network
Showing 229–236 of 236 results
VLAN Operation and Configuration
In this course, we will examine VLANs, VLAN trunks, the layer 3 switch, as well as some common errors one can make while configuring switched networks.
VMware NSX-T Data Center: Troubleshooting and Repairing an NSX-T Environment
VMware’s software-defined network platform can present challenges when troubleshooting is needed. This course will teach you how to utilize the built-in tools to troubleshoot an NSX-T environment.
VoIP and Web Calls: Tips for Better Remote Communications
With more people working remotely, the importance of remote communication skills has never been greater. This course will teach you how to prepare for a web call, how to lead or participate in the call, and then how to take action afterwards.
VPNs and Wireless Networks
Pluralsight is not an official partner or accredited training center of EC-Council. In this course you'll learn about configuring VPNs, Wi-Fi, and Bluetooth, and ways to reduce associated risks.
Wide Area Networking and VPN Operation
Even the smallest organization requires a WAN and likely a VPN. This course explores the purpose of WAN and VPN connections, identifies real world WAN technology, and demonstrates the configuration of a VPN.
Wireless Architecture Fundamentals
No one wants to poorly design a network. This course will teach you wireless topologies, layer 2 and layer 3 roaming, access point cell size considerations, and how to extend an ESS with additional access points.
Wireless Technology Fundamentals
Supporting a wireless network requires understanding the underlying technologies involved. This course will teach you these technologies, such as 802.11 frames, CSMA/CA, radio resource management, and finally configuration of APs and controllers.
Wireshark Traffic Analysis: Customizing the Interface, ARP, ICMP, and DNS
Using Wireshark to identify and analyze ARP, ICMP, and DNS traffic is a great tool to add to a network engineer's toolkit. Many of the most easily corrected problems on a network can be solved by understanding proper operation of these protocols.