Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Network From Scratch to Advanced Implementation
Introduction
Introduction (10:44)
Course Objective
Course Objective (2:44)
Network Basic
Network Basic (12:02)
IP (16:07)
Private and Public IP (16:43)
The OSI Model Part 1 (14:39)
The OSI Model Part 2 (14:10)
TCP/IP Model (2:45)
Default Gateway (7:05)
Demonstration (11:42)
Network Architecture Components (17:04)
Types of Network (5:08)
TCP Command (8:57)
Setup Your Lab
Setup Your Lab (18:18)
Client Installation (18:49)
Create more client easily (12:43)
Building a WorkGroup (Basic Network)
Build a Worgroup (Basic Network) (13:00)
Sharing Resources (13:01)
Building a Server Client Network
What is a Server Client Network ? (4:34)
Server Installation (13:00)
Server Configuration (3:40)
Active Directory 1 (19:30)
Active Directory 2 (4:07)
Users and Group (9:04)
Join the domain (7:02)
Configuring different Server role
Configure DHCP (14:13)
Configure DNS (13:33)
Configuring File Server (13:27)
Control user using Group Policy
What is Group Policy (2:29)
GPO Implementation (13:03)
Provide High Availability
What is RAID ? (3:57)
Configure RAID 1 (15:00)
Configure RAID 5 (9:58)
Configure Cluster 1 (16:40)
Configure Cluster 2 (6:51)
Routing and Switching network (CCNA)
Working with CISCO devices (11:59)
WAN (6:59)
Starting a Router (10:14)
Secure Cisco devices (9:24)
Introduction to Routing (10:51)
Cisco IOS Modes (6:44)
Dynamic Route (7:37)
Build the WAN1 (17:02)
Build the WAN2 (6:07)
Routing Update (6:18)
EIGRP (5:11)
EIGRP Implementation (16:42)
Subnet (22:00)
More Subnet Examples (6:00)
More Subnet Examples 2 (4:02)
Switching (4:23)
VLAN Configuration (15:26)
VLAN Trunk and VTP (20:11)
More about VTP (2:12)
Access Control List
Access Control List (4:39)
Standard Access Control list (8:14)
Build VOIP Networkg and Switching network
Build VOIP Network Scanrio 1 (20:21)
Build VOIP Network Scanrio 2 (18:16)
Building a Wireless Network
Building a Wireless Network (12:59)
Montitor your network
Wireshark (14:44)
Etherape (4:06)
Network Security
Network Security (1:59)
Common Network Attacks (8:58)
Sniffering (Proof of Concept) (30:13)
Man in the Middle attack (11:59)
GPO Implementation
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock