Interface Issues video title page

Interface Issues – CompTIA Network+ N10-009 – 5.2

A network interface can tell a lot about the health of the network. In this video, you’ll learn about interface monitoring, CRC errors, runts, giants, drops, error disabled states, and port status messages. << Previous: Cable Issues Next Video: Hardware Issues >> Network administrators use a great deal of their time to monitor different interfaces […]

Interface Issues – CompTIA Network+ N10-009 – 5.2 Read More »

Cable Issues video title page

Cable Issues – CompTIA Network+ N10-009 – 5.2

If the physical layer isn’t right, the network will have big problems. In this video, you’ll learn about fiber mismatches, cable categories, crosstalk, EMI, attenuation, and proper termination. << Previous: Network Troubleshooting Methodology Next Video: Interface Issues >> When you’re working with fiber optics, you have to make sure that you’re using exactly the right

Cable Issues – CompTIA Network+ N10-009 – 5.2 Read More »

Network Troubleshooting Methodology video title page

Network Troubleshooting Methodology – CompTIA Network+ N10-009 – 5.1

Network professionals solve problems every day. In this video, you’ll learn how a troubleshooting methodology can simplify complex issues and make it easier to identify and solve big problems. << Previous: Security Rules Next Video: Cable Issues >> When you work with networks, there will be problems that need to be resolved and issues that

Network Troubleshooting Methodology – CompTIA Network+ N10-009 – 5.1 Read More »

Security Rules video title page

Security Rules – CompTIA Network+ N10-009 – 4.3

We often use rules to allow or prevent access to important resources. In this video, you’ll learn about access control lists, firewall rules, content filtering, screened subnets, and security zones. << Previous: Device Security Next Video: Network Troubleshooting Methodology >> One common way to limit the type of traffic that can traverse the network is

Security Rules – CompTIA Network+ N10-009 – 4.3 Read More »

Social Engineering video title page

Social Engineering – CompTIA Network+ N10-009 – 4.2

Attackers often use social engineering techniques to subvert existing security controls. In this video, you’ll learn about phishing, shoulder surfing, tailgating, piggybacking, and dumpster diving. << Previous: Rogue Services Next Video: Malware >> We’ve probably all seen an email come through our inbox that seems to be from one sender, but, in reality, it’s being

Social Engineering – CompTIA Network+ N10-009 – 4.2 Read More »