Top videos
CompTIA IT Fundamentals+ Course | Module 4 Part 7: Internet of Things (IoT) Devices
Module 3 Part 5: โฃSoftware Testing and Emerging Trends
Module 6 Part โฃ2: Phishing, Network Security, and Firewalls
Module 8 Part โฃ2: Machine Learning and Blockchain
Module 8 Part โฃ3: Internet of Things (IoT) and Quantum Computing
Part 08 of C# .net Bootcamp: What is the .NET Platform?
In this lesson, you are going to learn about what is the .NET platform, what it's used for, and how it works.
Part 13 of C# .NET Bootcamp: Hello World!
In this lesson you are going to learn how to create a new program... A classic Hello World application as a console application in the .NET platform using C# language.
Part 14 of C# .NET Bootcamp: โฃHello World (Explicit)
In this lesson, you are going to learn more about your first application created in .NET platform using the C# language, but more in depth...
โฃโฃโฃCompTIA IT Fundamentals+ Course | Module 10 Part 6: Access Control and Permissions
The field of mathematics owes a tremendous debt to the Islamic Golden Age. Mathematicians such as Omar Khayyam (who is perhaps better known today as a poet) and al-Khwarizmi built on the work of Babylonian, Greek, and Indian mathematicians to systematize and explain algebra and symbolic algorithms. Survey this critical period of mathematics history.
Part 09 of Computer Networking Fundamentals: Wireless Standards
Wireless Standards
At the end of this episode, I will be able to:
- Compare and contrast wireless technology standards.
Learner Objective: Compare and contrast wireless technology standards.
Description: In this episode, the learner will be introduced to a variety of wireless specifications and standards.
- Introduction to Network Infrastructure
- Wireless networking
- Wireless Standards
- IEEE - Institute of Electrical and Electronics Engineers (IEEE)
- The world's largest association of technical professionals and standards body.
- Electrical, electronics, telecommunications, computer engineering
- 802 - is the standards committee that develops and maintains networking
- Wi-Fi Alliance - a non-profit organization that owns the Wi-Fi trademark. Manufacturers may use the trademark to brand products certified for Wi-Fi interoperability. standards for LANs, MAN, and their wireless counterparts WLAN, WPAN, WMAN as well as Ethernet and bridging technologies.
- 802.11 - is the standards committee for wireless LAN RF communication standards
- 802.11a - (1999)released along side .11b, 5 GHz frequency @54Mbps
- 802.11b - (1999)released along side .11a, 2.4 GHz frequency @11Mbps
- 802.11g (Wi-Fi 3)- (2003)2.4 GHz @54Mbps, supports backward compatibility with .11b devices
- 802.11n (Wi-Fi 4) - (2009) 2.4 GHz and 5 GHz, @600Mbps, supports backward compatibility with all earlier 802.11 standards, increased channel width.
- 802.11ac (Wi-Fi 5) - (2014) 5 GHz, @1.3 Gbps-2.3 Gbps
- 802.11ax (Wi-Fi 6/6E) - (2021) 2.4 GHz,5 GHz and 6 GHz, @9.6 Gbps
- IEEE - Institute of Electrical and Electronics Engineers (IEEE)
- Bluetooth
- Wireless communication technology operating in the 2.4 GHz ISM band
- Bluetooth 1.* (1999)- 732 Kbps (10m or 32.8 ft)
- Bluetooth 2.* - (2004) (Enhanced Data Rate or EDR) 3 Mbps (10m or 32.8 ft)
- Bluetooth 3.0 - (2009) (+ High Speed or +HS) (up to 24 Mbps over Wi-Fi) (10m or 32.8 ft) excessive power consumption
- Bluetooth 4.* - (2010) (Bluetooth Low Energy or BLE) 1 Mbps (610m or 32.8 ft)
- Bluetooth 5.* (2016)- 2 Mbps (10m or 32.8 ft)
- Infrared
- Short-range line-of-sight communication
- Specifications are controlled by the Infrared Data Association (IrDA)
- Standards
- Serial IrDA (SIR) - 115.2 Kbps
- Fast IrDA (FIR) - 4 Mbps
- Very Fast IrDA (VFIR) - 16 Mbps
- Wireless Standards
- Wireless networking
Part 11 of Computer Networking Fundamentals: Wireless Network Security
Wireless Network Security
At the end of this episode, I will be able to:
- Compare and contrast wireless security technologies.
Learner Objective: Compare and contrast wireless security technologies
Description: In this episode, the learner will explore a variety of wireless network security technologies.
- Introduction to Network Infrastructure
- Wireless Security
- WEP
- Weak or vulnerable to attack(Avoid)
- Uses a static key
- 64-bit or 128-bit key
- RC4 stream cipher
- CRC checksum
- WPA
- Weak or vulnerable to attack(Avoid)
- Uses Temporal Key Integrity Protocol
- Per-packet encryption
- RC4 stream cipher
- Message Integrity Check
- WPA2
- Stronger (Implement)
- Uses CCMP
- Counter Mode Cipher Block Chaining Message Authentication Code Protocol
- Advanced Encryption Standard
- 128-bit key
- WPA3
- Strongest
- Uses SAE
- 128-bit or 192-bit encryption
- WPS
- Push-button security
- Simplifies implementing security
- Weak or vulnerable to attack (Avoid)
- Disable
- Personal Mode
- WPA/WPA2/WPA3 implementation
- Requires no additional infrastructure
- Uses a preshared key or PSK (think password)
- Enterprise Mode
- WPA/WPA2/WPA3 implementation
- Requires additional infrastructure
- Utilizes 802.1X port-based authencation
- Requires a Remote Access Dial-in Server (RADIUS)
- MAC Filtering
- A security technique that identifies which wireless clients are allowed or denied access to the wireless network based on the client's media access control address.
- WEP
- Wireless Security
Part 13 of Computer Networking Fundamentals: Virtual Private Networks (VPN)
Virtual Private Networks
At the end of this episode, I will be able to:
- Identify and describe the characteristics and importance of VPNs.
Learner Objective: Identify and describe the characteristics and importance of VPNs
Description: In this episode, the learner will be introduced to virtual private networks or VPNs as well as the importance and attributes of this technology.
- Introduction to Network Infrastructure
- Virtual Private Networks
- A technology that allows for secure communications using public networks infrastructure
- Tunneling Protocols -
- Protocol - a set of rules for communications on a network
- Point-to-Point Tunneling Protocol (PPTP) - the oldest VPN tunneling protocol, while still in use, should be avoided due to vulnerabilities in the encryption and authentication.
- Layer 2 Tunneling Protocol (L2TP)- a combination of Microsoft's PPTP and Cisco's Layer 2 Forwarding (L2F), is a complex VPN protocol that is commonly coupled with IPSec for strong encryption.
- Microsoft Point-to-Point Encryption (MPPE)- an older encryption protocol used with dial-up connections and VPN technologies. This protocol is not considered to be secure and should be avoided where security is a concern.
- IP Security (IPSec)
- VPN Types
- Remote Access VPN - connects remote users to the organization's network from any location
- Site-to-site VPN - connects two local area networks together
- Virtual Private Networks
โฃโฃโฃCompTIA IT Fundamentals+ Course | Module 7 Part 2: Network Components
Take the measure of the sultan Suleiman's extraordinary vision, through which he expanded and consolidated the Ottoman Empire, engendered a bureaucratic system and a unified legislative code, and commissioned monumental architecture. Learn also of his great love for his favorite wife, Roxelana, perhaps the most influential female political figure in Ottoman history.
โฃโฃโฃCompTIA IT Fundamentals+ Course | Module 13 Part 9: Digital Certificates
CompTIA IT Fundamentals+ Course | Module 5 Part 1: โฃInternal System Components
OSN-K Informatika 2024
Module 7 Part โฃ2: File Management and Document Creation
Module 8 Part โฃ1: Introduction to Emerging Technologies and Artificial Intelligence