Command line network tools provide a quick and easy way to access network configuration and troubleshooting information. In this video, Mike Chapple explains how to use a variety of command line network tools, including ping, traceroute, ipconfig, ifconfi
- [Instructor] Command-line network tools…provide a quick and easy way to access…network configuration and troubleshooting information.…Let's take a look at a few key commands…that you should know as you prepare for the exam.…The ping command allows you to check…whether a remote system is accessible.…It works using the Internet Control Message Protocol,…or ICMP.…The system that initiates the ping sends…an ICMP echo request packet to the target system.…
This packet is the equivalent of saying,…"Hello, are you there?"…The remote system responds to the ping request…by sending back an ICMP echo reply.…This is the equivalent of answering the question…with, "Yes, I am here."…When you receive a successful response to your ping request,…you know that network connectivity…between the two systems is working properly.…This is especially helpful,…if you're having connectivity issues,…and aren't sure where the issue resides.…For example, if you're trying to access a website,…and it's not responding, the issue…could be in a variety of places.…
- IP addresses
- Routers, switches, and bridges
- VPNs and VPN concentrators
- Network intrusion detection and prevention
- Managing secure networks
- Tuning and configuring SIEMs
- Troubleshooting digital certificates
- Personnel, host, and mobile device security
- Mobile device management and tracking
- Securing common protocols
Skill Level Beginner
IT Security Foundations: Core Conceptswith Lisa Bock1h 13m Beginner
Insights from a Cybersecurity Professionalwith Mike Chapple32m 15s Appropriate for all
1. TCP/IP Suite
2. Network Security Devices
3. Managing Secure Networks
4. Wireless Networking
5. Security and Monitoring Technologies
6. Security Assessment Tools
7. Security Troubleshooting
8. Personnel Security
9. Host Security
10. Mobile Device Security
11. Securing Protocols
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.