本站已收录 番号和无损神作磁力链接/BT种子 

CBT Nuggets CompTIA Network+ (N10-007)

种子简介

种子名称: CBT Nuggets CompTIA Network+ (N10-007)
文件类型: 视频
文件数目: 228个文件
文件大小: 4.49 GB
收录时间: 2019-1-15 14:28
已经下载: 3
资源热度: 196
最近下载: 2024-12-28 15:34

下载BT种子文件

下载Torrent文件(.torrent) 立即下载

磁力链接下载

magnet:?xt=urn:btih:1c9d6712a0bf0edc041d5b055cd38874ae35a7e8&dn=CBT Nuggets CompTIA Network+ (N10-007) 复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。

喜欢这个种子的人也喜欢

种子包含的文件

CBT Nuggets CompTIA Network+ (N10-007).torrent
  • 001 OSI Layers Ports & Protocols A Tale of Two Kings.mp419.12MB
  • 002 OSI Layers Ports & Protocols The 7 Layers of the OSI Model.mp419.92MB
  • 003 OSI Layers Ports & Protocols TCPIP Suite Layers.mp421.54MB
  • 004 OSI Layers Ports & Protocols Core TCPIP Protocols.mp419.67MB
  • 005 OSI Layers Ports & Protocols Wireshark Views of Core TCPIP Protocols.mp417.68MB
  • 006 OSI Layers Ports & Protocols How Ports Are Used in TCPIP.mp425.01MB
  • 007 OSI Layers Ports & Protocols Verifying L4 Ports with Wireshark.mp412.53MB
  • 008 OSI Layers Ports & Protocols Common Protocols and Their Well-known Ports.mp422.11MB
  • 009 OSI Layers Ports & Protocols TCP's Three-way Handshake.mp421.2MB
  • 010 OSI Layers Ports & Protocols Wireshark Verification of a TCP 3-Way Handshake.mp418.54MB
  • 011 Ethernet Switching Properties of Network Traffic.mp421.81MB
  • 012 Ethernet Switching Layer 2 Ethernet Addresses.mp417.94MB
  • 013 Ethernet Switching How a Layer 2 Switch Works.mp420.82MB
  • 014 Ethernet Switching Demonstration Switch Dynamic Learning.mp412MB
  • 015 Ethernet Switching Understanding VLANs.mp412.55MB
  • 016 Ethernet Switching Configuring a VLAN.mp421.92MB
  • 017 Ethernet Switching Overview of 802.1Q and Trunks.mp421.77MB
  • 018 Ethernet Switching Configuring an 802.1Q Ethernet Trunk.mp420.42MB
  • 019 Ethernet Switching How Address Resolution Protocol (ARP) Operates.mp420.75MB
  • 020 Ethernet Switching Predicting the MAC Address Table.mp421.39MB
  • 021 Ethernet Switching Validating MAC Address Table Predictions.mp413.28MB
  • 022 Ethernet Switching Game Predict MAC Table After PC1 Pings PC4.mp416.38MB
  • 023 Ethernet Switching Game Predict MAC Table After PC3 Pings PC5.mp418.23MB
  • 024 Ethernet Switching Switching Loops and Spanning Tree Protocol (STP).mp416.61MB
  • 025 Ethernet Switching STP Reacting to a Network Change.mp420.19MB
  • 026 Ethernet Switching Design Considerations and PoE.mp416.74MB
  • 027 Ethernet Switching Switch Port Mirroring.mp411.14MB
  • 028 IP Routing and Forwarding Introduction to IP Routing.mp422.03MB
  • 029 IP Routing and Forwarding How to Train a Router.mp417.88MB
  • 030 IP Routing and Forwarding Options for Static Routes.mp419.57MB
  • 031 IP Routing and Forwarding Configuring Static Routes.mp418.01MB
  • 032 IP Routing and Forwarding Dynamic Routing Protocol Overview.mp416.61MB
  • 033 IP Routing and Forwarding Dynamic Routing Protocol Demonstration.mp48.73MB
  • 034 IP Routing and Forwarding Address Translation with PAT.mp417.36MB
  • 035 IP Routing and Forwarding One-to-one Translations with NAT.mp414.74MB
  • 036 IP Routing and Forwarding Using Wireshark to Verify IP Translations.mp416.34MB
  • 037 IP Routing and Forwarding Access Control Lists.mp421.08MB
  • 038 IP Routing and Forwarding ACL Demonstration.mp417.94MB
  • 039 IP Routing and Forwarding Enterprise Network Forwarding.mp420.42MB
  • 040 IP Addressing and Subnetting IPv4 Overview.mp421.4MB
  • 041 IP Addressing and Subnetting Binary Basics.mp421.26MB
  • 042 IP Addressing and Subnetting Converting Decimal to Binary.mp420.32MB
  • 043 IP Addressing and Subnetting Converting Binary to Decimal.mp421.23MB
  • 044 IP Addressing and Subnetting The IP Mask.mp420.57MB
  • 045 IP Addressing and Subnetting Practice Using a Different IP Mask.mp416.32MB
  • 046 IP Addressing and Subnetting Borrowing Host Bits.mp457.31MB
  • 047 IP Addressing and Subnetting Practicing the Finger Game.mp416.85MB
  • 048 IP Addressing and Subnetting Identifying New Subnets.mp420.7MB
  • 049 IP Addressing and Subnetting Exercise 1 Identify the New Subnets.mp421.62MB
  • 050 IP Addressing and Subnetting Exercise 2 Identify the New Subnets.mp410.8MB
  • 051 IP Addressing and Subnetting ID Valid Host Addresses on a Subnet.mp420.7MB
  • 052 IP Addressing and Subnetting Exercise 1 ID Valid Host Addresses.mp421.45MB
  • 053 IP Addressing and Subnetting Exercise 2 ID Valid Host Addresses.mp418.94MB
  • 054 IP Addressing and Subnetting Calculate the Number of Hosts per Subnet.mp422.06MB
  • 055 IP Addressing and Subnetting Determine the Subnet Based on a Host's IP Address.mp421.65MB
  • 056 IP Addressing and Subnetting Planning and Assigning IP Addresses.mp422.13MB
  • 057 IP Addressing and Subnetting Test Your IPv4 Knowledge Lab.mp439.12MB
  • 058 IP Addressing and Subnetting IPv6 Concepts.mp420.86MB
  • 059 Network Topologies Wired Topologies.mp423.07MB
  • 060 Network Topologies Wireless Topologies.mp418.22MB
  • 061 Network Topologies Types of Networks.mp422.23MB
  • 062 Network Topologies Introducing the Internet of Things (IoT).mp421.55MB
  • 063 Network Topologies Internet of Things (IoT) Technologies.mp417.57MB
  • 064 Wireless Technologies and Configurations The Purpose of Wireless.mp416.31MB
  • 065 Wireless Technologies and Configurations Understanding Radio Frequency.mp424.55MB
  • 066 Wireless Technologies and Configurations Understanding Radio Channels.mp429.73MB
  • 067 Wireless Technologies and Configurations Wireless Communication Technologies.mp425.52MB
  • 068 Wireless Technologies and Configurations Designing for Wireless Speed and Coverage.mp430.53MB
  • 069 Wireless Technologies and Configurations Understanding Wireless Antennas.mp420.05MB
  • 070 Wireless Technologies and Configurations Wireless Performance Improvements.mp427.7MB
  • 071 Cloud Concepts Types of Services.mp421.13MB
  • 072 Cloud Concepts Cloud Delivery Models.mp414.63MB
  • 073 Cloud Concepts Connectivity Methods.mp420.23MB
  • 074 Cloud Concepts Security Implications Considerations.mp421.81MB
  • 075 Cloud Concepts Local and Cloud Resource Relationships.mp418.4MB
  • 076 Network Services DHCP Overview.mp421.89MB
  • 077 Network Services Verify DHCP with Wireshark.mp411.16MB
  • 078 Network Services DNS Overview.mp412.53MB
  • 079 Network Services DNS Methods Records and Design Options.mp422.11MB
  • 080 Network Services DNS Testing and Validation.mp413.67MB
  • 081 Network Services Network Time Protocol (NTP).mp419.45MB
  • 082 Network Services IP Address Management (IPAM).mp412.49MB
  • 083 Deploying Appropriate Cabling Solutions Copper Network Media Types.mp429.63MB
  • 084 Deploying Appropriate Cabling Solutions Fiber Network Media Types.mp425.75MB
  • 085 Deploying Appropriate Cabling Solutions Network Termination Points.mp435.42MB
  • 086 Deploying Appropriate Cabling Solutions Network Transceivers.mp430.54MB
  • 087 Device Placement and Configuration Network Device Placement.mp421.38MB
  • 088 Device Placement and Configuration Device Configuration Overview.mp421.84MB
  • 089 Device Placement and Configuration Configure Switch Ports Lab.mp423.78MB
  • 090 Device Placement and Configuration Configure IP Addresses Lab.mp419.37MB
  • 091 Device Placement and Configuration Configure IP Routing Lab.mp423.22MB
  • 092 Device Placement and Configuration Configuring DHCP Services Lab.mp420.95MB
  • 093 Device Placement and Configuration Configuring a VLAN Interface Lab.mp425.73MB
  • 094 Device Placement and Configuration Configuring NAT Lab.mp423.59MB
  • 095 Advanced Networking Devices Multi-Layer Switch Overview.mp422.18MB
  • 096 Advanced Networking Devices Configure Multi-Layer Switch Lab.mp421.4MB
  • 097 Advanced Networking Devices Load Balancer Overview.mp414.79MB
  • 098 Advanced Networking Devices IDS and IPS.mp419.2MB
  • 099 Advanced Networking Devices Proxy Servers and Content Filtering.mp412.74MB
  • 100 Advanced Networking Devices Security Network Devices.mp418.27MB
  • 101 Advanced Networking Devices AAARADIUS Server.mp414.48MB
  • 102 Advanced Networking Devices VoIP PBX and Gateway.mp412.31MB
  • 103 Advanced Networking Devices Wireless Controller.mp411.28MB
  • 104 Virtualization & Network Storage Hypervisor Introduction.mp421.54MB
  • 105 Virtualization & Network Storage Virtual Networking Components.mp415.13MB
  • 106 Virtualization & Network Storage Creating a Virtual Switch and VM Lab.mp412.65MB
  • 107 Virtualization & Network Storage Network Storage.mp419.11MB
  • 108 WAN Technologies Understanding the LAN MAN and WAN Difference.mp419.56MB
  • 109 WAN Technologies WAN Transmission over Copper Fiber Wireless and Satellite.mp414.5MB
  • 110 WAN Technologies WAN Types ISDNPRI T1-T3 E1-E3 and OC.mp437.37MB
  • 111 WAN Technologies WAN Types Cable DSL Dial-up.mp423.1MB
  • 112 WAN Technologies WAN Characteristics Frame Relay ATM MPLS and DMVPN.mp433.01MB
  • 113 WAN Technologies What is PPP and PPPoE.mp419.78MB
  • 114 WAN Technologies What is SIP Trunking.mp425.34MB
  • 115 WAN Technologies The Physical Reality of a WAN Connection.mp418.37MB
  • 116 Network Diagram & Documentation Network Documentation is Fun!.mp421.91MB
  • 117 Network Diagram & Documentation Creating Logical Network Diagrams.mp420.05MB
  • 118 Network Diagram & Documentation Creating Physical Diagrams.mp419.17MB
  • 119 Network Diagram & Documentation Naming Conventions and Labeling.mp426.62MB
  • 120 Network Diagram & Documentation Documenting Wiring and Port Locations.mp421.38MB
  • 121 Network Diagram & Documentation SOPs and Work Instructions.mp425.5MB
  • 122 Network Diagram & Documentation Network Change Management.mp419.04MB
  • 123 Network Diagram & Documentation Configuration and Monitoring Baselines.mp426.45MB
  • 124 Network Diagram & Documentation Inventory Management.mp415.22MB
  • 125 Business Continuity Availability Concepts.mp419.64MB
  • 126 Business Continuity Load Sharing and Balancing.mp422.23MB
  • 127 Business Continuity Power Management.mp410.6MB
  • 128 Business Continuity Site Recovery Options.mp419.6MB
  • 129 Business Continuity Backups.mp428.76MB
  • 130 Business Continuity Backup and Restore Hands On Lab.mp452.81MB
  • 131 Business Continuity MTTR and MTBF.mp414.66MB
  • 132 Business Continuity SLA Requirements.mp410.5MB
  • 133 Scanning Monitoring & Patching Scanning Overview.mp410.91MB
  • 134 Scanning Monitoring & Patching Network Scanning Methodology.mp412.39MB
  • 135 Scanning Monitoring & Patching Port Scanning and Discovery.mp416.74MB
  • 136 Scanning Monitoring & Patching OS Discovery and Fingerprinting.mp421.68MB
  • 137 Scanning Monitoring & Patching Motivators for Vulnerability Management.mp416.96MB
  • 138 Scanning Monitoring & Patching Vulnerability Scanning.mp418.59MB
  • 139 Scanning Monitoring & Patching Logging and Review.mp421.73MB
  • 140 Scanning Monitoring & Patching Packet and Traffic Analysis.mp417.48MB
  • 141 Scanning Monitoring & Patching Packet Capture and Analysis Lab.mp439.17MB
  • 142 Scanning Monitoring & Patching Remediation and Patch Management.mp421.9MB
  • 143 Scanning Monitoring & Patching Network Scanning with NMAP and Zenmap Lab.mp465.22MB
  • 144 Scanning Monitoring & Patching Baselines.mp415.03MB
  • 145 Remote Access Methods Telnet and SSH for CLI Remote Access.mp416.63MB
  • 146 Remote Access Methods HTTPS Management URLs.mp411.35MB
  • 147 Remote Access Methods VPNs.mp420.24MB
  • 148 Remote Access Methods Remote Desktop Access.mp415.24MB
  • 149 Remote Access Methods Out-of-Band Management.mp418.89MB
  • 150 Identify Policies & Best Practices Privileged User Agreement.mp414.92MB
  • 151 Identify Policies & Best Practices Password Policy.mp413.84MB
  • 152 Identify Policies & Best Practices On-boarding and Off-boarding.mp424.91MB
  • 153 Identify Policies & Best Practices Licensing Restrictions.mp417MB
  • 154 Identify Policies & Best Practices International Export Controls.mp412.75MB
  • 155 Identify Policies & Best Practices Data Loss Prevention.mp415.35MB
  • 156 Identify Policies & Best Practices Remote Access Policies.mp414.4MB
  • 157 Identify Policies & Best Practices Incident Response Policies.mp418.79MB
  • 158 Identify Policies & Best Practices Bring Your Own Device (BYOD).mp419.37MB
  • 159 Identify Policies & Best Practices Acceptable Use Policy (AUP).mp413.38MB
  • 160 Identify Policies & Best Practices Non-disclosure Agreements (NDA).mp415.06MB
  • 161 Identify Policies & Best Practices System Life Cycle.mp416.26MB
  • 162 Identify Policies & Best Practices Safety Procedures and Policies.mp49.51MB
  • 163 Physical Security & Network Attacks Let's Break into a Data Center.mp48.8MB
  • 164 Physical Security & Network Attacks Video Surveillance and Motion Detection.mp420.24MB
  • 165 Physical Security & Network Attacks Badges and Smart Cards.mp419.37MB
  • 166 Physical Security & Network Attacks Biometrics.mp419.18MB
  • 167 Physical Security & Network Attacks Locks Asset Tags and Tamper Detection.mp420.54MB
  • 168 Physical Security & Network Attacks DoS and PDoS (Permanent Denial of Service).mp416.06MB
  • 169 Physical Security & Network Attacks DDoS (Distributed Denial of Service).mp416.9MB
  • 170 Physical Security & Network Attacks DDoS with ICMP and Smurfing.mp412.3MB
  • 171 Physical Security & Network Attacks DDoS with DNS and NTP.mp414.82MB
  • 172 Physical Security & Network Attacks Let's Go Phishing.mp414.9MB
  • 173 Physical Security & Network Attacks Social Engineering and Insider Threats.mp417.07MB
  • 174 Physical Security & Network Attacks Ransomware and Scareware.mp415.38MB
  • 175 Physical Security & Network Attacks Cryptolocker and Logic Bombs.mp421.22MB
  • 176 Physical Security & Network Attacks DNS Spoofing (Poisoning).mp421.95MB
  • 177 Physical Security & Network Attacks Man-In-The-Middle with ARP Spoofing.mp421.72MB
  • 178 Physical Security & Network Attacks Wardriving and Deauthentication.mp420.54MB
  • 179 Physical Security & Network Attacks Evil Twins and Rogue Access Points.mp418.46MB
  • 180 Authentication & Access Control AAA.mp421.17MB
  • 181 Authentication & Access Control Multi-factor Authentication Overview.mp417.53MB
  • 182 Authentication & Access Control Using Two-Factor Authentication (2FA).mp417.61MB
  • 183 Authentication & Access Control Demo Implementing 2FA.mp421.52MB
  • 184 Authentication & Access Control Switch Port Security.mp410.64MB
  • 185 Authentication & Access Control Access Control Methods.mp413.39MB
  • 186 Basic Wireless Network Security The Wireless Security Evolution.mp425.38MB
  • 187 Basic Wireless Network Security Wireless Authentication and Authorization Types.mp425.74MB
  • 188 Mitigation Techniques Network Device Hardening.mp421.97MB
  • 189 Mitigation Techniques Hardening a Windows Server System.mp415.72MB
  • 190 Mitigation Techniques Signature Management.mp411.87MB
  • 191 Mitigation Techniques File Integrity Monitoring.mp416.78MB
  • 192 Mitigation Techniques Privileged User Accounts and Role Separation.mp419.5MB
  • 193 Mitigation Techniques Network Segmentation.mp415.31MB
  • 194 Mitigation Techniques Switch Port Protections.mp425.26MB
  • 195 Mitigation Techniques The Native VLAN.mp418.5MB
  • 196 Mitigation Techniques Filtering with Access Control Lists (ACLs).mp423.65MB
  • 197 Mitigation Techniques Honeypots and Honeynets.mp412.58MB
  • 198 Mitigation Techniques Penetration Testing.mp418.6MB
  • 199 Troubleshooting Methodology A Network Troubleshooting Methodology.mp415.56MB
  • 200 Troubleshooting Methodology Identify the Problem.mp415.14MB
  • 201 Troubleshooting Methodology Establish a Theory of Probable Cause.mp420.38MB
  • 202 Troubleshooting Methodology Test the Theory to Determine the Root Cause.mp413.5MB
  • 203 Troubleshooting Methodology Establish a Plan of Action to Solve the Problem.mp415.44MB
  • 204 Troubleshooting Methodology Problem Solving Verification and Documentation.mp417.43MB
  • 205 Network Troubleshooting Hardware Tools.mp431.68MB
  • 206 Network Troubleshooting Software Tools.mp431.93MB
  • 207 Network Troubleshooting Using CLI Network Tools ipconfig ping arp.mp431.69MB
  • 208 Network Troubleshooting Using CLI Network Tools nslookup dig.mp427.81MB
  • 209 Network Troubleshooting Using CLI Network Tools tracert pathping nmap route.mp433.78MB
  • 210 Network Troubleshooting Using CLI Network Tools ifconfig iptables tcpdump and netstat.mp425.77MB
  • 211 Wired Connectivity & Performance Issues Attenuation Latency and Jitter.mp421.61MB
  • 212 Wired Connectivity & Performance Issues Crosstalk EMI OpenShort.mp420.59MB
  • 213 Wired Connectivity & Performance Issues Incorrect Pin-Outs or Cable Types.mp416.56MB
  • 214 Wired Connectivity & Performance Issues Mismatched and Damaged Cables.mp412.34MB
  • 215 Wired Connectivity & Performance Issues Bad Ports and LED Status Indicators.mp418.51MB
  • 216 Wired Connectivity & Performance Issues Duplex and Speed Mismatches.mp417.47MB
  • 217 Wired Connectivity & Performance Issues VLAN Mismatches.mp427.71MB
  • 218 Wired Connectivity & Performance Issues Native VLAN Mismatches.mp421.61MB
  • 219 Wired Connectivity & Performance Issues Bottlenecks.mp419.34MB
  • 220 Troubleshooting Wireless The Nature of Airwaves.mp425.6MB
  • 221 Troubleshooting Wireless Fighting Frequencies.mp432.75MB
  • 222 Troubleshooting Wireless Understanding Antenna Types.mp420.44MB
  • 223 Troubleshooting Wireless Misconfigurations.mp427.09MB
  • 224 Common Network Service Issues Troubleshooting Name Resolution.mp424.59MB
  • 225 Common Network Service Issues Troubleshooting MAC Addressing.mp420.29MB
  • 226 Common Network Service Issues Troubleshooting IP Addressing.mp421.22MB
  • 227 Common Network Service Issues Troubleshooting Security Settings.mp419.89MB
  • 228 Common Network Service Issues Troubleshooting Miscellaneous Service Issues.mp420.29MB