Communications and Network Security Part 3: Routing Protocols
Please review the Table of Contents below. In this lesson, we explore routing protocols as they relate to the OSI model, including IS-IS, OSPF, IGRP, EIGRP, RIP, and BGP. You can download the script for this video from above or at the end of the video.
Table of Contents:
00:00 - Intro
00:29 - Routing protocols defined
00:51 - Topology and Convergence
01:25 - Distance-vector and link-state categories
01:50 - Autonomous systems
02:27 - Interior gateway and exterior gateway categories
02:50 - Classful and classless categories
03:50 - Routing protocol types
04:08 - RIP
05:53 - IGRP and EIGRP
06:55 - OSPF
07:35 - BGP
07:55 - IS-IS
Видео Communications and Network Security Part 3: Routing Protocols канала Tom Olzak
Table of Contents:
00:00 - Intro
00:29 - Routing protocols defined
00:51 - Topology and Convergence
01:25 - Distance-vector and link-state categories
01:50 - Autonomous systems
02:27 - Interior gateway and exterior gateway categories
02:50 - Classful and classless categories
03:50 - Routing protocol types
04:08 - RIP
05:53 - IGRP and EIGRP
06:55 - OSPF
07:35 - BGP
07:55 - IS-IS
Видео Communications and Network Security Part 3: Routing Protocols канала Tom Olzak
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![Asset Classification](https://i.ytimg.com/vi/PivTJzvLgkc/default.jpg)
![Adventures in Security Episode 2 - 2014 Internet Security Threat Report](https://i.ytimg.com/vi/da28OBI5vuE/default.jpg)
![Communications and Network Security Part 22 – Remote Collaboration & Email](https://i.ytimg.com/vi/fRLvf17MSpo/default.jpg)
![Communications and Network Security Part 15 - Network Topologies](https://i.ytimg.com/vi/SS5qLqRD2_E/default.jpg)
![System Hardening - CISSP](https://i.ytimg.com/vi/B09dU3jEPzc/default.jpg)
![Cryptography Part 3: Asymmetric Encryption](https://i.ytimg.com/vi/aXF7RRPERHM/default.jpg)
![Information and Asset Ownership](https://i.ytimg.com/vi/0p5L4WGY4tE/default.jpg)
![Communications and Network Security Part 20 – Communication Channel and Authentication Protocols](https://i.ytimg.com/vi/k7J8DgX7PCM/default.jpg)
![Privileged Account and Session Management](https://i.ytimg.com/vi/R7BYCbJ57uo/default.jpg)
![Asset Handling Requirements - CISSP](https://i.ytimg.com/vi/f99RUQ136bE/default.jpg)
![CMGT431_Week_1_Lecture](https://i.ytimg.com/vi/C0FBByIX8BA/default.jpg)
![Validate Computing Device Integrity](https://i.ytimg.com/vi/0kkmHcYCyZQ/default.jpg)
![Data Security Controls Part 1: Frameworks](https://i.ytimg.com/vi/DC_K2ieHpRs/default.jpg)
![Cryptography Part 1 - History](https://i.ytimg.com/vi/-lb95I9A6Sc/default.jpg)
![Data States and Protection - CISSP](https://i.ytimg.com/vi/x4iE8GVV6sY/default.jpg)
![Protecting Data Integrity with Backups](https://i.ytimg.com/vi/7ioTa_sulcw/default.jpg)
![Identity Use and Identity Lifecycle](https://i.ytimg.com/vi/pbjs9jVbgAc/default.jpg)
![Communications and Network Security Part 23 – Remote Access Security](https://i.ytimg.com/vi/j-0iv5ch8Lw/default.jpg)
![Cryptography Part 4: Hashing](https://i.ytimg.com/vi/WYtCpJ6sczc/default.jpg)
![Episode 6: Critical Infrastructure Security](https://i.ytimg.com/vi/W_398tN3X_Q/default.jpg)