Pluralsight is not an official partner or accredited training center of EC-Council. IPv4 is still the prevalent Internet protocol, but IPv6 is gaining traction. This course lays the foundation for securing network hardware and software.
Pluralsight is not an official partner or accredited training center of EC-Council. Today's computing devices are always connected to a network. While increasing productivity, this also increases the risk of malicious activity. This course, Network Fundamentals and Protocols, begins by introducing you to network topologies and network equipment. Subsequently, you will learn about IPv4 and IPv6 addressing and protocols. Lastly, you will be introduced to the layers of computer network defense and secure network design. After finishing this course, you'll have an understanding of network hardware and software, and you'll be able to gain insights from captured network traffic.
Daniel Lachance, CompTIA Security+™, CompTIA A+®, CompTIA Network+®, CompTIA Server+, CompTIA Cloud Essentials, MCITP, MCTS, MCSA, is the owner of Lachance IT Consulting Inc. He is the author of the CompTIA Server+ Certification All-in-One Exam Guide, CompTIA Cloud Essentials Certification Study Guide, and co-author of CompTIA Security+ Certification Practice Exams.
Course Overview Hi everyone. My name is Dan Lachance, and welcome to my course, Network Fundamentals and Protocols. Over the years I've taught countless networking and security courses, as well as conducting network security audits for clients, and one of the things that stayed with me as a result of security audits is the realization that properly securing computer networks is possible only with a full understanding of the underlying network hardware and software in use. Some of the major things what we'll talk about in this course include, network topologies, the function of network equipment and when it should be used, how to configure IPv4 and IPv6, mapping TCPIP protocols to the OSI model, and how to identify the layers related to computer network defense. By the end of this course you'll know how network hardware devices, such as routers function, and how to configure IPv4 and IPv6. Through network packet captures you'll also be able to identify what's actually happening on the network. This all lends itself to securing the network from malicious attacks. Before beginning the course you should have some familiarity with how to navigate around the Windows and Linux operating systems, so I hope you'll join me on this quest to learn about computer networking with the Network Fundamentals and Protocols course at Pluralsight.