From the course: CompTIA Network+ (N10-008) Cert Prep
Unlock this course with a free trial
Join today to access over 24,200 courses taught by industry experts.
Introduction to IPv6
From the course: CompTIA Network+ (N10-008) Cert Prep
Introduction to IPv6
- Friends, we are in the midst of a revolution. In fact, the revolution is pretty much already over and a lot of people don't even know what has happened. What's taken place is the world of IP addresses has fundamentally changed. Now, what I'd like to do is, let's go ahead and put up a example IP address. Okay, so here's an IP address, a typical IP address. We've got our four values separated by three dots. Now this type of IP address, which we're now going to call IPV4, 'cause that's really what it is, has been serving us great for, I'm not even going to say, it's many decades. It's done a great job. But this has a big problem. This form of addressing, IPV4, has a total address space of around 4 billion addresses. So we can go all the way from four zeros like this all the way to 255.255.255.255 like this, and there's around 4 billion possible IP addresses. Now, if you've been following along through this series, you'll know addresses like four zeros and 255.255.255.255 cannot be used…
Download courses and learn on the go
Watch courses on your mobile device without an internet connection. Download courses using your iOS or Android LinkedIn Learning app.
Contents
-
-
Introduction to structured cabling4m 7s
-
(Locked)
Terminating structured cabling7m 45s
-
(Locked)
Equipment room7m 10s
-
(Locked)
Alternative distribution panels3m 41s
-
(Locked)
Testing cable8m 43s
-
(Locked)
Troubleshooting structured cabling, part 14m 9s
-
(Locked)
Troubleshooting structured cabling, part 23m 39s
-
(Locked)
Using a toner and probe2m 36s
-
(Locked)
Wired connection scenarios10m 21s
-
-
-
Introduction to IP addressing and binary12m 33s
-
(Locked)
Introduction to ARP3m 37s
-
(Locked)
Subnet masks12m
-
(Locked)
Classful addressing10m 10s
-
(Locked)
Subnetting with CIDR9m 36s
-
(Locked)
More CIDR subnetting practice9m 48s
-
(Locked)
Dynamic and static IP addressing13m 40s
-
(Locked)
Special IP addresses6m 52s
-
(Locked)
IP addressing scenarios14m 38s
-
-
-
Introducing routers15m 9s
-
(Locked)
Understanding ports5m 17s
-
(Locked)
Network address translation6m 15s
-
(Locked)
Implementing NAT2m 28s
-
(Locked)
Forwarding ports17m 31s
-
(Locked)
Tour of a SOHO router11m 53s
-
(Locked)
SOHO vs. enterprise8m 32s
-
(Locked)
Static routes12m 31s
-
(Locked)
Dynamic routing10m 27s
-
(Locked)
RIP4m 18s
-
(Locked)
OSPF3m 25s
-
(Locked)
BGP5m 30s
-
-
-
TCP and UDP7m 13s
-
(Locked)
ICMP and IGMP5m 59s
-
(Locked)
Handy tools6m 35s
-
(Locked)
Introduction to Wireshark10m 29s
-
(Locked)
Introduction to netstat8m 42s
-
(Locked)
Web servers11m 43s
-
(Locked)
FTP11m 37s
-
(Locked)
Email servers and clients9m 9s
-
(Locked)
Securing email5m 39s
-
(Locked)
Telnet and SSH9m 8s
-
(Locked)
Network Time Protocol2m 47s
-
(Locked)
Network service scenarios9m 25s
-
-
-
(Locked)
Making TCP/IP secure4m 17s
-
(Locked)
Symmetric encryption5m 24s
-
(Locked)
Asymmetric encryption3m 12s
-
(Locked)
Cryptographic hashes4m 48s
-
(Locked)
Identification8m
-
(Locked)
Access control4m 12s
-
(Locked)
AAA4m 51s
-
(Locked)
Kerberos/EAP7m 24s
-
(Locked)
Single sign-on10m 1s
-
(Locked)
Certificates and trust13m 53s
-
(Locked)
Certificate error scenarios7m 58s
-
(Locked)
-
-
(Locked)
Switch management8m 54s
-
(Locked)
Introduction to VLANs10m 13s
-
(Locked)
InterVLAN routing3m 1s
-
(Locked)
Trunking7m 44s
-
(Locked)
Cisco commands6m 21s
-
(Locked)
Switch port protection6m 33s
-
(Locked)
Port bonding7m 7s
-
(Locked)
Port mirroring3m 24s
-
(Locked)
Quality of service5m 2s
-
(Locked)
IDS vs. IPS4m 20s
-
(Locked)
Proxy servers12m 36s
-
(Locked)
Load balancing8m 24s
-
(Locked)
Device placement scenarios12m 46s
-
(Locked)
-
-
(Locked)
Understanding IP tunneling5m 56s
-
(Locked)
WAN technologies5m 35s
-
(Locked)
Digital subscriber line (DSL)4m 24s
-
(Locked)
Connecting with cable modems4m 8s
-
(Locked)
Connecting with satellites2m 21s
-
(Locked)
Cellular technologies3m 54s
-
(Locked)
Remote desktop connectivity4m 24s
-
(Locked)
Virtual private networks (VPNs)8m 42s
-
(Locked)
WAN troubleshooting scenarios4m 40s
-
(Locked)
-
-
(Locked)
Introduction to 802.1111m 30s
-
(Locked)
802.11 standards12m 9s
-
(Locked)
Power over Ethernet (PoE)3m 35s
-
(Locked)
Antennas8m 30s
-
(Locked)
Wireless security standards5m 59s
-
(Locked)
Implementing wireless security6m 48s
-
(Locked)
Threats to your wireless network6m 54s
-
(Locked)
Enterprise wireless5m 59s
-
(Locked)
Installing a wireless network14m 36s
-
(Locked)
Wireless scenarios6m 4s
-
(Locked)
NEEDS TITLE8m 42s
-
(Locked)
-
-
(Locked)
Virtualization basics6m 34s
-
(Locked)
Your first virtual machine7m 17s
-
(Locked)
Cloud basics3m 7s
-
(Locked)
Cloud services6m 52s
-
(Locked)
Cloud ownership2m 27s
-
(Locked)
Infrastructure as code (IaC)3m 19s
-
(Locked)
Heroku demo8m 46s
-
(Locked)
Enterprise virtualization5m 25s
-
(Locked)
Cloud implementation11m 28s
-
(Locked)
-
-
(Locked)
What are network operations?3m 15s
-
(Locked)
Hardening and security policies8m 21s
-
(Locked)
Change management6m 32s
-
(Locked)
Patching and updating7m 12s
-
(Locked)
Security risk management5m 14s
-
(Locked)
Points of failure4m 5s
-
(Locked)
Standard business documentation4m 59s
-
(Locked)
Incident response and forensics5m 27s
-
(Locked)
Disaster recovery and backups12m 28s
-
(Locked)
Business continuity11m 36s
-
(Locked)
Deployment models5m 15s
-
(Locked)
-
-
(Locked)
Security concepts5m 57s
-
(Locked)
Defense in depth5m 17s
-
(Locked)
Rogue DHCP servers3m 50s
-
(Locked)
Denial of Service (DoS)9m 53s
-
(Locked)
On-path and spoofing attacks22m 31s
-
(Locked)
Password attacks6m 24s
-
(Locked)
VLAN hopping6m 10s
-
(Locked)
System life cycle4m 29s
-
(Locked)
Malware6m 12s
-
(Locked)
Social engineering7m 39s
-
(Locked)
Common vulnerabilities3m 12s
-
(Locked)
Physical security12m 34s
-
(Locked)
Network hardening8m 1s
-
(Locked)
Demilitarized Zone (DMZ)5m 21s
-
(Locked)
Introduction to firewalls4m 22s
-
(Locked)
Firewalls10m 3s
-
(Locked)