IT Networking Basics: n00b to Ninja
What you'll learn
- This is a fast-paced mini-course designed to be the precursor to your CompTIA Security+ SY0-601 training.
- If you're planning for the Security+ exam but feel a little worried about your networking skills, fear not!
- After completing the course you will have a firm understanding of networking basics.
- You will gain the confidence to feel both secure and unafraid to explain basic networking to anyone
Requirements
- Wireshark is recommended by not required
Description
n00b To Ninja
Think You Understand The Basics?
One of the questions we often see goes like this: "Do I need to pass the CompTIA Network+ exam before taking the Security+?"
Now this is an excellent question because, although the Security+ exam doesn't have any prerequisites it is still highly recommended that all students have a firm understanding of basic networking technologies.
The n00b to Ninja course is a great prep tool to get you mentally and psychologically ready to tackle the Security+ exam (but you can also use it to simply gain a better understanding of how networks work)
What You Will Learn
Networking Basics from the ground up (everything everyone already THINKS you know but you know you don't)
Routers and Switches - what they really do and why we need them
All about DHCP - it's not just about automatically getting an IP address
BONUS: DHCP penetration testing attacks to show you how an attacker might abuse DHCP on a local area network
DNS from A to Z. After this lecture you will finally completely understand what DNS is, why we have it and how it really works. All secrets revealed.
ARP: Have you ever wondered why we have both MAC addresses and IP Addresses? Have you been confused about this? After this lecture you'll know why we need both (Hint: 90% of IT professionals don't even know the answer to this basic question - but you will after completing this lecture)
You'll learn all about IP addresses - we'll break it down to the binary level and show you how to convert between binary and decimal and back again
You'll learn the purpose of the Subnet Mask and how (and why) to Subnet Networks - it's a lot easier than you think
All about NAT - the greatest inhibitor to innovation but also the reason the internet hasn't collapsed on itself! IT people like to throw this term around but you'll finally GET it - it'll just make sense after you finish this lecture.
All about ports - what are ephemeral ports, well known ports - why we have ports - all that jazz
WAN technologies - we'll take a step back and look at the internet at large and how routing protocols work.
Here's what this course will do for you
The purpose of this course is really simple: to give you the confidence you need to pass the Security+ exam.
Sure you're going to have fun along the way, and sure you can use these skills to stay in your current job and be a more competent employee but we designed this course to spring-board your entry into the exam.
Once you know the fundamentals taught in this course you'll not only be better prepared but also eager to begin your studies for the Security+ exam.
So what are you waiting for? Jump in now!
Who this course is for:
- Beginner Network Administrators, this course is not for experts.
- Entry Level Help Desk Analysts and Technicians
- New Cyber Security Analysts
Instructor
I'll never forget the day I first got hacked.
I was fooling around in an AOL chat room downloading little hacking programs called proggies and punters. I thought I was special, or leet as they call it, simply because I had a lowercase screenname which made me a bit mysterious since AOL didn't let ordinary people create lowercase names (called icases); my icase indicated that I knew how to "hack" the system.
I also commanded a vast array of punters including Fate X, HaVok Platinum, Firetoolz and Area51. Punters were tiny programs that let you violate AOL's terms of service by booting innocent people off AOL. If someone made me mad I would just click a button and send them into oblivion. The victim would almost immediately be forced to logoff and go through the painful process of dialing-up and reconnecting.. These proggies also let you scroll text super fast which would prevent other people from chatting and force them to leave the room.
Now that that I think about it, I was was probably at the apex of immaturity but I was barely in middle school and booting people offline was simply too much fun.
But one day I met my match.
I downloaded a program that was purportedly a new punter that had a bevy of features that my other tools lacked. Everything was fun in the beginning but after a few days weird things started happening to my computer.
For example, my CD-ROM would randomly open on its own, my mouse cursor seemed to move without my input and strange programs would sometimes leap onto my screen and then instantly vanish.
I was freaking out! It's really hard to describe just how scary this was.
I had no idea what was happening but I had to find out. Apparently whoever, (or whatever) had seized control of my computer didn't make any effort to hide his or her antics. After a few weeks of complete frustration, a chat box popped on my screen from an unknown name. I was the guy who hacked me. He started to taunt me by saying things like "i got you" or "your password is 1234567"
This is when I made it my mission to figure out as much as I could about this person and his methodology. After several interactions I learned he was using a remote access trojan called SubSeven. I quickly scoured the internet looking for this tool and once I found it I found my new love.
That's how I got into cybersecurity and ethical hacking. I was hacked and wanted to learn how it happened.
Unfortunately, back in middle school my motives weren't so pure and I used my new skills to hack other victims; however, after graduating from high school and with a little prodding by my dad to explore programming, I decided I wanted to major in Computer Science to do good in the world.
Since then I've never looked back.
So who am I? My name is Vonnie Hudson and I have over 13 years of hands-on experience maintaining, troubleshooting and repairing computer software and hardware. I actually started my career as a technical support analyst at a satellite internet company and eventually landed a job at IBM as a security engineer. From there I became the IT director of a large multimedia enterprise based in Time Square, New York.
I'm currently a Senior CyberSecurity Analyst at a large D.C based firm and I regularly contribute to the information security community by attending information security conferences and webinars and sharing my knowledge on my blog and email list.
My blog, fixedByVonnie, gets about half a million visitors per month. The articles span topics ranging from speeding up your browser to ethical hacking with Kali Linux.
I'm also an author and have published a highly rated Windows 8.1/10 Kindle book on Amazon. And always being an avid learner myself, I hold numerous industry standard certifications in good standing including the A+, Network+, Security+, CCNA, CCNP, CISSP and GCIH.
I have a lively Youtube channel, loyal Twitter following and a bunch of book and video ideas which I can't wait to implement. Thanks for reading my profile and checking out my videos - it's going to be a fun ride!
I think my teaching style is a bit unique. I try to respect your time by quickly getting into the content but I also let my personality bleed into everything I do. My videos sometimes feel like you have your very own guru sitting next to you showing you step-by-step how to learn. I promise you that you'll not only get your solid fill of content from my videos but also take away few laughs alone the way. I can't wait to see you inside!
Thanks again
-Vonnie