O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CompTIA Security+ SY0-201 Video Course Domain 2 - Network Infrastructure

Video Description

Network Infrastructure

Shon Harris

The fast, powerful way to prepare for your CompTIA Security+ exam!

Get all the hands-on training you need to pass (ISC)²’s tough SSCP exam, get certified, and move forward in your IT security career! In this online video, the world’s #1 information security trainer walks you through every skill and concept you’ll need to master. This online video contains Almost eight hours of training adapted from Shon Harris’s legendary five-day SSCP boot camps–including realistic labs, scenarios, case studies, and animations designed to build and test your knowledge in real-world settings!

Comprehensive coverage of CompTIA Security+ domains of knowledge:

     .    Networking Communications

     .    Types of Networks

     .    Cabling Types

     .    Port and Protocol Relationship

     .    Security Associations

     .    Wireless Technologies

About the Shon Harris Security Series

This online video is part of a complete library of books, online services, and videos designed to help security professionals enhance their skills and prepare for their certification exams. Every product in this series reflects Shon Harris’s unsurpassed experience in teaching IT security professionals.

Category: Security

System Requirements

OPERATING SYSTEM: Windows 2000, XP, or Vista; Mac OS X 10.4 (Tiger) or later
MULTIMEDIA: DVD drive; 1024 x 768 or higher display; sound card with speakers
COMPUTER: 500MHz or higher CPU; 128MB RAM or more

Table of Contents

  1. Course Introduction 00:06:59
  2. Domain 2 - Network Infrastructure 00:00:40
  3. Agenda 1 00:03:09
  4. Networking Communications 00:00:40
  5. An Older Model 00:01:40
  6. Data Encapsulation 00:02:02
  7. Application Layer 00:00:25
  8. OSI - Application Layer 00:02:08
  9. Presentation Layer 00:01:21
  10. OSI - Presentation Layer 00:01:16
  11. OSI - Session Layer 00:01:00
  12. Client/Server Model 00:00:56
  13. Client/Server Session Layer 00:01:15
  14. Transport Layer 00:01:52
  15. Transport Layer Analogy 00:01:07
  16. OSI - Network Layer 00:00:56
  17. Here to There 00:01:06
  18. Network Layer 00:00:44
  19. OSI - Data Link 00:01:49
  20. Data Link 00:02:05
  21. Sublayers 00:01:58
  22. OSI - Physical Layer 00:01:33
  23. Layers Working Together 00:06:22
  24. Devices Work at Different Layers 00:02:17
  25. Types of Networks 00:01:27
  26. Network Topologies - Physical Layer 00:00:37
  27. Topology Type - Bus 00:00:52
  28. Topology Type - Ring 00:01:46
  29. Topology Type - Star 00:00:55
  30. Network Topologies - Mesh 00:01:49
  31. Summary of Topologies 00:01:11
  32. Agenda 2 00:01:10
  33. Media Access 00:00:53
  34. One Goal of Media Access Technologies 00:00:42
  35. Collision Domain 00:00:58
  36. Back Off, Buddy 00:01:30
  37. Carrier Sense Multiple Access 00:01:11
  38. CSMA/Collision Avoidance (CSMA/CA) 00:01:24
  39. Media Access Technologies - Ethernet 00:02:09
  40. Media Access Technologies - Token Passing 00:02:55
  41. Token's Role 00:00:46
  42. Other Technologies 00:01:07
  43. Media Access Technologies - Polling 00:01:02
  44. Agenda 3 00:01:39
  45. Cabling Types - Twisted Pair 00:01:29
  46. Cable Types 00:00:56
  47. Multimode versus Single Mode 00:01:12
  48. Signal and Cable Issues 00:00:52
  49. Signaling Issues 00:01:04
  50. Transmission Types - Analog and Digital 00:01:53
  51. Transmission Types - Synchronous 00:00:57
  52. Asynchronous 00:00:42
  53. Transmission Types 00:02:08
  54. Cabling Issues - Plenum-Rated 00:01:57
  55. Transmission Types - Number of Receivers 00:02:30
  56. Internet Group Management Protocol 00:00:54
  57. Multicasting 00:00:52
  58. Network Technologies 00:01:14
  59. Extranet 00:00:42
  60. Network Technologies (Cont.) 00:01:14
  61. EDI Evolution 00:00:38
  62. Networking Devices 00:01:50
  63. Network Device - Hub 00:00:48
  64. Networking Device - Bridge 00:01:26
  65. Forwarding Table Example 00:01:21
  66. Network Devices - Switch 00:00:55
  67. Virtual LAN 00:01:24
  68. VLAN 00:00:53
  69. Interfaces and VLANs 00:02:14
  70. Sniffers 00:03:13
  71. Networking Devices - Router 00:02:15
  72. Hops 00:00:56
  73. Routers 00:00:49
  74. Bridges Compared to Routers 00:01:29
  75. Network Devices - Gateway 00:00:54
  76. Agenda 4 00:02:09
  77. Client Ports 00:01:34
  78. Conceptual Use of Ports 00:00:47
  79. TCP/IP Suite 00:01:09
  80. UDP versus TCP 00:02:29
  81. TCP Segment 00:00:50
  82. SYN Flood 00:03:29
  83. Teardrop Attack 00:02:05
  84. Source Routing 00:01:03
  85. Source Routing Types 00:00:52
  86. IP Address Ranges 00:02:56
  87. IPv6 00:02:25
  88. Protocols 00:00:11
  89. Protocols - ARP 00:01:09
  90. IP to MAC Mapping 00:00:50
  91. How ARP Works 00:01:27
  92. ARP Poisoning 00:01:13
  93. ICMP Packets 00:01:22
  94. A Way Hackers Use ICMP 00:01:19
  95. Ping Steps 00:01:30
  96. Protocols - SNMP 00:00:49
  97. SNMP in Action 00:03:20
  98. SNMP 00:01:48
  99. SNMP Output 00:00:58
  100. POP3 and SMTP 00:00:47
  101. Protocols - SMTP 00:00:33
  102. Mail Relay 00:02:00
  103. Protocols - FTP, TFTP, Telnet 00:02:36
  104. Protocols - RARP and BootP 00:01:18
  105. DHCP - Dynamic Host Configuration Protocol 00:01:04
  106. Agenda 5 00:01:49
  107. Network Configurations 00:01:07
  108. DMZ Configurations 00:01:05
  109. Firewall Comparisons 00:00:44
  110. Network Devices - Firewalls 00:02:25
  111. Packet Filtering Firewall 00:01:56
  112. Packet Filtering Firewall Weaknesses 00:00:57
  113. Packet Filtering 00:00:35
  114. Rule Set Example 00:01:22
  115. Firewall Types - Proxy Firewalls 00:01:50
  116. Firewall Types - Circuit-Level Proxy Firewall 00:02:17
  117. Firewall Types - Application-Layer Proxy 00:03:30
  118. Application-Layer Proxy Advantages 00:00:44
  119. Application-Layer Proxy Disadvantages 00:01:01
  120. Dedicated Proxy Servers 00:00:57
  121. Firewall Types - Stateful 00:05:06
  122. Compare 00:03:35
  123. Firewall Types - Kernel Proxies 00:01:31
  124. Firewall Based VPN Devices 00:00:51
  125. Best Practices 00:02:58
  126. Firewall Placement 00:01:18
  127. Packet Filtering (Cont.) 00:00:36
  128. Screened Host 00:01:14
  129. Firewall Architecture Types - Multi- or Dual-Homed 00:01:24
  130. Screened Subnet 00:02:25
  131. Agenda 6 00:00:47
  132. Dial-Up Protocol - SLIP 00:00:46
  133. Dial-Up Protocol - PPP 00:01:01
  134. PPP 00:00:51
  135. PPP versus SLIP 00:01:31
  136. Authentication Protocols - PAP 00:00:45
  137. Authentication Protocols - CHAP 00:02:15
  138. Authentication Protocol - EAP 00:01:24
  139. Data Inspection 00:03:44
  140. Virtual Private Network Technologies 00:00:17
  141. What Is a Tunneling Protocol? 00:01:01
  142. Analogy 00:01:01
  143. Tunneling Protocols - Examples 00:00:58
  144. Tunneling Protocols - PPTP 00:01:08
  145. Tunneling Protocols - L2TP 00:02:35
  146. L2TP Encapsulation 00:00:30
  147. Tunneling Protocols - IPSec 00:00:48
  148. IPSec Basic Features 00:03:55
  149. IPSec Modes 00:00:35
  150. Security Associations (SAs) 00:04:01
  151. Combining Sas 00:02:42
  152. Agenda 7 00:01:20
  153. Layer 3 at Layer 2 00:00:59
  154. MPLS 00:01:09
  155. Multiprotocol Label Switching 00:01:13
  156. Quality of Service (QoS) 00:01:48
  157. QoS Services 00:00:49
  158. Autonomous Systems 00:02:04
  159. Routing Protocols 00:02:16
  160. Routing 00:01:51
  161. Routing Protocols (Cont.) 00:02:04
  162. OSPF 00:01:22
  163. IGRP 00:00:40
  164. BGP 00:02:39
  165. Routing Protocol Attacks 00:00:54
  166. Metropolitan Area Network Technologies 00:01:23
  167. FDDI 00:00:49
  168. SONET Rings 00:01:17
  169. MAN Technologies - SONET 00:00:34
  170. Connecting Networks 00:01:30
  171. Network Services 00:01:33
  172. DNS Server Structure 00:01:14
  173. Name Resolving Steps 00:03:32
  174. Split DNS 00:01:03
  175. Host Name Resolution Attacks 00:03:37
  176. Network Service - NAT 00:03:26
  177. PAT 00:01:00
  178. NIS 00:00:43
  179. Storing Data 00:00:45
  180. NIS+ Authentication 00:00:38
  181. Agenda 8 00:01:10
  182. PSTN 00:00:58
  183. Circuit Switching 00:00:41
  184. Steps of Connections 00:00:45
  185. Multiplexing 00:01:40
  186. Types of Multiplexing 00:00:53
  187. TDM Process 00:00:23
  188. Statistical Time Division Multiplexing 00:01:21
  189. FDM 00:01:25
  190. Packet Switching 00:02:28
  191. Circuit versus Packet Switching 00:01:24
  192. WAN Technologies - Packet Switched 00:00:17
  193. WAN Technologies - X.25 00:00:54
  194. X.25 00:01:09
  195. WAN Technologies - Frame Relay 00:01:47
  196. WAN Example 00:00:44
  197. Frame Relay 00:02:26
  198. WAN Technologies - ATM 00:01:21
  199. Cell Switching 00:00:46
  200. Wide Area Network Technologies 00:01:02
  201. WAN Technologies - ISDN 00:01:10
  202. On-Demand 00:00:26
  203. ISDN Service Types 00:00:34
  204. WAN Technologies - DSL 00:02:38
  205. WAN Technologies - Cable Modem 00:01:37
  206. Cable Modems 00:01:26
  207. Satellites 00:00:39
  208. Hybrid Connection 00:00:52
  209. Satellite Coverage 00:00:40
  210. Network Perimeter Security 00:01:03
  211. Complexity only Increases 00:01:04
  212. A Layered Approach 00:00:37
  213. Agenda 9 00:00:44
  214. PSTN (Cont.) 00:01:54
  215. Private Branch Exchange 00:01:50
  216. PBX Vulnerabilities 00:01:33
  217. PBX Best Practices 00:01:44
  218. IP Telephony 00:03:00
  219. IP Telephony Components 00:00:36
  220. Media Gateways 00:01:51
  221. IP Telephony Issues 00:01:15
  222. Telephony Protection Mechanisms 00:00:36
  223. Telephony Security 00:02:39
  224. IP Telephony with Wireless 00:00:32
  225. IP Phones Security 00:02:13
  226. Mobile Technology Generations 00:01:55
  227. Mobile Phone Security 00:01:23
  228. Mobile Device Security 00:01:22
  229. Cell Phone 00:02:40
  230. Agenda 10 00:00:25
  231. Wireless Technologies - Access Point 00:01:54
  232. Wireless Frequencies 00:01:10
  233. Alphabet Soup of Standards 00:06:01
  234. Spread Spectrum 00:05:50
  235. OFDM 00:00:42
  236. Where Does Spread Spectrum Work? 00:02:10
  237. 802.11n 00:01:09
  238. Wireless Technologies - Access Point (Cont.) 00:01:01
  239. Architectures 00:00:46
  240. Wireless Technologies - Service Set ID 00:01:46
  241. Authenticating to an AP 00:01:03
  242. 802.11 Authentication 00:02:27
  243. Wireless Technologies - WEP 00:01:58
  244. Wireless Technologies - More WEP Woes 00:02:41
  245. Lack of Integrity 00:01:45
  246. Frequency Management 00:01:19
  247. 802.11 Security Solutions 00:04:12
  248. 802.1x 00:01:20
  249. 802.1x Authentication 00:05:08
  250. Types of 802.11 Security 00:01:22
  251. IEEE 802.11i Standard 00:02:07
  252. Wireless EAP 00:05:51
  253. Wireless Technologies - Common Attacks 00:05:20
  254. Wireless Technologies - War Driving 00:01:59
  255. NetStumbler Example 00:00:44
  256. Warchalking 00:01:33
  257. Countermeasures 00:04:56
  258. Wireless Attacks 00:02:10
  259. Wormhole Attack 00:00:48
  260. Wireless Technologies - WAP 00:00:44
  261. Wireless Technologies - WTLS 00:01:31
  262. i-mode 00:00:36
  263. Bluetooth 00:01:01
  264. Vampire Tap 00:01:53
  265. Tapping 00:00:41
  266. Fiber Tapping 00:01:20
  267. Domain Name Kiting 00:00:58
  268. Null Session 00:01:15
  269. Sniffers (Cont.) 00:03:09
  270. Packet Sniffer 00:01:20
  271. Packet Sniffer - Uses 00:00:48
  272. Spoofing Attacks 00:00:40
  273. E-mail Spoofing 00:01:25
  274. Spoofing - Instructional E-mails 00:01:00
  275. Email Spoofing - Common Messages 00:00:38
  276. Countermeasures (Cont.) 00:01:38
  277. Authentication and Encryption 00:00:47
  278. IP Spoofing 00:00:56
  279. Header Components 00:00:45
  280. Man-in-the-Middle 00:01:51
  281. Man-in-the-Middle Attack 00:00:23
  282. Replay Attack 00:01:00
  283. Countermeasures (Cont.) 00:01:46
  284. Session Hijacking 00:01:47
  285. Programs For Session Hijacking 00:00:32
  286. TCP/IP Hijacking 00:00:41
  287. Sequence Numbers 00:01:08
  288. Finding TCP Sequence Numbers 00:01:05
  289. SYN, SYN/ACK, ACK and ISN 00:00:27
  290. Denial of Service 00:01:46
  291. Reasons for DoS Attacks 00:00:33
  292. TCP Handshake 00:03:32
  293. SYN Flood (Cont.) 00:01:03
  294. TCP 00:00:37
  295. SYN Attacks Defense 00:02:07
  296. UDP Floods 00:01:21
  297. DDoS 00:01:45
  298. DDoS - Example 00:01:19
  299. DDoS Countermeasures 00:02:10
  300. Subnetting 00:01:55
  301. Network Access Control (NAC) 00:02:12
  302. NAC - Features and Benefits 00:00:57
  303. NAC Architecture 00:01:27
  304. Honeypot 00:02:05
  305. Honeypot - Types 00:01:32
  306. Honeypot (2) 00:00:51
  307. Honeynet 00:01:39
  308. Types of Honeypots 00:01:41
  309. Internet Content Filters 00:03:25
  310. Bluesnarfing 00:02:14
  311. Domain 2 Review 00:00:38