כל הקורסים
network-operations-specialist · beginner

Network Operations Specialist Network Security

Network Security: OSI, VLAN, trunking, STP, LACP, OSPF, BGP, NAT, ACL, DNS, DHCP, packet flow and Wireshark troubleshooting. Includes commands, real incidents, monitoring and runbooks.

32 שיעורים תעודה כלולה

תכנית הקורס

Network Security Module 1

  • Beginner explanation: Network Security
    Deep beginner explanation for Network Security. Includes commands, architecture, operational checklist, monitoring indicators, security notes and troubleshooting flow.
    30m
  • Packet/command walkthrough: Network Security
    Deep packet/command walkthrough for Network Security. Includes commands, architecture, operational checklist, monitoring indicators, security notes and troubleshooting flow.
    35m
  • Production use case: Network Security
    Deep production use case for Network Security. Includes commands, architecture, operational checklist, monitoring indicators, security notes and troubleshooting flow.
    40m
  • Monitoring signals: Network Security
    Deep monitoring signals for Network Security. Includes commands, architecture, operational checklist, monitoring indicators, security notes and troubleshooting flow.
    45m
  • Troubleshooting method: Network Security
    Deep troubleshooting method for Network Security. Includes commands, architecture, operational checklist, monitoring indicators, security notes and troubleshooting flow.
    50m
  • Security implications: Network Security
    Deep security implications for Network Security. Includes commands, architecture, operational checklist, monitoring indicators, security notes and troubleshooting flow.
    55m
  • Performance considerations: Network Security
    Deep performance considerations for Network Security. Includes commands, architecture, operational checklist, monitoring indicators, security notes and troubleshooting flow.
    60m
  • Enterprise mistakes: Network Security
    Deep enterprise mistakes for Network Security. Includes commands, architecture, operational checklist, monitoring indicators, security notes and troubleshooting flow.
    65m

Network Security Module 2

  • Beginner explanation: Network Security
    Deep beginner explanation for Network Security. Includes commands, architecture, operational checklist, monitoring indicators, security notes and troubleshooting flow.
    30m
  • Packet/command walkthrough: Network Security
    Deep packet/command walkthrough for Network Security. Includes commands, architecture, operational checklist, monitoring indicators, security notes and troubleshooting flow.
    35m
  • Production use case: Network Security
    Deep production use case for Network Security. Includes commands, architecture, operational checklist, monitoring indicators, security notes and troubleshooting flow.
    40m
  • Monitoring signals: Network Security
    Deep monitoring signals for Network Security. Includes commands, architecture, operational checklist, monitoring indicators, security notes and troubleshooting flow.
    45m
  • Troubleshooting method: Network Security
    Deep troubleshooting method for Network Security. Includes commands, architecture, operational checklist, monitoring indicators, security notes and troubleshooting flow.
    50m
  • Security implications: Network Security
    Deep security implications for Network Security. Includes commands, architecture, operational checklist, monitoring indicators, security notes and troubleshooting flow.
    55m
  • Performance considerations: Network Security
    Deep performance considerations for Network Security. Includes commands, architecture, operational checklist, monitoring indicators, security notes and troubleshooting flow.
    60m
  • Enterprise mistakes: Network Security
    Deep enterprise mistakes for Network Security. Includes commands, architecture, operational checklist, monitoring indicators, security notes and troubleshooting flow.
    65m

Network Security Module 3

  • Beginner explanation: Network Security
    Deep beginner explanation for Network Security. Includes commands, architecture, operational checklist, monitoring indicators, security notes and troubleshooting flow.
    30m
  • Packet/command walkthrough: Network Security
    Deep packet/command walkthrough for Network Security. Includes commands, architecture, operational checklist, monitoring indicators, security notes and troubleshooting flow.
    35m
  • Production use case: Network Security
    Deep production use case for Network Security. Includes commands, architecture, operational checklist, monitoring indicators, security notes and troubleshooting flow.
    40m
  • Monitoring signals: Network Security
    Deep monitoring signals for Network Security. Includes commands, architecture, operational checklist, monitoring indicators, security notes and troubleshooting flow.
    45m
  • Troubleshooting method: Network Security
    Deep troubleshooting method for Network Security. Includes commands, architecture, operational checklist, monitoring indicators, security notes and troubleshooting flow.
    50m
  • Security implications: Network Security
    Deep security implications for Network Security. Includes commands, architecture, operational checklist, monitoring indicators, security notes and troubleshooting flow.
    55m
  • Performance considerations: Network Security
    Deep performance considerations for Network Security. Includes commands, architecture, operational checklist, monitoring indicators, security notes and troubleshooting flow.
    60m
  • Enterprise mistakes: Network Security
    Deep enterprise mistakes for Network Security. Includes commands, architecture, operational checklist, monitoring indicators, security notes and troubleshooting flow.
    65m

Network Security Module 4

  • Beginner explanation: Network Security
    Deep beginner explanation for Network Security. Includes commands, architecture, operational checklist, monitoring indicators, security notes and troubleshooting flow.
    30m
  • Packet/command walkthrough: Network Security
    Deep packet/command walkthrough for Network Security. Includes commands, architecture, operational checklist, monitoring indicators, security notes and troubleshooting flow.
    35m
  • Production use case: Network Security
    Deep production use case for Network Security. Includes commands, architecture, operational checklist, monitoring indicators, security notes and troubleshooting flow.
    40m
  • Monitoring signals: Network Security
    Deep monitoring signals for Network Security. Includes commands, architecture, operational checklist, monitoring indicators, security notes and troubleshooting flow.
    45m
  • Troubleshooting method: Network Security
    Deep troubleshooting method for Network Security. Includes commands, architecture, operational checklist, monitoring indicators, security notes and troubleshooting flow.
    50m
  • Security implications: Network Security
    Deep security implications for Network Security. Includes commands, architecture, operational checklist, monitoring indicators, security notes and troubleshooting flow.
    55m
  • Performance considerations: Network Security
    Deep performance considerations for Network Security. Includes commands, architecture, operational checklist, monitoring indicators, security notes and troubleshooting flow.
    60m
  • Enterprise mistakes: Network Security
    Deep enterprise mistakes for Network Security. Includes commands, architecture, operational checklist, monitoring indicators, security notes and troubleshooting flow.
    65m