Instructor Background

A+ 900 Series Updates

Module 1.1 - Configure and apply BIOS Settings

Module 1.2 - Differentiate Between Motherboards

Module 1.3 - Compare and Contrast RAM

Module 1.4 - Install and Configure Expansion Cards

Module 1.5 - Install and Configure Storage Devices

Module 1.6 - Differentiate CPU Types

Module 1.7 - Compare Connection Interfaces

Module 1.8 - Install Appropriate Power Supply

Module 1.9 - Custom Configurations

Module 1.10 - Evaluate Display Devices

Module 1.11 - Identify Connectors & Cables

Module 1.12 - Install Peripheral Devices

Module 2.1 - Network Cables and Connectors

Module 2.2 - Characteristics or Connectors / Cables

Module 2.3 - TCP/IP

Module 2.4 - Common TCP and UDP

Module 2.5 - Wireless Standards / Encryption

Module 2.6 - Install and Configure a SOHO Router

Module 2.7 - Internet Connection Types / Features

Module 2.8 - Identify Network Types

Module 2.9 - Compare Network Devices

Module 2.10 - Use Appropriate Networking Tools

Module 3.1 - Laptop Hardware and Components

Module 3.2 - Compare Laptop Display Types

Module 3.3 - Compare Laptop Features

Module 4.1 - Printer Imaging Processes

Module 4.2 - Install / Configure Printers

Module 4.3 - Printer Maintenance

Module 5.1 - Appropriate Safety Procedures

Module 5.2 - Environmental Impacts / Controls

Module 5.3 - Communication & Professionalism

Module 5.4 - Dealing with Prohibited Content

Exam Module

Module 1.1 - Windows Operating Systems

Module 1.2 - Installing & Configuring Operating Systems

Module 1.3 - Screen Capture Labs

Module 1.4 - OS Features - Administrative Tools

Module 1.5 - Control Panel

Module 1.6 - Network Connections on Client Desktop

Module 1.7 - Preventative Maintenance Tools

Module 1.8 - OS Security Settings

Module 1.9 - Virtualization

Module 2.1 - Security

Module 2.2 - Security Threats

Module 2.3 - Securing A Work Station Best Practices

Module 2.4 - Data Destruction Methods

Module 2.5 - Securing a Wireless Network

Module 2.6 - Securing Home Office Wired Network

Module 3.1 - Mobile Operating Systems

Module 3.2 - Configuring Network Connectivity and Email on Mobile

Module 3.3 - Securing Mobile Devices

Module 3.4 - Tablets vs Laptops

Module 3.5 - Mobile Device Synchronization

Module 4.1 - Troubleshooting Theory

Module 4.2 - Motherboard, RAM, CPU and Power Issues

Module 4.3 - Troubleshooting Hard Drives and RAID Arrays

Module 4.4 - Troubleshooting Display Issues

Module 4.5 - Troubleshooting Wireless and Wired Connections

Module 4.6 - Troubleshooting Operating System Problems

Module 4.7 - Troubleshooting Security Issues

Module 4.8 - Troubleshooting Laptop Issues

Module 4.9 - Troubleshooting Printers

Exam Module

Networking Protocols: Telnet, SMPT, POP3 & IMAP

Invite Friends
Facebook Twitter Google+ LinkedIn Email
Networking Protocols: Telnet, SMPT, POP3 & IMAP

Telnet, SMTP, POP3, & IMAP

Telnet is a “remote terminal connection” protocol that connects a computing system to a remote source.  Telnet runs on port 23, it’s also unsecure and is both a TCP ad UDP protocol, and has generally been replaced with SSH.

This type of transaction is totally transparent, any data is visible and unsecure which is not desired.  It’s used with both TCP and UDP.

Our next group of protocols deals with email transmissions over the network, they are SMTP, POP3, & IMAP and these are all TCP protocols.

SMTP stands for Simple Mail Transfer Protocol and runs over port 25, runs generally between a dedicate server (think Exchange or mail server) and a computer or other device with email client software as the interface such as Outlook ad even internet based email such as Yahoo, Gmail.

POP3 uses port 110, its stands for Post Office Protocol 3.  POP3 is a protocol that downloads email from the server for email transactions, it’s not a send/receive protocol, it only provides download services to the client computer.  It must be configured to retain emails on the server after download to the client else it deletes them by default.

IMAP uses port 143, it’s a networking protocol for email.  You have server to download to the client and retention of the email and far more robust than is POP3.

For each of these protocols, we map out the entire transaction process to demonstrate how emails are sent, whether or secured, transmitted, and then what happens when they are received on the other end (server + client).

Watch the Course Intro Video
Learn on the go.
The app designed for the modern cyber security professional.
Get it on Google PlayGet it on the App Store
Upcoming Industry Events

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

Cybrary|0P3N

Skip to toolbar
Cybrary works best if you switch to our Android-friendly app
Continue

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel