- 31
- 393 297
Troy Berg
Canada
Приєднався 13 жов 2019
Welcome, and thanks for visiting! My name is Troy Berg and I am a college professor, corporate trainer, information technology specialist and consultant, and a lifelong technophile with nearly 20 years in the IT industry.
My mission with my videos is to provide useful, comprehensive information regarding information technology, infrastructure and computing technology, networking, cybersecurity, local area network management and server administration, and IT project management in an engaging and entertaining way.
Maybe you are a student who is new to the world of IT and are building your foundational knowledge? Perhaps you're currently working in the industry and want to solidify and expand your skills? Maybe you're actively pursuing a specific certification? Either way, this channel is built with you in mind.
Great to meet you! Be sure to subscribe to be notified of regularly updated content.
My mission with my videos is to provide useful, comprehensive information regarding information technology, infrastructure and computing technology, networking, cybersecurity, local area network management and server administration, and IT project management in an engaging and entertaining way.
Maybe you are a student who is new to the world of IT and are building your foundational knowledge? Perhaps you're currently working in the industry and want to solidify and expand your skills? Maybe you're actively pursuing a specific certification? Either way, this channel is built with you in mind.
Great to meet you! Be sure to subscribe to be notified of regularly updated content.
Core Configuration of a Router and a Switch in Cisco Packet Tracer - Every Command Explained.
Berg IT Training - In this CCST and CCNA introductory-level video, I perform a line-by-line core configuration of a Cisco router and a Cisco switch using the command line interface (CLI) in Cisco Packet Tracer, explaining each command in detail and verifiying the effects of each command as we go.
We perform all the foundational commands discussed in Cisco's CCNA: Introduction to Networks version 7 (CCNA 1).
============================================================
Time Stamps
00:00 Video Introduction
00:53 Topology Overview
01:55 Defaut Functionality of a Switch
03:19 Structured Core Configuration Overview
04:20 User EXEC, Privileged EXEC, and Global Configuration Modes
06:50 Configuring the Hostname
07:34 Securing the Device
08:20 Banner MOTD Command
11:04 Device CLI Tab vs Console Cable Terminal Access
12:24 Configuring the Console Password (Line Console 0)
14:29 Understanding the Login command in Line Configuration Mode
16:55 Configuring the VTY Lines Password
20:00 Viewing Plain Text Passwords Using Show Runnning Configuration
20:52 Service Password-Encryption Command
22:45 Enable Password vs Enable Secret Commands
29:10 Understanding Switchports and the Default VLAN 1 on a Switch
31:08 Configuring an IP Address to VLAN 1 on a Switch
35:10 Testing VTY Passwords Using Telnet
36:37 Copy Running-Config Startup-Config
38:44 Applying Text File Configurations to a Router
40:42 Configuring an IP Address to an Interface on a Router
41:49 Summary and Outro
============================================================
============================================================
Text File Configurations Shared in the Video Are in the Video Comments Below
============================================================
My mission with my videos is to provide useful, comprehensive information regarding information technology, infrastructure and computing technology, networking, cybersecurity, local area network management, and IT project management in an engaging and entertaining way.
Like this content? Check out my work-in-progress playlists:
Fundamentals of Local Area Network Management
ua-cam.com/play/PLWO00NoUXa4zGGqc--I8IAWIQhE9a47YL.html
Journey to CCST (Networking) and CCNA 200-301 (series in progress)
ua-cam.com/play/PLWO00NoUXa4yNhmBVm65lN2bveWCQXG1o.html
Practical Cybersecurity (series in progress)
ua-cam.com/play/PLWO00NoUXa4yOqLxQJYDlHwgALeyYUo2f.html
#ittraining #ccna #ccst #packettracer #networking
We perform all the foundational commands discussed in Cisco's CCNA: Introduction to Networks version 7 (CCNA 1).
============================================================
Time Stamps
00:00 Video Introduction
00:53 Topology Overview
01:55 Defaut Functionality of a Switch
03:19 Structured Core Configuration Overview
04:20 User EXEC, Privileged EXEC, and Global Configuration Modes
06:50 Configuring the Hostname
07:34 Securing the Device
08:20 Banner MOTD Command
11:04 Device CLI Tab vs Console Cable Terminal Access
12:24 Configuring the Console Password (Line Console 0)
14:29 Understanding the Login command in Line Configuration Mode
16:55 Configuring the VTY Lines Password
20:00 Viewing Plain Text Passwords Using Show Runnning Configuration
20:52 Service Password-Encryption Command
22:45 Enable Password vs Enable Secret Commands
29:10 Understanding Switchports and the Default VLAN 1 on a Switch
31:08 Configuring an IP Address to VLAN 1 on a Switch
35:10 Testing VTY Passwords Using Telnet
36:37 Copy Running-Config Startup-Config
38:44 Applying Text File Configurations to a Router
40:42 Configuring an IP Address to an Interface on a Router
41:49 Summary and Outro
============================================================
============================================================
Text File Configurations Shared in the Video Are in the Video Comments Below
============================================================
My mission with my videos is to provide useful, comprehensive information regarding information technology, infrastructure and computing technology, networking, cybersecurity, local area network management, and IT project management in an engaging and entertaining way.
Like this content? Check out my work-in-progress playlists:
Fundamentals of Local Area Network Management
ua-cam.com/play/PLWO00NoUXa4zGGqc--I8IAWIQhE9a47YL.html
Journey to CCST (Networking) and CCNA 200-301 (series in progress)
ua-cam.com/play/PLWO00NoUXa4yNhmBVm65lN2bveWCQXG1o.html
Practical Cybersecurity (series in progress)
ua-cam.com/play/PLWO00NoUXa4yOqLxQJYDlHwgALeyYUo2f.html
#ittraining #ccna #ccst #packettracer #networking
Переглядів: 4 435
Відео
Installing Windows Server with Desktop Experience vs Server Core - A Side by Side Comparison
Переглядів 14 тис.2 роки тому
Berg IT Training - In this video I perform side-by-side installations comparing Windows Server 2022 Desktop Experience and Windows Server Core. Once installed, I do some basic configuration to prepare each machine for use in a lab or sandbox environment, Time Stamps 00:00 Video Introduction 01:37 Topology Overview 02:11 Creating Our Virtual Machines 04:30 Installing Windows Server Operating Sys...
Deploying A Multi-Tier PKI (Public Key Infrastructure) Inside an Active Directory Domain Using ADCS
Переглядів 24 тис.2 роки тому
Berg IT Training - In this video, I build a multi-tier private Public Key Infrastructure in Active Directory using Active Directory Certificate Service and Windows Server 2022. Time Stamps 00:00 Video Introduction 01:02 Topology Overview 03:05 Deploy Root Certificate Authority 03:30 Install AD CS on Root CA Server 05:25 Post-Deployment AD CS Configuration 07:42 Configure Root Certificate Extens...
Five Things I Wish Someone Had Told Me When I Started My Career in Information Technology
Переглядів 2,1 тис.2 роки тому
Berg IT Training - In this video, I discuss five key things that I wish someone had told me years ago when I embarked on my IT career. Time Stamps 00:00 Video Introduction 00:45 Tip #1 - Build a broad foundation. 02:20 Tip #2 - Focus. Don't Flitter. 03:49 Tip #3 - Hone your people skills. 04:41 Tip #4 - Learn how YOU learn. 06:08 Tip #5 - Breathe. Relax. Slow down. Focus. 07:18 Summary My missi...
How to Achieve End-to-End Email Encryption Using Gpg4Win and Kleopatra Certificate Manager
Переглядів 9 тис.2 роки тому
Berg IT Training - In this video, I demonstrate how to use Gpg4Win and Kleopatra Certificate Manager to encrypt documents and achieve end-to-end encryption for data and information shared over email. Along the way we review the principles of asymmetric (public-key) encryption and we decide whether or not Gpg4Win is potentially suitable for an enterprise environment. Time Stamps 00:00 Video Intr...
Wireshark for Beginners - How to Configure Wireshark for the Optimum Learning Experience
Переглядів 2,6 тис.2 роки тому
Berg IT Training - In this video, I install and deploy Wireshark Network Protocol Analyzer on a Windows 11 virtual machine with a focus on how to configure Wireshark in a way that emphasizes learning basic packet and protocol analysis. Along the way I show you basic packet and conversation filtering techniques to help you get started with Wireshark. Time Stamps 00:00 Video Introduction 01:25 Wi...
Configuring a Client-to-Site VPN using RADIUS (NPS) Server Authentication in Windows Server 2022
Переглядів 27 тис.2 роки тому
In this video, I provide a demonstration of the deployment of a Client-to-Site (C2S) Virtual Private Network (VPN), which uses RADIUS server authentication using Windows Server 2022's Network Policy and Access Server (NPS) server role in an Active Directory environment. Time Stamps 00:00 Video Introduction 00:52 Network Topology Overview 01:54 RADIUS Terminology 03:27 Lab Setup 04:04 Network Po...
Getting Started with Nessus Essentials - From Installation to Your First Vulnerability Scan
Переглядів 7 тис.2 роки тому
In this quick video, we provide a short introduction to a valuable cybersecurity tool called Nessus Essentials, from installation to our first vulnerability scan, for the purposes of organizational threat management. Links Mentioned in the Video Tenable Home Page www.tenable.com/ Nessus Essentials Starting Page www.tenable.com/tenable-for-education/nessus-essentials?edu=true Nessus Documentatio...
Easy Installation of the Internet Information Services (IIS) server role in Windows Server 2022
Переглядів 10 тис.2 роки тому
In this quick video, we perform a quick and easy default installation of the Internet Information Services (IIS) server role on a Windows Server 2022 virtual machine for the purposes of a lab environment. Time Stamps 00:00 Video Introduction 00:22 Installation Overview 00:50 Topology Overview 01:16 Installation of the IIS Server Role 02:29 Verification of IIS Management Tools 02:50 Verification...
Managing and Configuring Hyper-V Virtual Switches -- Default, Internal, External, and Private
Переглядів 125 тис.2 роки тому
In this comprehensive video, we do a complete mega-comparison of Hyper-V virtual switches. We compare and configure the four most common foundational vSwitches default, private, internal, and external. In addition to creating and configuring each switch, we deploy each one in a full virtualized environment to see how they work and interact with other virtual machines, the host environment, the ...
Installing a Second Domain Controller in Active Directory Domain Services for Fault Tolerance
Переглядів 18 тис.2 роки тому
In this video, I install a second domain controller in Active Directory Domain Services in Windows Server 2022. I then verify and test the replication of AD Users and Computers as well as DNS. Time Stamps 00:00 Introduction 00:53 Infrastructure Overview 02:22 Pre-Deployment Configuration 03:42 Adding Server to Domain 05:30 Local Administrator vs Domain Administrator 07:35 Installation of the AD...
Installing Active Directory Domain Services in Windows Server 2022, along with DNS and DHCP
Переглядів 69 тис.2 роки тому
In this video, I perform a complete installation of Active Directory Domain Services in a Windows Server 2022 virtual machine. I promote the server to a Domain Controller and verify the corresponding Domain Name System (DNS). I also deploy the DHCP server role to provide dynamic IPv4 addressing to a Windows 10 Professional host, which I then add to the Active Directory Domain. I finally create ...
PowerShell Fundamentals Part 12 - PowerShell Variables Part 2
Переглядів 7342 роки тому
PowerShell Fundamentals Series Part 12 - PowerShell Variables Part 2 Time Stamps 00:00 - Intro 02:30 - Using the official variable PowerShell cmdlets 06:20 - Identifying variable datatypes 08:00 - Performing operations on variables of different datatypes 10:06 - Declaring integer datatypes 15:25 - Single object variables vs multi-object variables 17:05 - Chaining methods and properties to varia...
PowerShell Fundamentals Part 6 - PowerShell Piping and Exporting Data
Переглядів 1 тис.2 роки тому
PowerShell Fundamentals Series Part 6 - PowerShell Piping and Exporting Data Time Stamps 00:00 - Intro 02:10 - Piping with Out-Default, Out-Host 04:40 - Input and Output Options for Cmdlets 08:10 - Piping with Out-File 13:30 - Piping with ConvertTo-CSV 17:28 - Piping with Export-CSV 19:30 - Piping with ConvertTo-HTML 21:19 - Piping with Export-CliXML #PowerShell #ITTraining
PowerShell Fundamentals Part 11 - PowerShell Variables and Basic Scripting
Переглядів 9692 роки тому
PowerShell Fundamentals Series Part 11 - PowerShell Variables and Basic Scripting Time Stamps 00:00 - Intro 01:46 - Creating simple variables 05:00 - Variable naming conventions 09:35 - Single quotes, double-quotes, and escape characters 16:18 - Using the Read-Host cmdlet 18:35 - Integrating variables in basic scripts #PowerShell #ITTraining
PowerShell Fundamentals Part 10 - Sorting, Selecting and Grouping Objects
Переглядів 8652 роки тому
PowerShell Fundamentals Part 10 - Sorting, Selecting and Grouping Objects
PowerShell Fundamentals Part 9 - Understanding PowerShell Objects
Переглядів 1,3 тис.2 роки тому
PowerShell Fundamentals Part 9 - Understanding PowerShell Objects
PowerShell Fundamentals Part 8 - Working with Item (Object) Properties in PowerShell
Переглядів 1,2 тис.2 роки тому
PowerShell Fundamentals Part 8 - Working with Item (Object) Properties in PowerShell
PowerShell Fundamentals Part 7 - Working with PSProviders and PSDrives
Переглядів 1,1 тис.2 роки тому
PowerShell Fundamentals Part 7 - Working with PSProviders and PSDrives
PowerShell Fundamentals Part 5 - Working With Aliases
Переглядів 1,2 тис.2 роки тому
PowerShell Fundamentals Part 5 - Working With Aliases
PowerShell Fundamentals Part 4 - Understanding PowerShell Parameters
Переглядів 2,9 тис.2 роки тому
PowerShell Fundamentals Part 4 - Understanding PowerShell Parameters
PowerShell Fundamentals Part 3 - Exploring PowerShell Help
Переглядів 1,4 тис.2 роки тому
PowerShell Fundamentals Part 3 - Exploring PowerShell Help
PowerShell Fundamentals Part 2 - Discovering and Executing Basic PowerShell Commands
Переглядів 2,2 тис.2 роки тому
PowerShell Fundamentals Part 2 - Discovering and Executing Basic PowerShell Commands
PowerShell Fundamentals Part 1 - Introduction to PowerShell
Переглядів 4,4 тис.2 роки тому
PowerShell Fundamentals Part 1 - Introduction to PowerShell
Configuring DHCP Load Balancing and Failover Using Windows Server 2022
Переглядів 9 тис.3 роки тому
Configuring DHCP Load Balancing and Failover Using Windows Server 2022
Configuring Dynamic Host Control Protocol (DHCP) in Windows Server 2022
Переглядів 6 тис.3 роки тому
Configuring Dynamic Host Control Protocol (DHCP) in Windows Server 2022
Configuring Transfers Between Primary and Secondary DNS Zones in Windows Server 2022
Переглядів 6 тис.3 роки тому
Configuring Transfers Between Primary and Secondary DNS Zones in Windows Server 2022
Deploying Standalone DNS (Domain Name System) in Windows Server 2022
Переглядів 11 тис.3 роки тому
Deploying Standalone DNS (Domain Name System) in Windows Server 2022
Installing Windows Server 2022 as a Virtual Machine in Hyper-V
Переглядів 26 тис.3 роки тому
Installing Windows Server 2022 as a Virtual Machine in Hyper-V
Enabling Client Hyper-V in Windows 10 or Windows 11
Переглядів 1,6 тис.3 роки тому
Enabling Client Hyper-V in Windows 10 or Windows 11
Great video sir, thank you
I have a question regarding Windows PKI infrastructure design. Woudl it make sense to add a 3rd server for CRL and for new CSR coming from non-Windows AD integrated machines that coming from a not fully trusted network? I imagine having the offline RootCA in our management network, the Enterprice (Issuing) CA in our normal VM network which is going to be contacted from our Windows machines to request and get new certificates (as of my understanding, correct me if I'm wrong here). However, we might install some certificates in not fully trusted networks that are connected via Site-to-Site VPN. The clients at these VPN networks would need our root certificate, and access to CRL. We would then create this CRL and CSR server in our DMZ so we don't expose our Enterprise CA directly. Would this make sense? BTW, thanks a lot for this video, this was a really good starting point here.
That was Gold , thank you Sir
great learning material 👍
Thank you for the in depth explanations. Will it work if I set my external switch to connect to my Wi-Fi network with the "allow management operating system to share this network adapter" check box checked? It is not working for me whereby my host internet connection still works but my VM keeps on showing no internet connection despite recreating the external switch and routing it to a dedicated IP address. Internal, default and private switches did not work either.
Just started my journey into home labbing, and your channel has helped me a lot the past couple days. Thank you for the content
Really good video easy to understand active directory certificate services, but can you tell me that, why you not explain CA policy. inf file which we want to keep under root of cwindows. Do we must require this CA policy. inf file to install and configure standalone root CA or Enterprise CA
Thanks Troy...Superb teaching skill...Appreciated it
Excellent Videos , Thank you
Not sure if anyone will reply to this comment. But I got stuck at the pinging the switch part from PC01. I tried and it kept saying Request timed out. I followed closely along with Troy, but my result is different. What am I doing wrong?
This video has helped me so much, thank you for this straight-forward video with all the explenations i needed
Thanks a TON Troy !!! what a video!
Great intro to ADCS . Thank you very much Troy !
Super information regarding all my query thanks
One of the best explanation for virtualization thanks alot sir
Can this be a job of its own?
Very nice
When I went to Microsoft to Download the Evaluation Software I saw the option to download the ISO or a VHD, why do you recommend to download the ISO instead of the VHD, if the VHD is already a Virtual Machine ready to deploy ? (great work with the video tutorials...)
Hi Troy, it was an exciting videos! Thank you Anyway, could you please give an advice about the configuration firewall in front of router? So, the firewall will be connected directly to the ISP Hope you can see the comment :) Thank you, again!
Thank you so much Sir, Much appreciated really
perperfect
negative. you suck! don't pretend like people who are watching your 1 video are experts already.
How to configure that if one of the DC is off or down? How to make the other one works?
this it seems to work also on windows server 2019, am i right?
Thank you for sparing my limited attention span. Raw information demonstrated by clear examples. Saved me from hours of experimenting! For anyone attempting to replicate these examples, be sure to check target VM's Firewall if ping requests initially fail. In 2024 ... a newly created Win10(22H2) VM may have its Inbound ICMPv4 Firewall Rule disabled which will inhibit its response to any external ping request (ie. the request will be blocked by the Firewall). Windows Defender Firewall -> Advanced Settings -> Inbound Rules -> File and Printer Sharing (Echo Request - ICMPv4-In) -> Enable
Thanks for the explanation ! I was wondering which step I did wrong
Is there a possibility to move users to another subnet?
thank you. your videos is the best 😁
I thank you for your great Service, i life in Austria, I have an Examination in Network Management and your Vid helped me tf out, Thanks
Hello, Just looking at you video, but one big question. Why you let the Root CA as a workgroup computer ?
Hello, I want to set up a local network with Internet connection, a modem, a server that I installed using the dhcp method, and a modem that has dhcp enabled. I want the clients to get the IP from the server and from the internet modem, can I do this with the firewall settings?
Following these instructions literally as-is destroyed one of my machines (at least I unfortunately thought so and ended up deleting and starting completely over). There can NOT be any missed steps or "magic" steps. When you say "Use the administrator password created during the process", that is a magic step, because we did no such thing. Ultimately, after a lot of research and going through super vague instructions, the LOCAL administrator account because your first domain account. When you first login, you login as "<computer_name>\administrator". The computer_name is usually hidden. After reboot, login as <domain_name>\administrator, with the SAME password as the previous local administrator account. Note that if you're RDPing into a machine, you MUST type the domain_name\administrator, and the domain_name part will disapear, but its still secretly there. I do appreciate this video, but please update or add a note. Hopefully this helps someone.
The way you explain is easy to understand. Thak you
Troy thank you for the detailed explanation it was most helpful! Is there any notes/highlights that might be different on setting up a second sub ca?
Forgive me. Somewhere around spot 14:25 - 14:30 you start jumping all over the screen, making following you a very difficult. Perhaps you might to say where you are going so we can all follow.
Pure gold men! congrats!
your presentation skills are excellent
Hey Troy Its Awesome-Fabulous work you have done Thanksssssssssssssssssssssss a lot man. It's very -very useful for me. Great work keep it up bro.
Top class information!!!
So much effort to set a basic parameter through the command-line, and you need a second computer to refer to a GUI. The server still has a GUI: you can see windows popping up. Microsoft ripped out a true full screen textmode some time ago. A basic Windows2000-like GUI wouldn't have any footprint.
Thats a terrific job!
thank you very much for your thorough explanations, top notch work.
This is the greatest video, thank you so much.
is it possibile to change the subnet of the DEFAULT SWITCH ?
Extremely well done. Very clear and concise despite the apparent length. Saved me many hours of beating my head on the access problem.
Spent two hours trying to make a DNS server before coming across this. By far the best explanation so far
Question- How do I issue internal website certs using my issuing cert authority server?
Excellent Excellent! Thank you so much
Such an amazing video!! It was challenging to find out a right one, but was this! easy to understand and follow. Learned a lot! Thanks very much!
I followed your instructions and the private network will not communicate with VMs
Thank you for this valuable tips , as a learner it really helps.