Complete Practical Networking Course - Packet Traveling, Subnetting, VLANs, Cryptography, and NAT
Practical Networking via YouTube
Google AI Professional Certificate - Learn AI Skills That Get You Hired
Our career paths help you become job ready faster
Overview
Syllabus
Packet Traveling - How Packets Move Through a Network
Address Resolution Protocol (ARP) in less than 5 minutes
What is Subnetting? - Subnetting Mastery - Part 1 of 7
Drawing the Cheat Sheet - Subnetting Mastery - Part 2 of 7
How to solve ANY Subnetting Problems in 60 seconds or less - Subnetting Mastery - Part 3 of 7
Practice Examples - Subnetting Mastery - Part 4 of 7
Time-Saving Tricks for Subnetting - Subnetting Mastery - Part 5 of 7
Subnetting in the /17 - /24 range - Subnetting Mastery - Part 6 of 7
Subnetting in the /1 - /16 range - Subnetting Mastery - Part 7 of 7
Fixed-Length Subnet Mask (FLSM) - Subnetting Mastery - FLSM and VLSM Appendix Part 1 of 2
Variable-Length Subnet Mask (VLSM) - Subnetting Mastery - FLSM and VLSM Appendix Part 2 of 2
Native VLAN - the DEFINITIVE illustration
What are VLANs? -- the simplest explanation
Route Precedence -- How does a Router choose a path when multiple paths exist?
Route Precedence -- Answer to Bonus Questions
Local Broadcast and Directed Broadcasts - Description and Demonstration
Local Broadcast and Directed Broadcasts - Demo and Packet Captures
Packet Tracer challenge: Find the Imposter - Layer 2
Packet Tracer challenge: Find the Imposter - Layer 2 - SOLUTION VIDEO
Hashing, Hashing Algorithms, and Collisions - Cryptography - Practical TLS
Data Integrity - How Hashing is used to ensure data isn't modified - HMAC - Cryptography
Facebook went down!! Let's use that to talk about BGP, DNS, and Anycast
Encryption - Symmetric Encryption vs Asymmetric Encryption - Cryptography - Practical TLS
Public and Private Keys - Signatures & Key Exchanges - Cryptography - Practical TLS
How SSL & TLS use Cryptographic tools to secure your data - Practical TLS
Public Key Infrastructure - What is a PKI? - Cryptography - Practical TLS
RSA Algorithm - How does it work? - I'll PROVE it with an Example! -- Cryptography - Practical TLS
Diffie-Hellman Key Exchange - the MAGIC that makes it possible - Cryptography - Practical TLS
TLS / SSL - The complete sequence - Practical TLS
How does NAT conserve IP Address Space? (and why!) - Network Address Translation
Static NAT - Network Address Translation
Dynamic PAT - Network Address Translation
Dynamic NAT - Network Address Translation
Policy NAT - Network Address Translation
Twice NAT - Network Address Translation
OpenSSL - Encrypting and Decrypting Private Key Files
Taught by
Practical Networking