From the course: CompTIA Network+ (N10-009) Cert Prep
Unlock this course with a free trial
Join today to access over 25,500 courses taught by industry experts.
Remote desktop connectivity
From the course: CompTIA Network+ (N10-009) Cert Prep
Remote desktop connectivity
- One thing people would love to do is to connect to their office computer from home or any remote location. And this is done through remote desktop technologies. Now, remote desktop started with a company called Citrix. They used a proprietary protocol called Independent Computing Architecture or ICA. And this was done over an IP network. Citrix is still a little popular today, but there are others out there such as TightVNC and RDP. Now, VNC stands for virtual network computing and TightVNC is just one program that uses this. VNC is a cross platform solution. In other words, you can have a Mac computer connect remotely to a Linux computer, whereas RDP, remote desktop protocol, this is a proprietary protocol from Microsoft. Now, TightVNC itself, it does come with Mac and Linux. You can get it for Windows, but you have to download it. Now, when you have a VNC, you'll get a viewer and then you'll get a service. Another method to connect to remote computer, as we said, is Microsoft's…
Download courses and learn on the go
Watch courses on your mobile device without an internet connection. Download courses using your iOS or Android LinkedIn Learning app.
Contents
-
-
Introduction to structured cabling4m 3s
-
Terminating structured cabling7m 39s
-
Equipment room7m 5s
-
Alternative distribution panels3m 36s
-
Using a toner and probe2m 31s
-
Testing cable8m 39s
-
Troubleshooting cabling, part 14m 5s
-
Troubleshooting cabling, part 23m 34s
-
Troubleshooting cabling, part 39m 44s
-
-
-
Introduction to routers15m 4s
-
Network address translation (NAT)6m 10s
-
Implementing NAT2m 23s
-
Forwarding ports17m 26s
-
Tour of a SOHO router11m 48s
-
SOHO vs. enterprise8m 28s
-
Static routes12m 25s
-
Dynamic routing10m 22s
-
Open shortest path first (OSPF)3m 19s
-
Border gateway protocol (BGP)5m 25s
-
Enhanced interior gateway routing protocol (EIGRP)8m 10s
-
First hop redundancy protocol (FHRP)7m 56s
-
-
-
TCP and UDP7m 9s
-
ICMP and IGMP5m 55s
-
Explaining traffic types4m 44s
-
Handy tools6m 30s
-
Wireshark protocol analyzer10m 25s
-
Introduction to netstat7m 31s
-
File transfer protocol (FTP)9m 56s
-
Email servers and clients9m 7s
-
Securing email5m 34s
-
Telnet and SSH9m 2s
-
Network time protocol (NTP)4m 46s
-
Network service scenarios9m 20s
-
-
-
Switch management8m 49s
-
Introduction to VLANs10m 7s
-
InterVLAN routing2m 56s
-
Configuring switching technologies7m 25s
-
Trunking7m 39s
-
Cisco commands9m 2s
-
Switch port protection6m 28s
-
Port mirroring3m 19s
-
IDS vs. IPS4m 15s
-
Proxy servers12m 31s
-
Load balancing8m 19s
-
Device placement scenarios12m 37s
-
-
-
(Locked)
Understanding IP tunneling5m 50s
-
(Locked)
WAN technologies5m 29s
-
(Locked)
Content delivery networks (CDNs)1m 22s
-
(Locked)
Quality of service (QoS) and time to live (TTL)4m 42s
-
(Locked)
Understanding satellite networking2m 16s
-
(Locked)
Understanding cellular networking3m 49s
-
(Locked)
Remote desktop connectivity4m 19s
-
(Locked)
Virtual private networks (VPNs)10m 37s
-
(Locked)
Troubleshooting network services9m 28s
-
(Locked)
-
-
(Locked)
Introduction to 802.1111m 25s
-
(Locked)
802.11 standards5m 29s
-
(Locked)
Frequency, guest, and authentication options3m 44s
-
(Locked)
Power over ethernet (PoE)3m 30s
-
(Locked)
Common performance issues6m 17s
-
(Locked)
Troubleshooting interface issues10m 2s
-
(Locked)
Antennas8m 25s
-
(Locked)
Wireless security standards5m 53s
-
(Locked)
Implementing wireless security6m 43s
-
(Locked)
Threats to your wireless network6m 49s
-
(Locked)
Enterprise wireless5m 54s
-
(Locked)
Installing a wireless network14m 31s
-
(Locked)
Wireless scenarios5m 59s
-
(Locked)
More wireless scenarios8m 37s
-
(Locked)
-
-
(Locked)
Internet of Things (IoT) and Industrial Internet of Things (IIoT)8m 42s
-
(Locked)
Industrial control systems (ICS) and SCADA8m 29s
-
(Locked)
What are network operations?3m 10s
-
(Locked)
Encryption key management6m 7s
-
(Locked)
Configuration management5m 52s
-
(Locked)
Documentation7m 6s
-
(Locked)
Documenting the datacenter7m 34s
-
(Locked)
Patching and updating7m 7s
-
(Locked)
Disaster recovery and backups12m 23s
-
(Locked)
-
-
(Locked)
Security concepts5m 52s
-
(Locked)
Defense in depth (DiD)5m 12s
-
(Locked)
Rogue DHCP servers3m 45s
-
(Locked)
Denial of service (DoS) and distributed denial of service (DDoS)9m 48s
-
(Locked)
On-path attacks21m 55s
-
(Locked)
VLAN hopping6m 5s
-
(Locked)
Lifecycle management10m 3s
-
(Locked)
Malware6m 7s
-
(Locked)
Social engineering7m 33s
-
(Locked)
Logical security4m 54s
-
(Locked)
Physical security12m 30s
-
(Locked)