Лучшие видеоролики
CompTIA IT Fundamentals+ Course | Module 3 Part 7: Data-driven Business Decisions
Part 08 of C# .net Bootcamp: What is the .NET Platform?
In this lesson, you are going to learn about what is the .NET platform, what it's used for, and how it works.
Module 8 Part 2: Machine Learning and Blockchain
Part 01 of C# .NET Bootcamp: The Fundamentals (OOP, LINQ, Test Automation + more)
Part 14 of Computer Networking Fundamentals: Network Hardware
Network Hardware
At the end of this episode, I will be able to:
- Compare and contrast common network hardware.
Learner Objective: Compare and contrast common network hardware
Description: In this episode, the learner will be introduced to common network hardware.
- Introduction to Network Infrastructure
- Network Hardware
- Network adapters - a component that controls network communications for the device it is connect to or integrated into
- Repeaters/extenders - a network component that regenerates a signal, then re-transmits the signal to propagate the communications farther.
- Hubs - an older, largely obsolete network connectivity device that acts as a multi-port repeater. These network components do not make decisions on where to send the traffic and can reduce performance.
- Switches - a network connectivity device that forwards network communications between a series of ports. These devices rely on direct connections and use MAC addresses to determine where to send traffic.
- Routers - a network connectivity device that forwards traffic between networks based on IP addresses.
- Firewalls - a network component that is used to secure and control network traffic based on predetermined criteria.
- Voice Over IP (VoIP) phones - a network device can digitizes voice communications that can be routed across TCP/IP networks.
- Access points - a network connectivity device that allows wireless clients access to a wired network.
- Cable modems - a common network connectivity device used to provide Internet access using coaxial media.
- Dial-up modems - a network connectivity device that modulates and demodulates a digital signal, sent over analog PSTN (public switched telephone network) lines.
- Network Hardware
CompTIA IT Fundamentals+ Course | Module 4 Part 5: Servers
CompTIA IT Fundamentals+ Course | Module 4 Part 2: Overview of a Computer
CompTIA IT Fundamentals+ Course | Module 5 Part 3: Central Processing Unit (CPU)
CompTIA IT Fundamentals+ Course | Module 4 Part 8: Original Equipment Manufacturers (OEM)
Part 47 of C# .NET Bootcamp: Switch Expression in C#
Part 38 of C# .NET Bootcamp: Interfaces
CompTIA IT Fundamentals+ Course | Module 4 Part 7: Internet of Things (IoT) Devices
The Message (Arabic: الرسالة, Ar-Risālah; originally known as Mohammad, Messenger of God) is a 1976 epic film directed and produced by Moustapha Akkad that chronicles the life and times of Muhammad, who is never directly depicted.[4]
Released in separately filmed Arabic- and English-language versions, The Message serves as an introduction to the early history of Islam. The international ensemble cast includes Anthony Quinn, Irene Papas, Michael Ansara, Johnny Sekka, Michael Forest, André Morell, Garrick Hagon, Damien Thomas, and Martin Benson. It was an international co-production between Libya, Morocco, Lebanon, Syria and the UK.
The film was nominated for Best Original Score in the 50th Academy Awards, composed by Maurice Jarre, but lost the award to Star Wars (composed by John Williams).
Part 07 of Computer Networking Fundamentals: Additional Network Types
Additional Network Types
At the end of this episode, I will be able to:
- Compare and contrast network types.
Learner Objective: Compare and contrast network types.
Description: In this episode, the learner will explore additional network types such as personal area networks (PAN), metropolitan area networks (MAN), campus area networks (CAN) and storage area networks (SAN).
- Introduction to Network Infrastructure
- Additional Network Types
- Personal Area Networks (PAN) - A network that is typically an individual's or user's immediate vicinity. The range is common a meter to 10 meters. Common devices are Wi-Fi and Bluetooth peripherals
- Metropolitan Area Network (MAN) - A network that spans a larger geographical area than a local area network, but a smaller coverage area than a wide area network. The coverage area is a single city, municipality or in some instances multiple cities.
- Wireless Metropolitan Area Network (WMAN) - A network in which the scope is the same as a traditional met area network, using unbounded media such as the Wireless Interoperability for Microwave Access or WiMAX.
- Campus Area Network (CAN) - A network that is very similar to the scope of a metropolitan area network, however is under the control of a single academic body.
- Wireless Wide Area Networks (WWAN) - A network that is the same in coverage area to a traditional wide area network, using cellular communications such as 3G, 4G, 5G and LTE to communicate.
- Storage Area Networks (SAN) - a network type that utilizes high-speed connections, using Fiber Channel, interconnected switches, fiber optic media, connecting servers to data storage.
- Additional Network Types
Part 11 of Computer Networking Fundamentals: Wireless Network Security
Wireless Network Security
At the end of this episode, I will be able to:
- Compare and contrast wireless security technologies.
Learner Objective: Compare and contrast wireless security technologies
Description: In this episode, the learner will explore a variety of wireless network security technologies.
- Introduction to Network Infrastructure
- Wireless Security
- WEP
- Weak or vulnerable to attack(Avoid)
- Uses a static key
- 64-bit or 128-bit key
- RC4 stream cipher
- CRC checksum
- WPA
- Weak or vulnerable to attack(Avoid)
- Uses Temporal Key Integrity Protocol
- Per-packet encryption
- RC4 stream cipher
- Message Integrity Check
- WPA2
- Stronger (Implement)
- Uses CCMP
- Counter Mode Cipher Block Chaining Message Authentication Code Protocol
- Advanced Encryption Standard
- 128-bit key
- WPA3
- Strongest
- Uses SAE
- 128-bit or 192-bit encryption
- WPS
- Push-button security
- Simplifies implementing security
- Weak or vulnerable to attack (Avoid)
- Disable
- Personal Mode
- WPA/WPA2/WPA3 implementation
- Requires no additional infrastructure
- Uses a preshared key or PSK (think password)
- Enterprise Mode
- WPA/WPA2/WPA3 implementation
- Requires additional infrastructure
- Utilizes 802.1X port-based authencation
- Requires a Remote Access Dial-in Server (RADIUS)
- MAC Filtering
- A security technique that identifies which wireless clients are allowed or denied access to the wireless network based on the client's media access control address.
- WEP
- Wireless Security
CompTIA IT Fundamentals+ Course | Module 4 Part 4: Laptops
Part 20 of the C# .NET Bootcamp: Using C# Value Types
Part 18 of Computer Networking Fundamentals: Building a Network
Module 8 Part 3: Internet of Things (IoT) and Quantum Computing
Part 55 of C# .NET Bootcamp: ArrayList