Networking Foundations: Servers

Networking Foundations: Servers

English | MP4 | AVC 1280Ă—720 | AAC 48KHz 2ch | 2h 27m | 336 MB

Servers are the heavy lifters of IT. They power the internet, email, enterprise-level applications, databases, local networks, and more. While most users have a superficial understanding of servers, system administrators and IT pros must know them intimately. You must be prepared to configure, deploy, and maintain a variety of servers—with high availability and scalability. This course covers the fundamentals of servers, including popular server operating systems such as Windows Server and Linux. It’s designed for the entry-level IT student who needs a basic understanding of server architecture, user administration, virtualization, storage, security, networking, and disaster recovery. Instructor Ed Liberman, an IT consultant and trainer for over 20 years, also reviews troubleshooting theory and tools, so you can understand common problems that can arise with servers and how to solve them.

Table of Contents

Introduction
1 Getting started with server administration
2 What you should know

Server Architecture
3 Server form factors
4 Server components
5 Power and cooling components

Server Administration
6 Server installation
7 Post-installation configuration
8 Server roles
9 Server connectivity options

Server Maintenance
10 General server management
11 Performance management
12 Event logging
13 Asset management
14 Documentation

Networking
15 Basic IP configuration
16 Common ports and protocols
17 Network cabling
18 Wireless networking

Storage
19 Storage technologies
20 Understanding RAID
21 Capacity planning

Security
22 Rights and permissions
23 Encryption
24 Server hardening
25 Physical security

Environmental Protection
26 Power protection
27 Environment and safety
28 Secure disposal

Virtualization and Cloud Computing
29 Benefits of virtualization
30 Implementing virtual servers
31 Overview of cloud computing

Disaster Recovery
32 Planning for a disaster
33 Backup strategies
34 Troubleshooting methodology

Conclusion
35 Next steps