Data centre part 22
In this video, I discuss
Subnetting Basics
Reduced Network Traffic
Optimized Network Performance
Simplified Management
Facilitated Spanning of Large Geographical Distances
IP Subnet-Zero
How to Create Subnets
Subnet Masks
Classless Inter-Domain Routing (CIDR)
Subnetting Class C Addresses
Subnetting a Class C Address
2
views
Comptia security part 39
In this video, I discuss
Physical Security and Authentication Models
Authentication
Authorization
Something the user knows
Something the user has
Something the user does
Something the user is
Somewhere the user is
Physical Security
General Building and Server Room Security
Door Access
Biometric Readers
False acceptance
False rejection
11
views
Data centre part 21
In this video, I discuss
IPv6 Addressing
Why Do We Need IPv6?
Benefits and Uses of IPv6
IPv6 Addressing and Expressions
Shortened Expression
Address Types
Unicast Packets
Global Unicast Addresses
Link-Local Addresses
Unique Local Addresses (RFC 4193)
Multicast
Anycast
Summary
11
views
Data centre part 20
In this video, I discuss
Class A Valid Host IDs
Class B Addresses
Class B Valid Host IDs
Class C Addresses
Class C Valid Host IDs
Private IP Addresses (RFC 1918)
IPv4 Address Types
Loopback
Layer 2 Broadcasts
Broadcasts (Layer 3)
Unicast
Multicast
Layer 2 Broadcasts
Layer 3 Broadcasts
Unicast Address
Multicast Address
4
views
Data centre part 22
In this video, I discuss
Subnetting Basics
Reduced Network Traffic
Optimized Network Performance
Simplified Management
Facilitated Spanning of Large Geographical Distances
IP Subnet-Zero
How to Create Subnets
Subnet Masks
Classless Inter-Domain Routing (CIDR)
Subnetting Class C Addresses
Subnetting a Class C Address
4
views
Comptia security + part 38
In this video, I discuss
Unified Threat Management
Chapter Summary
4
views
Comptia security + part 40
In this video, I discuss
Authentication Models and Components
Authentication Models
Localized Authentication Technologies
802.1X and EAP
Three components to an 802.1X connection
Initialization
Initiation
Negotiation
Authentication
EAP authentication
EAP-MD5
EAP-TLS
EAP-TTLS
EAP-FAST
PEAP
LDAP
Kerberos and Mutual Authentication
10
views
Comptia security + part 37
In this video, I discuss
Honeypots and Honeynets
Data Loss Prevention (DLP)
NIDS Versus NIPS
4
views
Data centre part 19
In this video, I discuss
IPV4 Addressing
IP Terminology
Bit
Byte
Octet
Network Address
Broadcast Address
Hierarchical IP Addressing Scheme
Network Addressing
Network Address Range: Class A
Network Address Range: Class B
Network Address Range: Class C
Network Address Ranges: Classes D and E
Network Addresses: Special Purpose
Class A Addresses
3
views
Comptia security + part 36
In this video, I discuss
Packet filtering
NAT filtering
Application-level gateway (ALG)
Circuit-level gateway
Proxy servers
IP proxy
Caching proxy
4
views
Data centre part 18
In this video, I discuss
Internet Control Message Protocol (ICMP)
Buffer/Source Quence
Hops/Time Exceeded
Ping
Traceroute
Address Resolution Protocol (ARP)
Reverse Address Resolution Protocol (RARP)
Proxy Address Resolution Protocol (Proxy ARP)
Summary
4
views
Comptia security + part 35
In this video, I discuss
ARP Poisoning
Chapter Summary
Network Perimeter Security
Firewalls and Network Security
Firewalls
10
views
Data centre part 17
In this video, I discuss
Port Numbers
TCP Session: Source Port
TCP Session: Destination Port
TCP Session: Syn Packet Acknowledgement
Internet Layer Protocols
Internet Protocol (IP)
Header Length
Priority and Type of Service
Total Length
Identification
Flags
Fragment Offset
Time to Live
Protocol
Header Checksum
Source IP Address
Destination IP Address
Options
Data
14
views
Comptia security + part 34
In this video, I discuss
Sinkholes and Blackholes
Spoofing
Session Hijacking
Session theft
TCP/IP hijacking
Blind hijacking
Clickjacking
Man-in-the-middle (MITM)
Man-in-the-browser (MITB)
Watering hole attack
Replay
Null Sessions
Transitive Access and Client-Side Attacks
DNS Poising and Other DNS Attacks
3
views
Data centre part 16
In this video, I discuss
DHCP Conflicts
Automatic Private IP Addressing (APIPA)
The Host-to-Host Layer Protocols
Transmission Control Protocol (TCP)
TCP Segment Format
Source Port
Destination Port
Sequence Number
Header Length
Reserved
Code Bits/Flags
Window
Checksum
Urgent
Options
Data
User Datagram Protocol (UDP)
UDP Segment Format
Source Port
Destination Port
Length
Checksum
Data
2
views
Comptia security + part 33
In this video, I discuss
Malicious Attacks
DoS (Denial of service attacks)
Flood attack
Ping flood
Smurf attack
Fraggle
SYN attack
Xmas attack
Ping of Death
Teardrop attack
Permanent DoS attack
Fork bomb
DDoS (Distributed denial-of-service)
6
views
Data centre part 15
In this video, I discuss
A brief history of TCP/IP
The Process/Application Layer Protocols
Telnet
File Transfer Protocol (FTP)
Trivial File Transfer Protocol (TFTP)
Network File System (NFS)
Simple Mail Transfer Protocol (SMTP)
Post Office Protocol (POP)
Simple Network Management Protocol (SMTP)
Secure Shell (SSH)
Hypertext Transfer Protocol (HTTP)
Hypertext Transfer Protocol Secure (HTTPS)
Network Time Protocol (NTP)
Domain Name Service (DNS)
Dynamic Host Configuration Protocol (DHCP)/Bootstrap Protocol (BootP)
4
views
Comptia security + part 32
In this video, I discuss
Networking Protocols and Threats
Ports and Protocols
Port Ranges, Inbound Versus Outbound, and Common Ports
Inbound ports
Outbound ports
Within the operating system GUI
Within the CLI
Within a firewall
3
views
Data centre part 14
In this video, I discuss
Ethernet Cabling
Straight-Through Cable
Crossover Cable
Rolled Cable
Data Encapsulation
Summary
4
views
Comptia security + part 31
In this video, I discuss
Server Defense
File Servers
Network Controllers
E-mail Servers
Web Servers
FTP Server
Chapter Summary
2
views
Data centre part 13
In this video, I discuss
Ethernet at the Physical Layer
10Base2
10Base5
10BaseT
100Base-TX (IEEE 802.3u)
100Base-FX (IEEE 802.3u)
1000Base-CX (IEEE 802.3z)
1000Base-T (IEEE 802.3ab)
1000Base-SX (IEEE 802.3z)
1000Base-LX (IEEE 802.3z)
1000Base-ZX (Cisco standard)
10GBase-T
10GBase-Short Range (SR)
10GBase-Long Range (LR)
10GBase-Extended Range (ER)
10GBase-Short Wavelength (SW)
10GBase-Long Wavelength (LW)
10GBase-Extra Long Wavelength (EW)
13
views
Comptia security + part 30
In this video, I discuss
Cloud Computing
Software as a service (SaaS)
Infrastructure as a service (IaaS)
Platform as a service (PaaS)
Security as a service (SECaaS)
Public cloud
Private cloud
Hybrid cloud
Community cloud
Cloud Security
Complex passwords
Powerful authentication methods
Strong cloud data access policies
Encryption
Standardization of programming
Protection of all the data
6
views
Comptia security + part 29
In this video, I discuss
Subnetting
Virtual Local Area Network (VLAN)
Telephony
Modems
PBX Equipment
VoIP
Cloud Security and Server Defense
8
views
Data centre part 12
In this video, I discuss
Source Address (SA)
Length or Type
Data
Frame Check Sequence (FCS)
802.2 and SNAP
802.2 Frame
SNAP Frame
9
views