Autoplay
Autocomplete
Previous Lesson
Complete and Continue
CompTIA A+ CompTIA A 220-1001 Exam and A+ Certification Prep
About computer
1- History Of Computer (1:40)
2- FAQ about CompTIA, CompTIA A+, CompTIA A 220-1001 Exam and A+ Certification
3- What is a Computer (1:25)
4- Benefits of Using Computer (0:37)
5- Types of Computer (1:07)
Components of Computer
6- Input Processing - Output Cycle (6:27)
7- Computer Inputs (0:57)
8- What is Processing (1:18)
9- Cyper Attacks to CPU (1:04)
10- What is Storing (0:53)
11- Output (1:25)
12- Computer Components (2:54)
13- Input Devices (2:28)
Storage Devices
14- Primary and Secondary Memory (4:22)
15- RAM (1:18)
16- SRAM and DRAM (1:28)
17- ROM (1:12)
18- PROM, EPROM, EEPROM (1:04)
19- What is Flash Memory, Magnetic Storage Devices, Optical Storage Devices (2:19)
20- Network attached storage (1:40)
21- Cloud Storage (1:16)
Processing Devices
22- CPU (3:00)
23- GPU (2:46)
24- Motherboard (1:14)
25- Output Devices (0:38)
IoT & Mobile
26- What is IoT (3:24)
27- Where does IoT Exist in Our Lives (1:47)
28- How does IoT work (0:47)
29- Connection Standarts (9:06)
30- IoT Security (7:04)
31- Mobile Security Threats (8:02)
Network Fundamentals
32- Attention for Ethical Hackers
33- Content of the Network Fundamentals (1:07)
34- Basic Terms of Networking (5:36)
35- Reference Models (0:24)
36- TCP/IP (Networking) Basics (13:43)
37- OSI Reference Model vs. TCP/IP Reference Model (2:32)
38- Network Layers in Real World (7:59)
39- Layer 2 - Data Link Layer (3:50)
40- Layer 2: Ethernet - Principles, Frames & Headers (4:06)
41- Layer 2: ARP - Address Resolution Protocol (6:10)
42- Layer 2: Analysing ARP Packets (3:14)
43- Layer 2: VLANs (Virtual Local Area Networks) (4:03)
44- Layer 2: WLANs (Wireless Local Area Networks) (7:01)
45- Layer 3 - Network Layer (1:36)
46- Layer 3: IP (Internet Protocol) (2:49)
47- Layer 3: IPv4 Addressing System (1:56)
48- Layer 3: IPv4 Packet Header (2:56)
49- Layer 3: Subnetting - Classful Networks (2:35)
50- Layer 3: Subnetting Masks (2:59)
51- Layer 3: Understanding IPv4 Subnets (3:09)
52- Layer 3: IPv4 Address Shortage (1:41)
53- Layer 3: Private Networks (3:59)
54- Layer 3: Private Networks - Demonstration (3:01)
55- Layer 3: NAT (Network Address Translation) (4:30)
56- Layer 3: IPv6, Packet Header & Addressing (8:30)
57- Layer 3: DHCP - How the Mechanism Works (9:23)
58- Layer 3: ICMP (Internet Control Message Protocol) (2:02)
59- Layer 3: Traceroute (9:50)
60- Layer 4 - Transport Layer (2:39)
61- Layer 4: TCP (Transmission Control Protocol) (6:59)
62- Layer 4: TCP Header (2:27)
63- Layer 4: UDP (User Datagram Protocol) (3:56)
64- Layer 5-7 - Application Layer (0:55)
65- Layer 7: DNS (Domain Name System) (5:56)
66- Layer 7: HTTP (Hyper Text Transfer Protocol) (3:09)
67- Layer 7: HTTPS (1:56)
68- GNS3 - Graphical Network Simulator (3:30)
69- GNS3: Setting Up the First Project (7:57)
70- GNS3: Tool Components (2:56)
71- GNS3: Building the Network (15:45)
72- GNS3: Attaching VMware VMs (Including Kali) to the Network (6:31)
73- GNS3: Configuring Switch & Router (Cisco) and creating VLANs (5:13)
74- Active Network Devices: Router, Switch, Hub (4:44)
75- Wireless Access Point (WAP) (1:06)
76- Summary of Network Fundamentals (1:23)
Wi-fi Network Fundamentals
77- IEE-802.11 (3:54)
78- Basic Terminologies Concepts (4:50)
79- Wireless Operating Modes (6:11)
80- MAC Frame Structure (2:58)
81- Wireless Packet Types (5:21)
82- Wireless Encryption Protocols: WEP vs. WPA (3:58)
83- WPA 4-Way Handshake (5:45)
84- WPA2 Personal and Enterprise (3:16)
85- Wireshark: WEP and WPA (1:10)
86- Wi-Fi Protected Setup (WPS) (3:49)
Operating Systems
87- Functions Of Operating Systems (10:25)
88- Kinds of Operating System (1:47)
89- Linux Systems (5:12)
Linux Fundamentals
90- What is Linux? (1:34)
91- Distributions (1:22)
92- Pieces of Linux (2:57)
93- Shell (2:04)
94- Linux Signs: $, #, %, ~ (0:59)
96- Linux File Hierarchy (2:57)
97- Configuring Services (3:42)
98- User Management (2:38)
99- Package Management Concepts (3:25)
100- Foremost Linux Package Managers (2:32)
101- Repository (a.k.a. Repo) (0:49)
102- “apt-get” Package Manager (6:08)
103- Debian packages "dpkg" (2:26)
104- Install From Source Code (4:35)
105- System Monitoring (6:59)
106- Status of Network (1:49)
Libraries and Virtualization
107- What is a Library - 1 (4:48)
108- What is Virtualization (1:06)
109- Types of Virtualization (1:36)
110- Functions of Virtualization (1:06)
111- Security of the Virtualization (3:01)
112- Virtualization Lab Exercise - 1 (8:20)
113- Virtualization Lab Exercise - 2 (12:35)
114- What is a Library - 2 (4:21)
Programming Languages
116- Types of Programming (9:19)
Database Fundamentals
118- RDBMS(Relational Database Management System) (2:24)
119- What is SQL/Query? (2:47)
120- Insert Data To Table (10:06)
121- Update Data In A Table (5:42)
122- Delete Data and AdventureWorks (6:17)
Cloud Computing
123- Characteristics of Cloud Computing (9:19)
124- What is Cloud Computing (3:38)
125- Cloud Service Modules - 1 (7:31)
126- Cloud Service Modules - 2 (6:26)
Security
127- What is Security (2:22)
128- Privacy-Integrity-Availability (3:15)
129- Encryption and Access Control (2:54)
130- A Rule (Authentication, Authorization and Accounting) (3:52)
132- What is Attack? What are the Stages? (3:19)
Social Engineering
133- Terminologies Part 1 (5:19)
134- Terminologies Part 2 (6:08)
135- Sending Fake Emails - Phishing (1:11)
136- Vishing - Voice Phishing (3:40)
27- Where does IoT Exist in Our Lives
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock