Complete Practical Networking Course - Packet Traveling, Subnetting, VLANs, Cryptography, and NAT

Complete Practical Networking Course - Packet Traveling, Subnetting, VLANs, Cryptography, and NAT

Practical Networking via YouTube Direct link

Packet Traveling - How Packets Move Through a Network

1 of 36

1 of 36

Packet Traveling - How Packets Move Through a Network

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Complete Practical Networking Course - Packet Traveling, Subnetting, VLANs, Cryptography, and NAT

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Packet Traveling - How Packets Move Through a Network
  2. 2 Address Resolution Protocol (ARP) in less than 5 minutes
  3. 3 What is Subnetting? - Subnetting Mastery - Part 1 of 7
  4. 4 Drawing the Cheat Sheet - Subnetting Mastery - Part 2 of 7
  5. 5 How to solve ANY Subnetting Problems in 60 seconds or less - Subnetting Mastery - Part 3 of 7
  6. 6 Practice Examples - Subnetting Mastery - Part 4 of 7
  7. 7 Time-Saving Tricks for Subnetting - Subnetting Mastery - Part 5 of 7
  8. 8 Subnetting in the /17 - /24 range - Subnetting Mastery - Part 6 of 7
  9. 9 Subnetting in the /1 - /16 range - Subnetting Mastery - Part 7 of 7
  10. 10 Fixed-Length Subnet Mask (FLSM) - Subnetting Mastery - FLSM and VLSM Appendix Part 1 of 2
  11. 11 Variable-Length Subnet Mask (VLSM) - Subnetting Mastery - FLSM and VLSM Appendix Part 2 of 2
  12. 12 Native VLAN - the DEFINITIVE illustration
  13. 13 What are VLANs? -- the simplest explanation
  14. 14 Route Precedence -- How does a Router choose a path when multiple paths exist?
  15. 15 Route Precedence -- Answer to Bonus Questions
  16. 16 Local Broadcast and Directed Broadcasts - Description and Demonstration
  17. 17 Local Broadcast and Directed Broadcasts - Demo and Packet Captures
  18. 18 🎬 Packet Tracer challenge: Find the Imposter - Layer 2
  19. 19 🎬 Packet Tracer challenge: Find the Imposter - Layer 2 - SOLUTION VIDEO
  20. 20 Hashing, Hashing Algorithms, and Collisions - Cryptography - Practical TLS
  21. 21 Data Integrity - How Hashing is used to ensure data isn't modified - HMAC - Cryptography
  22. 22 Facebook went down!! Let's use that to talk about BGP, DNS, and Anycast
  23. 23 Encryption - Symmetric Encryption vs Asymmetric Encryption - Cryptography - Practical TLS
  24. 24 Public and Private Keys - Signatures & Key Exchanges - Cryptography - Practical TLS
  25. 25 How SSL & TLS use Cryptographic tools to secure your data - Practical TLS
  26. 26 Public Key Infrastructure - What is a PKI? - Cryptography - Practical TLS
  27. 27 RSA Algorithm - How does it work? - I'll PROVE it with an Example! -- Cryptography - Practical TLS
  28. 28 Diffie-Hellman Key Exchange - the MAGIC that makes it possible - Cryptography - Practical TLS
  29. 29 TLS / SSL - The complete sequence - Practical TLS
  30. 30 How does NAT conserve IP Address Space? (and why!) - Network Address Translation
  31. 31 Static NAT - Network Address Translation
  32. 32 Dynamic PAT - Network Address Translation
  33. 33 Dynamic NAT - Network Address Translation
  34. 34 Policy NAT - Network Address Translation
  35. 35 Twice NAT - Network Address Translation
  36. 36 OpenSSL - Encrypting and Decrypting Private Key Files

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.