Google Learning Programs
GithubFeedbackLinkedinOfficial WebsiteX
  • Google Learning Program šŸ“š
  • Google IT Support Professional Certificate
    • Course 1 Welcome to the First Course in the Series! šŸŽ“šŸ–„ļø
      • Welcome to Technical Support Fundamentals!
        • 1.Introduction to IT Support
          • Technical Support Fundamentals
          • What Does an IT Support Specialist Do?
        • 2.History of Computing
          • The Journey of Computers
          • The Path to Modern Computers šŸ’„
          • Pioneers in Computing and IT 🧮
        • 3.Digital Logic
          • Computer Language
          • Character Encoding
          • Binary
          • Logic Gates
          • Binary and Decimal Systems in Computing
        • 4.Computer Architecture Layer
          • Abstraction in Computing
          • Layers of a Computer System
          • Nontraditional Backgrounds in IT
      • Inside a Computer
        • 1.The Modern Computer
          • The Fascinating Journey of Computers
          • Inside the Computer: Exploring Hardware
          • Introduction to Building Computers šŸ–„ļø
          • Supplemental Reading for CPUs
          • Changes in Diversity with Regards to IT Support Specialists šŸ‘„šŸ’»šŸŒ
        • 2.Components
          • CPU 🧠
          • Computer Peripherals and Connectors
          • Connector Types
          • Projectors
          • The Significance of RAM in Computing šŸ’¾šŸ§ šŸ’”
          • The Role of Motherboards in Computer Systems šŸ–„ļøšŸ”Œ
          • Physical Storage: Hard Drives
          • Data Storage
          • Introduction
          • Power Supplies
          • Mobile Devices
          • Mobile Device Power and Charging
        • 3.Starting It Up
          • Computer Components and Device Communication šŸ’»šŸ”ŒšŸ“”
          • The Importance of Technology Skills
          • Building Your Own Computer
          • Repairing a Mobile Device šŸ“±šŸ”§
          • Mobile Display Types
        • 4.Hardware Graded Assessment
          • Feedback on IT Program
      • Operating Systems
        • 1.What is an Operating System
          • Welcome Back to OS! šŸ‘‹
          • Boot Methods Best Practices
          • Mobile Device Operating Systems
          • Exploring Career Opportunities in IT
          • Introduction to Operating Systems
          • Understanding File Management in Operating Systems
          • Process Management in Operating Systems
          • Memory Management and Virtual Memory
          • Input and Output Management
          • Userspace and Interacting with the Operating System
          • Understanding Logs: Your Computer's Diary
          • Booting Process: Starting Your Operating System
        • 2.Installing an Operating System
          • Selecting and Installing an Operating System
          • Virtual Machines: An Introduction
          • Installing Windows 10 Operating System
          • Windows 10 and 11 Feature Matrix
          • Linux Installation Guide
          • ChromeOS: A Secure and Simple Operating System for Web Browsing
          • Apple's Mac OS: A User-Friendly Operating System
          • Overcoming Obstacles and Embracing Opportunities in IT
      • Networking
        • 1.What is Networking
          • Introduction to Networking
          • The Internet: Connecting Computers and Accessing Information
          • The Internet: Connecting Computers and Accessing Information
          • Understanding Network Protocols and TCP/IP
          • Lots of different ways to use the internet 🌐
          • Journey in IT šŸŽµ
        • 2.Limitations of the Internet
          • The Internet: Its Creation and Evolution 🌐
          • IP Addresses and Network Address Translation (NAT)
          • Skills from Previous Jobs and Career Transitions
        • 3.Impact of the Internet
          • The Impact of the Internet
          • The Internet of Things (IoT) and the Future of Computing
          • Android Security: Protecting Over Two Billion Devices
          • The Impact of the Internet: Anonymity, Privacy, and Security
          • The Thrilling World of Information Security at Google
      • Computer Software
        • 1.Introduction to Software
          • Introduction to Computer Software
          • Understanding Different Types of Software
          • Common Scripting Solutions
          • Software Copyright and Types
          • Programming Languages and Hardware Abstraction
          • Evolution of Programming Languages
          • My Journey in Information Technology
        • 2.Interacting with Software
          • Understanding Software and Software Management
          • Software Management and Automation
      • Troubleshooting, Customer Support, and Documentation
        • 1.Troubleshooting Best Practices
          • The User Layer: Troubleshooting, Communication, and Impact
          • Effective Troubleshooting: Asking the Right Questions
          • Isolating the Problem: Narrowing Down the Scope
          • Follow the Cookie Crumbs: Tracing the Problem
          • Fixing the Issue: Start with the Quickest Step First
          • Avoiding Common Pitfalls in Troubleshooting
          • Attributes for Success in IT Support
        • 2.Customer Service
          • Intro to Soft Skills šŸ˜ŠšŸ’¼šŸ”§šŸ“š
          • Anatomy of an Interaction šŸ’¬
          • Understanding the Science behind Difficult Situations šŸ§ šŸ’”
          • Understanding Frustrations in User Support Interactions šŸ§ šŸ’”
        • 3.Documentation
          • Why Documentation is Important
          • Examples of Good and Not So Good Documentation šŸ“
          • Writing Documentation in Ticketing or Bug Systems
        • 4.Getting Through a Technical Interview
          • Your Opportunity Introduction
          • Resume and Online Professional Presence
          • Crafting Your Resume āœļø
          • Interview Preparation Tips
          • Creating Your Elevator Pitch
          • When You're Interviewing
          • Being Your Best Self for the Interview
          • Interview Transcript
    • Course 2 The Bits and Bytes of Computer Networking by Google
      • Networking - IT Support Professional Certificate
        • 1.Introduction to Computer Networking
          • Course: The Bits and Bytes of Computer Networking
        • 2.The TCP IP Five Layer Network Model
          • Understanding Networking Layers
        • 3.The Basics of Networking Devices
          • Understanding Networking Cables and Devices šŸ“¶šŸ’»šŸ”Œ
          • Hubs, Switches, and Routers: Connecting Networks šŸŒšŸ”—šŸŒ
          • Servers, Clients, and Network Communication šŸ–„ļøšŸ’»šŸ“”
        • 4.The Physical Layer
          • The Physical Layer: Moving Ones and Zeros šŸŒšŸ’”šŸ”Œ
          • Twisted Pair Cables: Enabling Duplex Communication šŸŒšŸ”—šŸ”€
          • Ethernet Over Twisted Pair Technologies šŸŒšŸ”—šŸ”€
          • Twisted Pair Ethernet: Crossover Cables 🌐
          • The Physical Layer and Network Endpoints 🌐
          • Cabling Tools šŸ› ļø
        • 5.The Data Link Layer
          • Wireless and Cellular Internet šŸ“”
          • Unicast, Multicast, and Broadcast in Ethernet 🌐
          • Dissecting an Ethernet Frame šŸ•øļø
          • Pursuing a Career in IT šŸ–„ļø
      • Exploring the Network Layer 🌐
        • 1.Introduction
          • Exploring Network Communication 🌐
        • 2.The Network Layer
          • Introducing the Network Layer and IP Addressing 🌐
          • Understanding IP Addresses and Allocation 🌐
          • IP Datagram: Structure and Fields
          • IP Addresses and Address Classes
          • Address Resolution Protocol (ARP)
        • 3.Subnetting
          • Subnetting
          • Subnet Masks
          • Binary Numbers and Decimal Numbers
          • Address Classes and CIDR Notation
          • Overcoming Challenges and Seeking Support
        • 4.Routing
          • Routing Basics
          • Routing Tables
          • Routing Protocols
          • Exterior Gateway Protocols: Connecting Autonomous Systems
          • A Brief History of Non-Routable Address Space
          • A Tale of Two Line Endings: A Support Engineer's Odyssey
      • Transport and Application Layers
        • 1.Transport and Application Layers
          • Introduction to Transport and Application Layers
        • 2.The Transport Layer
          • The Transport Layer: Multiplexing, Demultiplexing, and Ports
          • Dissecting a TCP Segment
          • TCP Control Flags: Establishing and Closing Connections
          • Understanding TCP Socket States
          • Understanding Connection-Oriented Protocols and Connectionless Protocols
          • Supplemental Reading for System Ports versus Ephemeral Ports
          • Network Firewalls: A Critical Component of Network Security
        • 3.The Application Layer
          • The Application Layer: Sending and Receiving Data
          • Understanding Network Layer Models: OSI Model
          • Exercise: Understanding Network Communication
      • Course Module Networking Services
        • 1.Introduction to Network Services
          • Introduction to Computer Networking Services
        • 2.Name Resolution
          • Introduction to DNS (Domain Name System)
          • The Many Steps of Name Resolution
          • DNS and UDP: A Comparison
          • Passion and Drive in IT šŸ’”
        • 3.Name Resolution in Practice
          • DNS Resource Record Types
          • Domain Name Structure
          • Understanding Authoritative Name Servers and DNS Zones
        • 4.Dynamic Host Configuration Protocol
          • Managing Hosts on a Network with DHCP
          • DHCP Protocol 🌐
          • IPv4 Address Exhaustion
        • 5.VPNs and Proxies
          • Virtual Private Networks (VPNs)
          • Proxy Services: Introduction and Types
      • Internet Connectivity and Networking
        • 1.Connecting to the Internet
          • The Internet and Connectivity Technologies
        • 2.POTS and Dial up
          • Evolution of Computer Networks and Dial-up Connectivity
        • 3.Broadband Connections
          • The Significance of Broadband Internet
          • T-carrier Technologies: From Phone Calls to Data Transfers
          • DSL: Revolutionizing Internet Access
          • DSL: Revolutionizing Internet Access
          • Fiber Optic Technology: Revolutionizing Internet Connectivity
          • Broadband Protocols šŸŒšŸ“”
        • 4.WANs
          • Network Setup and WAN Technologies
          • Network Setup and WAN Technologies
          • Point-to-Point VPNs
        • 5.Wireless Networking
          • Introduction to Wireless Networking Technologies
          • Mobile Device Connectivity
          • Mobile Device Networks
          • Wi-Fi 6
          • Alphabet Soup: Wi-Fi Standards
          • IoT Data Transfer Protocols
          • Wireless Network Configurations
          • Understanding Wireless Network Channels
          • Wireless Network Security
          • Protocols & Encryption
          • Cellular Networking
      • The Future of Computer Networking 🌐
        • 1.Introduction
          • Network Troubleshooting šŸ› ļø
        • 2.Verifying Connectivity
          • Network Troubleshooting šŸ› ļø
          • Traceroute: Tracing the Path to Network Connectivity šŸ›¤ļø
          • Connectivity Testing Beyond the Network Layer 🌐
        • 3.Digging into DNS
          • Mastering Name Resolution with nslookup šŸ”
          • Understanding the Role of DNS in Network Connectivity 🌐
          • The Domain Name System: A Hierarchical Global Network 🌐
          • Before DNS: The Legacy of Host Files šŸ—‚ļø
        • 4.The Cloud
          • Exploring the World of Cloud Computing šŸŒ„ļø
          • Cloud Computing: Beyond Virtual Machines
          • Cloud Storage: Secure, Accessible, and Available
        • 5.IPv6
          • The IPv4 Address Exhaustion Problem
          • IPv6 Header Improvements šŸš€
          • The Transition to IPv6 šŸŒšŸ”
          • IPv6 and IPv4 Harmony šŸŒšŸ”—
          • Technical Interview Scenario: Troubleshooting Network Issues
    • Course 3 Operating Systems and You: Becoming a Power User šŸ–„ļø
      • Learning Objectives
        • 1.Operating Systems and Becoming a Power User
          • Navigating the Operating Systems šŸ’»
        • 2.Basic Commands
          • Navigating the Windows and Linux OSs
          • Copying Files and Directories in PowerShell
          • Renaming and Moving Files in Bash šŸ”„
          • Deleting Files and Directories
          • Navigating File System in Windows šŸ—‚ļø šŸ—‚ļø
          • Windows Confidential: Just What Is 'Size on Disk'? šŸ–„ļø
          • File Systems
          • Navigating Directories šŸ“
          • Navigating the Windows CLI šŸ’»
          • Navigating the File System in Bash 🐧
          • Creating Directories
          • Efficient Directory Management in Bash
        • 3.File and Text Manipulation
          • Viewing and Editing Files
          • Editing Files
      • User and Permissions
        • 1.Users and Groups
          • Managing Users and Permissions
          • Viewing User Group Information
          • Linux User Management 🐧
          • 4.Passwords
          • Window Managing User Accounts
          • User Accounts in Mobile Operating Systems šŸ“±šŸ’»
          • Ben Fried: Google's Chief Information Officer šŸ§‘ā€šŸ’»šŸ¢
        • 2.Permissions
          • File Permissions šŸ’»
          • Changing Permissions
          • Linux Special Permissions 🐧
      • Package and Software Management šŸ–„ļø
        • 1.Software Distribution
          • Course Progress Update: Halfway Through! šŸŽ‰
          • Understanding Package Dependencies on Windows šŸ–„ļø
          • Understanding Package Dependencies in Linux šŸ“¦
          • Understanding Software Packaging & Installation šŸš€
          • Understanding Windows Software Packages šŸš€
          • Linux Package Management: Debian Packages šŸ› ļø
          • Mobile Operating Systems & App Management šŸ› ļø
          • Mobile App Distribution: iOS & Android šŸ› ļø
          • Mobile App Updates Best Practices for IT Support šŸ“±
          • Mobile Device Storage Management Best Practices šŸ“±
          • Understanding Archives
        • 2.Package Managers
          • Windows Package Management with Chocolatey šŸ–„ļø
        • 3.Whats happening in the background
          • Windows Software Installation: Behind the Scenes šŸ› ļø
        • 4.Device Software Management
          • Windows Devices and Drivers: An Overview šŸ› ļø
          • Linux Devices and Drivers: Detailed Overview šŸ› ļø
          • Windows Operating System Updates šŸ–„ļøšŸ”„
          • Linux Operating System Updates 🐧
      • Filesystems Overview: Windows & Linux šŸ–„ļøšŸ§
        • 1.Filesystem Types
          • Module Introduction: Disk Management Essentials šŸ› ļøšŸ’»
          • Understanding File Management in Windows šŸ“‚šŸ’»
          • Monitoring and Managing Disk Usage in Windows šŸ–„ļø
          • Windows Filesystem Repair šŸ› ļø
          • Linux Filesystem Repair: An Overview šŸ§šŸ”§
          • Review of Filesystems: A Refresher šŸŒšŸ’¾
          • Disk Partitioning and File System Essentials šŸ’½šŸ› ļø
          • Windows Disk Partitioning and Formatting a Filesystem šŸ’»šŸ’¾
          • Windows: Mounting and Unmounting a Filesystem šŸ”ŒšŸ’¾
          • Linux: Disk Partitioning and Formatting a Filesystem šŸ§šŸ’»
          • Linux Mounting and Unmounting a Filesystem šŸ§šŸ“‚
          • Understanding Swap Space and Virtual Memory in Windows šŸ’»
          • Understanding Linux Swap Space šŸ–„ļøšŸ’¾
      • Process Management šŸ–„ļøšŸ”§
        • 1.Life of a Process
          • Introduction to Process Management šŸ–„ļøšŸ”
          • Programs vs. Processes Revisited šŸ–„ļøšŸ”„
          • Windows Process Creation and Termination šŸ–„ļøšŸ”„
        • 2.Managing Processes
          • Windows Reading Process Information šŸ–„ļøšŸ”
          • Windows Signals šŸš¦šŸ””
          • Windows Managing Processes šŸ› ļøšŸ’»
          • Mobile App Management šŸ“±šŸ”§
        • 3.Process Utilization
          • Windows Resource Monitoring
          • Resource Monitoring in Linux
      • Final Module Overview: IT Support Essentials
        • 1.Remote Access
          • Final Module Introduction: IT Support Essentials
          • Remote Connections on Windows
          • Remote Connections in Windows
          • Remote Connection: File Transfer on Linux
          • Remote Connection: File Transfer on Windows
        • 2.Virtualization
          • Virtual Machines
          • Supplemental reading for Virtual Machines
        • 3.Logging
          • System Monitoring
          • The Windows Event Viewer
          • Linux Logs
          • Working with Logs
        • 4.Operating System Deployment
          • Knowledge Summary: Imaging Software šŸ–„ļøšŸ”§
          • Knowledge Summary: Operating Systems Deployment Methods šŸ–„ļøšŸš€
          • Knowledge Summary: OS Deployment Methods šŸ–„ļøšŸ”„
          • Knowledge Summary: Mobile Device Resetting and Imaging šŸ“±šŸ”„
          • Knowledge Summary: Windows Troubleshooting šŸ–„ļøšŸ”
          • Knowledge Summary: Windows Troubleshooting Tools šŸ› ļøšŸ”
          • Troubleshooting a Full Hard Drive in Windows šŸ–„ļøšŸ’¾
          • Interview Scenario Troubleshooting Application Issues
    • Course 4 System Administration and IT Infrastructure Services 🌐
      • System Administration Course Overview šŸ“š
        • 1.What is System Administration
          • Understanding IT Infrastructure and the Role of System Administrators 🌐
          • Understanding Servers in IT Infrastructure 🌐
          • Understanding Cloud Computing ā˜ļø
          • Understanding Cloud Computing ā˜ļø
        • 2.Systems Administration Tasks
          • Organizational Policies šŸ“‹
          • IT Infrastructure Services šŸ–„ļø
          • User and Hardware Provisioning šŸ–„ļøšŸ‘„
          • Routine Maintenance šŸ› ļøšŸ”„
          • 5.Vendors
          • Troubleshooting and Managing Issues šŸ› ļøšŸ”
          • Disaster Preparedness and Data Backup šŸŒŖļøšŸ’¾
        • 3.Applying Changes
          • Responsible Use of Administrative Rights āš™ļøšŸ”’
          • IT Change Management šŸ› ļøšŸ“ˆ
          • Recording Your Actions šŸ–„ļøšŸŽ„
          • Never Test in Production šŸš«šŸ”§
          • Assessing Risk in Change Management āš ļøšŸ”
          • Fixing Things the Right Way šŸ› ļøšŸ”
      • Network and Infrastructure Services: Module Overview šŸŒšŸ”§
        • 1.Intro to IT Infrastructure Services
          • IT Infrastructure Services Overview šŸ–„ļøšŸŒ
          • The Role of IT Infrastructure Services in SysAdmin šŸ› ļøšŸŒ
          • Types of IT Infrastructure Services šŸŒšŸ’»
        • 2.Physical Infrastructure Services
          • Server Operating Systems šŸ–„ļøšŸ”§
          • Virtualization in IT Infrastructure šŸŒšŸ’»
          • Remote Access Revisited šŸŒšŸ’»
        • 3.Network Services
          • FTP, SFTP, and TFTP šŸ“šŸ”„
          • Network Time Protocol (NTP) ā°šŸŒ
          • Network Support Services Revisited šŸŒšŸ”§
          • Understanding DNS
          • DHCP (Dynamic Host Configuration Protocol) šŸŒšŸ”§
        • 4.Troubleshooting Network Services
          • Troubleshooting DNS Issues: Unable to Resolve a Hostname or Domain Name šŸŒšŸ”
        • 5.Managing System Services
          • Managing and Configuring IT Services šŸ–„ļøšŸ”§
          • Managing Services in Linux šŸ–„ļøšŸ”§
          • Managing Services in Windows šŸ–„ļøšŸ”„
          • Configuring Services in Linux šŸ’»
        • 6.Configuring Network Services
          • Configuring DNS with Dnsmasq šŸŒšŸ› ļø
          • Configuring DHCP with Dnsmasq 🌐
      • Software and Platform Services šŸ“ŠšŸ’»
        • 1.Software Services
          • Understanding Software and Platform Services in IT Infrastructure šŸ–„ļøšŸ’”
          • Overview of Communication Services in IT Infrastructure šŸ’¬šŸ”§
          • Overview of Email Protocols and Services šŸ“§šŸ”§
          • Spam Management and Mitigation šŸ›”ļøšŸ“§
          • User Productivity Services: Agreements and Licenses šŸ“‹šŸ’¼
          • Web Server Security Protocols šŸ”šŸŒ
          • Managing Self-Doubt: Insights from Heather 🌟
        • 2.File Services
          • File Services: Enhancing Organizational Productivity šŸ“
          • Network File Storage: Efficient Solutions for File Sharing šŸ“‚
          • Mobile Synchronization Protecting Your Valuable Data šŸ“±šŸ”’
        • 3.Print Services
          • Configuring Print Services šŸ“„
        • 4.Platform Services
          • Web Servers Revisited šŸŒšŸ’»
          • Load Balancers: Overview and Key Concepts šŸŒāš™ļø
          • Understanding Database Servers šŸ“ŠšŸ’¾
        • 5.Troubleshooting Platform Services
          • Diagnosing Website Issues with HTTP Status Codes šŸŒšŸ”
        • 6.Managing Cloud Resources
          • Cloud Concepts šŸŒ„ļøšŸ’”
          • Typical Cloud Infrastructure Setups ā˜ļøšŸ”§
          • Common Cloud Models ā˜ļøšŸ”
          • When and How to Choose Cloud ā˜ļøšŸ¤”
          • Managing Cloud Resources ā˜ļøšŸ”§
      • Data Recovery and Backups šŸ“šŸ”„
        • 1.Planning for Data Recovery
          • Introduction to Data Recovery šŸ“ŠšŸ”§
          • What is Data Recovery? šŸ“‚šŸ”
          • Backing Up Your Data šŸ”’šŸ’¾
          • Backup Solutions šŸ›”ļøšŸ’¾
          • Job Transition: The Value of Soft Skills in IT šŸŒŸšŸ’¼
          • Testing Backups: Ensuring Effective Data Recovery šŸ”„šŸ› ļø
          • Types of Backup Choosing the Right Approach for Your Data šŸ“‚šŸ”„
          • User Backups Ensuring Data Safety for Individual Devices šŸ’»ā˜ļø
        • 2.Disaster Recovery Plans
          • Disaster Recovery Plan Essential Components and Strategies šŸŒŖļøšŸ› ļø
          • Designing an Effective Disaster Recovery Plan šŸ›”ļø
        • 3.Post Mortems
          • Understanding Post-Mortems šŸ“šŸ”
          • Writing a PostMortem Report šŸ“šŸ”
      • Final Systems Administration Consultation Project
        • Process Review for Network Funtime Company šŸ–„ļøšŸ”§
        • Process Review for W.D. Widgets šŸ“ˆšŸ› ļø
        • Process Review for Dewgood šŸŒŸšŸ’»
    • Course 5 IT Security: Defense Against the Digital Dark Arts šŸ”šŸ’»
      • IT Security Course: Module 1 Overview šŸ”
        • 1.Introduction to IT Security
          • Introduction to IT Security Course šŸ”
        • 2.Malicious Software
          • The CIA Triad in Information Security šŸ”
          • Essential Security Terms in IT Security šŸ›”ļø
          • Malicious Software (Malware) Overview 🦠
          • Antimalware Protection and Malware Removal šŸ›”ļøšŸ’»
          • Malware Continued: Advanced Threats and Techniques šŸšØšŸ–„ļø
        • 3.Network Attacks
          • Network Attacks: Overview of Common Threats šŸŒšŸ”’
          • Denial-of-Service Attacks: An Overview 🌐🚫
          • Overview of High-Profile Distributed Denial of Service (DDoS) Attacks 🌐🚫
        • 4.Other Attacks
          • Overview of ClientSide Attacks šŸ–„ļøšŸ’„
          • Overview of Password Attacks šŸ”šŸšØ
          • Overview of Deceptive Attacks šŸ•µļøā€ā™‚ļøšŸ’»
          • Physical Security Measures šŸ›”ļøšŸ”
      • Cryptology Overview šŸ”
        • 1.Symmetric Encryption
          • Cryptography and Its Principles šŸ”
          • Symmetric Cryptography šŸ”
          • Symmetric Encryption Algorithms šŸ”
          • The Role of a Security Engineer šŸ”
        • 2.Public Key or Asymmetric Encryption
          • Asymmetric Cryptography šŸ”šŸ”‘
          • Asymmetric vs Symmetric Cryptography šŸ”‘šŸ”’
          • Asymmetric Encryption Algorithms šŸ”
        • 3.Hashing
          • Hashing šŸ”
          • Hashing Algorithms šŸ› ļø
        • 4.Cryptography Applications
          • Public Key Infrastructure (PKI) šŸŒšŸ”’
          • Certificates and Trust Models šŸ”‘šŸ”
          • Cryptography in Action šŸ”’šŸ’»
          • Securing Network Traffic šŸ”šŸŒ
          • Cryptographic Hardware šŸ›”ļøšŸ”‘
      • The Three A's in Cybersecurity šŸ”
        • 1.Authentication
          • Best Practices for Authentication šŸ”
          • Multifactor Authentication (MFA) šŸ”‘
          • Physical Privacy and Security Components šŸ”’
          • 4.Certificates Part Two
          • RADIUS Remote Authentication DialIn User Service 🌐
          • Kerberos Authentication Protocol šŸ›”ļø
          • TACACS+ (Terminal Access Controller Access-Control System Plus) šŸ”
          • Single Sign-On (SSO) šŸ”‘
        • 2.Authorization
          • Authorization and Access Control Methods šŸ”
          • Mobile Security Methods šŸ“±šŸ”’
          • Access Control List (ACL) šŸ“œšŸ”
        • 3.Accounting
          • Tracking Usage and Access šŸ“ŠšŸ”
          • Important Skills in Security šŸ”šŸ’”
      • Secure Network Architecture šŸ›”ļøšŸŒ
        • 1.Secure Network Architecture
          • Secure Network Architecture šŸ›”ļøšŸŒ
          • Network Hardware Hardening šŸŒšŸ› ļø
          • IEEE 802.1X: Port-Based Network Access Control šŸŒšŸ”’
          • Network Software Hardening Techniques šŸ”’šŸ’»
        • 2.Wireless Security
          • WEP Encryption and Why It Shouldn't Be Used Anymore šŸš«šŸ”‘
          • Summary of WPA and WPS Security in Wireless Networks
          • WPA2: Advanced Security Protocol for Wi-Fi Networks
          • Wireless Hardening: Enhancing Wi-Fi Security
          • The Impact of Social Engineering
        • 3.Network Monitoring
          • Sniffing the Network
          • Wireshark and Tcpdump
          • Intrusion Detection and Prevention Systems (IDS/IPS)
          • Unified Threat Management (UTM) šŸ›”ļø
          • Home Network Security šŸ šŸ”
      • Module 5 In-Depth Security Defense šŸ›”ļøšŸ”’
        • 1.System Hardening
          • Introduction to Defense in Depth šŸ›”ļøšŸ”„
          • Disabling Unnecessary Components šŸ› ļøšŸ”’
          • Host-Based Firewalls šŸ›”ļøšŸ’»
          • Logging and Auditing šŸ”šŸ“Š
          • Windows Defender Guide šŸ›”ļøšŸ–„ļø
          • Antimalware Protection Guide šŸ›”ļø
          • Disk Encryption Guide šŸ”
          • Self-Learning The Key to Success in Technology šŸš€
        • 2.Application Hardening
          • Software Patch Management: Essential for Security** šŸ›”ļø
          • Browser Hardening: Enhancing Your Online Security šŸ”’
          • Application Policies: Enhancing Security through Effective Management šŸ”
      • Congratulations on reaching the final module of the course! šŸŽ‰ Here’s what you’ll be focusing on:
        • 1.Risk in the Workplace
          • Security Goals and PCI DSS Overview šŸ”’
          • Measuring and Assessing Risk šŸ”
          • Privacy Policy šŸ“œ
          • Data Destruction šŸ”’
        • 2.Users
          • User Habits and Security šŸš€šŸ”
          • ThirdParty Security šŸ›”ļøšŸ”
          • Security Training šŸ›”ļøšŸ“š
          • Qualities of an IT Candidate šŸŒŸšŸ’»
        • 3.Incident Handling
          • Incident Reporting and Analysis šŸšØšŸ”
          • Incident Response and Forensic Analysis šŸ”šŸ›”ļø
          • Incident Response and Recovery šŸš€šŸ”’
          • Mobile Security and Privacy šŸ“±šŸ”
          • Bring Your Own Device (BYOD) šŸ“±šŸ¢
          • Tips for IT Support Interviews šŸ’¼šŸ–„ļø
          • Interview Role Play: Network Security Scenario šŸŽ„šŸ”’
          • Security Infrastructure Design Document
  • Google Project Manager Certification in Progress šŸ§‘ā€āš•ļø
    • Course 1 Foundations of Project Management
      • Module 1 Embarking on a career in project management
      • Module 2 Becoming an effective project manager
Powered by GitBook
On this page
  • Introduction
  • Network Expansion
  • Wide Area Networks (WAN)
  • Data Link Layer Protocols in WAN
  • WAN Protocols
  • Physical versus software-based WANs
  • WAN optimization
  • WAN Protocols
  • Conclusion

Was this helpful?

  1. Google IT Support Professional Certificate
  2. Course 2 The Bits and Bytes of Computer Networking by Google
  3. Internet Connectivity and Networking
  4. 4.WANs

Network Setup and WAN Technologies

Introduction

As the sole IT support specialist at a small company, you have set up a network that initially consisted of a few computers in a single office. To conserve IP addresses, you used nonwritable address space for the internal IPs. You configured a router with Network Address Translation (NAT) to connect the office to the internet provided by an ISP. Additionally, you set up a local DNS server and a DHCP server for network configuration.

Network Expansion

As the company grows, you have plenty of address space for internal IPs. Some salespeople need remote access to resources while on the road, so you configure a VPN server and enable port forwarding. This allows employees from anywhere in the world to connect to the office LAN.

Wide Area Networks (WAN)

With the expansion of the company, a new office is opened in another city. This is where Wide Area Networks (WAN) come into play. Unlike Local Area Networks (LAN), WAN spans across multiple physical locations.

WAN technologies require contracting a link with an ISP to connect the different sites. The ISP handles the data transmission between the sites. Each site has a demarcation point where the ISP's network takes over. The area between the demarcation point and the ISP's core network is called a local loop, which could be a T carrier line or a high-speed optical connection.

From the ISP's regional office, the connection extends to the ISP's core network and the wider internet.

Data Link Layer Protocols in WAN

WANs utilize various protocols at the data link layer to transport data between sites. These protocols differ from the commonly used Ethernet protocols found in LANs. The specific protocols used in WANs and the core internet infrastructure are beyond the scope of this course.

Expand your network and connect multiple locations with WAN technologies! šŸŒšŸ’¼

WAN Protocols

Physical versus software-based WANs

  • WAN router: Hardware devices that act as intermediate systems to route data amongst the LAN member groups of a WAN (also called WAN endpoints) using a private connection. WAN routers may also be called border routers or edge routers. These routers facilitate an organization’s access to a carrier network. WAN routers have a digital modem interface for the WAN, which works at the OSI link layer, and an Ethernet interface for the LAN.

  • Software-Defined WAN (SD-WAN): Software developed to address the unique needs of cloud-based WAN environments. SD-WANs can be used alone or in conjunction with a traditional WAN. SD-WANs simplify how WANs are implemented, managed, and maintained. An organization’s overall cost to operate a cloud-based SD-WAN is significantly less than the overall cost of equipping and maintaining a traditional WAN. One of the ways that SD-WANs help reduce operational costs is by replacing the need for expensive lines leased from an ISP by linking regional LANs together to build a WAN.

WAN optimization

There are multiple techniques available to optimize network traffic and data storage on a WAN:

  • Compression: Reducing file sizes to improve network traffic efficiency. There are many compression algorithms available for text, image, video, etc. The sender and the receiver will need apps that offer the same compression/decompression algorithm to encode and decode the compressed files.

  • Deduplication: Prevents files from being stored multiple times within a network to avoid wasting expensive hard drive space. One copy of the file is kept in a central location. All other ā€œcopiesā€ are actually file pointers to the single copy of the file. This saves valuable hard drive space, makes performing data backups more efficient, and reduces the amount of time needed to recover from data loss disasters.

  • Protocol Optimization: Improves the efficiency of networking protocols for applications that need higher bandwidth and low latency.

  • Local Caching: Storing local copies of network and internet files on a user’s computer to reduce the need to resend the same information across the network every time the file is accessed. Some WAN optimization products can cache shared files at one physical LAN location when groups of employees at the location tend to request the same set of files frequently.

  • Traffic Shaping: Optimizing network performance by controlling the flow of network traffic. Three techniques are commonly used in traffic shaping:

    • Bandwidth throttling - controlling network traffic volume during peak use times.

    • Rate limiting - capping maximum data rates/speeds.

    • Use of complex algorithms - classifying and prioritizing data to give preference to more important traffic (e.g., an organization might want to prioritize private LAN-to-LAN traffic within the organization’s WAN and give a lower priority to employees accessing the public Internet).

WAN Protocols

WAN Internet Protocols are used in conjunction with WAN routers to perform the task of distinguishing between a private LAN and the related public WAN. Several WAN protocols have been developed over the decades for this task, as well as other purposes, including:

  • Packet switching: A method of data transmission. In packet switching, messagesare divided into small units called packets, which are then transmitted independently over the network. The packets can take different routes to reach their destination and are reassembled at the receiving end. This allows for more efficient and reliable transmission of data over the network.

  • Frame Relay: A WAN protocol that operates at the data link layer of the OSI model. It uses virtual circuits to transmit data between network nodes. Frame Relay is known for its simplicity and efficiency, making it suitable for small to medium-sized networks.

  • Asynchronous Transfer Mode (ATM): A WAN protocol that uses fixed-size cells to transmit data. ATM provides high-speed transmission and is often used for voice, video, and data services.

  • MPLS (Multi-Protocol Label Switching): A protocol that uses labels to determine the path that packets should take through a network. MPLS improves the efficiency and performance of data transmission in WANs by allowing for faster routing decisions.

  • Point-to-Point Protocol (PPP): A protocol used to establish a direct connection between two network nodes. PPP is often used to connect a computer to an ISP and is commonly used for dial-up and DSL connections.

  • HDLC (High-Level Data Link Control): A data link layer protocol that provides a reliable and efficient way to transmit data over WANs. HDLC is widely used in point-to-point connections and is the default encapsulation method for serial links in Cisco routers.

These are just a few examples of WAN protocols. The choice of protocol depends on factors such as network requirements, available infrastructure, and the specific needs of the organization.

Conclusion

WAN technologies play a crucial role in connecting multiple locations and enabling communication between them. WAN protocols, such as Frame Relay, ATM, MPLS, PPP, and HDLC, provide the necessary mechanisms for data transmission over wide area networks. Additionally, WAN optimization techniques, such as compression, deduplication, protocol optimization, local caching, and traffic shaping, can enhance network performance and efficiency. Whether using traditional WAN routers or software-defined WAN solutions, organizations have various options to establish and optimize their wide area networks.

PreviousNetwork Setup and WAN TechnologiesNextPoint-to-Point VPNs

Last updated 7 months ago

Was this helpful?