Learning Network Technology and Security Fundamentals [Online Code]
Learning Network Technology and Security Fundamentals [Online Code] by Infiniteskills at ITHKS. Hurry! Limited time offer. Offer valid only while supplies last. Number of Videos: 8.25 hours - 60 lessonsAuthor: David MillerUser Level: IntermediateIn this Network Technology and Security Fundamentals training
Product Description
Number of Videos: 8.25 hours - 60 lessons
Author: David Miller
User Level: Intermediate
In this Network Technology and Security Fundamentals training course, expert author David Miller teaches you how to secure and protect information as it flows across an enterprise network. This course is designed for users that are working in or looking to move up in the field of Information Technology.
You will start by reviewing the Open Systems Interconnect (OSI) model, then jump into learning the TCP/IP suite of protocols. David will then cover transmission media and technologies. This video tutorial will also look at the devices that make up the network infrastructure, including firewalls, routers, Virtual Private Networks (VPNs), client systems, and virtual machines. Next, you will learn about wireless networks, devices, and security.
Finally, David will cover the various types of attacks on networks, including browsing attacks, information theft, and attacks on cell phones. Once you have completed this computer based training course, you will be fully capable of securing and protecting an enterprise network. Working files are included, allowing you to follow along with the author throughout the lessons.
System Requirements:- Supported OS: [Mac Mountain Lion 10.8, Mac Lion 10.7, Mac Snow Leopard 10.6, Mac Leopard 10.5, Mac OS X, Macintosh]
- Processor: Any
- RAM: Any
- Hard Disk: 1GB
- Video Card: Any
Features & Highlights
- Learn Network Technology and Security Fundamentals from a professional trainer on your own time at your own desk.
- This visual training method offers users increased retention and accelerated learning.
- Breaks even the most complex applications down into simplistic steps.
Additional Information
Have questions about this item, or would like to inquire about a custom or bulk order?
If you have any questions about this product by Infiniteskills, contact us by completing and submitting the form below. If you are looking for a specif part number, please include it with your message.
Related Best Sellers
By Infiniteskills
Number of Videos: 9.25 hours - 105 lessonsAuthor: Mark LongUser Level: BeginnerIn this CompTIA Security+ training course, expert author Mark Long will teach you everything you need to know to prepare for a career in IT security, and successfully comp...
By Infiniteskills
Number of Videos: 9.25 hours - 105 lessons Author: Mark Long User Level: Beginner In this CompTIA Security+ training course, expert author Mark Long will teach you everything you need to know to prepare for a career in IT security, and successfully c...
By Infiniteskills
Number of Videos: 10 hours - 110 lessonsAuthor: John SavillUser Level: AdvancedIn this Microsoft Windows Server 2012 Certification (Exam 70-413) training course, expert author John Savill teaches you how to design, implement, and maintain a Windows S...
By Infiniteskills
Number of Videos: 4.75 hours - 83 lessons Author: Ric Messier User Level: Intermediate In this Professional Guide to Wireless Network Hacking and Penetration Testing training course, expert author Ric Messier will teach you the tools and techniques n...
By Infiniteskills
Number of Videos: 6 hours - 69 lessons Author:Philip Polstra User Level: Intermediate In this Reverse Engineering and Exploit Development training course, expert author Philip Polstra will teach you about common software vulnerabilities and how to fi...
By Microworld technologies Inc
The Next Generation Anti-Virus Solution for Windows-based Home Users eScan Anti-Virus solution designed for home users is a comprehensive Anti-Virus and Content Security Solution that provides proactive protection to your computers against Malware an...
By KTM Consulting, Inc.
Scrambler allows users to create one time cypher pads, and encrypt aqnd decrypt files using them. Files encrypted using one time cypher pads cannot be decrypted without a copy of the cypher pad. This allows files to be sent over networks without co...
By KTM Consulting, Inc.
Scrambler allows users to create one time cypher pads, and encrypt aqnd decrypt files using them. Files encrypted using one time cypher pads cannot be decrypted without a copy of the cypher pad. This allows files to be sent over networks without co...
By Tenorshare Co.,Ltd.
Completely Erase all Your Data 1.Erase data, programs and operating system from hard drive securely and completely. 2.Wipe data absolutely from external hard drive, memory card (SD card, CF card, XD card), USB flash drive, mobile phone (Blackberry,HT...
By CISSP Certification Training: Domain 2
Number of Videos: 4.5 hours - 35 lessons Author: David Miller User Level:Beginner In this CISSP Certification Training: Domain 2 training course, expert author David Miller will teach you everything you need to know to prepare for and pass dom...