O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Learning Path: Networking for Sysadmins

Video Description

Learning Path Networking for Sysadmins

Master the nuts and bolts of computer networking

Networking is a complex but essential area of study for system administrators. This Learning Path covers the ways users can connect to a network; the concepts of switching, routing, and internetworking; end-to-end protocols; congestion control and resource allocation; end-to-end data; network security; and network applications such as e-mail and the Web, IP telephony and video streaming, and peer-to-peer file sharing. A basic understanding of system administration is recommended for this Learning Path.

Table of Contents

  1. What You Should Expect From This Video 00:01:10
  2. About The Author 00:01:14
  3. A Brief History Of The Domain Name System 00:04:11
  4. What Is The Domain Name System? 00:03:49
  5. Domains, Delegation And Zones 00:03:06
  6. The Internet Namespace 00:04:17
  7. Internationalized Domain Names 00:02:07
  8. Name Servers, Zones And Authority 00:01:26
  9. Resolvers 00:01:49
  10. Resolution And Recursion 00:04:22
  11. Queries And Responses 00:02:47
  12. Caching 00:02:23
  13. Server Selection And Retransmission 00:01:50
  14. Authoritative, Recursive And Caching Name Servers 00:02:15
  15. Primaries And Secondaries 00:03:09
  16. Forwarding And Forwarders 00:02:33
  17. Makes And Models - BIND, The Windows DNS Server, And More 00:02:16
  18. Resource Records 00:03:24
  19. The A Record 00:01:09
  20. The AAAA Record 00:01:14
  21. The PTR Record 00:03:24
  22. The CNAME Record 00:01:44
  23. The MX Record 00:02:13
  24. The SRV Record 00:02:45
  25. The TXT Record 00:00:58
  26. Infrastructure Records 00:07:44
  27. Wildcards 00:02:19
  28. RRset Order 00:01:24
  29. Tracing Resolution With dig 00:04:58
  30. Timeouts And Retransmissions 00:04:13
  31. Default Domains And Search Lists 00:03:33
  32. Dynamic Update 00:05:57
  33. NOTIFY 00:03:01
  34. IXFR 00:01:08
  35. Sender Policy Framework 00:03:23
  36. nslookup 00:08:43
  37. dig 00:08:49
  38. Conclusion 00:01:27
  39. What You Should Expect From This Video 00:02:27
  40. What You Should Know 00:03:04
  41. What You Will Learn 00:03:14
  42. History Of TCP/IP 00:05:39
  43. Using TCP/IP For Communication 00:04:12
  44. OSI Model 00:10:31
  45. TCP/IP Model 00:06:29
  46. Capturing Packets 00:06:54
  47. Using Wireshark 00:11:49
  48. IETF 00:09:33
  49. Protocols 00:04:17
  50. Networking Utilities 00:07:49
  51. Ethernet 00:06:11
  52. Layer 2 Addresses (Mac) 00:06:04
  53. PPP/Slip/PPPoe 00:06:29
  54. WAN Protocols - Sonet, ATM And Frame Relay 00:06:40
  55. VLANs And 802.1Q 00:04:22
  56. Purposes Of The Network Layer 00:05:33
  57. IP Headers 00:09:16
  58. IP Addresses And Subnets 00:07:29
  59. Routing 00:06:08
  60. BGP 00:06:14
  61. RIP 00:05:40
  62. OSPF 00:06:47
  63. ARP 00:04:52
  64. ARP Spoofing 00:04:53
  65. RARP 00:04:22
  66. Internet Registries 00:04:28
  67. Autoconfiguration - BootP And DHCP 00:07:24
  68. IP Configuration 00:04:42
  69. IP Fragmentation 00:05:17
  70. Uses Of ICMP 00:02:03
  71. ICMP Message Types 00:04:34
  72. Ping 00:04:26
  73. Error Messages And Handling 00:05:37
  74. ICMP Attacks 00:04:39
  75. Purposes Of The Transport Layer 00:02:33
  76. TCP Headers 00:07:15
  77. TCP Handshake 00:04:22
  78. Acknowledgements 00:04:08
  79. Sliding Windows 00:04:12
  80. Session Teardown 00:03:00
  81. TCP States 00:05:20
  82. Port Behavior 00:05:19
  83. Uses Of UDP 00:03:02
  84. Flags/Headers 00:03:27
  85. Streaming Audio And Video 00:05:11
  86. Purposes Of The Session Layer 00:02:07
  87. SSL/TLS 00:05:15
  88. SSH 00:06:34
  89. RTP Control Protocol 00:03:38
  90. RPC 00:09:01
  91. Purposes Of The Application Layer 00:03:48
  92. HTTP 00:07:57
  93. Telnet 00:07:08
  94. FTP 00:08:36
  95. SMTP 00:08:25
  96. POP3 And IMAP 00:04:52
  97. Windows File Sharing - SMB And CIFS 00:07:54
  98. DNS Basics 00:05:47
  99. DNS Protocol 00:06:31
  100. Firewalls 00:03:23
  101. Stateful - Determining State 00:05:35
  102. Stateless - Access Control Lists 00:03:41
  103. Application Layer Firewalls 00:05:37
  104. Intrusion Detection 00:05:10
  105. Spoofing Traffic 00:04:09
  106. Malicious Traffic 00:06:11
  107. Building Packets - PackETH 00:04:43
  108. Building Packets - HPing 00:04:33
  109. Wireless Fundamentals 00:03:38
  110. Searching For Wireless Networks 00:04:43
  111. Examining Wireless Packets 00:06:48
  112. Protecting Wireless With WEP 00:05:38
  113. Protecting Wireless With WPA 00:03:48
  114. Why IPv6 00:03:54
  115. IPv6 Vs. IPv4 00:05:02
  116. Using TCP With IPv6 00:03:02
  117. Using ICMPv6 00:03:39
  118. Next Steps 00:02:38
  119. About The Author 00:02:46
  120. About The Author And Introduction.mp4 00:05:35
  121. OSI - Part 1.mp4 00:07:41
  122. OSI - Part 2.mp4 00:09:44
  123. TCP / IP Protocols.mp4 00:07:39
  124. IPv4 Addressing.mp4 00:09:06
  125. Ports And IPv6 Addressing.mp4 00:08:32
  126. TCP / IP Review.mp4 00:07:55
  127. Network Media.mp4 00:08:32
  128. Network Media Terms - Part 1.mp4 00:08:11
  129. Network Media Terms - Part 2.mp4 00:07:46
  130. Ethernet.mp4 00:09:05
  131. Wireless.mp4 00:04:55
  132. Modulation And Encoding.mp4 00:09:26
  133. Topologies.mp4 00:09:11
  134. Network Sizes.mp4 00:08:50
  135. Transmission Types.mp4 00:09:19
  136. Media Access Methods.mp4 00:10:19
  137. Segments, Subnets And Domains.mp4 00:08:13
  138. Terms And Definitions.mp4 00:07:01
  139. Network Layer Devices - Part 1.mp4 00:07:50
  140. Network Layer Devices - Part 2.mp4 00:07:16
  141. Data Link Layer Devices.mp4 00:08:57
  142. Routers.mp4 00:08:45
  143. Firewalls - Part 1.mp4 00:08:36
  144. Firewalls - Part 2.mp4 00:10:05
  145. Firewalls - Part 3.mp4 00:08:13
  146. Firewall Rules.mp4 00:08:39
  147. Firewall Architecture.mp4 00:08:21
  148. Network Services.mp4 00:09:16
  149. DHCP.mp4 00:10:10
  150. Domain Name Systems.mp4 00:07:25
  151. DNS Architecture.mp4 00:10:48
  152. DNS Resolver.mp4 00:08:35
  153. Authentication Introduction.mp4 00:09:13
  154. Authentication Protocols.mp4 00:07:29
  155. Directory Services - Part 1.mp4 00:07:53
  156. Directory Services - Part 2.mp4 00:07:05
  157. DS Kerberos.mp4 00:06:58
  158. DS Kerberos RAS.mp4 00:08:19
  159. Diameter.mp4 00:05:42
  160. RAS VPN.mp4 00:09:07
  161. NAT PAT.mp4 00:07:10
  162. Bastion Host.mp4 00:07:41
  163. Endpoint Systems.mp4 00:07:56
  164. Virtual Machines.mp4 00:08:54
  165. Mainframe.mp4 00:05:08
  166. Wireless Introduction - Part 1.mp4 00:08:11
  167. Wireless Introduction - Part 2.mp4 00:08:31
  168. Wireless Security - WEP.mp4 00:06:15
  169. Wireless Security - Authenticating.mp4 00:08:23
  170. Wireless Security - WPA WPA2.mp4 00:07:50
  171. Wireless Security - 802.11i.mp4 00:09:38
  172. Wireless Security - Attacks.mp4 00:08:29
  173. Wireless Security Review.mp4 00:08:45
  174. MIMO And Cellular.mp4 00:09:22
  175. Browsing.mp4 00:08:15
  176. DoS / DDoS.mp4 00:07:23
  177. Information Theft.mp4 00:10:20
  178. APT And Cellular.mp4 00:09:36
  179. Course Review.mp4 00:08:35