Lesson 01 - Introduction to Computer Networking
Lesson 02 - Responsibilities of a network engineer
Lesson 03 - What is a Computer Network?
Lesson 04 - Why we need computer networks?
Lesson 05 - Different types devices used to create a computer network
Lesson 06 - Client Operating Systems and Network Operating Systems (NOS)
Lesson 07 - Common Network Application Software
Lesson 08 - Local Area Networks (LAN) and Wide Area Networks (WAN)
Lesson 09 - Campus Area Networks (CAN) and Metropolitan Area Network (MAN)
Lesson 12 - Internetworks, Internet, Intranet and Extranet
Lesson 13 - What is a Network Protocol
Lesson 14 - Difference between Proprietary and Standard Protocols
Lesson 15 - What are RFCs (Request for Comments)
Lesson 16 - Organizations which control Internet, Network Protocols and Standards
Lesson 17 - What is network topology
Lesson 18 - Difference between physical topology and logical topology
Lesson 19 - Network Topologies - Bus Topology
Lesson 20 - Network Topologies - Star Topology
Lesson 21 - Network Topologies - Mesh, Ring and Hybrid Topologies
Lesson 22 - Network Topologies - Partial-Mesh Topology
Lesson 23 - Network Topologies - Full-Mesh Topology
Lesson 24 - Advantages and disadvantages of full-mesh topology
Lesson 25 - Network Topologies - Ring Topology
Lesson 26 - Network Topologies - Dual Ring Topology
Lesson 27 - Network Topologies - Hybrid Topology
Lesson 28 - Network Topologies - Tree Topology
Lesson 29 - Point-to-point Topology and Point-to-multipoint Topology
Lesson 30 - What are wireless networks? Advantages and disadvantages of wireless networks.
Lesson 31 - Ad hoc Wireless Topology
Lesson 32 - Infrastructure Wireless Topology
Lesson 33 - Wireless Mesh Topology
Lesson 34 - What is SOHO network
Lesson 35 - Differences between SOHO and Enterprise network
Lesson 36 - Network Infrastructure Devices and Icons
Lesson 37 - Network Infrastructure Devices - What is a Hub?
Lesson 38 - Network Infrastructure Devices - What are Bridges and Switches?
Lesson 39 - Network Infrastructure Devices - What is a Router?
Lesson 40 - Network Infrastructure devices - What is a Firewall
Lesson 41 - Main office (Head Office) and Branch Office Networks
Lesson 42 - Site-to-Site Network Topologies - Hub and Spoke Toplogy
Lesson 43 - Site-to-Site Network Topologies - Partial-Mesh Toplogy
Lesson 44 - Site-to-Site Network Topologies - Full Mesh Topology
Lesson 45 - What is NIC (Network Interface Card)
Lesson 46 - Common Network Cable types
Lesson 47 - Differences between STP and UTP twisted pair cables
Lesson 48 - Twisted pair cable bandwidth and frequency range
Lesson 49 - Different types of shields used in STP (Shielded Twisted Pair Cable)
Lesson 50 - TIA/EIA 568A and TIA/EIA-568B standards
Lesson 51 - Straight-Through and Cross-Over cables
Lesson 52 - Gigabit Ethernet Cable Pinout, EIA/TIA 568A and EIA/TIA 568B standard
Lesson 53 - What is Auto-MDIX feature in ethernet switches
Lesson 54 - Difference between Baseband and Broadband
Lesson 55 - Full-duplex and half-duplex Ethernet
Lesson 56 - Network Access Methods - CSMA/CD, CSMA/CA and Token Passing
Lesson 58 - IEEE (Institute of Electrical and Electronics Engineers)
Lesson 59 - IEEE 802 Standards
Lesson 60 - IEEE 802.11 Standards
Lesson 61 - LAN Technologies - Ethernet
Lesson 62 - Ethernet Media Standards
Lesson 63 - 100Base-TX Ethernet Media Standard
Lesson 64 - 100Base-FX Ethernet Media Standard
Lesson 65 - 4D-PAM5 encoding in Gigabit Ethernet
Lesson 66 - 1000Base-T Ethernet Media Standard
Lesson 67 - 1000Base-SX Ethernet Media Standard
Lesson 68 - 1000Base-LX Ethernet Media Standard
Lesson 69 - 10GBase-T 10 Gigabit Ethernet Media Standard
Lesson 70 - 10GBase-SR 10 Gigabit Optical Fiber Ethernet Media Standard
Lesson 71 - Meaning of 10/100/1000 Ethernet
Lesson 72 - Twisted pair Cable categories for 1 Gigbit and 10 Gigabit networks
Lesson 73 - Broadband over Power Line (IEEE 1901-2010 standard)
Lesson 74 - What is Power over Ethernet (PoE)
Lesson 75 - What is PoE (Power over Ethernet) Switch
Lesson 76 - LAN Technologies - Token Ring
Lesson 77 - Advantages and disadvantages of Fiber optic cable
Lesson 78 - How fiber optics work
Lesson 79 - Structure of fiber optic cable (FOC)
Lesson 80 - Single Mode Fiber Optic Cable (SMF fiber cable)
Lesson 81 - Multimode Fiber Optic Cable (MMF fiber cable)
Lesson 82 - Different types of fiber optic cables
Lesson 83 - Fiber optic transceivers
Lesson 84 - Fiber optic connectors
Lesson 85 - LAN Technologies - Fibre Distributed Data Interface (FDDI)
Lesson 2 - What is PDU (Protocol Data Unit)
Lesson 3 - Seven Layers of OSI Model.
Lesson 5 - Name of data packets at different layers of OSI model
Lesson 6 - Why OSI model failed
Lesson 7 - Four layered TCP/IP model
Lesson 8 - Five layered TCP/IP model
Lesson 9 - Comparison between four layered TCP/IP model and five layered TCP/IP model
Lesson 10 - Protocols/Standards at various layers of TCP/IP model
Lesson 11 - Comparison between TCP/IP and OSI models
Lesson 13 - Name of data packets at different layers of TCP/IP model
Lesson 14 - TCP/IP Encapsulation and Decapsulation
Lesson 15 - Physical Layer (Layer 1)
Lesson 16 - Datalink Layer (Layer 2)
Lesson 17 - Ethernet Frame Format
Lesson 18 - Binary Decimal and Hexadecimal numbers and conversions
Lesson 19 - How to use calculator for binary, decimal and hexadecimal number conversions
Lesson 20 - Media Access Control (MAC) addresses
Lesson 21 - Broadcast MAC Address - ff:ff:ff:ff:ff:ff
Lesson 22 - IPv4 Multicast MAC addresses
Lesson 23 - Network Layer (Layer 3)
Lesson 24 - IPv4 Protocol, IPv4 header and fields of IPv4 header
Lesson 26 - What is subnet mask
Lesson 27 - What is network address
Lesson 28 - IPv4 Limited broadcast address
Lesson 29 - IPv4 Directed broadcast address
Lesson 30 - What is limited broadcast in IPv4 and how limited broadcast works
Lesson 31 - What is directed broadcast in IPv4 and how directed broadcast works
Lesson 32 - What is default gateway
Lesson 33 - What are Private IPv4 Addresses (RFC 1918 addresses)
Lesson 34 - Automatic Private IPv4 addresses (APIPA)
Lesson 35 - What is loopback address
Lesson 37 - Class A networks and Class A IP addresses
Lesson 38 - Class B networks and Class B IP addresses
Lesson 39 - Class C networks and Class C IP addresses
Lesson 40 - Class D multicast addresses
Lesson 41 - Link-local multicast addresses
Lesson 42 - Internetwork control block multicast addresses
Lesson 43 - Source-Specific Multicast addresses
Lesson 44 - GLOP Multicast addresses
Lesson 45 - Administratively scoped multicast address block
Lesson 47 - What is multicast group
Lesson 48 - Multicast IPv4 address to MAC address mapping
Lesson 49 - Comparison of multicast with unicast and broadcast
Lesson 50 - Advantages and disadvantages of multicast
Lesson 51 - How IPv4 multicast works
Lesson 52 - IPv4 address reservations
Lesson 53 - Class C Subnetting Tutorial - Part 1
Lesson 54 - Class C Subnetting Tutorial - Part 2
Lesson 55 - Class B Subnetting Tutorial - Part 1
Lesson 56 - Class B Subnetting Tutorial - Part 2
Lesson 57 - Class A Subnetting Tutorial - Part 1
Lesson 58 - Class A Subnetting Tutorial - Part 2
Lesson 59 - Variable Length Subnet Masking (VLSM)
Lesson 61 - How to find out the Network Address and Broadcast Address of a subnetted IPv4 address
Lesson 62 - Address Resolution Protocol (ARP)
Lesson 63 - What is Gratuitous ARP
Lesson 64 - Internet Control Message Protocol (ICMP)
Lesson 65 - ICMP message types
Lesson 66 - ICMP Echo Request and Echo Reply messages
Lesson 67 - ICMP Destination Unreachable messages
Lesson 68 - ICMP Source Quench messages
Lesson 69 - ICMP Redirect messages
Lesson 70 - ICMP Router Advertisement messages
Lesson 71 - ICMP Router Solicitation messages
Lesson 72 - ICMP Time Exceeded messages
Lesson 73 - ICMP Parameter Problem messages
Lesson 74 - ICMP Timestamp Request and Timestamp Reply messages
Lesson 75 - ICMP Photuris messages
Lesson 77 - Ping commmand options
Lesson 78 - Traceroute/tracert command tool
Lesson 79 - Tracert commmand options
Lesson 80 - Pathping command tool
Lesson 81 - Pathping commmand options
Lesson 82 - Difference between ping, traceroute/tracert and pathping
Lesson 83 - IGMP (Internet Group Management Protocol)
Lesson 84 - IGMP message types
Lesson 85 - IGMP DR and Querier
Lesson 86 - IGMPv1 - Internet Group Management Protocol Version 1
Lesson 87 - IGMPv2 - Internet Group Management Protocol Version 2
Lesson 88 - What are SSM (Source-specific Multicast) and ASM (Any-source Multicast)
Lesson 89 - IGMPv3 - Internet Group Management Protocol Version 3
Lesson 90 - Comparison between IGMPv1, IGMPv2 and IGMPv3
Lesson 91 - Transport Layer (Layer 4)
Lesson 92 - Transmission Control Protocol (TCP)
Lesson 93 - Transmission Control Protocol (TCP) Segment Header
Lesson 94 - What port numbers, socket numbers, well-known ports and dynamically assigned ports
Lesson 95 - Multiplexing and Demultiplexing using port numbers
Lesson 96 - TCP Three-way Handshake
Lesson 97 - Transmission Control Block (TCB)
Lesson 98 - TCP Sliding Window
Lesson 99 - TCP Connection Termination
Lesson 100 - User Datagram Protocol (UDP)
Lesson 101 - Differences between TCP and UDP
Lesson 102 - Application Layer (Layer 5)
Lesson 103 - What is NAT (Network Address Translation)
Lesson 104 - What is Static NAT
Lesson 105 - What is Dynamic NAT
Lesson 106 - What is PAT - Port Address Translation (NAT Overload)
Lesson 107 - Hypertext Transfer Protocol (HTTP) - What is HTTP?
Lesson 108 - Hypertext Transfer Protocol (HTTP) - Request and Response
Lesson 109 - Simple Mail Transport Protocol (SMTP) - How SMTP Works?
Lesson 110 - Simple Mail Transport Protocol (SMTP) Client - Server Communication
Lesson 111 - SMTP Status Codes and Extended Simple Mail Transfer Protocol (ESMTP)
Lesson 112 - Dynamic Host Configuration Protocol (DHCP) - How DHCP Works?
Lesson 113 - Dynamic Host Configuration Protocol (DHCP) - Message Format
Lesson 114 - Dynamic Host Configuration Protocol (DHCP) Messages
Lesson 115 - Dynamic Host Configuration Protocol (DHCP) Message Options
Lesson 116 - What is DNS - Why we need DNS (Domain Name System)
Lesson 117 - Advantages of Distributed DNS Infrastructure Architecture
Lesson 118 - Important RFCs Related with DNS (Domain Name System)
Lesson 119 - DNS Client (DNS Resolver) and DNS Server (Name Server)
Lesson 120 - DNS Namespace Hierarchy
Lesson 121 - Public DNS Namespace and Private DNS Namespace
Lesson 122 - Fully Qualified Domain Name (FQDN) and Partially Qualified Domain Name (PQDN)
Lesson 123 - What is DNS Resource Record
Lesson 124 - Authoritative DNS Server and Recursive DNS Server
Lesson 126 - Primary DNS Server and Secondary DNS Server
Lesson 127 - What is a DNS Query, How DNS Query Works
Lesson 128 - Recursive and Iterative DNS Queries
Lesson 129 - What is Inverse (Reverse) DNS Query
Lesson 130 - What is VPN (Virtual Private Network)
Lesson 131 - What is IPSec and Why we need IPSec
Lesson 132 - Important Technical Terms Related with IPSec
Lesson 133 - What are the terms Encryption, Decryption, Clear-Text and Cipher-Text
Lesson 134 - What are the terms Symmetric Encryption and Assymetric Encryption
Lesson 135 - Important Symmetric and Assymmetric Encryption Algorithms
Lesson 136 - What are Hash values? Important Hash value Algorithms
Lesson 137 - How Hash Values can be used to determine Integrity of Data
Lesson 138 - What is HMAC (Hashed Message Authentication Code)
Lesson 139 - What is Diffie-Hellman Key Exchange
Lesson 140 - What is Diffie-Hellman Group
Lesson 141 - Main Components of IPSec - IKE, ESP and AH
Lesson 142 - IPSec VPN Modes - Tunnel Mode and Transport Mode
Lesson 143 - Security Association and Security Parameter Index
Lesson 144 - IKEv1 Main Mode, Aggressive Mode and Quick mode Message Exchanges
Lesson 145 - What is Perfect Forward Secrecy (PFS)
Lesson 146 - IKEv2 Phase 1 (IKE SA) and Phase 2 (Child SA) Message Exchanges
Lesson 147 - What is NAT-Traversal (Network Address Translation - Traversal)
Lesson 149 - How IEEE 802.1X (dot1x) Port Based Authentication works
Lesson 01 - Limitations of IPv4
Lesson 02 - IPv6 History and related RFCs
Lesson 04 - Differences Between IPv4 and IPv6
Lesson 05 - Unicast, Multicast and Anycast - Types of network communication in IPv6
Lesson 06 - IPv6 Datagram Header Format
Lesson 07 - Comparison between IPv4 Header and IPv6 Header
Lesson 08 - Introduction to IPv6 Addressing
Lesson 10 - IPv6 Address formats
Lesson 11 - How to Simplify Shorten and Compress IPv6 Addresses
Lesson 12 - Types of IPv6 Addresses
Lesson 13 - Global Unicast IPv6 addresses
Lesson 14 - Different methods to assign a Global Unicast IPv6 address to an interface
Lesson 15 - What are IEEE EUI-64 based Global Unicast IPv6 addresses
Lesson 16 - How to configure Static Global Unicast IPv6 Address in a Cisco Router Interface
Lesson 17 - How to configure EUI-64 based Global Unicast IPv6 Address in a Cisco Router Interface
Lesson 18 - Link Local IPv6 Addresses, How Link Local IPv6 addresses are generated
Lesson 19 - Unique Local IPv6 Addresses
Lesson 20 - Multicast IPv6 Addresses
Lesson 21 - Anycast IPv6 Addresses
Lesson 22 - IPv6 Loopback Address and IPv6 Unspecified address
Lesson 23 - IPv6 Special Addresses and IPv6 well known prefixes
Lesson 24 - ICMPv6, Functions of ICMPv6, ICMPv6 Header, Types of ICMPv6 messages
Lesson 26 - Solicited-Node IPv6 Multicast Address
Lesson 01 - Introduction to Cisco Certified Network Associate (CCNA) Certification
Lesson 02 - Different Types of Router Memory
Lesson 04 - How to connect and access a router or switch using console connection
Lesson 05 - How to connect to router or switch console if serial port is not available in computer
Lesson 07 - How to use PuTTY Terminal Emulator to configure or monitor a Cisco Router or Switch
Lesson 08 - Cisco's Three-tier Hierarchical Network Model
Lesson 09 - Benefits of Segmenting a network using a Router
Lesson 10 - Unicast, Multicast, Broadcast, What is Unicast, What is Multicast and What is Broadcast
Lesson 11 - What are Collision Domain and Broadcast Domain
Lesson 12 - Cisco Router Boot Sequence
Lesson 13 - What is Trivial File Transfer Protocol (TFTP)
Lesson 14 - How to install Solarwinds Trivial File Transfer Protocol (TFTP) Server
Lesson 16 - Cisco Router Configuration Files
Lesson 17 - Naming Convention of Cisco IOS Image Files
Lesson 19 - How to Upgrade or Install IOS from Trivial File Transfer Protocol (TFTP) Server
Lesson 20 - Cisco IOS Command Line modes
Lesson 21 - How to configure passwords to secure Cisco Router
Lesson 22 - Basic Cisco Router Configuration Commands
Lesson 23 - Cisco Router Show Commands
Lesson 24 - Important Key Combinations of Cisco IOS Command Line Interface (CLI)
Lesson 25 - Router interface naming convention
Lesson 26 - Cisco Router interface configuration commands
Lesson 27 - Different types of interfaces in a Cisco Router
Lesson 29 - What is loopback interface in a Cisco Router
Lesson 30 - What is null interface in a Cisco Router
Lesson 31 - How to configure Router Serial Interfaces
Lesson 32 - What is Cisco Discovery Protocol (CDP)
Lesson 33 - Important Cisco Discovery Protocol (CDP) IOS commands
Lesson 34 - What are Routing and Switching - Difference between Routing and Switching
Lesson 35 - Types of Routes - Static Routes and Dynamic Routes
Lesson 36 - What is the difference between Routing Protocols and Routed Protocols
Lesson 37 - Difference Between Routable Protocol and Non-Routable Protocol
Lesson 38 - What is Autonomous System and Autonomous System Number
Lesson 39 - What is the difference between IGP and EGP
Lesson 40 - What is Administrative Distance
Lesson 41 - Introduction to Static Routes and Default Routes
Lesson 42 - How to configure Static Routes and Default Routes
Lesson 43 - What is Dynamic Routing and different types of Dynamic Routing
Lesson 44 - What is Routing Metric Value
Lesson 45 - What is Convergence of Routing Tables
Lesson 46 - Introduction to Distance Vector Routing Protocols
Lesson 47 - Introduction to Routing Information Protocol (RIP)
Lesson 48 - Difference between RIPv1 and RIPv2
Lesson 49 - How to configure Routing Information Protocol (RIP)
Lesson 50 - RIP Metric (Hop Count) and Hop Count Calculation
Lesson 51 - Auto Summarization in RIP
Lesson 52 - RIP Authentication, RIPv2 Authentication, RIP Authentication Keychain Configuration
Lesson 53 - Introduction to Interior Gateway Routing Protocol (IGRP)
Lesson 54 - How to configure Interior Gateway Routing Protocol (IGRP)
Lesson 55 - What is Routing Loop and how to avoid Routing Loop
Lesson 56 - Introduction to Link State Routing Protocols
Lesson 57 - Introduction to Open Shortest Path First (OSPF) Protocol
Lesson 58 - How to configure Open Shortest Path First (OSPF)
Lesson 59 - What is OSPF Metric value Cost and OSPF default Cost Reference Bandwidth
Lesson 61 - What is OSPF Area, OSPF Hierarchical Network Design, and Advantages of OSPF Areas
Lesson 62 - Introduction to Hybrid Routing Protocols
Lesson 63 - Introduction to Enhanced Interior Gateway Routing Protocol (EIGRP)
Lesson 64 - How to configure Enhanced Interior Gateway Routing Protocol (EIGRP)
Lesson 65 - EIGRP Metric Calculation Formula with example
Lesson 66 - Auto summarization in EIGRP
Lesson 67 - Introduction to Access Control Lists (ACL)
Lesson 68 - Standard Access Control Lists (ACLs)
Lesson 69 - Where should a Standard Access Control List (ACL) be placed
Lesson 70 - Access Control List (ACL) - Wildcard Masks
Lesson 71 - How to create and configure Standard Access Control Lists (ACLs)
Lesson 72 - Extended Access Control Lists (ACLs)
Lesson 73 - Where should an Extended Access Control List (ACL) be placed
Lesson 74 - Extended Access Control List (ACL) - Operators
Lesson 75 - Extended Access Control List (ACL) - TCP and UDP port numbers and names
Lesson 76 - Extended Access Control List (ACL)- established Keyword
Lesson 77 - How to create and configure Extended Access Control Lists (ACLs)
Lesson 78 - How to create and configure Access Control Lists (ACLs) for vty lines (telnet and ssh)
Lesson 79 - Named Access Control Lists (ACLs)
Lesson 80 - How to create and configure Standard Named Access Control Lists (ACLs)
Lesson 81 - How to create and configure Extended Named Access Control List (ACL)
Lesson 82 - How to edit a Named Access Control List (ACL) on router
Lesson 83 - What is NAT (Network Address Translation)
Lesson 84 - What are the Advantages and Disadvantages of NAT (Network Address Translation)
Lesson 85 - Different types of NAT - Static NAT, Dynamic NAT and PAT
Lesson 86 - NAT Address types - Inside Local, Inside Global, Outside Local, Outside Global
Lesson 87 - How to configure static NAT in a Cisco Router
Lesson 88 - How to configure dynamic NAT in a Cisco Router
Lesson 89 - How to configure PAT (Port Address Translation or NAT overload) in a Cisco Router
Lesson 90 - What is GRE (Generic Routing Encapsulation)
Lesson 91 - How to Configure Generic Routing Encapsulation (GRE) Tunnel in Cisco IOS Router
Lesson 92 - Introduction to Network Switches
Lesson 93 - Difference between Network Switches and Bridges
Lesson 94 - Methods of Switching
Lesson 95 - Difference between Half-duplex and Full-duplex Switching
Lesson 96 - Functions of a Network Switch
Lesson 97 - What is switch management VLAN and how to configure Management VLAN
Lesson 98 - Basic Cisco Switch Configuration Commands
Lesson 99 - What is Broadcast Storm
Lesson 100 - What is Layer 2 Switching loop
Lesson 101 - What is Spanning Tree Protocol (STP)
Lesson 102 - What is Bridge Protocol Data Unit (BPDU) frame
Lesson 103 - Bridge Protocol Data Unit (BPDU) Frame Format
Lesson 104 - What are Spanning Tree Bridge Priority and Bridge ID values
Lesson 105 - What is a Root Bridge (Root Switch)
Lesson 106 - What is a Root Port
Lesson 107 - Spanning Tree Path Cost Value and How is Spanning Tree Path Cost Value Calculated
Lesson 108 - Spanning Tree Port Priority and Port ID Values
Lesson 109 - How to change Spanning Tree Bridge Root Priority value and What is Extended System ID
Lesson 110 - How to configure Spanning Tree Protocol Root Primary and Root Secondary
Lesson 111 - How to change Spanning Tree Port Priority Value
Lesson 112 - How Spanning Tree Protocol (STP) select Root Port
Lesson 113 - What is a Designated Port
Lesson 114 - How Spanning Tree Protocol (STP) select Designated Port
Lesson 115- Difference between Root Port and Designated Port
Lesson 116 - Spanning Tree Port States
Lesson 117 - How BPDU is generated and How BPDU works
Lesson 118 - Important Spanning Tree Protocol (STP) Timers and their default values
Lesson 120 - Topology Changes in Spanning Tree Protocol (STP)
Lesson 121 - Spanning Tree Protocol (STP) Convergence
Lesson 122 - Where to place the Spanning Tree Protocol Root Switch (Root Bridge)
Lesson 123 - Spanning Tree Protocol (STP) UplinkFast, Backbone Fast and Portfast
Lesson 124 - What is Spanning Tree Protocol (STP) Uplink Fast
Lesson 125 - What is Spanning Tree Protocol (STP) Backbone Fast
Lesson 126 - What is Spanning Tree Protocol (STP) PortFast
Lesson 127 - How to configure and verify Spanning Tree Protocol (STP) PortFast
Lesson 128 - How to enable or disable Spanning Tree Protocol (STP)
Lesson 129 - What is Rapid Spanning Tree Protocol (RSTP)
Lesson 130 - Difference between Spanning Tree Protocol (STP) and Rapid Spanning Tree Protocol (RSTP)
Lesson 131 - Per-VLAN Spanning Tree (PVST) and Per-VLAN Spanning Tree Plus (PVST+)
Lesson 133 - EtherChannel PAgP and LACP modes
Lesson 134 - How to configure EtherChannel Port Aggregation Protocol (PAgP) in Cisco Switches
Lesson 136 - Manual EtherChannel Configuration in Cisco Switches Using Channel mode "on"
Lesson 137 - What is Virtual Local Area Network (VLAN)
Lesson 138 - Advantages of VLAN
Lesson 139 - VLAN Membership Types
Lesson 140 - How to create and name static VLAN
Lesson 141 - How to view VLAN information using "show vlan" command
Lesson 142 - Types of VLAN connection links - Trunk Links and Access Links
Lesson 143 - VLAN Frame Tagging
Lesson 144 - Inter-Switch Link (ISL) VLAN Tagging
Lesson 145 - IEEE 802.1Q VLAN Tagging
Lesson 146 - What is Native VLAN
Lesson 147 - How to configure VLAN trunk link and native VLAN
Lesson 148 - How to configure and assign a switch access port to a VLAN
Lesson 149 - What is VLAN Trunking Protocol (VTP)
Lesson 150 - What is VLAN Trunking Protocol (VTP) Domain
Lesson 151 - VLAN Trunking Protocol (VTP) Modes
Lesson 152 - VLAN Trunking Protocol (VTP) Advertisement Messages
Lesson 153 - How to configure VLAN Trunking Protocol (VTP)
Lesson 154 - How to view VLAN Trunking Protocol (VTP) information using "show vtp status" command
Lesson 155 - What is VLAN Trunking Protocol (VTP) Pruning
Lesson 156 - What is DTP (Dynamic Trunking Protocol)
Lesson 157 - Difference Between DTP "dynamic desirable" and "dynamic auto" Modes
Lesson 158 - How to configure DTP (Dynamic Trunking Protocol) Modes
Lesson 159 - Introduction to IPv6 and IPv6 Addresses
Lesson 160 - Introduction to IPv6 Routing and IPv6 Routing Protocols
Lesson 161 - How to configure IPv6 Static Routes in Cisco Routers
Lesson 162 - Introduction to RIPng (RIP Next Generation), RIP for IPv6
Lesson 163 - How to configure RIPng (RIP for IPv6) Routing Protocol in Cisco Routers
Lesson 164 - Differences between OSPFv2 and OSPFv3
Lesson 165 - How to configure OSPFv3 IPv6 Routing in Cisco Routers
Lesson 01 - Introduction to Information Security
Lesson 03 - Kerberos Authentication
Lesson 04 - Challenge Handshake Authentication Protocol (CHAP) Authentication
Lesson 05 - Biometric Authentication
Lesson 06 - Token Authentication
Lesson 07 - Multi-Factor Authentication
Lesson 09 - Discretionary Access Control (DAC)
Lesson 10 - Mandatory Access Control (MAC)
Lesson 11 - Role-based Access Control (RBAC)
Lesson 13 - Introduction to Auditing in Windows 2003
Lesson 14 - Types of Network Attacks
Lesson 15 - Types of Network Attacks - Denial of Service (DoS) attack
Lesson 16 - How to minimize the Denial of Service (DoS) attack impact
Lesson 17 - Types of Network Attacks - Distributed Denial of Service (DDoS) attack
Lesson 18 - Types of Network Attacks - SYN attack
Lesson 19 - Types of Network Attacks - Sniffer Attack
Lesson 20 - Types of Network Attacks - Man-In-The-Middle attack
Lesson 21 - Types of Network Attacks - IP Address Spoofing Attack
Lesson 22 - Types of Network Attacks - ARP (Address Resolution Protocol) Spoofing Attacks
Lesson 23 - Types of Network Attacks - DNS (Domain Name System) Spoofing Attacks
Lesson 24 - Types of Network Attacks - Phishing and Pharming Spoofing attacks
Lesson 25 - Types of Network Attacks - Backdoor Attacks
Lesson 26 - Types of Network Attacks - Password Guessing Attacks
Lesson 27 - Types of Network attacks - SQL Injection Attacks
Lesson 28 - Defense against Network Attack
Lesson 30 - Types of Malwares - Adwares, Toolbars and Hijackers
Lesson 31 - Types of Malwares - Keyloggers
Lesson 32 - Types of Malwares - Computer Viruses
Lesson 33 - Types of Computer Viruses
Lesson 34 - Types of Malwares - Worms
Lesson 35 - Types of Malwares - Logic Bombs
Lesson 36 - Types of Malwares - Trojan Horses
Lesson 37 - Types of Malwares - Rootkits
Lesson 01 - Introduction to Infrastructure Security
Lesson 05 - Bridges and Switches
Lesson 07 - Remote Access Services (RAS)
Lesson 08 - Virtual Private Networks (VPN)
Lesson 09 - Intrusion Detection Systems (IDS)Lesson 10 - Difference between Firewall and Intrusion Detection System
Lesson 11 - Types of Intrusion Detection Systems
Lesson 12 - Leading Intrusion Detection Systems (IDS) Products
Lesson 14 - Types of Honeypots - Low Interaction Honeypots and High Interaction Honeypots
Lesson 15 - Leading Honeypot Products
Lesson 16 - Honeypot Clients (HoneyClients)
Lesson 17 - Introduction to Network Protocol Analyzers (Sniffers)
Lesson 18 - How Network Protocol Analyzers (Sniffers) work?
Lesson 19 - Leading Network Protocol Analyzer (Sniffer) products
Lesson 20 - How to detect Network Protocol Analyzer (Sniffers) in your network
Lesson 21 - Network Access Control
Lesson 22 - DMZ (Demilitarized Zone)
Lesson 23 - How to secure Workstations and Servers
Lesson 25 - Institute of Electrical and Electronics Engineers (IEEE) 802.11 Wireless Standards
Lesson 26 - Wireless Application Protocol (WAP)
Lesson 27 - Wired Equivalent Privacy (WEP)
Lesson 28 - Wi-Fi Protected Access (WPA)
Lesson 29 - Common Wireless Attacks
Lesson 01 - Why Web Server Security is Important
Lesson 02 - How a Web Server Serve Clients
Lesson 03 - Introduction to Internet Information Services (IIS) 7
Lesson 04 - How to install Internet Information Services (IIS) 7 on Windows 2008 Server
Lesson 05 - Securing Access Control
Lesson 06 - Securing Directory and Data Structures
Lesson 07 - How to configure Virtual Directory on Internet Information Services (IIS) 7
Lesson 08 - Configuring IP address and Domain Name Restrictions
Lesson 09 - Configuring MIME Types
Lesson 10 - Introduction to Authentication and Authorization
Lesson 11 - Authentication Options in Internet Information Services (IIS) 7
Lesson 12 - How to Configure Basic Authentication in Internet Information Services (IIS) 7
Lesson 13 - How to Configure Windows Authentication in Internet Information Services (IIS) 7
Lesson 01 - Internet Protocol Security (IPSec) - What is IPSec?
Lesson 02 - Internet Protocol Security (IPSec) - Security Association (SA)
Lesson 03 - Internet Protocol Security (IPSec) - Security Parameter Index (SPI)
Lesson 04 - Internet Protocol Security (IPSec) - Transport Mode
Lesson 05 - Internet Protocol Security (IPSec) - Tunnel Mode
Lesson 06 - Internet Protocol Security (IPSec) - Authentication Header (AH)
Lesson 07 - Internet Protocol Security (IPSec) - Encapsulating Security Payload (ESP)
Lesson 08 - What are Windows 2003 IPSec features?
Lesson 09 - What are IPSec policies?
Lesson 10 - How to configure IPSec in a Windws 2003 network to secure Telnet traffic?
Lesson 11 - How to create an IPSec policy in a Windows 2003 server?
Lesson 12 - How to create an IPSec Rule in Windows 2003 server?
Lesson 13 - How to create an IPSec IP filter list in Windows 2003 server?
Lesson 14 - How to associate IPSec IP filter list to filter action?
Lesson 15 - How to assign IPSec policy in Windows 2003 server?
Lesson 16 - How to configure IPSec Integrity and Encryption algorithms in windows 2003?
Lesson 01 - What is Symmetric Encryption?
Lesson 02 - Symmetric Encryption Algorithms
Lesson 03 - What is Asymmetric Encyption?
Lesson 04 - Asymmetric Encryption Algorithms
Lesson 05 - Public Key Cryptography
Lesson 06 - What is a Digital Certificate?
Lesson 07 - What is Public Key Infrastructure (PKI)?
Lesson 08 - What is a Certificate Authority (CA)?
Lesson 09 - Comparison between Internal and External Certificate Authorities (CAs)
Lesson 10. Certificate Authority (CA) Hierarchy
Lesson 11. Windows 2003 Certificate Authorities (CAs)
Lesson 12 - Windows 2003 Certificate Server Architecture
Lesson 13 - Stand-alone Root Certificate Authority (CA)
Lesson 14 - Installing Stand-alone Root Certificate Authority (CA)
Lesson 15 - Installing Enterprise Subordinate Certificate Authority
Lesson 16 - How to submit Certificate Request to a Root Certificate Authority (CA)
Lesson 17 - How to import Root CA Certificate inside Trusted Root Certification Authorities Store
Lesson 18 - How to install CA certificate issued from Root CA on Enterprise Subordinate CA
Lesson 01 - Introduction to CCNA Security
Lesson 02 - What is Network Security and why we need Network Security
Lesson 03 - Primary Goals of Network Security
Lesson 04 - Enterprise Risk Management - Key Definitions
Lesson 05 - Network Threats and Countermeasures
Lesson 06 - Types of Hackers and how hackers are classified
Lesson 07 - Types of Network Attacks against Confidentiality, Integrity and Avilability
Lesson 08 - Different Classes of Network attacks and how to defend them
Lesson 09 - How Hackers attack networks and a Hacker's mindset
Lesson 10 - How to provide better security to your enterprise network
Lesson 11 - Disaster Recovery Business Continuity Plan
Lesson 12 - Types of Backup - Full backup, Incremental backup, Differential backup and Copy backup
Lesson 13 - Types of Backup Sites - Hot Site, Warm Site, Cold Site
Lesson 14 - Business Data Classification
Lesson 15 - Organizational Policies, Procedures, Standards and Guidelines
Lesson 16 - Testing Enterprise Security
Lesson 18 - Management Plane Protection - Cisco NFP (Network Foundation Protection)
Lesson 19 - Control Plane Protection - Cisco NFP (Network Foundation Protection)
Lesson 20 - Data Plane Protection - Cisco NFP (Network Foundation Protection)
Lesson 22 - How to install Cisco CCP and how to configure Cisco router for CCP
Lesson 23 - How to install Cisco SDM and how to configure Cisco router for SDM
Lesson 24 - Cisco Router/Switch Common Security Vulnerabilities and Router/Switch Hardening
Lesson 25 - Security Audit and One-step lockdown using CCP
Lesson 26 - Cisco IOS CLI Shell Pivilege levels, user EXEC mode and privilege EXEC modes
Lesson 27 - How to configure multiple Privilege Levels Cisco IOS CLI Shell
Lesson 28 - Strong Passwords and Password Encryption to protect Management Plane
Lesson 28 - AAA Authentication Authorization and Accounting
Lesson 30 - AAA RADIUS and TACACS+, Difference between RADIUS and TACACS+
Lesson 31 - Cisco ACS Secure Access Control System Products
Lesson 32 - How to install Cisco ACS (Secure Access Control Server ) 5.4 on VMware Workstation
Lesson 33 - How to connect manage and configure Cisco ACS using web browser
Lesson 34 - How to create and add an internal user in Cisco ACS
Lesson 41 - Troubleshooting AAA using Debug Commands
Lesson 42 - Parser Views - Role Based Access Control (RBAC)
Lesson 43 - Introduction to Syslog in Cisco Routers and Switches
Lesson 44 - How to install and configure Kiwi Syslog Server for Cisco Routers and Swiches
Lesson 45 - How to use CCP to view Syslog messages stored in Cisco Router/Switch Memory
Lesson 46 - What is SNMP (Simple Network Management Protocol)
Lesson 47 - How to configure Cisco Router/Switch for SNMP through IOS CLI
Lesson 48 - How to configure Cisco Router/Switch for SNMP through CCP
Lesson 49 - Why Network Time Synchronization is important
Lesson 50 - Introduction to NTP (Network Time Protocol), NTP Stratum Levels
Lesson 51 - NTP (Network Time Protocol) Modes of Operation
Lesson 53 - How to configure Cisco Routers and Switches to synchronize time using NTP through CCP
Lesson 54 - Out-of-Band (OOB) Management of Network Devices
Lesson 55 - Layer 2 Technologies - A revisit to VLAN and STP
Lesson 56 - What is VLAN Hopping attack
Lesson 57 - What is Switch spoofing attack and how to prevent Switch spoofing attack
Lesson 58 - What is Double tagging attack and how to prevent Double tagging attack
Lesson 60 - How to prevent MAC flooding attacks by configuring switchport port-security
Lesson 62 - Root Guard, BPDU Guard and BPDU Filter
Lesson 63 - What is Root Guard and how to configure Root Guard in Cisco Switches
Lesson 64 - What is BPDU Guard and how to configure BPDU Guard in Cisco Switches
Lesson 65 - What is BPDU Filter and how to configure BPDU Filter in Cisco Switches
Lesson 66 - DHCP Starvation attacks and DHCP spoofing attacks
Lesson 67 - How to configure DHCP Snooping
Lesson 68 - ARP Spoofing attack
Lesson 69 - Preventing ARP spoofing attacks with Dynamic ARP inspection (DAI)
Lesson 70 - IP spoofing attacks and IP Source Guard (IPSG)
Lesson 71 - What are PVLANs (Private VLANs)
Lesson 72 - How to configure PVLANs (Private VLANs)
Lesson 73 - Best Security practices to protect layer 2
Lesson 74 - Access Control Lists (ACLs)
Lesson 75 - What is Cisco IOS Zone Based Firewall
Lesson 77 - What are Zones and Zone Pairs
Lesson 78 - How to configure Cisco IOS Zone Based Firewall
Lesson 79 - Introduction to Cisco IPSec VPN Technologies
Lesson 81 - How-to-configure-Site-to-Site-IKEv2-IPsec-VPN-using-Pre-Shared-Key-Authentication
Lesson 01 - Introduction to Windows 2003
Lesson 02 - Windows 2003 family Editions
Lesson 03 - Hardware Requirements
Lesson 04 - Windows 2003 Installation - Character phase
Lesson 05 - Windows 2003 Installation - Graphics phase
Lesson 01 - Difference between Basic and Dynamic disks
Lesson 02 - How to create a Primary Partition
Lesson 03 - How to create an Extended Partiton
Lesson 04 - How to create a Logical Drive
Lesson 05 - How to convert basic disk to dynamic disk
Lesson 06 - Dynamic Volumes- Simple Volume
Lesson 07 - How to create a Simple Volume
Lesson 08 - Dynamic Volumes - Spanned Volume
Lesson 09 - How to create a Spanned Volume
Lesson 10 - Dynamic Volumes - Striped Volume
Lesson 11 - How to create a Striped Volume
Lesson 12 - Dynamic Volumes - Mirrored Volume
Lesson 13 - How to create a Mirrored Volume
Lesson 14 - Dynamic Volumes - Striping with parity (RAID-5) Volume
Lesson 15 - How to create a triping with parity (RAID-5) Volume
Lesson 01 - New Technology File System (NTFS)
Lesson 02 - New Technology File System (NTFS) Attributes
Lesson 04 - Standard Permissions
Lesson 05 - Special Permissions
Lesson 06 - Relation between Standard Permissions and Special Permissions
Lesson 07 - Permission Changes While Moving or Copying an NTFS File
Lesson 08 - How to take the Ownership of a file
Lesson 09 - Introduction to Folder Sharing
Lesson 10 - How to share a folder using Windows Explorer
Lesson 11 - How to share a folder on a remote computer using Shared Folders snap-in
Lesson 13 - Introduction to Offline Files and Folders
Lesson 14 - How to enable Offline Files
Lesson 15 - How to make files available Offline
Lesson 16 - Introduction to Disk Quotas
Lesson 17 - How to configure Disk Quota
Lesson 18 - Introduction to Encrypting File System (EFS)
Lesson 19 - Encrypting File System (EFS) - Encryption Process
Lesson 20 - Encrypting File System (EFS) - Decryption Process
Lesson 21 - How to encrypt and decrypt a file or folder using Encrypting File System (EFS)
Lesson 22 - Encrypted Data Recovery
Lesson 01 - Introduction to Windows 2003 Backup Utility (ntbackup.exe)
Lesson 02 - Normal Backup (Full backup)
Lesson 03 - Incremental Backup
Lesson 04 - Differential Backup
Lesson 05 - Copy and Daily Backup
Lesson 06 - Backup Combinations
Lesson 07 - How to Backup Files or Folders
Lesson 08 - How to Backup the System State
Lesson 09 - How to Schedule a Backup
Lesson 01 - What is Directory Service?
Lesson 02 - Introduction to Directory Standards
Lesson 03 - What is Active Directory (AD)?
Lesson 04 - What is Active Directory (AD) Forest?
Lesson 05 - What is Active Directory (AD) Tree?
Lesson 06 - What is Active Directory (AD) Domain?
Lesson 07 - What is a Domain Controller (DC)?
Lesson 08 - What is Organizational Unit (OU)?
Lesson 09 - Active Directory Trusts and Trust Types.
Lesson 10 - What is Active Directory Schema?
Lesson 11 - Windows 2003 Active Directory Installation - How to configure static IP address.
Lesson 12 - Windows 2003 Active Directory Installation - How to install DNS
Lesson 13 - Windows 2003 Active Directory Installation - Running Dcpromo
Lesson 14 - How add a computer to an Active Directory Domain?
Lesson 15 - Active Directory files and their functions
Lesson 16 - What is Active Directory Naming Context or Directory Partition?
Lesson 17 - What is Active Directory Replication?
Lesson 18 - Introduction to Active Directory Sites
Lesson 19 - How to create an Active Directory site
Lesson 20 - How to move Domain Controllers between Active Directory Sites
Lesson 21 - How to create and configure subnets for Active Directory Sites
Lesson 22 - What is Active Directory Site link?
Lesson 23 - How to create Active Directory Site Link
Lesson 24 - How to configure Site Link attributes
Lesson 26 - What is Site Link Bridge and How to create Site Link Bridge
Lesson 27 - What is Active Directory Global Catalog
Lesson 28 - How to configure a Domain Controller as Global Catalog Server
Lesson 29 - What is Universal Group Membership caching
Lesson 30 - How to configure Universal Group Membership caching
Lesson 31 - Operations Master Roles (Flexible Single Master Operations - FSMO)
Lesson 32 - How to transfer Operations Master roles (FSMO) to another Domain Controller
Lesson 33 - How to seize Operations Master (FSMO) roles using ntdsutil tool
Lesson 01 - Introduction to Windows 2003 User accounts
Lesson 02 - Windows 2003 Local User Accounts
Lesson 03 - Windows 2003 Built-in User Accounts
Lesson 04 - Windows 2003 Active Directory Domain User Accounts
Lesson 05 - Windows 2003 Logon Names
Lesson 06 - UPN (User Principal Name) Suffixes
Lesson 07 - How to create an Active Directory Domain user account
Lesson 08 - Modifying and administering Active Directory Domain User Accounts
Lesson 09 - How to reset Active Directory domain user password
Lesson 10 - How to unlock an Active Directory Domain User Account
Lesson 11 - How to rename an Active Directory Domain user account
Lesson 12 - How to delete an Active Directory Domain user account
Lesson 13 - How to copy an Active Directory Domain user account
Lesson 14 - How to enable/disable Active Directory Domain User Account
Lesson 15 - Active Directory Domain User Password Policy
Lesson 16 - Active Directory Domain User Account Lockout Policy
Lesson 17 - Introduction to Windows 2003 Groups
Lesson 18 - What is the difference between Security Group and Distribution Group
Lesson 19 - Group Scope - Domain Local, Global and Universal Group Scopes
Lesson 20 - How to create an Active Directory Group
Lesson 21 - How to add an Active Directory User to a Group
Lesson 01 - Introduction to Windows 2003 Clustering
Lesson 02 - Introduction to Network Load Balancing (NLB)
Lesson 03 - Network Load Balancing (NLB) - Unicast and Multicast modes
Lesson 04 - Network Load Balancing (NLB) cluster models
Lesson 05 - Network Load Balancing Manager (nlbmgr.exe)
Lesson 06 - How to create Network Load Balancing (NLB) cluster using nlbmgr.exe
Lesson 07 - Network Load Balancing Client Affinity and Port Configurations
Lesson 08 - How to add a node to Windows 2003 Network Load Balancing Cluster
Lesson 09 - Introduction to Windows 2003 Failover Server Clustering
Lesson 10 - Important definitions related with Server Failover Clustering
Lesson 11 - What is failover and failback
Lesson 12 - Server Cluster Resources and Resource Groups
Lesson 14 - Failover Server Cluster Modes - Active/Passive and Active/Active
Lesson 15 - Failover Server Cluster Pre-installation check-lists
Lesson 16 - How to install a Failover Server Cluster
Lesson 17 - How to add a node to a Failover Server Cluster
Lesson 01 - Introduction to Windows 2003 Group Policy
Lesson 02 - Local Group policy
Lesson 03 - Non-Local Group Policy
Lesson 04 - Group Policy Processing Order
Lesson 05 - Group Policy Object Editor
Lesson 06 - Group Policy Settings
Lesson 07 - Group Policy Inheritance
Lesson 08 - Group Policy Loop Back Processing
Lesson 09 - Group Policy Update Using gpupdate tool
Lesson 10 - Local User Profiles
Lesson 11 - Roaming Profiles and Mandatory Profiles
Lesson 12 - User Profile Folder Redirection
Lesson 13 - The Resultant Set of Policy (RSoP)
Lesson 14 - Configuring logon/logoff and startup/shutdown scripts
Lesson 15 - Deploying Software with Group Policy
Lesson 16 - Software Restriction policies
Lesson 01 - Introduction to Windows 2008 Server
Lesson 02 - New features of Windows 2008 Server
Lesson 03 - Hardware requirements for Windows 2008 Server installation
Lesson 04 - How to install Windows 2008 Server
Lesson 05 - Initial Configuration Tasks (ICT)
Lesson 07 - Boot Configuration Data (BCD)
Lesson 08 - Boot Configuration Data (BCD) Architecture
Lesson 09 - Boot Configuration Data (BCD) Objects
Lesson 10 - Boot Configuration Data (BCD) Elements
Lesson 11 - Boot Configuration Data Store Editor (BCDEdit) Options
Lesson 12 - How to use Boot Configuration Data Store Editor (BCDEdit) to manage BCD stores
Lesson 01 - Introduction to Windows 2008 Server Core
Lesson 02 - Options, roles and features available with Windows 2008 Server Core installation
Lesson 03 - Windows 2008 Server Core installation
Lesson 04 - Initial configuration of a Windows 2008 Server Core installation
Lesson 05 - How to configure TCP/IP settings of a Windows 2008 Server Core installation
Lesson 06 - Different options to manage a Windows 2008 Server Core computer
Lesson 07 - Managing a Windows 2008 Server Core installation locally using command prompt
Lesson 08 - Managing a Windows 2008 Server Core installation remotely using Terminal Services
Lesson 10 - Managing a Windows 2008 Server Core installation remotely using WinRM/WinRS
Lesson 11 - How to join Windows 2008 Server Core Computer to Active Directory Domain
Lesson 12 - How to activate Windows 2008 Server Core Computer
Lesson 13 - How to enable Automatic Updates for Windows 2008 Server Core Computer
Lesson 14 - How to configure Display Resolution of Windows 2008 Server Core Computer
Lesson 15 - How to create and manage network shares in Windows 2008 Server Core Computer
Lesson 16 - How to configure firewall on Windows 2008 Server Core Computer
Lesson 17 - How to list, install and manage Roles and Features in Windows 2008 Server Core Computer
Lesson 01 - Introduction to PowerShell
Lesson 02 - How to install PowerShell in Windows 2008 Server
Lesson 03 - What is a PowerShell cmdlet
Lesson 04 - How to get help in PowerShell
Lesson 05- How to find all the Cmdlets with particular Verb
Lesson 06 - How to find all the Cmdlets with particular Noun
Lesson 07 - What is a PowerShell Alias
Lesson 08 - How to create or remove aliases in PowerShell
Lesson 09 - PowerShell Pipelines
Lesson 02 - GNU/Linux Introduction
Lesson 03 - GNU/Linux Concepts
Lesson 04 - Difference between Fedora and RedHat Enterprise Linux
Lesson 05 - Major GNU/Linux Distributions
Lesson 06 - GNU/Linux Kernel and Shell
Lesson 07 - GNU/Linux File System
Lesson 08 - What is inode number?
Lesson 09 - GNU/Linux File System Hierarchy
Lesson 10 - GRUB (GNU GRand Unified Boot loader)
Lesson 11 - Working with grub.conf configuration file
Lesson 12 - How to password protect GRUB (GNU GRand Unified Boot loader)
Lesson 13 - Linux Rescue Mode (Linux Rescue Environment)
Lesson 14 - init process and Linux runlevels
Lesson 15 - inittab configuration file
Lesson 16 - Working with inittab configuration file
Lesson 18 - Creating and editing text files using vi editor
Lesson 19 - Linux File System Management Tools - fdisk command
Lesson 20 - Linux File System Management Tools - mkfs, mkfs.ext2, mkfs.ext3 commands
Lesson 21 - What is file system journaling?
Lesson 22 - Linux File System Management Tools - fsck command
Lesson 23 - Introduction to Linux /etc/fstab file
Lesson 24 - Linux mount and umount commands
Lesson 25 - Linux mount options
Lesson 26 - Introduction to Bourne Again Shell (BASH)
Lesson 27 - Basic Linux commands
Lesson 28 - Introduction to Logical Volume Manager (LVM)
Lesson 29 - How to create and manage Logical Volume Manager (LVM)
Lesson 30 - Introduction to Redundant Array of inexpensive (or Independent) Disks (RAID)
Lesson 31 - How to create and manage Redundant Array of Inexpensive Disks (RAID)
Lesson 32 - Introduction to swap space
Lesson 33 - How to create and manage swap space
Lesson 34 - Introduction to Linux user administration
Lesson 35 - How to add a user in Linux using useradd command
Lesson 36 - How to use passwd command to manage user passwords
Lesson 37 - How to modify a Linux user using usermod command
Lesson 38 - How to set Linux password aging using chage command
Lesson 39 - How to remove user from Linux using userdel command
Lesson 40 - The Linux user database (/etc/passwd)
Lesson 41 - The Linux password database (/etc/shadow)
Lesson 42 - Introduction to Linux User Group
Lesson 43 - How to create a new group in Linux using groupadd command
Lesson 44 - Linux Group Database (/etc/group) file
Lesson 45 - How to manage Linux user group
Lesson 46 - The Linux File Permissions
Lesson 47 - How to use chmod command to change Linux file permissions
Lesson 48 - How to use chgrp command to change Linux group ownership of a file
Lesson 49 - How to use chown command to change Linux user ownership of a file
Lesson 50 - Linux setuid and setgid
Lesson 51 - What is Linux umask?
Lesson 53 - Security-enhanced Linux (SELinux) Security Contexts
Lesson 54 - How Security-enhanced Linux (SELinux) works
Lesson 55 - Security-enhanced Linux (SELinux) configuration-file (/etc/selinux/conf)
Lesson 56 - Security-enhanced Linux (SELinux) - Filesystem Relabeling
Lesson 57 - Important Security-enhanced Linux (SELinux) commands
Lesson 58 - Introduction to Linux Disk Quota
Lesson 60 - How to turn on and turn off Linux disk quota using quotaon and quotaoff commands
Lesson 61 - How to manage Linux disk quota using edquota and repquota commands
Lesson 62 - Introduction to scheduling tasks using Linux cron daemon
Lesson 63 - How to schedule a task using Linux crontab (/etc/crontab) file
Lesson 64 - How to schedule tasks using Linux at command
Lesson 65 - Linux File filter commands sort wc and grep
Lesson 66 - How to compress, uncompress and view files using Linux commands gzip, gunzip and zcat
Lesson 67 - How to compress uncompress view files using Linux commands bzip2 bunzip2 and bzcat
Lesson 68 - How to use Linux tar (tape archive) command to create archives
Lesson 69 - Introduction to RedHat Package Manager (RPM)
Lesson 70 - Introduction to YUM (Yellow dog Updater, Modified) Package Manager
Lesson 71 - Common Linux network tools - ping, telnet, netstat and arp
Lesson 72 - Linux xinetd Super Server daemon
Lesson 73 - Linux Network Interface Configuration tool - ifconfig
Lesson 74 - Important Linux network configuration files
Lesson 75 - How to configure Dynamic Host Configuration Protocol (DHCP) in Linux
Lesson 76 - Introduction to Domain Name System (DNS)
Lesson 78 - Berkeley Internet Name Domain (BIND) as a DNS server
Lesson 79 - How to configure caching-only name server
Lesson 80 - BIND configuration file (/etc/named.conf)
Lesson 81 - Domain Name System (DNS) zone files
Lesson 82 - RNDC (Remote Name Daemon Control)
Lesson 83 - Introduction to Secure Shell and OpenSSH
Lesson 84 - Important OpenSSH client tools - scp, sftp, ssh, ssh-keygen, ssh-copy-id, slogin
Lesson 85 - OpenSSH Configuration Files
Lesson 86 - How to mount a remote File System using Network File System (NFS)
Lesson 87 - How to configure Very Secure File Transfer Protocol Daemon (vsFTPd)