Top videos

Continue your study of the Golden Age's many scientific achievements with a look at the development of medicine and the rise of what today we would call the teaching hospital. Along the way, you will encounter one of the greatest medical minds of all time, Ibn Sina (better known in the West as Avicenna).

C# Bootcamp (Udemy)
83 Views ยท 2 years ago

Part 06 of C# .net Bootcamp

In this lesson, you are going to learn about how to begin developing a computer program in .net platform using Microsoft Visual Studio Code, especially when you are MacOS or Linux user.

Networking Fundamentals (Udemy)
224 Views ยท 2 years ago

Part 0โฃ5 of Computer Networking Fundamentals: Demarcs and Perimeter Networks

Demarcation and Perimeter Networks

At the end of this episode, I will be able to:

  1. Describe the characteristics and importance of demarcation points and perimeter networks.

Learner Objective: Describe the characteristics and importance of demarcation points and perimeter networks.

Description: In this episode, the learner will explore what demarcation points and perimeter networks are as well as what the importance of these technologies are in networking.


  • Introduction to Network Infrastructure
    • Demarcation point - The physical point that a carrier's network connection ends and a private network starts (think network boundaries). The term demarcation is often abbreviated demarc.
      • Types of demarcation points
        • Residential - These are utilized in homes, either at the first socket (typically the kitchen) or a junction box on the exterior of the house
        • Business - These demarcation points are either installed on the exterior of the building, or the carrier will install a specialized device within the interior of the building at a main distribution frame (think server closet/datacenter)
      • Demarcation wiring runs either overhead or underground
      • A demarc is important to understand in networks today as this marks the point of responsibility for networked components and service. The carrier's network up to the demarc is the responsibility of the carrier, however the demarc point that connect on the residential or business side is the responsibility of the subscriber.
      • Demarc connections can be fiber, coaxial or PSTN lines
    • Perimeter Network (Screened Subnets) - A logical boundary between a privately owned network and the Internet. There are other names for perimeter networks such as demilitarized zone (DMZ), screened subnet and edge network.
      • Purpose
        • Security - A companies internal network must remain secure and not allow public access. Most organizations will install security devices in the perimeter network to control the flow of inbound and outbound traffic such as firewalls, intrusion detection systems (IDSs), intrusion prevention systems, honeypots or devices called unified threat management systems (UTM) which combine all the previous devices' functionality into one centralized device.

C# Bootcamp (Udemy)
65 Views ยท 2 years ago

Part 28 of C# .NET Bootcamp: โฃIteration Statements

In this lesson you will learn about iteration statements and how to use them.

Dion Training CompTIA IT Fundamentals+
62 Views ยท 6 months ago

CompTIA IT Fundamentals+ Course | Module 4 Part 2: โฃOverview of a Computer

C# Bootcamp (Udemy)
85 Views ยท 2 years ago

Part 07 of C# .net Bootcamp

In this lesson, you're going to learn about the history of the .net

Understanding Japan A Cultural History
38 Views ยท 5 months ago

You can't truly grasp a country's culture without understanding its ideas about the family. Explore the three main models of Japanese family life: the aristocratic model (uji), the samurai model (ie), and the postwar model. Along the way, learn about shifting attitudes toward domestic life, including women's rights and family planning.

Networking Fundamentals (Udemy)
227 Views ยท 2 years ago

Part 03 of Computer Networking Fundamentals: Virtual Local Area Networks (VLANs)

Virtual Local Area Networks

At the end of this episode, I will be able to:

  1. Identify the characteristics and importance of VLANs.

Learner Objective: Identify the characteristics and importance of VLANs

Description: In this episode, the learner will be introduced to Virtual Local Area Networks or VLANs as well as identify the purpose of implementing them in networks.


  • Introduction to Network Infrastructure
    • What are VLANs? - A logical division of networked devices connected within a local area networked
    • Why are VLANs important? - VLANs allow administrators to divide ports on a switch into logical groupings. This creates multiple logical switches out of a single physical switch. This can be done for performance and security.
    • Understanding communication types
      • Broadcast - A communication message that is sent by a single device to every other device connected to the switch.
        • One to all communication
      • Unicast - A communication message that is sent by a single device to another device on the network.
        • One to one communication
      • Multicast - A communication message that is sent by a single device to a group or subset of the devices on the network.
      • Broadcast domain - A group of devices connected to a network that receive broadcast communications. This grouping can be based on physical or logical segments.
      • Segments - A divison that splits a network into smaller parts.
    • Performance benefits - VLANs create virtual boundaries that reduce the amount of broadcast traffic between devices on a larger network and ease administration.
    • Security benefits - VLANs allow network administrators to group devices together to assign an enforce security policies. Devices within a VLAN can only communicate with other devices assigned to the same VLAN.
    • How are VLANs implemented?
      • VLANs require configuration of managed switches.
      • VLANs use tagging information that is inspected by the switch to determine which VLAN the communication belongs to.

Introduction to Computer (Udemy)
65 Views ยท 6 months ago

Module 7 Part โฃ1: Introduction to Digital Literacy and Essential Tools

Continue your examination of Greece's cultural heritage with this look at Greek theaterโ€”especially its greatest playwrights of tragedy, Aeschylus, Sophocles, and Euripidesโ€”and the second wave of philosophers known as the Sophists, led first by Socrates and then by his disciple Plato.

C# Bootcamp (Udemy)
98 Views ยท 2 years ago

Part 33 of C# .NET Bootcamp: โฃFIelds, Properties, and Constructors

In this lesson you will learn about fields, properties and constructors and how to use them.

Dion Training CompTIA IT Fundamentals+
39 Views ยท 6 months ago

โฃโฃโฃCompTIA IT Fundamentals+ Course | Module 8 Part 8: Wireless (Wi-Fi) Security Best Practices

With the successful invasion of the western Persian Empire, Philip's son successfully carried out his father's plan. Alexander the Great would then create his own path, and you follow him along the route of the greatest sustained conquest the world had yet seen.

C# Bootcamp (Udemy)
78 Views ยท 2 years ago

Part 19 of C# .NET Bootcamp: โฃC# .NET Value Types

Introduction to Computer (Udemy)
56 Views ยท 6 months ago

Module 5 Part โฃ4: Internet Structure and Security Basics

Alvin Muslim Sardar
46 Views ยท 5 months ago

OSN-K Informatika 2024

Dion Training CompTIA IT Fundamentals+
41 Views ยท 6 months ago

โฃโฃโฃCompTIA IT Fundamentals+ Course | Module 19 Part 6

Dion Training CompTIA IT Fundamentals+
88 Views ยท 6 months ago

CompTIA IT Fundamentals+ Course | Module 2 Part 4: Decimal Notation




Showing 4 out of 26