Intelligentedu
Best New Free Computer IT Training Tutorial Resources


January 7, 2011

9 Computer Networking Tutorials and References

Here are 9 knowledge-packed tutorial and instructional pages covering Computer Networking. If you are studying for the CompTIA Network+ Exam these materials will help you understand and learn these important networking topics. These are also a great resource or reference to have if you are working with computer networks. Some of this is a little dated, but most of it is still applicable today.

The CompTIA Network+ Exam certifies that the successful candidates knows the layers of the OSI model, can describe the features and functions of network components and has the skills needed to install, configure, and troubleshoot basic networking hardware peripherals and protocols, and understand areas such as wireless networking and gigabit Ethernet. A typical candidate should have A+ certification or equivalent knowledge, but A+ certification is not required. In addition, candidates are encouraged to have at least 9 months of experience in network support or administration.


Basic Networking Tutorial

7 Layers of the OSI Model

How Virtual LANs (VLANS) Work

Internet Backbone Speeds

Networking Terms and Topics, Simplified

Network Topologies

History of TCP/IP

IP Spoofing and Sniffing

Network+ Certification Exam Topics





Tags for this post>>

Filed under: Best New Free Computer IT Training Tutorial Resources — computer_teacher @ 4:10 pm


January 5, 2011

Internet and Networking Tutorial Seminars

Here are some excellent Internet and Networking Tutorial Seminars, hosted by the University of Nebraska. These were originally broadcast as part of the EXCITE series (EXtending your Communications and Information Technology Experience). For each networking/Internet seminar you can play the online video and also download the original handout in pdf format. You will need the free RealPlayer to view the video.

Each seminar includes a list of resources, put together by the presenter, that provides a mix of materials from college courses to company pages. Resources vary from lecture notes to index resource pages to HTML versions of PowerPoint slide shows. (The links were current at time of seminar.)


Seminars




Introduction to Networking: how networks work - topologies, protocols, bandwidth, equipment (routers, gateway, bridge, etc.), Internet 1 & 2, and more.
Presenter: Cliff Ritz | View seminar (52:58 minutes) | Seminar Handout (PDF - 1 page, 27KB).

Resources





How TCP/IP Networks Work: TCP/IP, Protocols, Addressing, Routing, ISPs/Network Providers.
Presenter: Ron Roeber | View seminar (58:34 minutes) | Seminar Handout (PDF - 2 pages, 36KB)

Resources
  • TCP/IP Network Administration, 3rd Edition, April 2002. By Craig Hunt. Available from O'Reilly Online Catalog.
  • Computer Networks and Internets: Introduction
    This "Introduction" Web page provides information on how to use the website. The website is a collection of the support materials for the Computer Networks and Internets book (third edition). The book, written by Dr. Douglas Comer, gives an introduction to networking and internetworking. Professor Comer uses Computer Networks and Internets in his course CS 422, Computer Networks, at Purdue University.



Connectivity / Media Options: IP Service/ bandwidth services, Terrestrial/ Wireless, Backbone, DSL, Cable, Wireless options.
Presenter: Dan Cotton | View seminar (56:55 minutes) | Seminar Handout (PDF - 2 pages, 16KB)

Resources



Home and Small Office Computing Solutions: LANs and Networking options / issues.
Presenter: Terry Bockstadter | View seminar (45:57 minutes) | Seminar Handout (PDF - 2 pages, 48KB)

Resources
  • Network Magazine - provides news, Buyer's Guide, product reviews, tutorials, Case Studies, and more
  • ExtremeTech - provides technology news, opinion articles, tips, and more
  • PC Magazine - provides hardware and networking reviews, news and analysis, how-to information under the "Solutions" category, and more
  • Network Tutorial by Robert Brian Brown, D & M Electronics Inc.



Security, Part 1: Services, Ports, Opportunities for Exploitation, and Protection (Firewall, Viruses, Worms).
Presenters: Mark Hendricks & Ron Roeber | View seminar (51:10 minutes) | Seminar Handout (PDF - 2 pages, 36KB)

Resources
  • Internet Storm Center - information on what's happening on the net: status of attacks and links to Institute for Security Technology Studies (ISTS) news
  • CERT® Coordination Center - Internet security expertise clearinghouse located at the Software Engineering Institute, a federally funded research and development center operated by Carnegie Mellon University
  • antivirus.unl.edu - virus protection information and software updates for UNL staff
  • Security advisories from Symantec - Symantec is a leading Internet security technology company.



Security, Part 2: Commerce, Encryption, Transmission of data, Password, SSH, and Authentication and authorization.
Presenters: Mark Hendricks & Ron Roeber | View seminar (52:26 minutes) | Seminar Handout (PDF - 2 pages, 39KB)

Resources
  • OpenSSH
    FREE version of the SSH protocol suite of network connectivity tools. OpenSSH encrypts all traffic (including passwords) to effectively eliminate eavesdropping, connection hijacking, and other network-level attacks and it provides a variety of authentication methods
  • SSH
    SSH Communications Security is a supplier of Internet security software for demanding network security solutions. SSH provides cryptography and authentication technologies and products for secure Internet communications.
  • F-Secure SSH
    F-Secure Corporation is a provider of centrally managed security solutions for the mobile enterprise. The company's products include anti-virus, file encryption and network security solutions for all major platforms from desktops to servers and from laptops to handhelds.
  • PuTTY
    PuTTY is a free implementation of Telnet and SSH for Win32 platforms, along with an xterm terminal emulator.
  • NiftyTelnet
    NiftyTelnet 1.1 SSH r3 is an enhanced version of Chris Newman's NiftyTelnet 1.1 application which adds support for encrypted terminal sessions using the SSH (Secure Shell) protocol.
  • OpenSSL Project
    The OpenSSL Project is a collaborative effort to develop a robust, commercial-grade, full-featured, and Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols as well as a full-strength general purpose cryptography library. The project is managed by a worldwide community of volunteers.
  • VeriSign
    VeriSign's Site Trust Services offer e-commerce businesses tools to secure and e-commerce-enable websites to that customers can be certain the website is genuine, and that the information they send via Web browsers, and other devices stays private and confidential.
  • Covalent
    Covalent is one of the industry's leading providers of enterprise solutions for the Apache Web server. The Apache Web server software's market share exceeds 60 percent for all Web servers--more than Microsoft and Netscape combined.



Tags for this post>> | |

Filed under: Best New Free Computer IT Training Tutorial Resources — computer_teacher @ 7:13 pm


April 21, 2010

Learning Linux, Sys Admin, Network Admin, Perl, and C Programming

Nick Urbanik, a computer and operating systems instructor, has made much of his teaching material freely available on his site at nicku.org. This free learning and training content covers the Linux Operating System, System Administration, Network Administration, Perl, and C Programming. His material includes lectures, notes, and quizes with questions and answers.


Nick Urbanik's Learning Topics:

LPIC 102—Preparing for the LPIC 102 Certification Exam
 - Topic 105: Kernel
 - Topic 106: Boot, Initialization, Shutdown and Runlevels
 - Topic 107: Printing
 - Topic 108: Documentation
 - Topic 109: Shells, Scripting, Programming and Compiling
 - Topic 111: Administrative Tasks
 - Topic 112: Networking Fundamentals
 - Topic 113: Networking Services
 - Topic 114: Security
 - LPIC Introduction
 - Grub and bootloaders

Operating Systems and Systems Integration
 - Shell programming
 - Linux Kernel
 - Linux Booting
 - Linux Processes
 - Deadlock
 - Memory Management
 - Samba
 - Input/Output
 - Partitioning
 - File Permissions.
 - Red Hat Linux

Systems and Network Management

 - LDAP
 - Perl
 - SNMP
 - DHCP
 - Routing and Switching

Linux For Teachers


C Programming

C for Engineers



Tags for this post>> | | |


Filed under: Best New Free Computer IT Training Tutorial Resources — computer_teacher @ 7:20 pm


March 19, 2010

Computer Learning and Support Docs

Here is the first of two posts of technical and computer learning and reference documents, located at admi-lan. Many of these cover Microsoft and Windows related topics, but there are also other areas covered such as Linux, Networking, Cisco, Wireless, Security, and computer Harware. The second post is here.


Active Directory
10 things you should know about Active Directory domain trusts
Design your Active Directory tree with security in mind
Manage computers in Active Directory with these quick and easy recipes
Simplify Active Directory administration by mastering these essential tools

Antivirus
Consider these low-costs antivirus solutions
Guide installation de Symantec AntiVirus Corporate Edition 9x a usage des administrateurs
Symantec Antivirus 10.0 installation walk-through for administrators
Symantec Client Security 3.0 installation walk-through for administrators

Backups
Develop an effective data backup strategy
Disk-Based Backup & Recovery - Making Sense of Your Options
How to create a Backup-to-disk folder in Backup Exec for Windows Servers
Recover from almost any registry error in Windows Server 2003 and Windows XP by using these backu

BIOS
bios_beep_codes_list_v3
bypass_bios_password
Crack a BIOS password in a flash

Cisco
Recover lost passwords using Cisco configuration registers

DHCP
Create a superscope to solve the problem of dwindling IP addresses
IP subnetting made easy

DNS
10 things securing dns
Build a DNS server on Linux using BIND
Build a scalable DNS infrastructure
Configurations and registry edits to help you secure your DNS servers
Configure a Win2K DNS server to forward external requests
Create a superscope to solve the problem of dwindling IP addresses
IP subnetting made easy
Lock down DNS with these tips
Manage the DNS client cache in Windows 2000 Pro
Nslookup screenshots - Troubleshooting DNS problems

Exams
Prepare for CompTIA's Network+ exam with more than 100 practices questions on network media and t

Firewalls
An Introduction to Client Firewalls
Best practices for managing firewall logs
Build a floppy-based router - firewall with Freesco
Configure firewall security on a SonicWALL device
Configure SonicWALL VPN Connections
Design the best security topology for your firewall

General Security
10 dumb things IT pros do that can mess up their networks
10 security problems unique to IT
10 ways to monitor what your users are doing with company computers
10+ e-mail best practices to share with your users
Configuring Windows Security
Debunking two myths about the Windows administrator account
file folder print rights
Investigate what hackers do, how they do it, and how you can protect yourself
Is encryption really crackable
securityresource2
See why even a simple firewall is better than nothing
The importance of an e-mail usage policy
Windows 101- Know the basics about NTFS permissions

Hardware
10 things you should know about deploying a UPS
10+ tools you should have in your support tech repair kit
A dead laptop battery doesnt have to be a disaster
Boost server disk I-O performance with a battery-backed write cache
Closely check those auto-detected BIOS settings
computer_hardware_inventory_list
CPU installation requires a delicate touch
Detect hard disk failures before they happen
Don't dismiss mechanical problems when troubleshooting CD-ROM drives
Duplicate a hard drive with a floppy disk
Extend the life of your printers with these tips
File systems 101 - FAT
Get the nitty gritty about SCSI
Get the pros and cons of Parallel ATA and SATA 1
Get the pros and cons of SATA II
Hard drive failure troubleshooting checklist
Learn about 'specialty' RAID levels
Monitor a UPS with the NUT package
Put your modem to work with Windows XP
Setup and troubleshoot Windows XP hardware components and device drivers
Understand 'single digit' RAID levels

IIS
Administer and customize FrontPage Server Extensions in IIS
Basic strategies for securing Internet Information Server
Configure and maintain the SMTP service in IIS 5.0
Lock it down - Windows 2000 IIS

Internet Security
10 reasons to use ISA Server 2004 as your remote access VPN server and VPN gateway
Another Microsoft security flaw threatens Internet users trust
Avoid getting blacklisted - stop relaying spam
Learn to surf the Web anonymously
Securing Your Online Data Transfer with SSL
Use DHCP Class to deny Internet access to unauthorized machines

Linux
Configure Linux to read your PC floppy disks
Create a Linux boot CD to recover a failed server
Decentralize Linux security with Sudo
Five steps to deploying Linux in the enterprise
Linux 101- Use ifconfig in Linux to configure your network
Set up a Linux VPN server by following these 10 steps

Network
10 commands you should master when working with the Cisco IOS
10 things you should know about AD domain trusts
100 things you should know about handling net admin tasks more effectively
10_things_netsh
Adaptec 1200a
Add Macs To A Windows Workgroup
Afficher les erreurs reseaux
An efficient and affordable network monitoring solution for SMEs
Automate networking tasks with Jarevas OpForce
cat_5_patch_cable_guide
Cisco administration 101- Routing redistribution
Common causes of network slowdowns
Configure network load balancing in Windows 2000
Configure TCP-IP graphically with Wntipcfg
Create an IP addressing plan that will grow
Enterprise Performance Management - A Framework for Optimizing Network and Application Performanc
IP subnetting made easy
Network_Documentation_Checklist
Router Configuration 101 - Setting up the router
Save time using batch files to perform repetitive tasks in a Windows environment
Speed up the switch port initialization process
Synchronize time throughout your entire Windows network
TCPIP_fundamentals
Unearthing the Openfiles command-line tool in Windows XP

Network Security
10 ways to monitor what your users are doing with company computers
10_things_wsus
AppSec can help restrict application access in Win2K
At last real wireless LAN security
Automate your network monitoring process
Cacls_exe_quikref
Centralize authentication with a Win2K RADIUS server
Centrally manage desktop security with Zone Labs Integrity
Disable NetBIOS and SMB to protect public Web servers
DoS protection
Essential steps to a secure network
Hacking the hacker - How a consultant shut down a malicious user
Help users create complex passwords that are easy to remember
Lock down SNMP traffic using IPSec
Monitor traffic on a network for free with Ethereal
NAP offers a network access control solution for SMBs
Resetting Windows XP Group Policy Refresh Interval
Secure your network for success with these resiliency best practices
security_policy_checklist

Palm
Connect your Palm or Pocket PC to a WLAN with these 802

SQL
10 common SQL Server problems and solutions
BLDR-QS-SQLServer
Configure Access and SQL ODBC connections for user databasà
Five tips to secure SQL Server 2000
Query more useful information by deploying SQL Server 2005 Reporting Services

Terminal Services
Check out these hidden extras for Win2K Terminal Services

VPN
10 things you should know about troubleshooting VPN connections
Configure Windows XP Professional to be a VPN server
Configuring certificates for an L2TP-IPSec VPN
Don't let VPN users be the weak link in network security
Join a domain during Windows logon using a VPN client

Wireless
10 things you should do to protect your network against wireless devices
ultimate guide to enterprise wireless LAN security



Tags for this post>> | | | | | |


Filed under: Best New Free Computer IT Training Tutorial Resources — computer_teacher @ 4:58 am


August 29, 2009

Networking, IP Addressing, and Wireless Networking

Here is lots of information from Orbit-computer-solutions for learning more about Networking, IP Addressing, Routers, Wireless Networking, VLANs, DHCP, and NAT. There are 


Networking Fundamentals
 - Routers
 - Broadband 
 - Switches
 - Wireless Networking
 - Wireless Network Diagram
 - Wired Network Diagram
 - Wireless Routers
 - Linksys Wireless Routers
 - Intermediary devices and role on network
 - Wireless Network Security
 - WEP, WPA, WP-2, 802.1x

IP Addressing
 - Types of IPv4 addresses
 - IP address and Class
 - Network Address
 - Broadcast Address
 - Host Address
 - CIDR (Classless InterDomain Routing)
 - VLSM (Variable Length Subnet Mask)
 - Applying IP address on Cisco routers
 - Subnetting IP addresses
 - Wildcards

Routers
 - Cisco Routers
 - Types of routers
 - Linksys Wireless routers

Switches

Routing Protocols
   
Wireless Networking
 - Wireless routers
 - Access Point
 - Wireless network diagram
 - Wired network diagram
 - Linksys wireless routers
 - Wireless network security
 - Network Security Software
 - WEP, WPA, WPA-2, 802.11x
 - Types of wireless technologies

VLAN
 - Access Control Lists (ACL)
 - Types of Access Lists
 - Applying Access lists
 - Standard and Extended Access lists
 - Extended ACL configuration
 - Access list configuration on a Cisco switch
 - Creating and Applying Standard list
 - Access List scenario example

DHCP
 - Advantages and Disadvantages of DHCP
 - Dynamic Allocation of IP address via DHCP on a Cisco Router
 - Excluding IP Addresse(s)
 - Defining DHCP Lease Period on a Cisco Router
 - Enabling DHCP on Windows

Network Address Translation (NAT)
 - How NAT work

Troubleshooting Networks



Tags for this post>>


Filed under: Best New Free Computer IT Training Tutorial Resources — computer_teacher @ 8:39 pm


March 27, 2009

100 eBooks for Programming, Networking, Communications, and Math

Here are about 100 eBooks covering Computer Programming and Networking, Communications Design and Theory, and Applied Mathematics. The main topics are listed below for your review.


eBook Topics
:

 - Java Programming
 - Java Network Programming
 - Coding Algorithms and Architecture
 - Ubuntu Linux
 - Windows Vista Networking
 - Cisco
 - Wireless Networking and Communications
 - WiMAX
 - GPRS and 3G Applications
 - Communications Engineering
 - Digital Communications
 - Digital Principals and Design
 - DSL
 - Modulation
 - Applied and Engineering Mathematics
 - Electric and Electronic Circuits
 - Information Theory
 - Fuzzy Controlers
 - GSM Engineering
 - Electrodynmics
 - Graph Theory
 - Microwave Engineering
 - Antenna Theory and Design
 - Calculus and Differential Equations
 - Telecommunications
 - Hard Drive
 - Fiber Optics
 - Probability and Queues
 - Artificial Intelligence



Tags for this post>> | | | |


Filed under: Free Computer and I.T. Books — computer_teacher @ 10:10 pm


February 16, 2009

Computing and Networking Classes and Tutorials

Here are HP's Free Computing and Networking Classes and Lessons. These will teach you Networking basics, Server technology, backup strategies,, security, troubleshooting, and wireless networking. These courses and tutorials are available 24/7 and you can enroll in them or take them at any time.


Networking 101 Class
Learn all the basics of networking so you can set up, secure and maintain your own network.

Servers 101 Class
Learn to select, install, configure, secure, support and upgrade a small business server network.

Six steps to computer security (quick lesson)
In this quick lesson, you'll learn how to protect your notebook and desktop computers from hackers, crackers, viruses, spam and other threats.

Laptop PCs: Basic Troubleshooting and Repair (quick lesson)
Learn how to fix or avoid the "gotchas" that are unique or common to laptop computers.

Laptop PCs: Troubleshooting Wireless Problems (quick lesson)
An important part of laptop PC troubleshooting involves wireless connections and security issues.

Simple backup strategies with HP Backup and Recovery Manager (quick lesson with podcast)
Learn how to back up and restore vital business data, applications and entire systems using HP Backup and Recovery Manager software.

HP Backup and Recovery Manager: Restore Files  (8:13)
Learn how to use HP Backup and Recovery Manager to restore files in this demonstration.

HP Backup and Recovery Manager: Schedule Backups  (13:34)
All HP business desktop and notebook computers have HP Backup and Recovery Manager. This demonstration shows you how to use this application to back up files.

IT infrastructure and its challenges: outsource or hire? (quick lesson)
As a business grows, its IT support needs become challenging. Learn how to decide if it makes sense to hire or contract for IT help.



Tags for this post>> | |


Filed under: Best New Free Computer IT Training Tutorial Resources — computer_teacher @ 11:18 pm


February 10, 2009

16 Free Classes for IT Professionals from HP

Here are HP's 16 Free Classes for IT Professionals, covering topics such as data protection, security, storage networks, Windows Server 2008, virtualization, firewalls, backup and recovery, IT infrastructure, and wireless networking.
Learning center - free online classes


Servers and Storage Solutions

Disaster preparedness through virtualization (quick lesson)
Learn what virtualization is, how it works and the practical application of including virtualization in your disaster recovery plan.

ERP: resource planning solutions
Enterprise resource planning (ERP) is a major undertaking for any business. Learn how ERP can streamline your business.

How to build a midsize IT core infrastructure  
Understand how IT managers at midsize companies can build and deploy a core IT infrastructure simply and effectively.

Introduction to storage networks
Improve your storage area network by assessing your current infrastructure, addressing evolving needs and getting the best return on storage network investments.

Protect your data: back up to tape, disk and the network
Learn the importance of backup to small and mid-sized businesses and how to design the right data protection solution for your organization.

Understanding Microsoft Windows Server 2008
This course is designed to give IT professionals an overview of the features offered in Microsoft Windows Server 2008.

Virtualize your infrastructure: deployment
Find out how to use virtualization to help you save money, expand your network resources and maximize your IT budget.


PC Solutions

Combating spam and spyware (with podcast)
This class will give you a thorough understanding of what spam and spyware is, how it works, and how to manage it.

Evaluating desktop virtualization solutions
This class provides a background in desktop virtualization to help you make decisions about implementing a desktop virtualization plan.

Exploring and implementing Gobi and 3G technology
Learn about the speed and flexibility of new Gobi chip technology and how to use it as a company-wide mobile and wireless networking tool.

Firewall basics (with podcast)
Learn what a firewall is, explore firewall hardware and software and get a TCP/IP tutorial for help in setting up your firewall.

HP Backup and Recovery Manager: schedule backups  (13:34)
All HP business desktop and notebook computers have HP Backup and Recovery Manager. This demonstration shows you how to use this application to back up files.

HP ProtectTools: security at your fingertips (quick lesson with podcast)
Learn how to enable the computer systems security components of HP ProtectTools, found pre-installed on most HP PCs.

Simple backup strategies with HP Backup and Recovery Manager (quick lesson with podcast)
Learn how to back up and restore vital business data, applications and entire systems using HP Backup and Recovery Manager software.

Simplify your IT infrastructure: reduce total cost of ownership
This blade tutorial teaches you how easy it is to deploy server and storage blades to streamline management, save space and reduce costs.

Wireless networking with Bluetooth (quick lesson)
This brief will explain what Bluetooth is and how to use it, as well as give a detailed comparison of Bluetooth with other wireless technologies.



Tags for this post>> | | |


Filed under: Best New Free Computer IT Training Tutorial Resources — computer_teacher @ 12:39 am


November 22, 2008

Computer and Programming Books Linked by Google

Here is a google search that returns several sites the provide and link to freely available technical, web development, and programming online books. Technologies covered by these include Java, Perl, Networking, Linux, Unix, Oracle, and XML. About one-third of the links in the search results are of interest.



Tags for this post>> | | | | | | | |


Filed under: Free Computer and I.T. Books — computer_teacher @ 10:15 pm


Powered by WordPress