Time
4 hours 30 minutes
Difficulty
Beginner
CEU/CPE
5

Video Transcription

00:01
welcome
00:02
once again to the side. Very empty. A 98
00:06
3 66 network and fundamentals certification prep course.
00:17
Most white that were used. Ethan that cables or transfer data between connected PCs and a small white network. A senior right. A single rider may be used to connect all the computers large and that were often involve multiple routers or switches that connect to each other.
00:35
Then we have another term called a While it's Land Walk. While it's local area network, they never that use wireless signals. In other words, we're talking about unguided media Where and when we talk about the wired network, it's kind of consider what we call God at me. The other words in this uses cables and so forth.
00:53
So again, when you think about while it's look every network, it's a type of local network that utilizes radio ways rather than wires to transmit data. Today's computers have a a wildest land built on board, which means no additional WiFi card and need to be install.
01:11
Now, Wireless access point is a central connection, if that's another way to think about. While its access port is a central connecting device, just like, for example, when you connect their wiring that we're together, you need to have what either ah hut, Which again are we? That's the legacy device or a switch. So a wireless access point is, ah, hardware device or configured note
01:30
owner locating that that allowed while it's capable devices
01:34
and why networks to connect to a wireless standard, including WiFi. Bluetooth
01:40
again, you have your wireless access point features again. Radio waves, transmitters and antenna, which facilitate connectivity between the devices and an Internet or a network
01:51
again, a wireless access point. It also known as, ah, hot hot spot. Anytime you're free here, people first. Here is a hot spot. A wireless access port maybe used to provide network. Continue in office environments, allowing employees to work anywhere in office and remain connected to a network. In addition, you're Wallace Access Port provides.
02:08
While it's intimate in public places like your coffee shops, your airports
02:13
and your train stations. Also your waters exit point. Our most common thought off in the contest. 802 syriza. While its standards coming on his WiFi, why there are otherwise stated the vast majority of the time to turn WiFi hot spot it. And while I support Arts Anonymous
02:32
now you can also set up a B land now own, Waker said. Would be led. You can answer that. What? What? A huh? You have to use a switch. So Avi Land is a group of host with a common set of requirements that communicate as if they're connected together with a common set of requirements that communicate
02:50
as they were connected together in a normal fashion on one switch, regardless of their physical location.
02:55
So a virtual local area network is a logical group of workstations, servers and network devices that appear to be on the same land. Despite their geographic distribution,
03:06
A V Land allows a network of computers and used to communicate in a simulated environment as if this is in this single land, and I'm sharing a single broadcast and multicast domain. Be lanza in minute to achieve scalability. You implement for scalability, security and ease of network management
03:23
and can easily adapt to changes in your network requirements and relocation of workstation.
03:29
And your server knows
03:31
when you think about a permanent network offer time and worked for two of the D. M. Z now the original. Our network permanent is based on the notion that our organization, internal information assets, hardware devices host applications and that it can be protected from outside threats coming from third parties and public networks.
03:52
It's the idea that there is a clear, defensible boundary between the information and the assets on your organization.
03:59
Other words you only need to keep safe and those that could harm you, purposely or not. It's also believed that network security solutions like firewalls and anti matter where can protect what is inside this boundary from the big, bad outside world.
04:15
Also equally as important that concept of a network permanent matter because it was the best way to defend your information assets. But it does. But what does your network really looked like right now?
04:28
If it's typical organization and network, you're dealing with issues like this. Your internal users are not simply your Internet. Users are not simply connecting from inside your building network or our inner circle. They are connected from external networks and using mobile devices to access internal resource. Is
04:46
your dad a nap case of known along the house on service
04:49
you physically owned or controlled and protect so again Web service have open ah, wide door to the world. I cite your trust binder. To serve a multitude of clients or to simply communicate again with other service is both internal external to your organization. Once you start thinking about all the needs of your network
05:10
network meets and use, it serves in this modern, data centric, interconnected network all New World. It's easy to see that the network perimeter is an outdated concept and very easy. Understand why perimeters based on defenses are failing because there's no perimeter to defend.
05:29
Many owners, especially again, the old Legacy enterprise,
05:32
are struggling to adapt systems, behavior and security protocols to this newest and ever evolving network model. Outdated beliefs about the true nature of the network and the source of threats put many organizations the information assets and that customers, partners
05:50
and stakeholders obviously at risk.
05:54
We also have a term call back in configuration, now backing figures in general terms. It's when server computers are located on either side of your permanent that were also known as show d m Z.
06:11
Then we have a three legged we call a three legged parameter configuration.
06:16
So again we think about.
06:17
We see here we see a three legged type configuration here.
06:23
Basically, it's a configures you were by your D. M Z or that again we called The Demilitarization Zone, or permanent is usually attached to a separate connection off a company foul. Therefore, the Fowler has three connections. One to the company land. Look, every network
06:41
one to the D. M Z or perimeter and wanted in it.
06:44
But what are the benefits again? When you think about this type of design, the D M Z is placed behind two firewalls. The front and the TMG and the back end.
06:56
If the users going to reach the D M Z from Internet, it would have to pass through two firewalls. The land is also behind two firewalls and therefore better protected. If you need to do any kind of auditing for attacks on the D. M Z and for any reason, the front and Fowler is not capable of that.
07:14
For example, it is the old fire or not very strong to take the load and also recognize all kinds of attacks.
07:20
Then the back and foul can take care of it.
07:24
Do you want to consider putting a honeypot. You Not only this, for the honey pots in the network, the purpose of a honey pot it's you can see on this liar basically is to
07:34
make the would be hacker think that they have access some vital resource. And in fact, they have not access your main production network and what you do, you have various tools in place to audit and gather information on the individual so that you can, which again could be used to prosecute that individual.
07:51
So again, the network segment between the follow is the best place
07:56
that you wanna put again, what we call your honeypot. The hacker expects the Demsey to be there, right? And so that's something that we look at, and so that's one of the ways we kind of protect our networks.

Up Next

MTA 98-366 Networking Fundamentals

This MTA Networking Fundamentals course provides an entry point to the Microsoft Technology Associate (MTA) certification exams that validate the fundamentals needed to begin building a career using Microsoft technologies. This course assumes some hands-on experience or training but not assumed on-the-job experience.

Instructed By

Instructor Profile Image
Jim Hollis
Independent Contractor
Instructor