Рет қаралды 189
00:14 Subnet mask
00:52 Network ID and Host ID
02:00 CIDR Notation
05:36 Hosts in each class IP address
07:12 Network and Broadcast address
12:31 Practice Question
15:17 Formula of Subnetting
27:57 Another Example
#networking #ipaddress #google #subnetting #subnetmask
Network
Repeater
Ethernet
LAN (Local Area Network)
WAN (Wide Area Network)
Router
Switch
TCP/IP
OSI Model
IP Address
Subnet Mask
DNS (Domain Name System)
DHCP (Dynamic Host Configuration Protocol)
NAT (Network Address Translation)
Firewall
VLAN (Virtual LAN)
VPN (Virtual Private Network)
IPv4
IPv6
Routing
Bandwidth
Packet
MAC Address
Wireless Network
Wi-Fi
SSID
Access Point
Modem
Gateway
Network Topology
Network Protocol
FTP (File Transfer Protocol)
HTTP (Hypertext Transfer Protocol)
HTTPS (HTTP Secure)
LAN Cable
Ethernet Cable
Network Security
Network Administrator
Network Monitoring
Network Performance
Network Architecture
Network Infrastructure
Network Troubleshooting
Packet Loss
Latency
Network Traffic
Network Segment
Network Hub
Network Bridge
Network Switch Port
Network Gateway
Cybersecurity
Intrusion Detection System (IDS)
Intrusion Prevention System (IPS)
Malware
Encryption
Authentication
Authorization
Penetration Testing
Vulnerability
Phishing
Zero-Day Vulnerability
Patch Management
Two-Factor Authentication (2FA)
Multi-Factor Authentication (MFA)
Port Forwarding
DMZ (Demilitarized Zone)
WPA/WPA2
Distributed Denial of Service (DDoS)
Security Information and Event Management (SIEM)
Access Control
Data Breach
Cyber Threat Intelligence
Cybersecurity Frameworks
Incident Response
Social Engineering
Network Security Policy
Packet Filtering
IDS/IPS Signatures
Honeypot
IP Spoofing
Network Hardening
Packet Sniffing
Data Loss Prevention (DLP)
BYOD (Bring Your Own Device)
NIST
ISO 27001
Encryption Key
Ransomware
Man-in-the-Middle (MitM) Attack
Cyber Hygiene
Nmap
IPsec
Malware Analysis
Cloud Security
VPN Tunnel
Port Scanning
Firewall Rules
Security Auditing
Security Patch
Threat Vector
Cybersecurity Risk
Network Segregation
Network Access Control (NAC)
Application Security
Brute Force Attack
Biometric Authentication
Public Key Infrastructure (PKI)
Network Traffic Analysis
Security Information Sharing
Security Incident Response Plan (SIRP)
Virtual Firewall
VPN Protocols
Cybersecurity Awareness Training
Network Forensics
Security Incident
Security Breach
Threat Intelligence Feed
Vulnerability Assessment
Network Discovery
Network Port
Secure Sockets Layer (SSL)