Pluralsight is not an official partner or accredited training center of EC-Council. IPv4 is still the prevalent Internet protocol, but IPv6 is gaining traction. This course lays the foundation for securing network hardware and software.
Pluralsight is not an official partner or accredited training center of EC-Council. Today's computing devices are always connected to a network. While increasing productivity, this also increases the risk of malicious activity. This course, Network Fundamentals and Protocols, begins by introducing you to network topologies and network equipment. Subsequently, you will learn about IPv4 and IPv6 addressing and protocols. Lastly, you will be introduced to the layers of computer network defense and secure network design. After finishing this course, you'll have an understanding of network hardware and software, and you'll be able to gain insights from captured network traffic.
Daniel Lachance, CompTIA Security+™, CompTIA A+®, CompTIA Network+®, CompTIA Server+, CompTIA Cloud Essentials, MCITP, MCTS, MCSA, is the owner of Lachance IT Consulting Inc. He is the author of the CompTIA Server+ Certification All-in-One Exam Guide, CompTIA Cloud Essentials Certification Study Guide, and co-author of CompTIA Security+ Certification Practice Exams.
Course Overview Hi everyone. My name is Dan Lachance, and welcome to my course, Network Fundamentals and Protocols. Over the years I've taught countless networking and security courses, as well as conducting network security audits for clients, and one of the things that stayed with me as a result of security audits is the realization that properly securing computer networks is possible only with a full understanding of the underlying network hardware and software in use. Some of the major things what we'll talk about in this course include, network topologies, the function of network equipment and when it should be used, how to configure IPv4 and IPv6, mapping TCPIP protocols to the OSI model, and how to identify the layers related to computer network defense. By the end of this course you'll know how network hardware devices, such as routers function, and how to configure IPv4 and IPv6. Through network packet captures you'll also be able to identify what's actually happening on the network. This all lends itself to securing the network from malicious attacks. Before beginning the course you should have some familiarity with how to navigate around the Windows and Linux operating systems, so I hope you'll join me on this quest to learn about computer networking with the Network Fundamentals and Protocols course at Pluralsight.
Discovering Network Topologies and Equipment Hi, and welcome to Pluralsight. I'm Dan Lachance. In this course we're going to be going through Network Fundamentals and Protocols because before we can become a network security expert we first have to be a network expert, and that means understanding network hardware and software. In this specific module we'll talk about discovering network topologies and network equipment. To start off with, when we identify network topologies we'll talk about the difference between physical versus logical topologies. Topologies really refer to how things are plugged in together, wired or wirelessly, and also how machines gain access to transmit on the network in the first place. We'll then talk about which type of network equipment to use given a situation, so when we should use things like a router, versus a wireless access point, versus a bridge, and so on.
Exploring the TCP/IP Protocol Suite Hi. I'm Dan Lachance, and welcome to this module where we'll be exploring the TCP/IP Protocol Suite. Specifically, we will start by looking at common high-level TCP/IP protocols. High-level is in reference to the OSI model, which we'll discuss a bit further. We'll then talk about how to get data on the network, and to ensure it gets transmitted to the intended target, so we'll talk about things like TCP and UDP.
Configuring IPv4 and IPv6 Welcome to this module. I'm Dan Lachance, and in this section we're going to talk about configuring IPv4 and IPv6. Even though most of the world is still using IPv4 over the internet, IPv6 is gaining traction quickly. So in this module we'll start by focusing on how to configure IPv4 addressing. Then we'll go into IPv6 addressing, and then we'll talk about subnetting and supernetting.
Applying Computer Network Defense (CND) Hi, and welcome to this module where we'll talk about applying Computer Network Defense. I'm Dan Lachance. The best security systems usually consist of layers of defense, otherwise called defense in depth, to protect against negative incidents like denied of service attacks, some kind of service interruption or even the disclosure of sensitive data. In this module we'll begin by talking about Computer Network Defense layers. Computer Network Defense is often simply referred to as CND. Then we'll talk about Secure Network Design.