LINKS TO PROFESSOR MESSER'S EXCELLENT NETWORK+ VIDEOS. For a small cost, you can download every video, audio versions of each module, and all of his slides in PDF format!

1.1 – OSI and TCP/IP Models

The OSI Model (7:43) |
The TCP/IP Model (5:00)

1.2 – Real-World OSI
The OSI Model in the Real World (6:00)

1.3 – IP Addressing
Binary Math (7:59) | IP Classes (9:52)
Classless Inter-Domain Routing (7:32) | IPv4 and IPv6 (5:18)
MAC Address Formats (6:46) | Subnetting (16:12)
Unicast, Multicast, and Broadcast (5:12) | APIPA (3:42)

1.4 – Routing and Switching
EIGRP (2:53) | OSPF (2:40) | RIP (2:21)
Link State, Distance Vector, and Hybrid Routing Protocols (5:38)
Static and Dynamic Routing (4:18) | Routing Metrics (3:50) | Next Hop (7:36)
Spanning Tree Protocol (6:00) | VLANs (4:08) | Port Mirroring (3:33)
Collision Domains and Broadcast Domains (7:00) | IGP and EGP (3:47)
Routing Tables (8:07) | Convergence (3:13)

1.5 – TCP and UDP Ports
Common TCP and UDP Ports (8:09)

1.6 – Common Networking Protocols
Networking Protocols (6:17) | Management Protocols (10:51)
Application Protocols (9:36)

1.7 – DNS
An Overview of DNS (8:12) | DNS Records (9:05)
Dynamic DNS (4:26)

1.8 – Network Troubleshooting Methodology
The Network Troubleshooting Process (9:23)

1.9 – Virtual Networking

Virtual Desktops and Servers (8:29) | Virtual Switches (3:50)
Network as a Service (4:41) | Onsite vs. Offsite Virtualization (4:13)
Virtual PBX (3:23)

2.1 – Installing Routers and Switches
Configuring Routing Tables (6:08) | Configuring NAT and PAT (4:58)
Configuring VLANs (3:50) | Managed vs. Unmanaged Switches (2:33)
Interface Configurations (3:26) | Power over Ethernet (3:45)
Traffic Filtering (3:34) | Switch and Routing Diagnostics (2:48)
VLAN Trunking Protocol (2:38) | Quality of Service (7:46) | Port Mirroring (3:32)

2.2 – Installing Wireless Networks
Access Point Placement (3:36) | Wireless Antenna Types (3:09)
Wireless Interference (3:05) | Wireless Channels and Frequencies (7:06)
Wireless Standards (6:04) | SSID Management (2:39)
Wireless Compatibility (2:51)

2.3 – DHCP
DHCP Addressing Overview (4:35) | DHCP Reservations (3:10)
DHCP Scopes (1:39) | DHCP Leases (4:24)
DHCP Options (3:03)

2.4 – Troubleshooting Wireless Problems
Troubleshooting Wireless Signal Issues (4:40)
Troubleshooting Wireless Configurations (3:12)

2.5 – Troubleshooting Routers and Switches
Troubleshooting Switch Loops (5:01)
Troubleshooting Network Cabling (4:24)
Troubleshooting Port Configuration (4:15)
Troubleshooting VLAN Assignments (4:20)
Troubleshooting Mismatched MTUs (9:15)
Troubleshooting Power Failures (4:32) | Troubleshooting Routing (6:13)
Troubleshooting Bad Fiber Modules (4:49)
Troubleshooting Subnet Masks and Gateways (4:30)
Troubleshooting Duplicate IP Addresses (4:52) | Troubleshooting DNS (4:05)

2.6 – Implementing a SOHO Network
SOHO Network Requirements (4:36) | SOHO Cabling (4:10)
SOHO Device Types (4:55) | SOHO Environmental Limitations (3:57)
SOHO Equipment Limitations (3:28) | SOHO Compatibility Requirements (3:34)
3.1 – Media Types
Multimode and Singlemode Fiber (4:46)
UTP, STP, and Coaxial Cabling (5:53)
Cable Categories (3:34) | Crossover and Straight Through Cables (6:27)
Plenum and Non-Plenum Cabling (4:22) | Converting Media (5:10)
Media Distance and Speed Limitations (5:48)
Broadband over Powerline (3:53)

3.2 – Connector Types
Fiber Connectors (4:36) | Copper Connectors (10:29)

3.3 – Wireless Networking Standards
Covered in Section 2.2

3.4 – WAN Technologies
T1/E1 and T3/E3/DS3 (3:46) | OCx, SONET, and SDH (3:55)
Satellite, ISDN, Cable, DSL, and Dialup (10:25)
Cellular, WiMAX, LTE, and HSPA+ (4:54) | DWDM and PON (3:48)
Frame Relay and ATM (4:09) | Circuit Switching and Packet Switching (3:30)
Transmission Media, Speed, and Distance (4:34)

3.5 – Network Topologies
MPLS Networks (2:34) | Network Topologies (4:52)
Client Server and Peer-to-Peer Networks (2:47)

3.6 – Troubleshooting Physical Connectivity
Troubleshooting Bad Connectors (2:32)
Troubleshooting Opens and Shorts (2:46) | Troubleshooting Split Cables (3:08)
Troubleshooting dB Loss (6:18)
Troubleshooting Transmit-Receive Reversal (3:29)
Troubleshooting Cable Placement, EMI, and Interference (5:09)
Troubleshooting Crosstalk (4:16)

3.7 – LAN Technologies
Ethernet Topologies (7:32) | CSMA/CD and CSMA/CA (5:33)
Bonding and Link Aggregation (2:25)

3.8 – Wiring Distribution
IDF and MDF (3:33) | Demarcs and Smart Jacks (3:39)
CSU/DSU (2:55)
4.1 – Network Appliances
Load Balancers (4:10) | Proxy Servers (3:02)
Content Filters (4:46) | VPN Concentrators (3:36)

4.2 – Troubleshooting Tools
Crimpers (3:36) | Lineman’s Handset (2:53) | Toner Probes (3:06)
Punch Down Tools (3:53) | Protocol Analyzers (4:22) | Loopback Plugs (2:30)
TDR and OTDR (3:23) | Multimeters (2:12) | Environmental Monitors (2:28)

4.3 – Software Tools
Using Protocol Analyzers (4:31) | Throughput Testers (3:51)
Ping (5:16) | Traceroute (5:56) | Nslookup and Dig (4:45)
Ipconfig and Ifconfig (6:07) | ARP (4:02) | Nbtstat (2:52)
Netstat (4:55) | Route (5:07)

4.4 – Network Monitoring
SNMP (6:40) | Syslog (4:12)
Using Traffic Analysis (4:21)

4.5 – Configuration Management Documentation
Wire Schemes (3:27) | Network Maps (5:09)
Documentation (3:28) | Cable Management (3:20) | Asset Management (2:49)
Baselines (2:43) | Change Management (3:54)

4.6 – Network Performance Optimization
Optimizing Network Performance (3:58) | QoS and Traffic Shaping (5:08)
Load Balancing (4:49) | High Availability and Fault Tolerance (6:20)
Caching Engines (3:18)

5.1 – Wireless Security
Understanding WEP, WPA, and WPA2 (5:19) | MAC Address Filtering (3:01)
Device Placement and Signal Strength (2:29)

5.2 – Network Access Security
Access Control Lists (3:51) | Tunneling and Encryption (5:33)
IPsec (7:20) | Remote Access (7:10)

5.3 – User Authentication
Introduction to User Authentication (4:27) | Understanding PKI (6:05)
An Overview of Kerberos (7:09)
An Overview of AAA, RADIUS, and TACACS (3:49)
Network Access Control with 802.1X (3:50) | CHAP and MS-CHAP (2:53)
Understanding Extensible Authentication Protocol (2:47)
Multi-factor Authentication (2:54) | Single Sign-on (2:58)

5.4 – Common Threats
War Driving and War Chalking (3:32) | Cracking WEP and WPA (9:41)
Rogue Access Points and Evil Twins (4:03) | Denial of Service Attacks (5:42)
Man in the Middle Attacks (4:52) | Social Engineering Attacks (4:49)
Virus and Worm Attacks (6:26) | Buffer Overflow Attacks (3:49)
Packet Sniffing Attacks (4:20) | FTP Bounce Attacks (2:49)
End-User Security Training and Awareness (4:44) | Patch Management (3:16)
Policies and Procedures (3:02) | Incident Response (3:29)

5.5 – Firewalls
Software and Hardware Firewalls (3:37) | Stateful Inspection and Packet Filtering (2:42)
Understanding Firewall Rules (5:24) | Understanding NAT and PAT (5:48)

5.6 – Network Security Appliances
An Overview of IPS and IDS (4:33) | Vulnerability Scanning (4:58)
An Overview of Honeypots (3:34)