כל הקורסים
network-operations-specialist · beginner
Network Operations Specialist Network Security
Network Security: OSI, VLAN, trunking, STP, LACP, OSPF, BGP, NAT, ACL, DNS, DHCP, packet flow and Wireshark troubleshooting. Includes commands, real incidents, monitoring and runbooks.
32 שיעורים תעודה כלולה
תכנית הקורס
Network Security Module 1
- 30mBeginner explanation: Network SecurityDeep beginner explanation for Network Security. Includes commands, architecture, operational checklist, monitoring indicators, security notes and troubleshooting flow.
- 35mPacket/command walkthrough: Network SecurityDeep packet/command walkthrough for Network Security. Includes commands, architecture, operational checklist, monitoring indicators, security notes and troubleshooting flow.
- 40mProduction use case: Network SecurityDeep production use case for Network Security. Includes commands, architecture, operational checklist, monitoring indicators, security notes and troubleshooting flow.
- 45mMonitoring signals: Network SecurityDeep monitoring signals for Network Security. Includes commands, architecture, operational checklist, monitoring indicators, security notes and troubleshooting flow.
- 50mTroubleshooting method: Network SecurityDeep troubleshooting method for Network Security. Includes commands, architecture, operational checklist, monitoring indicators, security notes and troubleshooting flow.
- 55mSecurity implications: Network SecurityDeep security implications for Network Security. Includes commands, architecture, operational checklist, monitoring indicators, security notes and troubleshooting flow.
- 60mPerformance considerations: Network SecurityDeep performance considerations for Network Security. Includes commands, architecture, operational checklist, monitoring indicators, security notes and troubleshooting flow.
- 65mEnterprise mistakes: Network SecurityDeep enterprise mistakes for Network Security. Includes commands, architecture, operational checklist, monitoring indicators, security notes and troubleshooting flow.
Network Security Module 2
- 30mBeginner explanation: Network SecurityDeep beginner explanation for Network Security. Includes commands, architecture, operational checklist, monitoring indicators, security notes and troubleshooting flow.
- 35mPacket/command walkthrough: Network SecurityDeep packet/command walkthrough for Network Security. Includes commands, architecture, operational checklist, monitoring indicators, security notes and troubleshooting flow.
- 40mProduction use case: Network SecurityDeep production use case for Network Security. Includes commands, architecture, operational checklist, monitoring indicators, security notes and troubleshooting flow.
- 45mMonitoring signals: Network SecurityDeep monitoring signals for Network Security. Includes commands, architecture, operational checklist, monitoring indicators, security notes and troubleshooting flow.
- 50mTroubleshooting method: Network SecurityDeep troubleshooting method for Network Security. Includes commands, architecture, operational checklist, monitoring indicators, security notes and troubleshooting flow.
- 55mSecurity implications: Network SecurityDeep security implications for Network Security. Includes commands, architecture, operational checklist, monitoring indicators, security notes and troubleshooting flow.
- 60mPerformance considerations: Network SecurityDeep performance considerations for Network Security. Includes commands, architecture, operational checklist, monitoring indicators, security notes and troubleshooting flow.
- 65mEnterprise mistakes: Network SecurityDeep enterprise mistakes for Network Security. Includes commands, architecture, operational checklist, monitoring indicators, security notes and troubleshooting flow.
Network Security Module 3
- 30mBeginner explanation: Network SecurityDeep beginner explanation for Network Security. Includes commands, architecture, operational checklist, monitoring indicators, security notes and troubleshooting flow.
- 35mPacket/command walkthrough: Network SecurityDeep packet/command walkthrough for Network Security. Includes commands, architecture, operational checklist, monitoring indicators, security notes and troubleshooting flow.
- 40mProduction use case: Network SecurityDeep production use case for Network Security. Includes commands, architecture, operational checklist, monitoring indicators, security notes and troubleshooting flow.
- 45mMonitoring signals: Network SecurityDeep monitoring signals for Network Security. Includes commands, architecture, operational checklist, monitoring indicators, security notes and troubleshooting flow.
- 50mTroubleshooting method: Network SecurityDeep troubleshooting method for Network Security. Includes commands, architecture, operational checklist, monitoring indicators, security notes and troubleshooting flow.
- 55mSecurity implications: Network SecurityDeep security implications for Network Security. Includes commands, architecture, operational checklist, monitoring indicators, security notes and troubleshooting flow.
- 60mPerformance considerations: Network SecurityDeep performance considerations for Network Security. Includes commands, architecture, operational checklist, monitoring indicators, security notes and troubleshooting flow.
- 65mEnterprise mistakes: Network SecurityDeep enterprise mistakes for Network Security. Includes commands, architecture, operational checklist, monitoring indicators, security notes and troubleshooting flow.
Network Security Module 4
- 30mBeginner explanation: Network SecurityDeep beginner explanation for Network Security. Includes commands, architecture, operational checklist, monitoring indicators, security notes and troubleshooting flow.
- 35mPacket/command walkthrough: Network SecurityDeep packet/command walkthrough for Network Security. Includes commands, architecture, operational checklist, monitoring indicators, security notes and troubleshooting flow.
- 40mProduction use case: Network SecurityDeep production use case for Network Security. Includes commands, architecture, operational checklist, monitoring indicators, security notes and troubleshooting flow.
- 45mMonitoring signals: Network SecurityDeep monitoring signals for Network Security. Includes commands, architecture, operational checklist, monitoring indicators, security notes and troubleshooting flow.
- 50mTroubleshooting method: Network SecurityDeep troubleshooting method for Network Security. Includes commands, architecture, operational checklist, monitoring indicators, security notes and troubleshooting flow.
- 55mSecurity implications: Network SecurityDeep security implications for Network Security. Includes commands, architecture, operational checklist, monitoring indicators, security notes and troubleshooting flow.
- 60mPerformance considerations: Network SecurityDeep performance considerations for Network Security. Includes commands, architecture, operational checklist, monitoring indicators, security notes and troubleshooting flow.
- 65mEnterprise mistakes: Network SecurityDeep enterprise mistakes for Network Security. Includes commands, architecture, operational checklist, monitoring indicators, security notes and troubleshooting flow.