Instructor Background

A+ 900 Series Updates

Module 1.1 - Configure and apply BIOS Settings

Module 1.2 - Differentiate Between Motherboards

Module 1.3 - Compare and Contrast RAM

Module 1.4 - Install and Configure Expansion Cards

Module 1.5 - Install and Configure Storage Devices

Module 1.6 - Differentiate CPU Types

Module 1.7 - Compare Connection Interfaces

Module 1.8 - Install Appropriate Power Supply

Module 1.9 - Custom Configurations

Module 1.10 - Evaluate Display Devices

Module 1.11 - Identify Connectors & Cables

Module 1.12 - Install Peripheral Devices

Module 2.1 - Network Cables and Connectors

Module 2.2 - Characteristics or Connectors / Cables

Module 2.3 - TCP/IP

Module 2.4 - Common TCP and UDP

Module 2.5 - Wireless Standards / Encryption

Module 2.6 - Install and Configure a SOHO Router

Module 2.7 - Internet Connection Types / Features

Module 2.8 - Identify Network Types

Module 2.9 - Compare Network Devices

Module 2.10 - Use Appropriate Networking Tools

Module 3.1 - Laptop Hardware and Components

Module 3.2 - Compare Laptop Display Types

Module 3.3 - Compare Laptop Features

Module 4.1 - Printer Imaging Processes

Module 4.2 - Install / Configure Printers

Module 4.3 - Printer Maintenance

Module 5.1 - Appropriate Safety Procedures

Module 5.2 - Environmental Impacts / Controls

Module 5.3 - Communication & Professionalism

Module 5.4 - Dealing with Prohibited Content

Exam Module

Module 1.1 - Windows Operating Systems

Module 1.2 - Installing & Configuring Operating Systems

Module 1.3 - Screen Capture Labs

Module 1.4 - OS Features - Administrative Tools

Module 1.5 - Control Panel

Module 1.6 - Network Connections on Client Desktop

Module 1.7 - Preventative Maintenance Tools

Module 1.8 - OS Security Settings

Module 1.9 - Virtualization

Module 2.1 - Security

Module 2.2 - Security Threats

Module 2.3 - Securing A Work Station Best Practices

Module 2.4 - Data Destruction Methods

Module 2.5 - Securing a Wireless Network

Module 2.6 - Securing Home Office Wired Network

Module 3.1 - Mobile Operating Systems

Module 3.2 - Configuring Network Connectivity and Email on Mobile

Module 3.3 - Securing Mobile Devices

Module 3.4 - Tablets vs Laptops

Module 3.5 - Mobile Device Synchronization

Module 4.1 - Troubleshooting Theory

Module 4.2 - Motherboard, RAM, CPU and Power Issues

Module 4.3 - Troubleshooting Hard Drives and RAID Arrays

Module 4.4 - Troubleshooting Display Issues

Module 4.5 - Troubleshooting Wireless and Wired Connections

Module 4.6 - Troubleshooting Operating System Problems

Module 4.7 - Troubleshooting Security Issues

Module 4.8 - Troubleshooting Laptop Issues

Module 4.9 - Troubleshooting Printers

Exam Module

Ports & Protocols

Invite Friends
Facebook Twitter Google+ LinkedIn Email

All Information Should Be Free

Join today and get unlimited free access to the industry's best cyber security training and content.

JOIN CYBRARY

Already a member? Login to View this Lesson

Ports & Protocols

Ports & Protocols

Welcome to the Cybrary IT A+ Certification course for the CompTIA Exam, in today’s lesson we are going to explore computer Ports and Protocols.

Ports are defined as communication endpoints which are more 65,000 possible ports a network communication device can connect with.

You’ll learn how ports are used, why they are reserved for specific use, what the “5-Layer Diagram” is, how to construct it, and what happens at each level of this layer, specifically the Transport layer.

FYI:  HOMEWORK

Google Master Port List, and you’ll find a variety of standardized list of TCP and UDP Ports.  You should note however, that the IANA site (www.IANA.org) should always be your go-to resource for port assignments.  This is an invaluable reference tool to have at the ready.

Known officially as the Service Name and Transport Protocol Port Number Registry, it was last updated as of July 8, 2015.

http://www.iana.org/assignments/service-names-port-numbers/service-names-port-numbers.xhtml

Watch the Course Intro Video
Learn on the go.
The app designed for the modern cyber security professional.
Get it on Google PlayGet it on the App Store
Upcoming Industry Events

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

Cybrary|0P3N

Lateral Movement Part 1
Views: 575 / March 30, 2017
Logging Settings and Procedures
Views: 752 / March 30, 2017
Optimization Tips and Tricks
Views: 1333 / March 29, 2017
Introduction to the IPtables Command
Views: 1472 / March 29, 2017
Skip to toolbar
Cybrary works best if you switch to our Android-friendly app
Continue

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel