Lessons Include:
0-0: Course Introduction (3:49)
1-1: Networking Theory (11:30)
1-2: The OSI Model (15:35)
1-3: Network Topologies (8:59)
1-4: WAN Technologies, part 1 (14:46)
1-5: Wan Technologies, part 2 (20:44)
1-6: Network Devices (14:07)
1-7: Network Concepts, part 1 (16:19)
1-8: Network Concepts, part 2 (14:27)
1-9: Wired Connections (18:25)
1-10: Cable Connectors, part 1 (13:44)
1-11: Cable Connectors, part 2 (15:57)
1-12: Cable Connectors, part 3 (11:28)
1-13: Wireless Connections (8:57)
1-14: Network Access (14:18)
1-15: DHCP and DNS, part 1 (12:19)
1-16: DHCP and DNS, part 2 (17:06)
1-17: Addressing Schema, part 1 (16:13)
1-18: Addressing Schema, part 2 (21:01)
1-19: Routing Protocols (16:31)
1-20: Unified Communication Technologies (8:26)
1-21: Cloud and Virtualization (8:24)
1-22: Cloud and Virtualization, part 2 (10:49)
1-23: Implementing a Network (8:02)
1-24: Ports and Protocols (14:27)
2-1: Monitoring Tools, part 1 (14:40)
2-2: Monitoring Tools, part 2 (8:57)
2-3: Metrics and Reports (10:25)
2-4: Configuration Management (13:36)
2-5: Network Segmentation (11:25)
2-6: Patches and Updates (8:21)
2-7: Switches and VLANs, part 1 (15:11)
2-8: Switches and VLANs, part 2 (11:46)
2-9: Switches and VLANs, part 3 (12:07)
2-10: Wireless Infrastructure, part 1 (13:56)
2-11: Wireless Infrastructure, part 2 (11:50)
3-1: Areas of Risk (11:01)
3-2: Attack Vectors (16:03)
3-3: Attack Vectors, part 2 (13:11)
3-4: Attack Vectors, part 3 (7:57)
3-5: Network Hardening Techniques, part 1 (12:19)
3-6: Network Hardening Technologies, part 2 (13:21)
3-7: Physical Security (6:35)
3-8: Firewalls (10:29)
3-9: Network Access Control (10:46)
3-10: Forensic Concepts (11:34)
4-1: Troubleshooting Methodologies (13:51)
4-2: Troubleshooting Tools (7:50)
4-3: Troubleshooting Tools, part 2 (8:24)
4-4: Troubleshooting Wireless Networks (10:48)
4-5: Troubleshooting Wireless Networks, part 2 (9:07)
4-6: Troubleshooting Copper Cabling (12:59)
4-7: Troubleshooting Fiber Cabling (7:08)
4-8: Troubleshooting Common Network Errors (11:45)
4-9: Troubleshooting Common Network Issues, part 2 (11:10)
4-10: Troubleshooting Common Security Issues (7:13)
4-11: Troubleshooting Common Security Issues, part 2 (9:24)
4-12: Troubleshooting WAN (8:35)
5-1: Policies and Procedures (9:02)
5-2: Safety Policies (12:59)
5-3: Installing and Configuring Equipment (9:41)
5-4: Installing and Configuring Equipment, part 2 (8:41)
5-5: Change Management (7:54)