本站已收录 番号和无损神作磁力链接/BT种子 

Lynda.com - CompTIA Network+ Exam Prep (N10-006)

种子简介

种子名称: Lynda.com - CompTIA Network+ Exam Prep (N10-006)
文件类型: 视频
文件数目: 144个文件
文件大小: 3.26 GB
收录时间: 2018-8-17 10:04
已经下载: 3
资源热度: 158
最近下载: 2024-9-28 13:01

下载BT种子文件

下载Torrent文件(.torrent) 立即下载

磁力链接下载

magnet:?xt=urn:btih:74f1827c580dfff0789e535693d697329cb6d3f9&dn=Lynda.com - CompTIA Network+ Exam Prep (N10-006) 复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。

喜欢这个种子的人也喜欢

种子包含的文件

Lynda.com - CompTIA Network+ Exam Prep (N10-006).torrent
  • Part 1 - Understanding Networks/0. Welcome.mp421.52MB
  • Part 1 - Understanding Networks/1. Meet the frame.mp425.25MB
  • Part 1 - Understanding Networks/10. Next steps.mp42.99MB
  • Part 1 - Understanding Networks/2. The MAC address.mp426.81MB
  • Part 1 - Understanding Networks/3. Broadcast vs. Unicast.mp417.51MB
  • Part 1 - Understanding Networks/4. Hubs and switches.mp47.41MB
  • Part 1 - Understanding Networks/5. Introduction to IP addressing.mp435.66MB
  • Part 1 - Understanding Networks/6. Packets and ports.mp420.29MB
  • Part 1 - Understanding Networks/7. What is a model.mp46.68MB
  • Part 1 - Understanding Networks/8. The OSI model vs. the TCP-IP model.mp429.88MB
  • Part 1 - Understanding Networks/9. Walking through the OSI and TCP-IP models.mp458.77MB
  • Part 2 - The Physical Network/0. Introduction/1. Welcome.mp48.47MB
  • Part 2 - The Physical Network/1. Cabling and Topology/1. Coaxial cabling.mp415.88MB
  • Part 2 - The Physical Network/1. Cabling and Topology/2. UTP and STP cabling.mp433.98MB
  • Part 2 - The Physical Network/1. Cabling and Topology/3. Fiber-optic cabling.mp430.9MB
  • Part 2 - The Physical Network/2. Ethernet Basics/1. Introduction to Ethernet.mp421.7MB
  • Part 2 - The Physical Network/2. Ethernet Basics/2. Early Ethernet.mp428.63MB
  • Part 2 - The Physical Network/2. Ethernet Basics/3. The daddy of Ethernet, 10BaseT.mp411.29MB
  • Part 2 - The Physical Network/3. Modern Ethernet/1. Modern Ethernet, switches, and duplex.mp428.93MB
  • Part 2 - The Physical Network/3. Modern Ethernet/2. Connecting switches.mp425.94MB
  • Part 2 - The Physical Network/3. Modern Ethernet/3. Gigabit Ethernet and 10-gigabit Ethernet.mp423.44MB
  • Part 2 - The Physical Network/3. Modern Ethernet/4. Switch backbones.mp420.26MB
  • Part 2 - The Physical Network/4. Installing a Physical Network/1. Introduction to structured cabling.mp420.21MB
  • Part 2 - The Physical Network/4. Installing a Physical Network/2. Crimping cables.mp439.57MB
  • Part 2 - The Physical Network/4. Installing a Physical Network/3. Punchdown blocks.mp444.37MB
  • Part 2 - The Physical Network/4. Installing a Physical Network/4. MDF, IDF, demarc, and tour of the equipment room.mp433.44MB
  • Part 2 - The Physical Network/4. Installing a Physical Network/5. Testing cable.mp439.78MB
  • Part 2 - The Physical Network/4. Installing a Physical Network/6. Troubleshooting structured cabling.mp417.06MB
  • Part 2 - The Physical Network/4. Installing a Physical Network/7. Advanced troubleshooting structured cabling.mp424.03MB
  • Part 2 - The Physical Network/4. Installing a Physical Network/8. Using a toner and probe.mp412.5MB
  • Part 2 - The Physical Network/5. Conclusion/1. Next steps.mp42.63MB
  • Part 3 - The World of TCP-IP/0. Welcome.mp49.05MB
  • Part 3 - The World of TCP-IP/1. TCP-IP Basics/01. Introduction to IP addressing and binary.mp451.5MB
  • Part 3 - The World of TCP-IP/1. TCP-IP Basics/02. Introduction to ARP.mp411.02MB
  • Part 3 - The World of TCP-IP/1. TCP-IP Basics/03. Subnet mask.mp456.23MB
  • Part 3 - The World of TCP-IP/1. TCP-IP Basics/04. Classful addressing.mp425.64MB
  • Part 3 - The World of TCP-IP/1. TCP-IP Basics/05. Subnetting with CIDR.mp450.1MB
  • Part 3 - The World of TCP-IP/1. TCP-IP Basics/06. More CIDR and subnetting practice.mp418.83MB
  • Part 3 - The World of TCP-IP/1. TCP-IP Basics/07. Dynamic and static IP addressing.mp449.26MB
  • Part 3 - The World of TCP-IP/1. TCP-IP Basics/08. Rogue DHCP servers.mp424.98MB
  • Part 3 - The World of TCP-IP/1. TCP-IP Basics/09. Special IP addresses.mp414.71MB
  • Part 3 - The World of TCP-IP/2. Routing/10. Introducing routers.mp447.26MB
  • Part 3 - The World of TCP-IP/2. Routing/11. Understanding ports.mp429.72MB
  • Part 3 - The World of TCP-IP/2. Routing/12. Network Address Translation (NAT).mp430.9MB
  • Part 3 - The World of TCP-IP/2. Routing/13. Implementing NAT.mp48.04MB
  • Part 3 - The World of TCP-IP/2. Routing/14. Port forwarding.mp428.9MB
  • Part 3 - The World of TCP-IP/2. Routing/15. DMZ, port range forwarding, and port triggering.mp418.87MB
  • Part 3 - The World of TCP-IP/2. Routing/16. Tour of a SOHO router.mp433.66MB
  • Part 3 - The World of TCP-IP/2. Routing/17. Introduction to routing protocols.mp439.55MB
  • Part 3 - The World of TCP-IP/2. Routing/18. Routing Information Protocol (RIP).mp414.71MB
  • Part 3 - The World of TCP-IP/2. Routing/19. Open Shortest Path First (OSPF).mp412.16MB
  • Part 3 - The World of TCP-IP/2. Routing/20. Border Gateway Protocol.mp413.55MB
  • Part 3 - The World of TCP-IP/3. Conclusion/21. Next steps.mp42.24MB
  • Part 4 - Making TCP-IP Work/0. Welcome.mp410.18MB
  • Part 4 - Making TCP-IP Work/1. TCP-IP Applications/01. Introduction to TCP and UDP.mp434.63MB
  • Part 4 - Making TCP-IP Work/1. TCP-IP Applications/02. ICMP and IGMP.mp424.1MB
  • Part 4 - Making TCP-IP Work/1. TCP-IP Applications/03. Introduction to Wireshark.mp422.93MB
  • Part 4 - Making TCP-IP Work/1. TCP-IP Applications/04. The netstat command.mp423.13MB
  • Part 4 - Making TCP-IP Work/1. TCP-IP Applications/05. Web servers.mp438.42MB
  • Part 4 - Making TCP-IP Work/1. TCP-IP Applications/06. File Transfer Protocol (FTP).mp434.86MB
  • Part 4 - Making TCP-IP Work/1. TCP-IP Applications/07. Email servers and clients.mp431.72MB
  • Part 4 - Making TCP-IP Work/1. TCP-IP Applications/08. Telnet and SSH.mp429.52MB
  • Part 4 - Making TCP-IP Work/2. Network Naming/09. What is DNS.mp439.17MB
  • Part 4 - Making TCP-IP Work/2. Network Naming/10. How DNS works.mp426.31MB
  • Part 4 - Making TCP-IP Work/2. Network Naming/11. The HOSTS file.mp49.99MB
  • Part 4 - Making TCP-IP Work/2. Network Naming/12. Nbtstat.mp46.71MB
  • Part 4 - Making TCP-IP Work/2. Network Naming/13. Dynamic DNS.mp418.87MB
  • Part 4 - Making TCP-IP Work/2. Network Naming/14. DNS troubleshooting.mp441.62MB
  • Part 4 - Making TCP-IP Work/3. Securing TCP-IP/15. Symmetric encryption.mp418.5MB
  • Part 4 - Making TCP-IP Work/3. Securing TCP-IP/16. Asymmetric encryption.mp413.1MB
  • Part 4 - Making TCP-IP Work/3. Securing TCP-IP/17. Cryptographic hashes.mp417.18MB
  • Part 4 - Making TCP-IP Work/3. Securing TCP-IP/18. Access control.mp420.77MB
  • Part 4 - Making TCP-IP Work/3. Securing TCP-IP/19. AAA.mp420.34MB
  • Part 4 - Making TCP-IP Work/3. Securing TCP-IP/20. Kerberos-EAP.mp428.01MB
  • Part 4 - Making TCP-IP Work/3. Securing TCP-IP/21. Cryptographic tunnels with SSH.mp428.21MB
  • Part 4 - Making TCP-IP Work/3. Securing TCP-IP/22. Network Time Protocol.mp46.88MB
  • Part 4 - Making TCP-IP Work/4. Conclusion/23. Next steps.mp44.1MB
  • Part 5 - Advanced IP Networking/0. Welcome.mp49.28MB
  • Part 5 - Advanced IP Networking/1. Advanced Networking Devices/01. Client-server vs. peer-to-peer.mp422.12MB
  • Part 5 - Advanced IP Networking/1. Advanced Networking Devices/02. Virtual Private Networks (VPNs).mp445.3MB
  • Part 5 - Advanced IP Networking/1. Advanced Networking Devices/03. Introduction to VLANs.mp435.99MB
  • Part 5 - Advanced IP Networking/1. Advanced Networking Devices/04. InterVLAN routing.mp413.94MB
  • Part 5 - Advanced IP Networking/1. Advanced Networking Devices/05. Interfacing with managed switches.mp430.61MB
  • Part 5 - Advanced IP Networking/1. Advanced Networking Devices/06. Port bonding.mp430.71MB
  • Part 5 - Advanced IP Networking/1. Advanced Networking Devices/07. Port mirroring.mp411.26MB
  • Part 5 - Advanced IP Networking/1. Advanced Networking Devices/08. Quality of service.mp415.04MB
  • Part 5 - Advanced IP Networking/1. Advanced Networking Devices/09. IDS vs. IPS.mp422.73MB
  • Part 5 - Advanced IP Networking/2. IPv6/10. Introduction to IPv6 addressing.mp419.04MB
  • Part 5 - Advanced IP Networking/2. IPv6/11. Advanced IPv6 addressing.mp430.15MB
  • Part 5 - Advanced IP Networking/2. IPv6/12. IPv6 tunnels.mp416.13MB
  • Part 5 - Advanced IP Networking/3. Remote Connectivity/13. Telephony technologies.mp432.08MB
  • Part 5 - Advanced IP Networking/3. Remote Connectivity/14. Optical carriers.mp411.48MB
  • Part 5 - Advanced IP Networking/3. Remote Connectivity/15. Packet switching.mp415.44MB
  • Part 5 - Advanced IP Networking/3. Remote Connectivity/16. Connecting with dial-up.mp419.59MB
  • Part 5 - Advanced IP Networking/3. Remote Connectivity/17. Digital Subscriber Line (DSL).mp423.25MB
  • Part 5 - Advanced IP Networking/3. Remote Connectivity/18. Connecting with cable modems.mp415.39MB
  • Part 5 - Advanced IP Networking/3. Remote Connectivity/19. Connecting with satellites.mp47.4MB
  • Part 5 - Advanced IP Networking/3. Remote Connectivity/20. Cellular WAN.mp421.61MB
  • Part 5 - Advanced IP Networking/3. Remote Connectivity/21. ISDN and BPL.mp414.81MB
  • Part 5 - Advanced IP Networking/3. Remote Connectivity/22. Remote connectivity.mp412.98MB
  • Part 5 - Advanced IP Networking/4. Conclusion/23. Next steps.mp42.12MB
  • Part 6 - Beyond the Typical Network/0. Welcome.mp410.31MB
  • Part 6 - Beyond the Typical Network/1. Wireless Networking/01. Introduction to Wi-Fi and wireless access points.mp431.13MB
  • Part 6 - Beyond the Typical Network/1. Wireless Networking/02. 802.11 standards.mp460MB
  • Part 6 - Beyond the Typical Network/1. Wireless Networking/03. Power over Ethernet (POE).mp411.99MB
  • Part 6 - Beyond the Typical Network/1. Wireless Networking/04. Wireless security standards.mp427.43MB
  • Part 6 - Beyond the Typical Network/1. Wireless Networking/05. Implementing wireless security.mp417.03MB
  • Part 6 - Beyond the Typical Network/1. Wireless Networking/06. Threats to your wireless network.mp423MB
  • Part 6 - Beyond the Typical Network/1. Wireless Networking/07. Retro threats.mp436.86MB
  • Part 6 - Beyond the Typical Network/1. Wireless Networking/08. Wi-Fi Protected Setup (WPS).mp418.01MB
  • Part 6 - Beyond the Typical Network/1. Wireless Networking/09. Wireless problem scenarios.mp417.36MB
  • Part 6 - Beyond the Typical Network/1. Wireless Networking/10. Planning and installing a wireless network.mp452.07MB
  • Part 6 - Beyond the Typical Network/2. Virtualization and Cloud Computing/11. Virtualization basics.mp426.15MB
  • Part 6 - Beyond the Typical Network/2. Virtualization and Cloud Computing/12. Your first virtual machine.mp422.02MB
  • Part 6 - Beyond the Typical Network/2. Virtualization and Cloud Computing/13. Infrastructure as a service (IaaS).mp427.12MB
  • Part 6 - Beyond the Typical Network/2. Virtualization and Cloud Computing/14. Platform as a service (PaaS).mp424.8MB
  • Part 6 - Beyond the Typical Network/2. Virtualization and Cloud Computing/15. Software as a service (SaaS).mp48.18MB
  • Part 6 - Beyond the Typical Network/2. Virtualization and Cloud Computing/16. Cloud ownership.mp49.17MB
  • Part 6 - Beyond the Typical Network/3. Building a Real-World Network/17. Network types.mp423.51MB
  • Part 6 - Beyond the Typical Network/3. Building a Real-World Network/18. Network design.mp441.82MB
  • Part 6 - Beyond the Typical Network/3. Building a Real-World Network/19. SCADA and ICS.mp425.11MB
  • Part 6 - Beyond the Typical Network/3. Building a Real-World Network/20. Unified communications.mp426.57MB
  • Part 6 - Beyond the Typical Network/4. Conclusion/21. Next steps.mp42.37MB
  • Part 7 - Managing the Network/0. Welcome.mp411.13MB
  • Part 7 - Managing the Network/1. Managing Risk/01. Risk management.mp428.03MB
  • Part 7 - Managing the Network/1. Managing Risk/02. Security policies.mp414.14MB
  • Part 7 - Managing the Network/1. Managing Risk/03. Change management.mp424.82MB
  • Part 7 - Managing the Network/1. Managing Risk/04. User training.mp411.44MB
  • Part 7 - Managing the Network/1. Managing Risk/05. Points of failure.mp420.68MB
  • Part 7 - Managing the Network/1. Managing Risk/06. Standard business documentation.mp419.07MB
  • Part 7 - Managing the Network/2. Protecting Your Network/07. Threats.mp431.31MB
  • Part 7 - Managing the Network/2. Protecting Your Network/08. Social engineering.mp412.01MB
  • Part 7 - Managing the Network/2. Protecting Your Network/09. Access control.mp418.53MB
  • Part 7 - Managing the Network/2. Protecting Your Network/10. Testing network security.mp428.06MB
  • Part 7 - Managing the Network/2. Protecting Your Network/11. Mitigating network threats.mp421.23MB
  • Part 7 - Managing the Network/2. Protecting Your Network/12. Introduction to firewalls.mp415.48MB
  • Part 7 - Managing the Network/2. Protecting Your Network/13. Firewalls.mp429.29MB
  • Part 7 - Managing the Network/2. Protecting Your Network/14. DMZ.mp418.41MB
  • Part 7 - Managing the Network/3. Network Monitoring/15. SNMP.mp442.43MB
  • Part 7 - Managing the Network/3. Network Monitoring/16. Documenting logs.mp424.83MB
  • Part 7 - Managing the Network/4. Network Troubleshooting/17. MTU problems.mp417.29MB
  • Part 7 - Managing the Network/4. Network Troubleshooting/18. Bad connection solutions.mp421.42MB
  • Part 7 - Managing the Network/4. Network Troubleshooting/19. Titanium tech.mp424.7MB
  • Part 7 - Managing the Network/5. Conclusion/20. Next steps.mp49.37MB