CompTIA Security+ SY0-201 Video Course Domain 2 - Network Infrastructure

Video description

Network Infrastructure

Shon Harris

The fast, powerful way to prepare for your CompTIA Security+ exam!

Get all the hands-on training you need to pass (ISC)²’s tough SSCP exam, get certified, and move forward in your IT security career! In this online video, the world’s #1 information security trainer walks you through every skill and concept you’ll need to master. This online video contains Almost eight hours of training adapted from Shon Harris’s legendary five-day SSCP boot camps–including realistic labs, scenarios, case studies, and animations designed to build and test your knowledge in real-world settings!

Comprehensive coverage of CompTIA Security+ domains of knowledge:

     .    Networking Communications

     .    Types of Networks

     .    Cabling Types

     .    Port and Protocol Relationship

     .    Security Associations

     .    Wireless Technologies

About the Shon Harris Security Series

This online video is part of a complete library of books, online services, and videos designed to help security professionals enhance their skills and prepare for their certification exams. Every product in this series reflects Shon Harris’s unsurpassed experience in teaching IT security professionals.

Category: Security

System Requirements

OPERATING SYSTEM: Windows 2000, XP, or Vista; Mac OS X 10.4 (Tiger) or later
MULTIMEDIA: DVD drive; 1024 x 768 or higher display; sound card with speakers
COMPUTER: 500MHz or higher CPU; 128MB RAM or more

Table of contents

  1. Course Introduction
  2. Domain 2 - Network Infrastructure
  3. Agenda 1
  4. Networking Communications
  5. An Older Model
  6. Data Encapsulation
  7. Application Layer
  8. OSI - Application Layer
  9. Presentation Layer
  10. OSI - Presentation Layer
  11. OSI - Session Layer
  12. Client/Server Model
  13. Client/Server Session Layer
  14. Transport Layer
  15. Transport Layer Analogy
  16. OSI - Network Layer
  17. Here to There
  18. Network Layer
  19. OSI - Data Link
  20. Data Link
  21. Sublayers
  22. OSI - Physical Layer
  23. Layers Working Together
  24. Devices Work at Different Layers
  25. Types of Networks
  26. Network Topologies - Physical Layer
  27. Topology Type - Bus
  28. Topology Type - Ring
  29. Topology Type - Star
  30. Network Topologies - Mesh
  31. Summary of Topologies
  32. Agenda 2
  33. Media Access
  34. One Goal of Media Access Technologies
  35. Collision Domain
  36. Back Off, Buddy
  37. Carrier Sense Multiple Access
  38. CSMA/Collision Avoidance (CSMA/CA)
  39. Media Access Technologies - Ethernet
  40. Media Access Technologies - Token Passing
  41. Token's Role
  42. Other Technologies
  43. Media Access Technologies - Polling
  44. Agenda 3
  45. Cabling Types - Twisted Pair
  46. Cable Types
  47. Multimode versus Single Mode
  48. Signal and Cable Issues
  49. Signaling Issues
  50. Transmission Types - Analog and Digital
  51. Transmission Types - Synchronous
  52. Asynchronous
  53. Transmission Types
  54. Cabling Issues - Plenum-Rated
  55. Transmission Types - Number of Receivers
  56. Internet Group Management Protocol
  57. Multicasting
  58. Network Technologies
  59. Extranet
  60. Network Technologies (Cont.)
  61. EDI Evolution
  62. Networking Devices
  63. Network Device - Hub
  64. Networking Device - Bridge
  65. Forwarding Table Example
  66. Network Devices - Switch
  67. Virtual LAN
  68. VLAN
  69. Interfaces and VLANs
  70. Sniffers
  71. Networking Devices - Router
  72. Hops
  73. Routers
  74. Bridges Compared to Routers
  75. Network Devices - Gateway
  76. Agenda 4
  77. Client Ports
  78. Conceptual Use of Ports
  79. TCP/IP Suite
  80. UDP versus TCP
  81. TCP Segment
  82. SYN Flood
  83. Teardrop Attack
  84. Source Routing
  85. Source Routing Types
  86. IP Address Ranges
  87. IPv6
  88. Protocols
  89. Protocols - ARP
  90. IP to MAC Mapping
  91. How ARP Works
  92. ARP Poisoning
  93. ICMP Packets
  94. A Way Hackers Use ICMP
  95. Ping Steps
  96. Protocols - SNMP
  97. SNMP in Action
  98. SNMP
  99. SNMP Output
  100. POP3 and SMTP
  101. Protocols - SMTP
  102. Mail Relay
  103. Protocols - FTP, TFTP, Telnet
  104. Protocols - RARP and BootP
  105. DHCP - Dynamic Host Configuration Protocol
  106. Agenda 5
  107. Network Configurations
  108. DMZ Configurations
  109. Firewall Comparisons
  110. Network Devices - Firewalls
  111. Packet Filtering Firewall
  112. Packet Filtering Firewall Weaknesses
  113. Packet Filtering
  114. Rule Set Example
  115. Firewall Types - Proxy Firewalls
  116. Firewall Types - Circuit-Level Proxy Firewall
  117. Firewall Types - Application-Layer Proxy
  118. Application-Layer Proxy Advantages
  119. Application-Layer Proxy Disadvantages
  120. Dedicated Proxy Servers
  121. Firewall Types - Stateful
  122. Compare
  123. Firewall Types - Kernel Proxies
  124. Firewall Based VPN Devices
  125. Best Practices
  126. Firewall Placement
  127. Packet Filtering (Cont.)
  128. Screened Host
  129. Firewall Architecture Types - Multi- or Dual-Homed
  130. Screened Subnet
  131. Agenda 6
  132. Dial-Up Protocol - SLIP
  133. Dial-Up Protocol - PPP
  134. PPP
  135. PPP versus SLIP
  136. Authentication Protocols - PAP
  137. Authentication Protocols - CHAP
  138. Authentication Protocol - EAP
  139. Data Inspection
  140. Virtual Private Network Technologies
  141. What Is a Tunneling Protocol?
  142. Analogy
  143. Tunneling Protocols - Examples
  144. Tunneling Protocols - PPTP
  145. Tunneling Protocols - L2TP
  146. L2TP Encapsulation
  147. Tunneling Protocols - IPSec
  148. IPSec Basic Features
  149. IPSec Modes
  150. Security Associations (SAs)
  151. Combining Sas
  152. Agenda 7
  153. Layer 3 at Layer 2
  154. MPLS
  155. Multiprotocol Label Switching
  156. Quality of Service (QoS)
  157. QoS Services
  158. Autonomous Systems
  159. Routing Protocols
  160. Routing
  161. Routing Protocols (Cont.)
  162. OSPF
  163. IGRP
  164. BGP
  165. Routing Protocol Attacks
  166. Metropolitan Area Network Technologies
  167. FDDI
  168. SONET Rings
  169. MAN Technologies - SONET
  170. Connecting Networks
  171. Network Services
  172. DNS Server Structure
  173. Name Resolving Steps
  174. Split DNS
  175. Host Name Resolution Attacks
  176. Network Service - NAT
  177. PAT
  178. NIS
  179. Storing Data
  180. NIS+ Authentication
  181. Agenda 8
  182. PSTN
  183. Circuit Switching
  184. Steps of Connections
  185. Multiplexing
  186. Types of Multiplexing
  187. TDM Process
  188. Statistical Time Division Multiplexing
  189. FDM
  190. Packet Switching
  191. Circuit versus Packet Switching
  192. WAN Technologies - Packet Switched
  193. WAN Technologies - X.25
  194. X.25
  195. WAN Technologies - Frame Relay
  196. WAN Example
  197. Frame Relay
  198. WAN Technologies - ATM
  199. Cell Switching
  200. Wide Area Network Technologies
  201. WAN Technologies - ISDN
  202. On-Demand
  203. ISDN Service Types
  204. WAN Technologies - DSL
  205. WAN Technologies - Cable Modem
  206. Cable Modems
  207. Satellites
  208. Hybrid Connection
  209. Satellite Coverage
  210. Network Perimeter Security
  211. Complexity only Increases
  212. A Layered Approach
  213. Agenda 9
  214. PSTN (Cont.)
  215. Private Branch Exchange
  216. PBX Vulnerabilities
  217. PBX Best Practices
  218. IP Telephony
  219. IP Telephony Components
  220. Media Gateways
  221. IP Telephony Issues
  222. Telephony Protection Mechanisms
  223. Telephony Security
  224. IP Telephony with Wireless
  225. IP Phones Security
  226. Mobile Technology Generations
  227. Mobile Phone Security
  228. Mobile Device Security
  229. Cell Phone
  230. Agenda 10
  231. Wireless Technologies - Access Point
  232. Wireless Frequencies
  233. Alphabet Soup of Standards
  234. Spread Spectrum
  235. OFDM
  236. Where Does Spread Spectrum Work?
  237. 802.11n
  238. Wireless Technologies - Access Point (Cont.)
  239. Architectures
  240. Wireless Technologies - Service Set ID
  241. Authenticating to an AP
  242. 802.11 Authentication
  243. Wireless Technologies - WEP
  244. Wireless Technologies - More WEP Woes
  245. Lack of Integrity
  246. Frequency Management
  247. 802.11 Security Solutions
  248. 802.1x
  249. 802.1x Authentication
  250. Types of 802.11 Security
  251. IEEE 802.11i Standard
  252. Wireless EAP
  253. Wireless Technologies - Common Attacks
  254. Wireless Technologies - War Driving
  255. NetStumbler Example
  256. Warchalking
  257. Countermeasures
  258. Wireless Attacks
  259. Wormhole Attack
  260. Wireless Technologies - WAP
  261. Wireless Technologies - WTLS
  262. i-mode
  263. Bluetooth
  264. Vampire Tap
  265. Tapping
  266. Fiber Tapping
  267. Domain Name Kiting
  268. Null Session
  269. Sniffers (Cont.)
  270. Packet Sniffer
  271. Packet Sniffer - Uses
  272. Spoofing Attacks
  273. E-mail Spoofing
  274. Spoofing - Instructional E-mails
  275. Email Spoofing - Common Messages
  276. Countermeasures (Cont.)
  277. Authentication and Encryption
  278. IP Spoofing
  279. Header Components
  280. Man-in-the-Middle
  281. Man-in-the-Middle Attack
  282. Replay Attack
  283. Countermeasures (Cont.)
  284. Session Hijacking
  285. Programs For Session Hijacking
  286. TCP/IP Hijacking
  287. Sequence Numbers
  288. Finding TCP Sequence Numbers
  289. SYN, SYN/ACK, ACK and ISN
  290. Denial of Service
  291. Reasons for DoS Attacks
  292. TCP Handshake
  293. SYN Flood (Cont.)
  294. TCP
  295. SYN Attacks Defense
  296. UDP Floods
  297. DDoS
  298. DDoS - Example
  299. DDoS Countermeasures
  300. Subnetting
  301. Network Access Control (NAC)
  302. NAC - Features and Benefits
  303. NAC Architecture
  304. Honeypot
  305. Honeypot - Types
  306. Honeypot (2)
  307. Honeynet
  308. Types of Honeypots
  309. Internet Content Filters
  310. Bluesnarfing
  311. Domain 2 Review

Product information

  • Title: CompTIA Security+ SY0-201 Video Course Domain 2 - Network Infrastructure
  • Author(s):
  • Release date: June 2009
  • Publisher(s): Pearson
  • ISBN: 9780789740007