1 hour 26 minutes
Hello and welcome to Cyber is beginning network infrastructure Course off the instructor, Dust and Perry.
To participate in this course, you're gonna need a few different things. The first thing you'll need is just a desire to learn. This is an entry level course, so you really don't need to have a lot of prior knowledge or experience. You just want that desire to learn and go through the course.
Another thing that will help is access to virtual or hard equipment for the lab sections, and they're not gonna be to Lab Heavy was going over some basic configurations and things. But if you don't have access to actual physical devices like routers and switches, I would recommend Cisco's Packet Tracer, which is free.
You just need to enroll in their networking academy
to download that, and I'll show you how to do that here real quick.
So all you need to do is go to Nets a cad dot com slash courses slash packet dash tracer slash introduction dash packet, dash, tracer.
And once you get here, you just need Teoh sign up today and then go to English.
Um, I believe they do offer some other languages as well. But once you do that, you know it'll create an account for you.
And when you're logged into your account, uh, kind of like this seeing just go to my net a cad and I'm learning.
Um, sorry. Resource is and then download packet tracer.
I'm here. It will tell you you get the 64 bit version, the 32 bit limits and Mac as well. And they did release a mobile version
here pretty recently, Which this course, we are just going to using the desktop version. But Mobile may help if that's what you need.
So who am I? Uh, I'm again. I'm Dustin Perry. I currently work as a network security engineer, and I do have a few courses on Sai Buri, including the physical pen testing coarse fishing and a few basic security took courses, which you should definitely check out if you've got the time.
I've been in i t for over 10 years and I've been doing security as a primary duty for about the last three years
doing my bachelors and I t security from WG. You and I've got a ton of different certifications. Um, the ones that really apply to this course to be like the SEC, M. A, C, C and TCC may security net plus all those different certifications.
So in addition to the presentation, this course will also provide a study guide, quiz quizzes and quiz questions throughout the course and hands on easy to follow labs.
This course again is for anyone that wants to meet the requirements for a cyber network technician. But more importantly, it's for anyone that wants to advance their career and move into the network cybersecurity field.
And remember, you missed 100% of the shots you don't take
learning. Objectives for this course include the ability to operate network equipment, including hubs, routers, switches, bridges, servers, different transmission media and related hardware.
You will learn to configure an optimized network, hubs, routers and switches. We also go over a few the higher level protocols, including tunneling
knowledge of capabilities and applications of networking equipment, including hubs, routers, switches, bridges, servers, transmission media and related hardware. And this includes installing and maintaining network infrastructure on the device. Operating systems like the IOS or the firmware on the device
also be covering the skill and implementing and testing networking infrastructure, contingency and recovery plans and how to kind of set up a basic one or follow one that's already in place.
We will go over the basics of installing and replacing network hubs, routers and switches,
and we're also gonna learn how to provide feedback on network requirements, including network architecture and infrastructure.
So what is networking?
Networking, by definition, is the process of interacting with others to exchange information.
Computer networking is exactly that. In order to exchange information, there needs to be some sort of process to share information like a common language.
Modern computer networks allow computers to share information across tiny single offices all the way up to across the world.
Without networking devices operating at the various layers of the OS I model, which we will discuss in depth later,
sharing information like this would be completely impossible.