lesson 31 - Ad hoc Wireless Topology

Lesson 32 - Infrastructure Wireless Topology

Lesson 33 - Wireless Mesh Topology

Lesson 34 - What is SOHO network

Lesson 35 - Differences between SOHO and Enterprise network

Lesson 36 - Network Infrastructure Devices and Icons

Lesson 37 - Network Infrastructure Devices - What is a Hub?

Lesson 38 - Network Infrastructure Devices - What are Bridges and Switches?

Lesson 39 - Network Infrastructure Devices - What is a Router?

Lesson 40 - Network Infrastructure devices - What is a Firewall

Lesson 41 - Main office (Head Office) and Branch Office Networks

Lesson 42 - Site-to-Site Network Topologies - Hub and Spoke Toplogy

Lesson 43 - Site-to-Site Network Topologies - Partial-Mesh Toplogy

Lesson 44 - Site-to-Site Network Topologies - Full Mesh Topology

Lesson 45 - What is NIC (Network Interface Card)

Lesson 46 - Common Network Cable types

Lesson 47 - Differences between STP and UTP twisted pair cables

Lesson 48 - Twisted pair cable bandwidth and frequency range

Lesson 49 - Different types of shields used in STP (Shielded Twisted Pair Cable)

Lesson 50 - TIA/EIA 568A and TIA/EIA-568B standards

Lesson 51 - Straight-Through and Cross-Over cables

Lesson 52 - Gigabit Ethernet Cable Pinout, EIA/TIA 568A and EIA/TIA 568B standard

Lesson 53 - What is Auto-MDIX feature in ethernet switches

Lesson 54 - Difference between Baseband and Broadband

Lesson 55 - Full-duplex and half-duplex Ethernet

Lesson 56 - Network Access Methods - CSMA/CD, CSMA/CA and Token Passing

Lesson 57 - How CSMA/CD works

Lesson 58 - IEEE (Institute of Electrical and Electronics Engineers)

Lesson 59 - IEEE 802 Standards

Lesson 60 - IEEE 802.11 Standards

Lesson 61 - LAN Technologies - Ethernet

Lesson 62 - Ethernet Media Standards

Lesson 63 - 100Base-TX Ethernet Media Standard

Lesson 64 - 100Base-FX Ethernet Media Standard

Lesson 65 - 4D-PAM5 encoding in Gigabit Ethernet

Lesson 66 - 1000Base-T Ethernet Media Standard

Lesson 67 - 1000Base-SX Ethernet Media Standard

Lesson 68 - 1000Base-LX Ethernet Media Standard

Lesson 69 - 10GBase-T 10 Gigabit Ethernet Media Standard

Lesson 70 - 10GBase-SR 10 Gigabit Optical Fiber Ethernet Media Standard

Lesson 71 - Meaning of 10/100/1000 Ethernet

Lesson 72 - Twisted pair Cable categories for 1 Gigbit and 10 Gigabit networks

Lesson 73 - Broadband over Power Line (IEEE 1901-2010 standard)

Lesson 74 - What is Power over Ethernet (PoE)

Lesson 75 - What is PoE (Power over Ethernet) Switch

Lesson 76 - LAN Technologies - Token Ring

Lesson 77 - Advantages and disadvantages of Fiber optic cable

Lesson 78 - How fiber optics work

Lesson 79 - Structure of fiber optic cable (FOC)

Lesson 80 - Single Mode Fiber Optic Cable (SMF fiber cable)

Lesson 81 - Multimode Fiber Optic Cable (MMF fiber cable)

Lesson 82 - Different types of fiber optic cables

Lesson 83 - Fiber optic transceivers

Lesson 84 - Fiber optic connectors

Lesson 85 - LAN Technologies - Fibre Distributed Data Interface (FDDI)

TCP/IP

Part 01 - IPv4

Lesson 1 - Introduction

Lesson 2 - What is PDU (Protocol Data Unit)

Lesson 3 - Seven Layers of OSI Model.

Lesson 4 - How data is moved through different layers of OSI model at sending and receiving computers

Lesson 5 - Name of data packets at different layers of OSI model

Lesson 6 - Why OSI model failed

Lesson 7 - Four layered TCP/IP model

Lesson 8 - Five layered TCP/IP model

Lesson 9 - Comparison between four layered TCP/IP model and five layered TCP/IP model

Lesson 10 - Protocols/Standards at various layers of TCP/IP model

Lesson 11 - Comparison between TCP/IP and OSI models

Lesson 12 - How data is moved through different layers of TCP/IP model at sending and receiving computers

Lesson 13 - Name of data packets at different layers of TCP/IP model

Lesson 14 - TCP/IP Encapsulation and Decapsulation

Lesson 15 - Physical Layer (Layer 1)

Lesson 16 - Datalink Layer (Layer 2)

Lesson 17 - Ethernet Frame Format

Lesson 18 - Binary Decimal and Hexadecimal numbers and conversions

Lesson 19 - How to use calculator for binary, decimal and hexadecimal number conversions

Lesson 20 - Media Access Control (MAC) addresses

Lesson 21 - Broadcast MAC Address - ff:ff:ff:ff:ff:ff

Lesson 22 - IPv4 Multicast MAC addresses

Lesson 23 - Network Layer (Layer 3)

Lesson 24 - IPv4 Protocol, IPv4 header and fields of IPv4 header

Lesson 25 - IPv4 Addresses

Lesson 26 - What is subnet mask

Lesson 27 - What is network address

Lesson 28 - IPv4 Limited broadcast address

Lesson 29 - IPv4 Directed broadcast address

Lesson 30 - What is limited broadcast in IPv4 and how limited broadcast works

Lesson 31 - What is directed broadcast in IPv4 and how directed broadcast works

Lesson 32 - What is default gateway

Lesson 33 - What are Private IPv4 Addresses (RFC 1918 addresses)

Lesson 34 - Automatic Private IPv4 addresses (APIPA)

Lesson 35 - What is loopback address

Lesson 36 - What is localhost

Lesson 37 - Class A networks and Class A IP addresses

Lesson 38 - Class B networks and Class B IP addresses

Lesson 39 - Class C networks and Class C IP addresses

Lesson 40 - Class D multicast addresses

Lesson 41 - Link-local multicast addresses

Lesson 42 - Internetwork control block multicast addresses

Lesson 43 - Source-Specific Multicast addresses

Lesson 44 - GLOP Multicast addresses

Lesson 45 - Administratively scoped multicast address block

Lesson 46 - What is multicast

Lesson 47 - What is multicast group

Lesson 48 - Multicast IPv4 address to MAC address mapping

Lesson 49 - Comparison of multicast with unicast and broadcast

Lesson 50 - Advantages and disadvantages of multicast

Lesson 51 - How IPv4 multicast works

Lesson 52 - IPv4 address reservations

Lesson 53 - Class C Subnetting Tutorial - Part 1

Lesson 54 - Class C Subnetting Tutorial - Part 2

Lesson 55 - Class B Subnetting Tutorial - Part 1

Lesson 56 - Class B Subnetting Tutorial - Part 2

Lesson 57 - Class A Subnetting Tutorial - Part 1

Lesson 58 - Class A Subnetting Tutorial - Part 2

Lesson 59 - Variable Length Subnet Masking (VLSM)

Lesson 60 - Supernetting

Lesson 61 - How to find out the Network Address and Broadcast Address of a subnetted IPv4 address

Lesson 62 - Address Resolution Protocol (ARP)

Lesson 63 - What is Gratuitous ARP

Lesson 64 - Internet Control Message Protocol (ICMP)

Lesson 65 - ICMP message types

Lesson 66 - ICMP Echo Request and Echo Reply messages

Lesson 67 - ICMP Destination Unreachable messages

Lesson 68 - ICMP Source Quench messages

Lesson 69 - ICMP Redirect messages

Lesson 70 - ICMP Router Advertisement messages

Lesson 71 - ICMP Router Solicitation messages

Lesson 72 - ICMP Time Exceeded messages

Lesson 73 - ICMP Parameter Problem messages

Lesson 74 - ICMP Timestamp Request and Timestamp Reply messages

Lesson 75 - ICMP Photuris messages

Lesson 76 - Ping command tool

Lesson 77 - Ping commmand options

Lesson 78 - Traceroute/tracert command tool

Lesson 79 - Tracert commmand options

Lesson 80 - Pathping command tool

Lesson 81 - Pathping commmand options

Lesson 82 - Difference between ping, traceroute/tracert and pathping

Lesson 83 - IGMP (Internet Group Management Protocol)

Lesson 84 - IGMP message types

Lesson 85 - IGMP DR and Querier

Lesson 86 - IGMPv1 - Internet Group Management Protocol Version 1

Lesson 87 - IGMPv2 - Internet Group Management Protocol Version 2

Lesson 88 - What are SSM (Source-specific Multicast) and ASM (Any-source Multicast)

Lesson 89 - IGMPv3 - Internet Group Management Protocol Version 3

Lesson 90 - Comparison between IGMPv1, IGMPv2 and IGMPv3

Lesson 91 - Transport Layer (Layer 4)

Lesson 92 - Transmission Control Protocol (TCP)

Lesson 93 - Transmission Control Protocol (TCP) Segment Header

Lesson 94 - What port numbers, socket numbers, well-known ports and dynamically assigned ports

Lesson 95 - Multiplexing and Demultiplexing using port numbers

Lesson 96 - TCP Three-way Handshake

Lesson 97 - Transmission Control Block (TCB)

Lesson 98 - TCP Sliding Window

Lesson 99 - TCP Connection Termination

Lesson 100 - User Datagram Protocol (UDP)

Lesson 101 - Differences between TCP and UDP

Lesson 102 - Application Layer (Layer 5)

Lesson 103 - What is NAT (Network Address Translation)

Lesson 104 - What is Static NAT

Lesson 105 - What is Dynamic NAT

Lesson 106 - What is PAT - Port Address Translation (NAT Overload)

Lesson 107 - Hypertext Transfer Protocol (HTTP) - What is HTTP?

Lesson 108 - Hypertext Transfer Protocol (HTTP) - Request and Response

Lesson 109 - Simple Mail Transport Protocol (SMTP) - How SMTP Works?

Lesson 110 - Simple Mail Transport Protocol (SMTP) Client - Server Communication

Lesson 111 - SMTP Status Codes and Extended Simple Mail Transfer Protocol (ESMTP)

Lesson 112 - Dynamic Host Configuration Protocol (DHCP) - How DHCP Works?

Lesson 113 - Dynamic Host Configuration Protocol (DHCP) - Message Format

Lesson 114 - Dynamic Host Configuration Protocol (DHCP) Messages

Lesson 115 - Dynamic Host Configuration Protocol (DHCP) Message Options

Lesson 116 - What is DNS - Why we need DNS (Domain Name System)

Lesson 117 - Advantages of Distributed DNS Infrastructure Architecture

Lesson 118 - Important RFCs Related with DNS (Domain Name System)

Lesson 119 - DNS Client (DNS Resolver) and DNS Server (Name Server)

Lesson 120 - DNS Namespace Hierarchy

Lesson 121 - Public DNS Namespace and Private DNS Namespace

Lesson 122 - Fully Qualified Domain Name (FQDN) and Partially Qualified Domain Name (PQDN)

Lesson 123 - What is DNS Resource Record

Lesson 124 - Authoritative DNS Server and Recursive DNS Server

Lesson 125 - What is DNS Zone

Lesson 126 - Primary DNS Server and Secondary DNS Server

Lesson 127 - What is a DNS Query, How DNS Query Works

Lesson 128 - Recursive and Iterative DNS Queries

Lesson 129 - What is Inverse (Reverse) DNS Query

Lesson 130 - What is VPN (Virtual Private Network)

Lesson 131 - What is IPSec and Why we need IPSec

Lesson 132 - Important Technical Terms Related with IPSec

Lesson 133 - What are the terms Encryption, Decryption, Clear-Text and Cipher-Text

Lesson 134 - What are the terms Symmetric Encryption and Assymetric Encryption

Lesson 135 - Important Symmetric and Assymmetric Encryption Algorithms

Lesson 136 - What are Hash values? Important Hash value Algorithms

Lesson 137 - How Hash Values can be used to determine Integrity of Data

Lesson 138 - What is HMAC (Hashed Message Authentication Code)

Lesson 139 - What is Diffie-Hellman Key Exchange

Lesson 140 - What is Diffie-Hellman Group

Lesson 141 - Main Components of IPSec - IKE, ESP and AH

Lesson 142 - IPSec VPN Modes - Tunnel Mode and Transport Mode

Lesson 143 - Security Association and Security Parameter Index

Lesson 144 - IKEv1 Main Mode, Aggressive Mode and Quick mode Message Exchanges

Lesson 145 - What is Perfect Forward Secrecy (PFS)

Lesson 146 - IKEv2 Phase 1 (IKE SA) and Phase 2 (Child SA) Message Exchanges

Lesson 147 - What is NAT-Traversal (Network Address Translation - Traversal)

Lesson 148 - IEEE 802.1X (dot1x) Port Based Authentication, Supplicant, Authenticator and Authentication Server

Lesson 149 - How IEEE 802.1X (dot1x) Port Based Authentication works

Part 02 - IPv6

Lesson 01 - Limitations of IPv4

Lesson 02 - IPv6 History and related RFCs

Lesson 03 - IPv6 Features

Lesson 04 - Differences Between IPv4 and IPv6

Lesson 05 - Unicast, Multicast and Anycast - Types of network communication in IPv6

Lesson 06 - IPv6 Datagram Header Format

Lesson 07 - Comparison between IPv4 Header and IPv6 Header

Lesson 08 - Introduction to IPv6 Addressing

Lesson 09 - What is prefix and prefix length in IPv6, Similarity between IPv4 subnet mask and IPv6 prefix

Lesson 10 - IPv6 Address formats

Lesson 11 - How to Simplify Shorten and Compress IPv6 Addresses

Lesson 12 - Types of IPv6 Addresses

Lesson 13 - Global Unicast IPv6 addresses

Lesson 14 - Different methods to assign a Global Unicast IPv6 address to an interface

Lesson 15 - What are IEEE EUI-64 based Global Unicast IPv6 addresses

Lesson 16 - How to configure Static Global Unicast IPv6 Address in a Cisco Router Interface

Lesson 17 - How to configure EUI-64 based Global Unicast IPv6 Address in a Cisco Router Interface

Lesson 18 - Link Local IPv6 Addresses, How Link Local IPv6 addresses are generated

Lesson 19 - Unique Local IPv6 Addresses

Lesson 20 - Multicast IPv6 Addresses

Lesson 21 - Anycast IPv6 Addresses

Lesson 22 - IPv6 Loopback Address and IPv6 Unspecified address

Lesson 23 - IPv6 Special Addresses and IPv6 well known prefixes

Lesson 24 - ICMPv6, Functions of ICMPv6, ICMPv6 Header, Types of ICMPv6 messages

Lesson 25 - NDP (Neighbour Discovery Protocol), functions of NDP, Neighbour Solicitation and Advertisement, Router Solicitation and Advertisement

Lesson 26 - Solicited-Node IPv6 Multicast Address

Cisco Certified Network Associate (CCNA)

Lesson 01 - Introduction to Cisco Certified Network Associate (CCNA) Certification

Lesson 02 - Different Types of Router Memory

Lesson 03 - How to communicate with a Router using Console, Auxiliary, Telnet, SSH, HTTP and HTTPS connections

Lesson 04 - How to connect and access a router or switch using console connection

Lesson 05 - How to connect to router or switch console if serial port is not available in computer

Lesson 06 - How to use HyperTerminal Terminal Emulator to configure or monitor a Cisco Router or Switch

Lesson 07 - How to use PuTTY Terminal Emulator to configure or monitor a Cisco Router or Switch

Lesson 08 - Cisco's Three-tier Hierarchical Network Model

Lesson 09 - Benefits of Segmenting a network using a Router

Lesson 10 - Unicast, Multicast, Broadcast, What is Unicast, What is Multicast and What is Broadcast

Lesson 11 - What are Collision Domain and Broadcast Domain

Lesson 12 - Cisco Router Boot Sequence

Lesson 13 - What is Trivial File Transfer Protocol (TFTP)

Lesson 14 - How to install Solarwinds Trivial File Transfer Protocol (TFTP) Server

Lesson 15 - How to configure Solarwinds Trivial File Transfer Protocol (TFTP) Server to backup IOS and configuration files

Lesson 16 - Cisco Router Configuration Files

Lesson 17 - Naming Convention of Cisco IOS Image Files

Lesson 18 - How to backup IOS and configuration files to Trivial File Transfer Protocol (TFTP) Server

Lesson 19 - How to Upgrade or Install IOS from Trivial File Transfer Protocol (TFTP) Server

Lesson 20 - Cisco IOS Command Line modes

Lesson 21 - How to configure passwords to secure Cisco Router

Lesson 22 - Basic Cisco Router Configuration Commands

Lesson 23 - Cisco Router Show Commands

Lesson 24 - Important Key Combinations of Cisco IOS Command Line Interface (CLI)

Lesson 25 - Router interface naming convention

Lesson 26 - Cisco Router interface configuration commands

Lesson 27 - Different types of interfaces in a Cisco Router

Lesson 28 - What is a Subinterface in a Cisco Router and how to create a subinterface in a Cisco Router

Lesson 29 - What is loopback interface in a Cisco Router

Lesson 30 - What is null interface in a Cisco Router

Lesson 31 - How to configure Router Serial Interfaces

Lesson 32 - What is Cisco Discovery Protocol (CDP)

Lesson 33 - Important Cisco Discovery Protocol (CDP) IOS commands

Lesson 34 - What are Routing and Switching - Difference between Routing and Switching

Lesson 35 - Types of Routes - Static Routes and Dynamic Routes

Lesson 36 - What is the difference between Routing Protocols and Routed Protocols

Lesson 37 - Difference Between Routable Protocol and Non-Routable Protocol

Lesson 38 - What is Autonomous System and Autonomous System Number

Lesson 39 - What is the difference between IGP and EGP

Lesson 40 - What is Administrative Distance

Lesson 41 - Introduction to Static Routes and Default Routes

Lesson 42 - How to configure Static Routes and Default Routes

Lesson 43 - What is Dynamic Routing and different types of Dynamic Routing

Lesson 44 - What is Routing Metric Value

Lesson 45 - What is Convergence of Routing Tables

Lesson 46 - Introduction to Distance Vector Routing Protocols

Lesson 47 - Introduction to Routing Information Protocol (RIP)

Lesson 48 - Difference between RIPv1 and RIPv2

Lesson 49 - How to configure Routing Information Protocol (RIP)

Lesson 50 - RIP Metric (Hop Count) and Hop Count Calculation

Lesson 51 - Auto Summarization in RIP

Lesson 52 - RIP Authentication, RIPv2 Authentication, RIP Authentication Keychain Configuration

Lesson 53 - Introduction to Interior Gateway Routing Protocol (IGRP)

Lesson 54 - How to configure Interior Gateway Routing Protocol (IGRP)

Lesson 55 - What is Routing Loop and how to avoid Routing Loop

Lesson 56 - Introduction to Link State Routing Protocols

Lesson 57 - Introduction to Open Shortest Path First (OSPF) Protocol

Lesson 58 - How to configure Open Shortest Path First (OSPF)

Lesson 59 - What is OSPF Metric value Cost and OSPF default Cost Reference Bandwidth

Lesson 60 - What is OSPF Router ID, OSPF Router ID Selection Algorithm and How to Configure OSPF Router ID

Lesson 61 - What is OSPF Area, OSPF Hierarchical Network Design, and Advantages of OSPF Areas

Lesson 62 - Introduction to Hybrid Routing Protocols

Lesson 63 - Introduction to Enhanced Interior Gateway Routing Protocol (EIGRP)

Lesson 64 - How to configure Enhanced Interior Gateway Routing Protocol (EIGRP)

Lesson 65 - EIGRP Metric Calculation Formula with example

Lesson 66 - Auto summarization in EIGRP

Lesson 67 - Introduction to Access Control Lists (ACL)

Lesson 68 - Standard Access Control Lists (ACLs)

Lesson 69 - Where should a Standard Access Control List (ACL) be placed

Lesson 70 - Access Control List (ACL) - Wildcard Masks

Lesson 71 - How to create and configure Standard Access Control Lists (ACLs)

Lesson 72 - Extended Access Control Lists (ACLs)

Lesson 73 - Where should an Extended Access Control List (ACL) be placed

Lesson 74 - Extended Access Control List (ACL) - Operators

Lesson 75 - Extended Access Control List (ACL) - TCP and UDP port numbers and names

Lesson 76 - Extended Access Control List (ACL)- established Keyword

Lesson 77 - How to create and configure Extended Access Control Lists (ACLs)

Lesson 78 - How to create and configure Access Control Lists (ACLs) for vty lines (telnet and ssh)

Lesson 79 - Named Access Control Lists (ACLs)

Lesson 80 - How to create and configure Standard Named Access Control Lists (ACLs)

Lesson 81 - How to create and configure Extended Named Access Control List (ACL)

Lesson 82 - How to edit a Named Access Control List (ACL) on router

Lesson 83 - What is NAT (Network Address Translation)

Lesson 84 - What are the Advantages and Disadvantages of NAT (Network Address Translation)

Lesson 85 - Different types of NAT - Static NAT, Dynamic NAT and PAT

Lesson 86 - NAT Address types - Inside Local, Inside Global, Outside Local, Outside Global

Lesson 87 - How to configure static NAT in a Cisco Router

Lesson 88 - How to configure dynamic NAT in a Cisco Router

Lesson 89 - How to configure PAT (Port Address Translation or NAT overload) in a Cisco Router

Lesson 90 - What is GRE (Generic Routing Encapsulation)

Lesson 91 - How to Configure Generic Routing Encapsulation (GRE) Tunnel in Cisco IOS Router

Lesson 92 - Introduction to Network Switches

Lesson 93 - Difference between Network Switches and Bridges

Lesson 94 - Methods of Switching

Lesson 95 - Difference between Half-duplex and Full-duplex Switching

Lesson 96 - Functions of a Network Switch

Lesson 97 - What is switch management VLAN and how to configure Management VLAN

Lesson 98 - Basic Cisco Switch Configuration Commands

Lesson 99 - What is Broadcast Storm

Lesson 100 - What is Layer 2 Switching loop

Lesson 101 - What is Spanning Tree Protocol (STP)

Lesson 102 - What is Bridge Protocol Data Unit (BPDU) frame

Lesson 103 - Bridge Protocol Data Unit (BPDU) Frame Format

Lesson 104 - What are Spanning Tree Bridge Priority and Bridge ID values

Lesson 105 - What is a Root Bridge (Root Switch)

Lesson 106 - What is a Root Port

Lesson 107 - Spanning Tree Path Cost Value and How is Spanning Tree Path Cost Value Calculated

Lesson 108 - Spanning Tree Port Priority and Port ID Values

Lesson 109 - How to change Spanning Tree Bridge Root Priority value and What is Extended System ID

Lesson 110 - How to configure Spanning Tree Protocol Root Primary and Root Secondary

Lesson 111 - How to change Spanning Tree Port Priority Value

Lesson 112 - How Spanning Tree Protocol (STP) select Root Port

Lesson 113 - What is a Designated Port

Lesson 114 - How Spanning Tree Protocol (STP) select Designated Port

Lesson 115- Difference between Root Port and Designated Port

Lesson 116 - Spanning Tree Port States

Lesson 117 - How BPDU is generated and How BPDU works

Lesson 118 - Important Spanning Tree Protocol (STP) Timers and their default values

Lesson 119 - How to Configure and Change Spanning Tree Protocol (STP) Default Timer-Values for hello timer, forward delay timer and max age timer

Lesson 120 - Topology Changes in Spanning Tree Protocol (STP)

Lesson 121 - Spanning Tree Protocol (STP) Convergence

Lesson 122 - Where to place the Spanning Tree Protocol Root Switch (Root Bridge)

Lesson 123 - Spanning Tree Protocol (STP) UplinkFast, Backbone Fast and Portfast

Lesson 124 - What is Spanning Tree Protocol (STP) Uplink Fast

Lesson 125 - What is Spanning Tree Protocol (STP) Backbone Fast

Lesson 126 - What is Spanning Tree Protocol (STP) PortFast

Lesson 127 - How to configure and verify Spanning Tree Protocol (STP) PortFast

Lesson 128 - How to enable or disable Spanning Tree Protocol (STP)

Lesson 129 - What is Rapid Spanning Tree Protocol (RSTP)

Lesson 130 - Difference between Spanning Tree Protocol (STP) and Rapid Spanning Tree Protocol (RSTP)

Lesson 131 - Per-VLAN Spanning Tree (PVST) and Per-VLAN Spanning Tree Plus (PVST+)

Lesson 132 - What is Etherchannel in Cisco Switches and Routers, What is Link Aggregation and what is PAgP, LACP

Lesson 133 - EtherChannel PAgP and LACP modes

Lesson 134 - How to configure EtherChannel Port Aggregation Protocol (PAgP) in Cisco Switches

Lesson 135 - How to configure How to configure EtherChannel Link Aggregation Control Protocol (LACP) in Cisco Switches

Lesson 136 - Manual EtherChannel Configuration in Cisco Switches Using Channel mode "on"

Lesson 137 - What is Virtual Local Area Network (VLAN)

Lesson 138 - Advantages of VLAN

Lesson 139 - VLAN Membership Types

Lesson 140 - How to create and name static VLAN

Lesson 141 - How to view VLAN information using "show vlan" command

Lesson 142 - Types of VLAN connection links - Trunk Links and Access Links

Lesson 143 - VLAN Frame Tagging

Lesson 144 - Inter-Switch Link (ISL) VLAN Tagging

Lesson 145 - IEEE 802.1Q VLAN Tagging

Lesson 146 - What is Native VLAN

Lesson 147 - How to configure VLAN trunk link and native VLAN

Lesson 148 - How to configure and assign a switch access port to a VLAN

Lesson 149 - What is VLAN Trunking Protocol (VTP)

Lesson 150 - What is VLAN Trunking Protocol (VTP) Domain

Lesson 151 - VLAN Trunking Protocol (VTP) Modes

Lesson 152 - VLAN Trunking Protocol (VTP) Advertisement Messages

Lesson 153 - How to configure VLAN Trunking Protocol (VTP)

Lesson 154 - How to view VLAN Trunking Protocol (VTP) information using "show vtp status" command

Lesson 155 - What is VLAN Trunking Protocol (VTP) Pruning

Lesson 156 - What is DTP (Dynamic Trunking Protocol)

Lesson 157 - Difference Between DTP "dynamic desirable" and "dynamic auto" Modes

Lesson 158 - How to configure DTP (Dynamic Trunking Protocol) Modes

Lesson 159 - Introduction to IPv6 and IPv6 Addresses

Lesson 160 - Introduction to IPv6 Routing and IPv6 Routing Protocols

Lesson 161 - How to configure IPv6 Static Routes in Cisco Routers

Lesson 162 - Introduction to RIPng (RIP Next Generation), RIP for IPv6

Lesson 163 - How to configure RIPng (RIP for IPv6) Routing Protocol in Cisco Routers

Lesson 164 - Differences between OSPFv2 and OSPFv3

Lesson 165 - How to configure OSPFv3 IPv6 Routing in Cisco Routers

Security

Part 01 - Basics of Information Security

Lesson 01 - Introduction to Information Security

Lesson 02 - Authentication

Lesson 03 - Kerberos Authentication

Lesson 04 - Challenge Handshake Authentication Protocol (CHAP) Authentication

Lesson 05 - Biometric Authentication

Lesson 06 - Token Authentication

Lesson 07 - Multi-Factor Authentication

Lesson 08 - Access Control

Lesson 09 - Discretionary Access Control (DAC)

Lesson 10 - Mandatory Access Control (MAC)

Lesson 11 - Role-based Access Control (RBAC)

Lesson 12 - Auditing

Lesson 13 - Introduction to Auditing in Windows 2003

Lesson 14 - Types of Network Attacks

Lesson 15 - Types of Network Attacks - Denial of Service (DoS) attack

Lesson 16 - How to minimize the Denial of Service (DoS) attack impact

Lesson 17 - Types of Network Attacks - Distributed Denial of Service (DDoS) attack

Lesson 18 - Types of Network Attacks - SYN attack

Lesson 19 - Types of Network Attacks - Sniffer Attack

Lesson 20 - Types of Network Attacks - Man-In-The-Middle attack

Lesson 21 - Types of Network Attacks - IP Address Spoofing Attack

Lesson 22 - Types of Network Attacks - ARP (Address Resolution Protocol) Spoofing Attacks

Lesson 23 - Types of Network Attacks - DNS (Domain Name System) Spoofing Attacks

Lesson 24 - Types of Network Attacks - Phishing and Pharming Spoofing attacks

Lesson 25 - Types of Network Attacks - Backdoor Attacks

Lesson 26 - Types of Network Attacks - Password Guessing Attacks

Lesson 27 - Types of Network attacks - SQL Injection Attacks

Lesson 28 - Defense against Network Attack

Lesson 29 - Types of Malwares

Lesson 30 - Types of Malwares - Adwares, Toolbars and Hijackers

Lesson 31 - Types of Malwares - Keyloggers

Lesson 32 - Types of Malwares - Computer Viruses

Lesson 33 - Types of Computer Viruses

Lesson 34 - Types of Malwares - Worms

Lesson 35 - Types of Malwares - Logic Bombs

Lesson 36 - Types of Malwares - Trojan Horses

Lesson 37 - Types of Malwares - Rootkits

Part 02 - Infrastructure and Email Security

Lesson 01 - Introduction to Infrastructure Security

Lesson 02 - Firewalls

Lesson 03 - Routers

Lesson 04 - Hubs

Lesson 05 - Bridges and Switches

Lesson 06 - Modems

Lesson 07 - Remote Access Services (RAS)

Lesson 08 - Virtual Private Networks (VPN)

Lesson 09 - Intrusion Detection Systems (IDS)

Lesson 10 - Difference between Firewall and Intrusion Detection System

Lesson 11 - Types of Intrusion Detection Systems

Lesson 12 - Leading Intrusion Detection Systems (IDS) Products

Lesson 13 - Honeypots

Lesson 14 - Types of Honeypots - Low Interaction Honeypots and High Interaction Honeypots

Lesson 15 - Leading Honeypot Products

Lesson 16 - Honeypot Clients (HoneyClients)

Lesson 17 - Introduction to Network Protocol Analyzers (Sniffers)

Lesson 18 - How Network Protocol Analyzers (Sniffers) work?

Lesson 19 - Leading Network Protocol Analyzer (Sniffer) products

Lesson 20 - How to detect Network Protocol Analyzer (Sniffers) in your network

Lesson 21 - Network Access Control

Lesson 22 - DMZ (Demilitarized Zone)

Lesson 23 - How to secure Workstations and Servers

Lesson 24 - Wireless Networks

Lesson 25 - Institute of Electrical and Electronics Engineers (IEEE) 802.11 Wireless Standards

Lesson 26 - Wireless Application Protocol (WAP)

Lesson 27 - Wired Equivalent Privacy (WEP)

Lesson 28 - Wi-Fi Protected Access (WPA)

Lesson 29 - Common Wireless Attacks

Lesson 30 - E-mail Security

Part 03 - Internet Information Services (IIS) 7 Security

Lesson 01 - Why Web Server Security is Important

Lesson 02 - How a Web Server Serve Clients

Lesson 03 - Introduction to Internet Information Services (IIS) 7

Lesson 04 - How to install Internet Information Services (IIS) 7 on Windows 2008 Server

Lesson 05 - Securing Access Control

Lesson 06 - Securing Directory and Data Structures

Lesson 07 - How to configure Virtual Directory on Internet Information Services (IIS) 7

Lesson 08 - Configuring IP address and Domain Name Restrictions

Lesson 09 - Configuring MIME Types

Lesson 10 - Introduction to Authentication and Authorization

Lesson 11 - Authentication Options in Internet Information Services (IIS) 7

Lesson 12 - How to Configure Basic Authentication in Internet Information Services (IIS) 7

Lesson 13 - How to Configure Windows Authentication in Internet Information Services (IIS) 7

Part 04 - Internet Protocol Security (IPSec)

Lesson 01 - Internet Protocol Security (IPSec) - What is IPSec?

Lesson 02 - Internet Protocol Security (IPSec) - Security Association (SA)

Lesson 03 - Internet Protocol Security (IPSec) - Security Parameter Index (SPI)

Lesson 04 - Internet Protocol Security (IPSec) - Transport Mode

Lesson 05 - Internet Protocol Security (IPSec) - Tunnel Mode

Lesson 06 - Internet Protocol Security (IPSec) - Authentication Header (AH)

Lesson 07 - Internet Protocol Security (IPSec) - Encapsulating Security Payload (ESP)

Lesson 08 - What are Windows 2003 IPSec features?

Lesson 09 - What are IPSec policies?

Lesson 10 - How to configure IPSec in a Windws 2003 network to secure Telnet traffic?

Lesson 11 - How to create an IPSec policy in a Windows 2003 server?

Lesson 12 - How to create an IPSec Rule in Windows 2003 server?

Lesson 13 - How to create an IPSec IP filter list in Windows 2003 server?

Lesson 14 - How to associate IPSec IP filter list to filter action?

Lesson 15 - How to assign IPSec policy in Windows 2003 server?

Lesson 16 - How to configure IPSec Integrity and Encryption algorithms in windows 2003?

Part 05 - Public Key Infrastructure

Lesson 01 - What is Symmetric Encryption?

Lesson 02 - Symmetric Encryption Algorithms

Lesson 03 - What is Asymmetric Encyption?

Lesson 04 - Asymmetric Encryption Algorithms

Lesson 05 - Public Key Cryptography

Lesson 06 - What is a Digital Certificate?

Lesson 07 - What is Public Key Infrastructure (PKI)?

Lesson 08 - What is a Certificate Authority (CA)?

Lesson 09 - Comparison between Internal and External Certificate Authorities (CAs)

Lesson 10. Certificate Authority (CA) Hierarchy

Lesson 11. Windows 2003 Certificate Authorities (CAs)

Lesson 12 - Windows 2003 Certificate Server Architecture

Lesson 13 - Stand-alone Root Certificate Authority (CA)

Lesson 14 - Installing Stand-alone Root Certificate Authority (CA)

Lesson 15 - Installing Enterprise Subordinate Certificate Authority

Lesson 16 - How to submit Certificate Request to a Root Certificate Authority (CA)

Lesson 17 - How to import Root CA Certificate inside Trusted Root Certification Authorities Store

Lesson 18 - How to install CA certificate issued from Root CA on Enterprise Subordinate CA

CCNA Security

Lesson 01 - Introduction to CCNA Security

Lesson 02 - What is Network Security and why we need Network Security

Lesson 03 - Primary Goals of Network Security

Lesson 04 - Enterprise Risk Management - Key Definitions

Lesson 05 - Network Threats and Countermeasures

Lesson 06 - Types of Hackers and how hackers are classified

Lesson 07 - Types of Network Attacks against Confidentiality, Integrity and Avilability

Lesson 08 - Different Classes of Network attacks and how to defend them

Lesson 09 - How Hackers attack networks and a Hacker's mindset

Lesson 10 - How to provide better security to your enterprise network

Lesson 11 - Disaster Recovery Business Continuity Plan

Lesson 12 - Types of Backup - Full backup, Incremental backup, Differential backup and Copy backup

Lesson 13 - Types of Backup Sites - Hot Site, Warm Site, Cold Site

Lesson 14 - Business Data Classification

Lesson 15 - Organizational Policies, Procedures, Standards and Guidelines

Lesson 16 - Testing Enterprise Security

Lesson 17 - Cisco Network Foundation Protection (NFP) Framework - Management plane, Control plane and Data plane

Lesson 18 - Management Plane Protection - Cisco NFP (Network Foundation Protection)

Lesson 19 - Control Plane Protection - Cisco NFP (Network Foundation Protection)

Lesson 20 - Data Plane Protection - Cisco NFP (Network Foundation Protection)

Lesson 21 - How to configure Cisco Router/Switch to enable SSH (Secure Shell) and How to connect Cisco Router/Switch using SSH (Secure Shell)

Lesson 22 - How to install Cisco CCP and how to configure Cisco router for CCP

Lesson 23 - How to install Cisco SDM and how to configure Cisco router for SDM

Lesson 24 - Cisco Router/Switch Common Security Vulnerabilities and Router/Switch Hardening

Lesson 25 - Security Audit and One-step lockdown using CCP

Lesson 26 - Cisco IOS CLI Shell Pivilege levels, user EXEC mode and privilege EXEC modes

Lesson 27 - How to configure multiple Privilege Levels Cisco IOS CLI Shell

Lesson 28 - Strong Passwords and Password Encryption to protect Management Plane

Lesson 28 - AAA Authentication Authorization and Accounting

Lesson 30 - AAA RADIUS and TACACS+, Difference between RADIUS and TACACS+

Lesson 31 - Cisco ACS Secure Access Control System Products

Lesson 32 - How to install Cisco ACS (Secure Access Control Server ) 5.4 on VMware Workstation

Lesson 33 - How to connect manage and configure Cisco ACS using web browser

Lesson 34 - How to create and add an internal user in Cisco ACS

Lesson 35 - How to create and add AAA clients (Network devices like Routers and Switches) in Cisco ACS

Lesson 36 - What are AAA Method Lists and IOS commands for creating AAA Method Lists in Cisco Router or Switch

Lesson 37 - Cisco Router/Switch AAA Login Authentication configuration using TACACS+ and RADIUS Protocols through IOS Commands

Lesson 38 - Cisco Router/Switch AAA Login Authentication configuration using TACACS+ and RADIUS Protocols through CCP (Cisco Configuration Professional)

Lesson 39 - Cisco Secure ACS Shell Profiles and Command sets, How to configure Shell Profiles and Command sets in ACS

Lesson 40 - How to configure Cisco Routers and Switches with AAA Authorization and Accouting using TACACS+ protocol through IOS Commands

Lesson 41 - Troubleshooting AAA using Debug Commands

Lesson 42 - Parser Views - Role Based Access Control (RBAC)

Lesson 43 - Introduction to Syslog in Cisco Routers and Switches

Lesson 44 - How to install and configure Kiwi Syslog Server for Cisco Routers and Swiches

Lesson 45 - How to use CCP to view Syslog messages stored in Cisco Router/Switch Memory

Lesson 46 - What is SNMP (Simple Network Management Protocol)

Lesson 47 - How to configure Cisco Router/Switch for SNMP through IOS CLI

Lesson 48 - How to configure Cisco Router/Switch for SNMP through CCP

Lesson 49 - Why Network Time Synchronization is important

Lesson 50 - Introduction to NTP (Network Time Protocol), NTP Stratum Levels

Lesson 51 - NTP (Network Time Protocol) Modes of Operation

Lesson 52 - How to configure Cisco Routers and Switches to synchronize time using NTP through IOS CLI

Lesson 53 - How to configure Cisco Routers and Switches to synchronize time using NTP through CCP

Lesson 54 - Out-of-Band (OOB) Management of Network Devices

Lesson 55 - Layer 2 Technologies - A revisit to VLAN and STP

Lesson 56 - What is VLAN Hopping attack

Lesson 57 - What is Switch spoofing attack and how to prevent Switch spoofing attack

Lesson 58 - What is Double tagging attack and how to prevent Double tagging attack

Lesson 59 - What is MAC flooding attack (CAM table flooding attack) and How to prevent MAC flooding attack

Lesson 60 - How to prevent MAC flooding attacks by configuring switchport port-security

Lesson 61 - How to enable an interface, after a Port Security violation related shutdown (Errdisable state)

Lesson 62 - Root Guard, BPDU Guard and BPDU Filter

Lesson 63 - What is Root Guard and how to configure Root Guard in Cisco Switches

Lesson 64 - What is BPDU Guard and how to configure BPDU Guard in Cisco Switches

Lesson 65 - What is BPDU Filter and how to configure BPDU Filter in Cisco Switches

Lesson 66 - DHCP Starvation attacks and DHCP spoofing attacks

Lesson 67 - How to configure DHCP Snooping

Lesson 68 - ARP Spoofing attack

Lesson 69 - Preventing ARP spoofing attacks with Dynamic ARP inspection (DAI)

Lesson 70 - IP spoofing attacks and IP Source Guard (IPSG)

Lesson 71 - What are PVLANs (Private VLANs)

Lesson 72 - How to configure PVLANs (Private VLANs)

Lesson 73 - Best Security practices to protect layer 2

Lesson 74 - Access Control Lists (ACLs)

Lesson 75 - What is Cisco IOS Zone Based Firewall

Lesson 76 - C3PL (Cisco Common Classification Policy Language), Class Map, Policy Map and Service Policy

Lesson 77 - What are Zones and Zone Pairs

Lesson 78 - How to configure Cisco IOS Zone Based Firewall

Lesson 79 - Introduction to Cisco IPSec VPN Technologies

Lesson 80 - How to configure Site-to-Site IPSec VPN using IKEv1 (Main Mode) using Pre-shared Key Authentication

Lesson 81 - How-to-configure-Site-to-Site-IKEv2-IPsec-VPN-using-Pre-Shared-Key-Authentication

Windows 2003

Part 01 - Introduction to Windows 2003

Lesson 01 - Introduction to Windows 2003

Lesson 02 - Windows 2003 family Editions

Lesson 03 - Hardware Requirements

Lesson 04 - Windows 2003 Installation - Character phase

Lesson 05 - Windows 2003 Installation - Graphics phase

Part 02 - Disk Management

Lesson 01 - Difference between Basic and Dynamic disks

Lesson 02 - How to create a Primary Partition

Lesson 03 - How to create an Extended Partiton

Lesson 04 - How to create a Logical Drive

Lesson 05 - How to convert basic disk to dynamic disk

Lesson 06 - Dynamic Volumes- Simple Volume

Lesson 07 - How to create a Simple Volume

Lesson 08 - Dynamic Volumes - Spanned Volume

Lesson 09 - How to create a Spanned Volume

Lesson 10 - Dynamic Volumes - Striped Volume

Lesson 11 - How to create a Striped Volume

Lesson 12 - Dynamic Volumes - Mirrored Volume

Lesson 13 - How to create a Mirrored Volume

Lesson 14 - Dynamic Volumes - Striping with parity (RAID-5) Volume

Lesson 15 - How to create a triping with parity (RAID-5) Volume

Part 03 - Managing Files and Folders

Lesson 01 - New Technology File System (NTFS)

Lesson 02 - New Technology File System (NTFS) Attributes

Lesson 03 - NTFS Permissions

Lesson 04 - Standard Permissions

Lesson 05 - Special Permissions

Lesson 06 - Relation between Standard Permissions and Special Permissions

Lesson 07 - Permission Changes While Moving or Copying an NTFS File

Lesson 08 - How to take the Ownership of a file

Lesson 09 - Introduction to Folder Sharing

Lesson 10 - How to share a folder using Windows Explorer

Lesson 11 - How to share a folder on a remote computer using Shared Folders snap-in

Lesson 12 - Share Permissions

Lesson 13 - Introduction to Offline Files and Folders

Lesson 14 - How to enable Offline Files

Lesson 15 - How to make files available Offline

Lesson 16 - Introduction to Disk Quotas

Lesson 17 - How to configure Disk Quota

Lesson 18 - Introduction to Encrypting File System (EFS)

Lesson 19 - Encrypting File System (EFS) - Encryption Process

Lesson 20 - Encrypting File System (EFS) - Decryption Process

Lesson 21 - How to encrypt and decrypt a file or folder using Encrypting File System (EFS)

Lesson 22 - Encrypted Data Recovery

 

Part 04 - Backup and Restore

Lesson 01 - Introduction to Windows 2003 Backup Utility (ntbackup.exe)

Lesson 02 - Normal Backup (Full backup)

Lesson 03 - Incremental Backup

Lesson 04 - Differential Backup

Lesson 05 - Copy and Daily Backup

Lesson 06 - Backup Combinations

Lesson 07 - How to Backup Files or Folders

Lesson 08 - How to Backup the System State

Lesson 09 - How to Schedule a Backup

Part 05 - Active Directory

Lesson 01 - What is Directory Service?

Lesson 02 - Introduction to Directory Standards

Lesson 03 - What is Active Directory (AD)?

Lesson 04 - What is Active Directory (AD) Forest?

Lesson 05 - What is Active Directory (AD) Tree?

Lesson 06 - What is Active Directory (AD) Domain?

Lesson 07 - What is a Domain Controller (DC)?

Lesson 08 - What is Organizational Unit (OU)?

Lesson 09 - Active Directory Trusts and Trust Types.

Lesson 10 - What is Active Directory Schema?

Lesson 11 - Windows 2003 Active Directory Installation - How to configure static IP address.

Lesson 12 - Windows 2003 Active Directory Installation - How to install DNS

Lesson 13 - Windows 2003 Active Directory Installation - Running Dcpromo

Lesson 14 - How add a computer to an Active Directory Domain?

Lesson 15 - Active Directory files and their functions

Lesson 16 - What is Active Directory Naming Context or Directory Partition?

Lesson 17 - What is Active Directory Replication?

Lesson 18 - Introduction to Active Directory Sites

Lesson 19 - How to create an Active Directory site

Lesson 20 - How to move Domain Controllers between Active Directory Sites

Lesson 21 - How to create and configure subnets for Active Directory Sites

Lesson 22 - What is Active Directory Site link?

Lesson 23 - How to create Active Directory Site Link

Lesson 24 - How to configure Site Link attributes

Lesson 25 - What is bridgehead server , preferred bridgehead server and Knowledge Consistency Checker (KCC)

Lesson 26 - What is Site Link Bridge and How to create Site Link Bridge

Lesson 27 - What is Active Directory Global Catalog

Lesson 28 - How to configure a Domain Controller as Global Catalog Server

Lesson 29 - What is Universal Group Membership caching

Lesson 30 - How to configure Universal Group Membership caching

Lesson 31 - Operations Master Roles (Flexible Single Master Operations - FSMO)

Lesson 32 - How to transfer Operations Master roles (FSMO) to another Domain Controller

Lesson 33 - How to seize Operations Master (FSMO) roles using ntdsutil tool

Part 06 - User and Group Administration

Lesson 01 - Introduction to Windows 2003 User accounts

Lesson 02 - Windows 2003 Local User Accounts

Lesson 03 - Windows 2003 Built-in User Accounts

Lesson 04 - Windows 2003 Active Directory Domain User Accounts

Lesson 05 - Windows 2003 Logon Names

Lesson 06 - UPN (User Principal Name) Suffixes

Lesson 07 - How to create an Active Directory Domain user account

Lesson 08 - Modifying and administering Active Directory Domain User Accounts

Lesson 09 - How to reset Active Directory domain user password

Lesson 10 - How to unlock an Active Directory Domain User Account

Lesson 11 - How to rename an Active Directory Domain user account

Lesson 12 - How to delete an Active Directory Domain user account

Lesson 13 - How to copy an Active Directory Domain user account

Lesson 14 - How to enable/disable Active Directory Domain User Account

Lesson 15 - Active Directory Domain User Password Policy

Lesson 16 - Active Directory Domain User Account Lockout Policy

Lesson 17 - Introduction to Windows 2003 Groups

Lesson 18 - What is the difference between Security Group and Distribution Group

Lesson 19 - Group Scope - Domain Local, Global and Universal Group Scopes

Lesson 20 - How to create an Active Directory Group

Lesson 21 - How to add an Active Directory User to a Group

Part 07 - Windows 2003 Clustering Technologies

Lesson 01 - Introduction to Windows 2003 Clustering

Lesson 02 - Introduction to Network Load Balancing (NLB)

Lesson 03 - Network Load Balancing (NLB) - Unicast and Multicast modes

Lesson 04 - Network Load Balancing (NLB) cluster models

Lesson 05 - Network Load Balancing Manager (nlbmgr.exe)

Lesson 06 - How to create Network Load Balancing (NLB) cluster using nlbmgr.exe

Lesson 07 - Network Load Balancing Client Affinity and Port Configurations

Lesson 08 - How to add a node to Windows 2003 Network Load Balancing Cluster

Lesson 09 - Introduction to Windows 2003 Failover Server Clustering

Lesson 10 - Important definitions related with Server Failover Clustering

Lesson 11 - What is failover and failback

Lesson 12 - Server Cluster Resources and Resource Groups

Lesson 13 - Different types of Failover Server Clusters - Single-Quorum Cluster, Single Local Quorum and Majority Node Set (MNS)

Lesson 14 - Failover Server Cluster Modes - Active/Passive and Active/Active

Lesson 15 - Failover Server Cluster Pre-installation check-lists

Lesson 16 - How to install a Failover Server Cluster

Lesson 17 - How to add a node to a Failover Server Cluster

Part 08 - Windows 2003 Group Policy

Lesson 01 - Introduction to Windows 2003 Group Policy

Lesson 02 - Local Group policy

Lesson 03 - Non-Local Group Policy

Lesson 04 - Group Policy Processing Order

Lesson 05 - Group Policy Object Editor

Lesson 06 - Group Policy Settings

Lesson 07 - Group Policy Inheritance

Lesson 08 - Group Policy Loop Back Processing

Lesson 09 - Group Policy Update Using gpupdate tool

Lesson 10 - Local User Profiles

Lesson 11 - Roaming Profiles and Mandatory Profiles

Lesson 12 - User Profile Folder Redirection

Lesson 13 - The Resultant Set of Policy (RSoP)

Lesson 14 - Configuring logon/logoff and startup/shutdown scripts

Lesson 15 - Deploying Software with Group Policy

Lesson 16 - Software Restriction policies

Windows 2008

Part 01 - Introduction to Windows 2008 Server

Lesson 01 - Introduction to Windows 2008 Server

Lesson 02 - New features of Windows 2008 Server

Lesson 03 - Hardware requirements for Windows 2008 Server installation

Lesson 04 - How to install Windows 2008 Server

Lesson 05 - Initial Configuration Tasks (ICT)

Lesson 06 - Server Manager

Lesson 07 - Boot Configuration Data (BCD)

Lesson 08 - Boot Configuration Data (BCD) Architecture

Lesson 09 - Boot Configuration Data (BCD) Objects

Lesson 10 - Boot Configuration Data (BCD) Elements

Lesson 11 - Boot Configuration Data Store Editor (BCDEdit) Options

Lesson 12 - How to use Boot Configuration Data Store Editor (BCDEdit) to manage BCD stores

Part 02 - Server Core

Lesson 01 - Introduction to Windows 2008 Server Core

Lesson 02 - Options, roles and features available with Windows 2008 Server Core installation

Lesson 03 - Windows 2008 Server Core installation

Lesson 04 - Initial configuration of a Windows 2008 Server Core installation

Lesson 05 - How to configure TCP/IP settings of a Windows 2008 Server Core installation

Lesson 06 - Different options to manage a Windows 2008 Server Core computer

Lesson 07 - Managing a Windows 2008 Server Core installation locally using command prompt

Lesson 08 - Managing a Windows 2008 Server Core installation remotely using Terminal Services

Lesson 09 - Managing a Windows 2008 Server Core installation remotely using Server Administration Tools

Lesson 10 - Managing a Windows 2008 Server Core installation remotely using WinRM/WinRS

Lesson 11 - How to join Windows 2008 Server Core Computer to Active Directory Domain

Lesson 12 - How to activate Windows 2008 Server Core Computer

Lesson 13 - How to enable Automatic Updates for Windows 2008 Server Core Computer

Lesson 14 - How to configure Display Resolution of Windows 2008 Server Core Computer

Lesson 15 - How to create and manage network shares in Windows 2008 Server Core Computer

Lesson 16 - How to configure firewall on Windows 2008 Server Core Computer

Lesson 17 - How to list, install and manage Roles and Features in Windows 2008 Server Core Computer

Part 03 - PowerShell

Lesson 01 - Introduction to PowerShell

Lesson 02 - How to install PowerShell in Windows 2008 Server

Lesson 03 - What is a PowerShell cmdlet

Lesson 04 - How to get help in PowerShell

Lesson 05- How to find all the Cmdlets with particular Verb

Lesson 06 - How to find all the Cmdlets with particular Noun

Lesson 07 - What is a PowerShell Alias

Lesson 08 - How to create or remove aliases in PowerShell

Lesson 09 - PowerShell Pipelines

GNU/Linux

Part 1 - RedHat Certified Engineer (RHCE)

Lesson 01 - UNIX History

Lesson 02 - GNU/Linux Introduction

Lesson 03 - GNU/Linux Concepts

Lesson 04 - Difference between Fedora and RedHat Enterprise Linux

Lesson 05 - Major GNU/Linux Distributions

Lesson 06 - GNU/Linux Kernel and Shell

Lesson 07 - GNU/Linux File System

Lesson 08 - What is inode number?

Lesson 09 - GNU/Linux File System Hierarchy

Lesson 10 - GRUB (GNU GRand Unified Boot loader)

Lesson 11 - Working with grub.conf configuration file

Lesson 12 - How to password protect GRUB (GNU GRand Unified Boot loader)

Lesson 13 - Linux Rescue Mode (Linux Rescue Environment)

Lesson 14 - init process and Linux runlevels

Lesson 15 - inittab configuration file

Lesson 16 - Working with inittab configuration file

Lesson 17 - inittab format

Lesson 18 - Creating and editing text files using vi editor

Lesson 19 - Linux File System Management Tools - fdisk command

Lesson 20 - Linux File System Management Tools - mkfs, mkfs.ext2, mkfs.ext3 commands

Lesson 21 - What is file system journaling?

Lesson 22 - Linux File System Management Tools - fsck command

Lesson 23 - Introduction to Linux /etc/fstab file

Lesson 24 - Linux mount and umount commands

Lesson 25 - Linux mount options

Lesson 26 - Introduction to Bourne Again Shell (BASH)

Lesson 27 - Basic Linux commands

Lesson 28 - Introduction to Logical Volume Manager (LVM)

Lesson 29 - How to create and manage Logical Volume Manager (LVM)

Lesson 30 - Introduction to Redundant Array of inexpensive (or Independent) Disks (RAID)

Lesson 31 - How to create and manage Redundant Array of Inexpensive Disks (RAID)

Lesson 32 - Introduction to swap space

Lesson 33 - How to create and manage swap space

Lesson 34 - Introduction to Linux user administration

Lesson 35 - How to add a user in Linux using useradd command

Lesson 36 - How to use passwd command to manage user passwords

Lesson 37 - How to modify a Linux user using usermod command

Lesson 38 - How to set Linux password aging using chage command

Lesson 39 - How to remove user from Linux using userdel command

Lesson 40 - The Linux user database (/etc/passwd)

Lesson 41 - The Linux password database (/etc/shadow)

Lesson 42 - Introduction to Linux User Group

Lesson 43 - How to create a new group in Linux using groupadd command

Lesson 44 - Linux Group Database (/etc/group) file

Lesson 45 - How to manage Linux user group

Lesson 46 - The Linux File Permissions

Lesson 47 - How to use chmod command to change Linux file permissions

Lesson 48 - How to use chgrp command to change Linux group ownership of a file

Lesson 49 - How to use chown command to change Linux user ownership of a file

Lesson 50 - Linux setuid and setgid

Lesson 51 - What is Linux umask?

Lesson 52 - What is Security-enhanced Linux (SELinux), Discretionary Access Control (DAC), Mandatory Access Control (MAC) and Role-based Access Control (RBAC)?

Lesson 53 - Security-enhanced Linux (SELinux) Security Contexts

Lesson 54 - How Security-enhanced Linux (SELinux) works

Lesson 55 - Security-enhanced Linux (SELinux) configuration-file (/etc/selinux/conf)

Lesson 56 - Security-enhanced Linux (SELinux) - Filesystem Relabeling

Lesson 57 - Important Security-enhanced Linux (SELinux) commands

Lesson 58 - Introduction to Linux Disk Quota

Lesson 59 - How to create Linux disk quota database files (aquota.group and aquota.user) using quotacheck command

Lesson 60 - How to turn on and turn off Linux disk quota using quotaon and quotaoff commands

Lesson 61 - How to manage Linux disk quota using edquota and repquota commands

Lesson 62 - Introduction to scheduling tasks using Linux cron daemon

Lesson 63 - How to schedule a task using Linux crontab (/etc/crontab) file

Lesson 64 - How to schedule tasks using Linux at command

Lesson 65 - Linux File filter commands sort wc and grep

Lesson 66 - How to compress, uncompress and view files using Linux commands gzip, gunzip and zcat

Lesson 67 - How to compress uncompress view files using Linux commands bzip2 bunzip2 and bzcat

Lesson 68 - How to use Linux tar (tape archive) command to create archives

Lesson 69 - Introduction to RedHat Package Manager (RPM)

Lesson 70 - Introduction to YUM (Yellow dog Updater, Modified) Package Manager

Lesson 71 - Common Linux network tools - ping, telnet, netstat and arp

Lesson 72 - Linux xinetd Super Server daemon

Lesson 73 - Linux Network Interface Configuration tool - ifconfig

Lesson 74 - Important Linux network configuration files

Lesson 75 - How to configure Dynamic Host Configuration Protocol (DHCP) in Linux

Lesson 76 - Introduction to Domain Name System (DNS)

Lesson 77 - Linux Domain Name System (DNS) client configuration files /etc/hosts, /etc/nsswitch.conf and /etc/resolv.conf

Lesson 78 - Berkeley Internet Name Domain (BIND) as a DNS server

Lesson 79 - How to configure caching-only name server

Lesson 80 - BIND configuration file (/etc/named.conf)

Lesson 81 - Domain Name System (DNS) zone files

Lesson 82 - RNDC (Remote Name Daemon Control)

Lesson 83 - Introduction to Secure Shell and OpenSSH

Lesson 84 - Important OpenSSH client tools - scp, sftp, ssh, ssh-keygen, ssh-copy-id, slogin

Lesson 85 - OpenSSH Configuration Files

Lesson 86 - How to mount a remote File System using Network File System (NFS)

Lesson 87 - How to configure Very Secure File Transfer Protocol Daemon (vsFTPd)

Lesson 88 - Introduction to Network Time Protocol (NTP)

Search