Google Learning Programs
GithubFeedbackLinkedinOfficial WebsiteX
  • Google Learning Program 📚
  • Google IT Support Professional Certificate
    • Course 1 Welcome to the First Course in the Series! 🎓🖥️
      • Welcome to Technical Support Fundamentals!
        • 1.Introduction to IT Support
          • Technical Support Fundamentals
          • What Does an IT Support Specialist Do?
        • 2.History of Computing
          • The Journey of Computers
          • The Path to Modern Computers 💥
          • Pioneers in Computing and IT 🧮
        • 3.Digital Logic
          • Computer Language
          • Character Encoding
          • Binary
          • Logic Gates
          • Binary and Decimal Systems in Computing
        • 4.Computer Architecture Layer
          • Abstraction in Computing
          • Layers of a Computer System
          • Nontraditional Backgrounds in IT
      • Inside a Computer
        • 1.The Modern Computer
          • The Fascinating Journey of Computers
          • Inside the Computer: Exploring Hardware
          • Introduction to Building Computers 🖥️
          • Supplemental Reading for CPUs
          • Changes in Diversity with Regards to IT Support Specialists 👥💻🌍
        • 2.Components
          • CPU 🧠
          • Computer Peripherals and Connectors
          • Connector Types
          • Projectors
          • The Significance of RAM in Computing 💾🧠💡
          • The Role of Motherboards in Computer Systems 🖥️🔌
          • Physical Storage: Hard Drives
          • Data Storage
          • Introduction
          • Power Supplies
          • Mobile Devices
          • Mobile Device Power and Charging
        • 3.Starting It Up
          • Computer Components and Device Communication 💻🔌📡
          • The Importance of Technology Skills
          • Building Your Own Computer
          • Repairing a Mobile Device 📱🔧
          • Mobile Display Types
        • 4.Hardware Graded Assessment
          • Feedback on IT Program
      • Operating Systems
        • 1.What is an Operating System
          • Welcome Back to OS! 👋
          • Boot Methods Best Practices
          • Mobile Device Operating Systems
          • Exploring Career Opportunities in IT
          • Introduction to Operating Systems
          • Understanding File Management in Operating Systems
          • Process Management in Operating Systems
          • Memory Management and Virtual Memory
          • Input and Output Management
          • Userspace and Interacting with the Operating System
          • Understanding Logs: Your Computer's Diary
          • Booting Process: Starting Your Operating System
        • 2.Installing an Operating System
          • Selecting and Installing an Operating System
          • Virtual Machines: An Introduction
          • Installing Windows 10 Operating System
          • Windows 10 and 11 Feature Matrix
          • Linux Installation Guide
          • ChromeOS: A Secure and Simple Operating System for Web Browsing
          • Apple's Mac OS: A User-Friendly Operating System
          • Overcoming Obstacles and Embracing Opportunities in IT
      • Networking
        • 1.What is Networking
          • Introduction to Networking
          • The Internet: Connecting Computers and Accessing Information
          • The Internet: Connecting Computers and Accessing Information
          • Understanding Network Protocols and TCP/IP
          • Lots of different ways to use the internet 🌐
          • Journey in IT 🎵
        • 2.Limitations of the Internet
          • The Internet: Its Creation and Evolution 🌐
          • IP Addresses and Network Address Translation (NAT)
          • Skills from Previous Jobs and Career Transitions
        • 3.Impact of the Internet
          • The Impact of the Internet
          • The Internet of Things (IoT) and the Future of Computing
          • Android Security: Protecting Over Two Billion Devices
          • The Impact of the Internet: Anonymity, Privacy, and Security
          • The Thrilling World of Information Security at Google
      • Computer Software
        • 1.Introduction to Software
          • Introduction to Computer Software
          • Understanding Different Types of Software
          • Common Scripting Solutions
          • Software Copyright and Types
          • Programming Languages and Hardware Abstraction
          • Evolution of Programming Languages
          • My Journey in Information Technology
        • 2.Interacting with Software
          • Understanding Software and Software Management
          • Software Management and Automation
      • Troubleshooting, Customer Support, and Documentation
        • 1.Troubleshooting Best Practices
          • The User Layer: Troubleshooting, Communication, and Impact
          • Effective Troubleshooting: Asking the Right Questions
          • Isolating the Problem: Narrowing Down the Scope
          • Follow the Cookie Crumbs: Tracing the Problem
          • Fixing the Issue: Start with the Quickest Step First
          • Avoiding Common Pitfalls in Troubleshooting
          • Attributes for Success in IT Support
        • 2.Customer Service
          • Intro to Soft Skills 😊💼🔧📚
          • Anatomy of an Interaction 💬
          • Understanding the Science behind Difficult Situations 🧠💡
          • Understanding Frustrations in User Support Interactions 🧠💡
        • 3.Documentation
          • Why Documentation is Important
          • Examples of Good and Not So Good Documentation 📝
          • Writing Documentation in Ticketing or Bug Systems
        • 4.Getting Through a Technical Interview
          • Your Opportunity Introduction
          • Resume and Online Professional Presence
          • Crafting Your Resume ✍️
          • Interview Preparation Tips
          • Creating Your Elevator Pitch
          • When You're Interviewing
          • Being Your Best Self for the Interview
          • Interview Transcript
    • Course 2 The Bits and Bytes of Computer Networking by Google
      • Networking - IT Support Professional Certificate
        • 1.Introduction to Computer Networking
          • Course: The Bits and Bytes of Computer Networking
        • 2.The TCP IP Five Layer Network Model
          • Understanding Networking Layers
        • 3.The Basics of Networking Devices
          • Understanding Networking Cables and Devices 📶💻🔌
          • Hubs, Switches, and Routers: Connecting Networks 🌐🔗🌍
          • Servers, Clients, and Network Communication 🖥️💻📡
        • 4.The Physical Layer
          • The Physical Layer: Moving Ones and Zeros 🌐💡🔌
          • Twisted Pair Cables: Enabling Duplex Communication 🌐🔗🔀
          • Ethernet Over Twisted Pair Technologies 🌐🔗🔀
          • Twisted Pair Ethernet: Crossover Cables 🌐
          • The Physical Layer and Network Endpoints 🌐
          • Cabling Tools 🛠️
        • 5.The Data Link Layer
          • Wireless and Cellular Internet 📡
          • Unicast, Multicast, and Broadcast in Ethernet 🌐
          • Dissecting an Ethernet Frame 🕸️
          • Pursuing a Career in IT 🖥️
      • Exploring the Network Layer 🌐
        • 1.Introduction
          • Exploring Network Communication 🌐
        • 2.The Network Layer
          • Introducing the Network Layer and IP Addressing 🌐
          • Understanding IP Addresses and Allocation 🌐
          • IP Datagram: Structure and Fields
          • IP Addresses and Address Classes
          • Address Resolution Protocol (ARP)
        • 3.Subnetting
          • Subnetting
          • Subnet Masks
          • Binary Numbers and Decimal Numbers
          • Address Classes and CIDR Notation
          • Overcoming Challenges and Seeking Support
        • 4.Routing
          • Routing Basics
          • Routing Tables
          • Routing Protocols
          • Exterior Gateway Protocols: Connecting Autonomous Systems
          • A Brief History of Non-Routable Address Space
          • A Tale of Two Line Endings: A Support Engineer's Odyssey
      • Transport and Application Layers
        • 1.Transport and Application Layers
          • Introduction to Transport and Application Layers
        • 2.The Transport Layer
          • The Transport Layer: Multiplexing, Demultiplexing, and Ports
          • Dissecting a TCP Segment
          • TCP Control Flags: Establishing and Closing Connections
          • Understanding TCP Socket States
          • Understanding Connection-Oriented Protocols and Connectionless Protocols
          • Supplemental Reading for System Ports versus Ephemeral Ports
          • Network Firewalls: A Critical Component of Network Security
        • 3.The Application Layer
          • The Application Layer: Sending and Receiving Data
          • Understanding Network Layer Models: OSI Model
          • Exercise: Understanding Network Communication
      • Course Module Networking Services
        • 1.Introduction to Network Services
          • Introduction to Computer Networking Services
        • 2.Name Resolution
          • Introduction to DNS (Domain Name System)
          • The Many Steps of Name Resolution
          • DNS and UDP: A Comparison
          • Passion and Drive in IT 💡
        • 3.Name Resolution in Practice
          • DNS Resource Record Types
          • Domain Name Structure
          • Understanding Authoritative Name Servers and DNS Zones
        • 4.Dynamic Host Configuration Protocol
          • Managing Hosts on a Network with DHCP
          • DHCP Protocol 🌐
          • IPv4 Address Exhaustion
        • 5.VPNs and Proxies
          • Virtual Private Networks (VPNs)
          • Proxy Services: Introduction and Types
      • Internet Connectivity and Networking
        • 1.Connecting to the Internet
          • The Internet and Connectivity Technologies
        • 2.POTS and Dial up
          • Evolution of Computer Networks and Dial-up Connectivity
        • 3.Broadband Connections
          • The Significance of Broadband Internet
          • T-carrier Technologies: From Phone Calls to Data Transfers
          • DSL: Revolutionizing Internet Access
          • DSL: Revolutionizing Internet Access
          • Fiber Optic Technology: Revolutionizing Internet Connectivity
          • Broadband Protocols 🌐📡
        • 4.WANs
          • Network Setup and WAN Technologies
          • Network Setup and WAN Technologies
          • Point-to-Point VPNs
        • 5.Wireless Networking
          • Introduction to Wireless Networking Technologies
          • Mobile Device Connectivity
          • Mobile Device Networks
          • Wi-Fi 6
          • Alphabet Soup: Wi-Fi Standards
          • IoT Data Transfer Protocols
          • Wireless Network Configurations
          • Understanding Wireless Network Channels
          • Wireless Network Security
          • Protocols & Encryption
          • Cellular Networking
      • The Future of Computer Networking 🌐
        • 1.Introduction
          • Network Troubleshooting 🛠️
        • 2.Verifying Connectivity
          • Network Troubleshooting 🛠️
          • Traceroute: Tracing the Path to Network Connectivity 🛤️
          • Connectivity Testing Beyond the Network Layer 🌐
        • 3.Digging into DNS
          • Mastering Name Resolution with nslookup 🔍
          • Understanding the Role of DNS in Network Connectivity 🌐
          • The Domain Name System: A Hierarchical Global Network 🌐
          • Before DNS: The Legacy of Host Files 🗂️
        • 4.The Cloud
          • Exploring the World of Cloud Computing 🌥️
          • Cloud Computing: Beyond Virtual Machines
          • Cloud Storage: Secure, Accessible, and Available
        • 5.IPv6
          • The IPv4 Address Exhaustion Problem
          • IPv6 Header Improvements 🚀
          • The Transition to IPv6 🌐🔍
          • IPv6 and IPv4 Harmony 🌐🔗
          • Technical Interview Scenario: Troubleshooting Network Issues
    • Course 3 Operating Systems and You: Becoming a Power User 🖥️
      • Learning Objectives
        • 1.Operating Systems and Becoming a Power User
          • Navigating the Operating Systems 💻
        • 2.Basic Commands
          • Navigating the Windows and Linux OSs
          • Copying Files and Directories in PowerShell
          • Renaming and Moving Files in Bash 🔄
          • Deleting Files and Directories
          • Navigating File System in Windows 🗂️ 🗂️
          • Windows Confidential: Just What Is 'Size on Disk'? 🖥️
          • File Systems
          • Navigating Directories 📁
          • Navigating the Windows CLI 💻
          • Navigating the File System in Bash 🐧
          • Creating Directories
          • Efficient Directory Management in Bash
        • 3.File and Text Manipulation
          • Viewing and Editing Files
          • Editing Files
      • User and Permissions
        • 1.Users and Groups
          • Managing Users and Permissions
          • Viewing User Group Information
          • Linux User Management 🐧
          • 4.Passwords
          • Window Managing User Accounts
          • User Accounts in Mobile Operating Systems 📱💻
          • Ben Fried: Google's Chief Information Officer 🧑‍💻🏢
        • 2.Permissions
          • File Permissions 💻
          • Changing Permissions
          • Linux Special Permissions 🐧
      • Package and Software Management 🖥️
        • 1.Software Distribution
          • Course Progress Update: Halfway Through! 🎉
          • Understanding Package Dependencies on Windows 🖥️
          • Understanding Package Dependencies in Linux 📦
          • Understanding Software Packaging & Installation 🚀
          • Understanding Windows Software Packages 🚀
          • Linux Package Management: Debian Packages 🛠️
          • Mobile Operating Systems & App Management 🛠️
          • Mobile App Distribution: iOS & Android 🛠️
          • Mobile App Updates Best Practices for IT Support 📱
          • Mobile Device Storage Management Best Practices 📱
          • Understanding Archives
        • 2.Package Managers
          • Windows Package Management with Chocolatey 🖥️
        • 3.Whats happening in the background
          • Windows Software Installation: Behind the Scenes 🛠️
        • 4.Device Software Management
          • Windows Devices and Drivers: An Overview 🛠️
          • Linux Devices and Drivers: Detailed Overview 🛠️
          • Windows Operating System Updates 🖥️🔄
          • Linux Operating System Updates 🐧
      • Filesystems Overview: Windows & Linux 🖥️🐧
        • 1.Filesystem Types
          • Module Introduction: Disk Management Essentials 🛠️💻
          • Understanding File Management in Windows 📂💻
          • Monitoring and Managing Disk Usage in Windows 🖥️
          • Windows Filesystem Repair 🛠️
          • Linux Filesystem Repair: An Overview 🐧🔧
          • Review of Filesystems: A Refresher 🌐💾
          • Disk Partitioning and File System Essentials 💽🛠️
          • Windows Disk Partitioning and Formatting a Filesystem 💻💾
          • Windows: Mounting and Unmounting a Filesystem 🔌💾
          • Linux: Disk Partitioning and Formatting a Filesystem 🐧💻
          • Linux Mounting and Unmounting a Filesystem 🐧📂
          • Understanding Swap Space and Virtual Memory in Windows 💻
          • Understanding Linux Swap Space 🖥️💾
      • Process Management 🖥️🔧
        • 1.Life of a Process
          • Introduction to Process Management 🖥️🔍
          • Programs vs. Processes Revisited 🖥️🔄
          • Windows Process Creation and Termination 🖥️🔄
        • 2.Managing Processes
          • Windows Reading Process Information 🖥️🔍
          • Windows Signals 🚦🔔
          • Windows Managing Processes 🛠️💻
          • Mobile App Management 📱🔧
        • 3.Process Utilization
          • Windows Resource Monitoring
          • Resource Monitoring in Linux
      • Final Module Overview: IT Support Essentials
        • 1.Remote Access
          • Final Module Introduction: IT Support Essentials
          • Remote Connections on Windows
          • Remote Connections in Windows
          • Remote Connection: File Transfer on Linux
          • Remote Connection: File Transfer on Windows
        • 2.Virtualization
          • Virtual Machines
          • Supplemental reading for Virtual Machines
        • 3.Logging
          • System Monitoring
          • The Windows Event Viewer
          • Linux Logs
          • Working with Logs
        • 4.Operating System Deployment
          • Knowledge Summary: Imaging Software 🖥️🔧
          • Knowledge Summary: Operating Systems Deployment Methods 🖥️🚀
          • Knowledge Summary: OS Deployment Methods 🖥️🔄
          • Knowledge Summary: Mobile Device Resetting and Imaging 📱🔄
          • Knowledge Summary: Windows Troubleshooting 🖥️🔍
          • Knowledge Summary: Windows Troubleshooting Tools 🛠️🔍
          • Troubleshooting a Full Hard Drive in Windows 🖥️💾
          • Interview Scenario Troubleshooting Application Issues
    • Course 4 System Administration and IT Infrastructure Services 🌐
      • System Administration Course Overview 📚
        • 1.What is System Administration
          • Understanding IT Infrastructure and the Role of System Administrators 🌐
          • Understanding Servers in IT Infrastructure 🌐
          • Understanding Cloud Computing ☁️
          • Understanding Cloud Computing ☁️
        • 2.Systems Administration Tasks
          • Organizational Policies 📋
          • IT Infrastructure Services 🖥️
          • User and Hardware Provisioning 🖥️👥
          • Routine Maintenance 🛠️🔄
          • 5.Vendors
          • Troubleshooting and Managing Issues 🛠️🔍
          • Disaster Preparedness and Data Backup 🌪️💾
        • 3.Applying Changes
          • Responsible Use of Administrative Rights ⚙️🔒
          • IT Change Management 🛠️📈
          • Recording Your Actions 🖥️🎥
          • Never Test in Production 🚫🔧
          • Assessing Risk in Change Management ⚠️🔍
          • Fixing Things the Right Way 🛠️🔍
      • Network and Infrastructure Services: Module Overview 🌐🔧
        • 1.Intro to IT Infrastructure Services
          • IT Infrastructure Services Overview 🖥️🌐
          • The Role of IT Infrastructure Services in SysAdmin 🛠️🌐
          • Types of IT Infrastructure Services 🌐💻
        • 2.Physical Infrastructure Services
          • Server Operating Systems 🖥️🔧
          • Virtualization in IT Infrastructure 🌐💻
          • Remote Access Revisited 🌍💻
        • 3.Network Services
          • FTP, SFTP, and TFTP 📁🔄
          • Network Time Protocol (NTP) ⏰🌐
          • Network Support Services Revisited 🌐🔧
          • Understanding DNS
          • DHCP (Dynamic Host Configuration Protocol) 🌐🔧
        • 4.Troubleshooting Network Services
          • Troubleshooting DNS Issues: Unable to Resolve a Hostname or Domain Name 🌐🔍
        • 5.Managing System Services
          • Managing and Configuring IT Services 🖥️🔧
          • Managing Services in Linux 🖥️🔧
          • Managing Services in Windows 🖥️🔄
          • Configuring Services in Linux 💻
        • 6.Configuring Network Services
          • Configuring DNS with Dnsmasq 🌐🛠️
          • Configuring DHCP with Dnsmasq 🌐
      • Software and Platform Services 📊💻
        • 1.Software Services
          • Understanding Software and Platform Services in IT Infrastructure 🖥️💡
          • Overview of Communication Services in IT Infrastructure 💬🔧
          • Overview of Email Protocols and Services 📧🔧
          • Spam Management and Mitigation 🛡️📧
          • User Productivity Services: Agreements and Licenses 📋💼
          • Web Server Security Protocols 🔐🌐
          • Managing Self-Doubt: Insights from Heather 🌟
        • 2.File Services
          • File Services: Enhancing Organizational Productivity 📁
          • Network File Storage: Efficient Solutions for File Sharing 📂
          • Mobile Synchronization Protecting Your Valuable Data 📱🔒
        • 3.Print Services
          • Configuring Print Services 📄
        • 4.Platform Services
          • Web Servers Revisited 🌐💻
          • Load Balancers: Overview and Key Concepts 🌐⚙️
          • Understanding Database Servers 📊💾
        • 5.Troubleshooting Platform Services
          • Diagnosing Website Issues with HTTP Status Codes 🌐🔍
        • 6.Managing Cloud Resources
          • Cloud Concepts 🌥️💡
          • Typical Cloud Infrastructure Setups ☁️🔧
          • Common Cloud Models ☁️🔍
          • When and How to Choose Cloud ☁️🤔
          • Managing Cloud Resources ☁️🔧
      • Data Recovery and Backups 📁🔄
        • 1.Planning for Data Recovery
          • Introduction to Data Recovery 📊🔧
          • What is Data Recovery? 📂🔍
          • Backing Up Your Data 🔒💾
          • Backup Solutions 🛡️💾
          • Job Transition: The Value of Soft Skills in IT 🌟💼
          • Testing Backups: Ensuring Effective Data Recovery 🔄🛠️
          • Types of Backup Choosing the Right Approach for Your Data 📂🔄
          • User Backups Ensuring Data Safety for Individual Devices 💻☁️
        • 2.Disaster Recovery Plans
          • Disaster Recovery Plan Essential Components and Strategies 🌪️🛠️
          • Designing an Effective Disaster Recovery Plan 🛡️
        • 3.Post Mortems
          • Understanding Post-Mortems 📝🔍
          • Writing a PostMortem Report 📝🔍
      • Final Systems Administration Consultation Project
        • Process Review for Network Funtime Company 🖥️🔧
        • Process Review for W.D. Widgets 📈🛠️
        • Process Review for Dewgood 🌟💻
    • Course 5 IT Security: Defense Against the Digital Dark Arts 🔐💻
      • IT Security Course: Module 1 Overview 🔐
        • 1.Introduction to IT Security
          • Introduction to IT Security Course 🔐
        • 2.Malicious Software
          • The CIA Triad in Information Security 🔐
          • Essential Security Terms in IT Security 🛡️
          • Malicious Software (Malware) Overview 🦠
          • Antimalware Protection and Malware Removal 🛡️💻
          • Malware Continued: Advanced Threats and Techniques 🚨🖥️
        • 3.Network Attacks
          • Network Attacks: Overview of Common Threats 🌐🔒
          • Denial-of-Service Attacks: An Overview 🌐🚫
          • Overview of High-Profile Distributed Denial of Service (DDoS) Attacks 🌐🚫
        • 4.Other Attacks
          • Overview of ClientSide Attacks 🖥️💥
          • Overview of Password Attacks 🔐🚨
          • Overview of Deceptive Attacks 🕵️‍♂️💻
          • Physical Security Measures 🛡️🔐
      • Cryptology Overview 🔐
        • 1.Symmetric Encryption
          • Cryptography and Its Principles 🔐
          • Symmetric Cryptography 🔐
          • Symmetric Encryption Algorithms 🔐
          • The Role of a Security Engineer 🔐
        • 2.Public Key or Asymmetric Encryption
          • Asymmetric Cryptography 🔐🔑
          • Asymmetric vs Symmetric Cryptography 🔑🔒
          • Asymmetric Encryption Algorithms 🔐
        • 3.Hashing
          • Hashing 🔍
          • Hashing Algorithms 🛠️
        • 4.Cryptography Applications
          • Public Key Infrastructure (PKI) 🌐🔒
          • Certificates and Trust Models 🔑🔍
          • Cryptography in Action 🔒💻
          • Securing Network Traffic 🔐🌐
          • Cryptographic Hardware 🛡️🔑
      • The Three A's in Cybersecurity 🔐
        • 1.Authentication
          • Best Practices for Authentication 🔐
          • Multifactor Authentication (MFA) 🔑
          • Physical Privacy and Security Components 🔒
          • 4.Certificates Part Two
          • RADIUS Remote Authentication DialIn User Service 🌐
          • Kerberos Authentication Protocol 🛡️
          • TACACS+ (Terminal Access Controller Access-Control System Plus) 🔐
          • Single Sign-On (SSO) 🔑
        • 2.Authorization
          • Authorization and Access Control Methods 🔐
          • Mobile Security Methods 📱🔒
          • Access Control List (ACL) 📜🔐
        • 3.Accounting
          • Tracking Usage and Access 📊🔍
          • Important Skills in Security 🔐💡
      • Secure Network Architecture 🛡️🌐
        • 1.Secure Network Architecture
          • Secure Network Architecture 🛡️🌐
          • Network Hardware Hardening 🌐🛠️
          • IEEE 802.1X: Port-Based Network Access Control 🌐🔒
          • Network Software Hardening Techniques 🔒💻
        • 2.Wireless Security
          • WEP Encryption and Why It Shouldn't Be Used Anymore 🚫🔑
          • Summary of WPA and WPS Security in Wireless Networks
          • WPA2: Advanced Security Protocol for Wi-Fi Networks
          • Wireless Hardening: Enhancing Wi-Fi Security
          • The Impact of Social Engineering
        • 3.Network Monitoring
          • Sniffing the Network
          • Wireshark and Tcpdump
          • Intrusion Detection and Prevention Systems (IDS/IPS)
          • Unified Threat Management (UTM) 🛡️
          • Home Network Security 🏠🔐
      • Module 5 In-Depth Security Defense 🛡️🔒
        • 1.System Hardening
          • Introduction to Defense in Depth 🛡️🔄
          • Disabling Unnecessary Components 🛠️🔒
          • Host-Based Firewalls 🛡️💻
          • Logging and Auditing 🔍📊
          • Windows Defender Guide 🛡️🖥️
          • Antimalware Protection Guide 🛡️
          • Disk Encryption Guide 🔐
          • Self-Learning The Key to Success in Technology 🚀
        • 2.Application Hardening
          • Software Patch Management: Essential for Security** 🛡️
          • Browser Hardening: Enhancing Your Online Security 🔒
          • Application Policies: Enhancing Security through Effective Management 🔐
      • Congratulations on reaching the final module of the course! 🎉 Here’s what you’ll be focusing on:
        • 1.Risk in the Workplace
          • Security Goals and PCI DSS Overview 🔒
          • Measuring and Assessing Risk 🔍
          • Privacy Policy 📜
          • Data Destruction 🔒
        • 2.Users
          • User Habits and Security 🚀🔐
          • ThirdParty Security 🛡️🔍
          • Security Training 🛡️📚
          • Qualities of an IT Candidate 🌟💻
        • 3.Incident Handling
          • Incident Reporting and Analysis 🚨🔍
          • Incident Response and Forensic Analysis 🔍🛡️
          • Incident Response and Recovery 🚀🔒
          • Mobile Security and Privacy 📱🔐
          • Bring Your Own Device (BYOD) 📱🏢
          • Tips for IT Support Interviews 💼🖥️
          • Interview Role Play: Network Security Scenario 🎥🔒
          • Security Infrastructure Design Document
  • Google Project Manager Certification in Progress 🧑‍⚕️
    • Course 1 Foundations of Project Management
      • Module 1 Embarking on a career in project management
      • Module 2 Becoming an effective project manager
Powered by GitBook
On this page
  • Diagnosing Connectivity Issues 🔍
  • Using ICMP for Error Reporting ⚠️
  • Using the Ping Tool 🏓

Was this helpful?

  1. Google IT Support Professional Certificate
  2. Course 2 The Bits and Bytes of Computer Networking by Google
  3. The Future of Computer Networking 🌐
  4. 2.Verifying Connectivity

Network Troubleshooting 🛠️

Diagnosing Connectivity Issues 🔍

When network problems come up, the most common issue you'll run into is the inability to establish a connection to something. It could be a server you can't reach at all, or a website that isn't loading. Maybe you can only reach your resource on your LAN and can't connect to anything on the Internet. Whatever the problem is, being able to diagnose connectivity issues is an important part of network troubleshooting.

By the end of this lesson, you'll be able to use a number of important troubleshooting tools to help resolve these issues. 💻

Using ICMP for Error Reporting ⚠️

When a network error occurs, the device that detects it needs some way to communicate this to the source of the problematic traffic. It could be that a router doesn't know how to route to a destination or that a certain port isn't reachable. It could even be that the TTL of an IP datagram expired and no further router hops will be attempted.

For all of these situations and more, ICMP (Internet Control Message Protocol) is used to communicate these issues. ICMP is mainly used by a router or remote host to communicate why transmission has failed back to the origin of the transmission. 🔖

The makeup of an ICMP packet is pretty simple. It has a header with a few fields and a data section that's used by a host to figure out which of their transmissions generated the error.

The first field is the type field, which specifies what type of message is being delivered. Some examples are "destination unreachable" or "time exceeded". Immediately after this is the code field which indicates a more specific reason for the message than just the type.

After this is a 16-bit checksum that works like every other checksum field we've covered so far. Next up is a 32-bit field called the "rest of header" which is optionally used by some of the specific types and codes to send more data.

Finally, there's the data payload for an ICMP packet, which contains the entire IP header and the first eight bytes of the data payload section of the offending packet. 📤

Using the Ping Tool 🏓

ICMP wasn't really developed for humans to interact with. The point is so that these error messages can be delivered between networked computers automatically. But there's also a specific tool and two message types that are very useful to human operators.

This tool is called ping. Some version of it exists on just about every operating system and has for a very long time. Ping is a super simple program and the basics are the same no matter which operating system you're using.

Ping lets you send a special type of ICMP message called an echo request. An ICMP echo request essentially just asks a destination "Hey, are you there?". If the destination is up and running and able to communicate on the network, it'll send back an ICMP echo reply message type. 🔍

You can invoke the ping command from the command line of any modern operating system. In its most basic use, you just type ping and a destination IP, or a fully qualified domain name.

The output of the ping command is very similar across each of the different operating systems. Every line of output will generally display the address sending the ICMP echo reply and how long it took for the round-trip communications. It will also have the TTL remaining and how large the ICMP message is in bytes.

Once the command ends, there will also be some statistics displayed, like percentage of packets transmitted and received, the average round-trip time, and a couple of other things like that. 📊

On Linux and macOS, the ping command will run until it's interrupted by an end user sending an interrupt event (Ctrl + C). On Windows, ping defaults to only sending four echo requests.

In all environments, ping supports a number of command line flags that let you change its behavior, like the number of echo requests to send, how large they should be, and how quickly they should be sent. Check out the documentation for your operating system to learn a little bit more. 📚

Previous2.Verifying ConnectivityNextTraceroute: Tracing the Path to Network Connectivity 🛤️

Last updated 7 months ago

Was this helpful?