CompTIA Network+ Cert. (N10-007): The Total Course

Everything you need to pass the CompTIA Network+ Exam, N10-007 from Mike Meyers, CompTIA expert and bestselling author.

Instructed by Total Seminars

  • Includes all Standard Features
  • Get Unlimited access to all the courses
  • No Contract. Cancel Anytime
Starting in just $19 / mo see all plans
Subscribe Now
$ 299
Annual Subscription
  • One year Unlimited Access
  • Access to all courses
    You will be able to access all the courses from any category on the platform.
  • Learning paths access
  • Access Assignments & Projects
  • Access on Mobile, PC and Tablet
  • Pause & Resume Courses Anytime
  • Offline viewing
  • Instructor Support
  • Course Completion Certificates
  • Cancel Anytime
Subscribe Now
  • Once you complete the course, you will have the knowledge and confidence to pass the exams AND the skills to be a great network tech. This course is ideal as both a study tool and an on-the-job reference.
  • Your new skills and the CompTIA Network+ Certification will help you land a network tech job or if you are already a network tech, get that raise or advancement you are seeking.

Welcome to the CompTIA Network+ Certification; N10-007. The Total Course from Mike Meyers and Total Seminars.

This course is over 24 hours in length and covers everything you need to know to pass your CompTIA Network+ Certification (N10-007) Exam. The first goal of the course is to make you a good Network Tech and, in the process, make sure you are ready to pass the CompTIA exam.

 

WHAT OUR STUDENTS ARE SAYING:

"I used these courses to pass the A+, Security+, and Network+ in a span of 2.5 months. I had no IT experience 4 months ago. Now I am a network engineer at a managed service provider with a great salary and solid upward mobility." - Ryan D.

 

The course covers all the exam topics including:

  • Network architectures

  • Cabling and topology

  • Ethernet basics

  • Network Installation

  • TCP/IP applications and network protocols

  • Routing

  • Network naming

  • Advanced networking devices

  • IPv6

  • Remote connectivity

  • Wireless networking

  • Virtualization and cloud computing

  • Network operations

  • Managing risk

This is a Total Network+ Course and covers everything a good tech needs to know and prepares you to pass the CompTIA Network+ Certification exam.

  • Basic familiarity with networks.
  • There are no specific prerequisites as the course covers all the topics in detail. However, it’s a good idea to have an understanding of CompTIA A+ Certification topics or to be A+ Certified. You can learn more about A+ Certification topics from our Mike Meyers – Total Seminars CompTIA A+ Certification course on Udemy.
  • This course is intended for anyone that is preparing for a network technician position or looking to improve their skills and become CompTIA Network+ Certified. However, it goes beyond that and will give you the skills you need to be a better network tech on the job.
  • This is a complete and comprehensive CompTIA Network+ Certification (N10-007) course. It is designed to prepare the student to be able to take and pass the certification exam needed to become CompTIA Network+ Certified.
View More...

Section 1 : Network Models

  • Lecture 1 :
  • In this episode, Mike presents the concept of network models.
  • Lecture 2 :
  • OSI vs. TCP/IP Model
  • This episode introduces the two models used to describe and troubleshoot networks.
  • Lecture 3 :
  • Walking Through OSI and TCP/IP
  • In this episode, Mike takes an Ethernet frame through the incoming and outgoing processes, using both the OSI and TCP/IP models for reference.
  • Lecture 4 :
  • Meet the Frame
  • In this episode, Mike introduces the primary data encapsulation unit, the frame.
  • Lecture 5 :
  • The MAC Address
  • In this episode, Mike discusses the basic addressing used for frames: the MAC address. Computers receiving a frame use the destination MAC address to determine whether or not to process the frame.
  • Lecture 6 :
  • Broadcast vs. Unicast
  • What is the difference between broadcast and unicast in a network? In this episode, Mike describes the typical unicast frame that uses destination and source MAC addresses for sending communication to a specific host in the network. He also shows the broadcast MAC address that all hosts connected to the network will receive.
  • Lecture 7 :
  • Introduction to IP Addressing
  • In this episode, Mikes introduces logical addressing to enable communication between groups of computers within networks.
  • Lecture 8 :
  • Packets and Ports
  • In this episode, Mike discusses how TCP/IP networks use port numbers to keep track of multiple connections between computers.
  • Lecture 9 :
  • Introduction to Net+
  • Lecture 10 :
  • Network Models
  • Network Models

Section 2 : Cabling and Topology

  • Lecture 1 :
  • Network Topologies
  • In this episode, Mike explains the concepts used in wired network topologies and describes logical flow of data.
  • Lecture 2 :
  • Coaxial Cabling
  • In the episode, learn the specifications and connector types associated with coaxial cable.
  • Lecture 3 :
  • Twisted Pair Cabling
  • Mike covers the 568A/568B wiring schema using twisted pair cable.
  • Lecture 4 :
  • Cat Ratings
  • Mike describes and shows the various Cat cables and details their speed and distance specifications.
  • Lecture 5 :
  • Fiber Optic Cabling
  • In this episode, Mike discusses the different types of fiber used in modern networks and includes references to connector types you'll see as a network technician.
  • Lecture 6 :
  • Fire Ratings
  • In this episode, Mike describes the various fire ratings of cable and explains their intended site usage.
  • Lecture 7 :
  • Legacy Network Connections
  • Find out about legacy connections, and their usefulness in today’s network environments.
  • Lecture 8 :
  • Cabling and Topology
  • Cabling and Topology

Section 3 : Ethernet Basics

  • Lecture 1 :
  • What is Ethernet?
  • Mike discusses the core technologies of Ethernet.
  • Lecture 2 :
  • Early Ethernet
  • Mike looks at the bad old days of coax-based Ethernet.
  • Lecture 3 :
  • The Daddy of Ethernet, 10BaseT
  • Mike looks at how coax-based Ethernet transformed into Ethernet of Unshielded Twisted Pair
  • Lecture 4 :
  • Terminating Twisted Pair
  • In this episode, Mike will terminate a cable to the 568A specification, showing the preparation, and crimping process.
  • Lecture 5 :
  • Hubs vs. Switches
  • Mike explains the difference of traffic patterns between hubs and switches, and how the MAC address is used by switches.
  • Lecture 6 :
  • Ethernet Frames
  • Understand the Ethernet frame, its components, and how they are used by the various devices to route data traffic.
  • Lecture 7 :
  • Ethernet Basics
  • Ethernet Basics

Section 4 : Modern Ethernet

  • Lecture 1 :
  • 100BaseT
  • In this episode, various 100Base specifications are defined for speed and distance.
  • Lecture 2 :
  • Connecting Switches
  • Mike discusses how switches are connected together to expand a network.
  • Lecture 3 :
  • Gigabit Ethernet and 10-Gigabit Ethernet
  • Mike wraps up the Ethernet standards in this episode, covering 1000Base and 10GBase.
  • Lecture 4 :
  • Transceivers
  • Learn about the various types of transceivers and how they are specified as vendor-neutral devices.
  • Lecture 5 :
  • Connecting Ethernet Scenarios
  • Learn about different cabling or switch configuration issues that can be difficult to diagnose.
  • Lecture 6 :
  • Modern Ethernet
  • Modern Ethernet

Section 5 : Installing a Physical Network

  • Lecture 1 :
  • Introduction to Structured Cabling
  • In this episode, Mike examines the basic component of structured cabling, such as an equipment room, horizontal runs, and the work area.
  • Lecture 2 :
  • Terminating Structured Cabling
  • In this episode, Mike explores punchdown blocks, one of the key elements in structured cabling.
  • Lecture 3 :
  • Equipment Room
  • Mike takes you on a tour of a typical SOHO infrastructure, from the equipment room to the demarc and back again.
  • Lecture 4 :
  • Alternative Distribution Panels
  • Mike hangs out in the equipment room to show the distribution panels.
  • Lecture 5 :
  • Testing Cable
  • In this episode, Mike explores cable testing, covering wire maps, continuity, and TDRs.
  • Lecture 6 :
  • Troubleshooting Structured Cabling, Part 1
  • In this episode, Mike shows how to test for problems with structured cabling and explains what types of problems to look out for.
  • Lecture 7 :
  • Troubleshooting Structured Cabling, Part 2
  • Mike continues his discussion of structured cabling by examining how to use voltage monitors, environmental/temperature monitors, and TDRs to troubleshoot a cabling installation.
  • Lecture 8 :
  • Using a Toner and Probe
  • Mike demonstrates using a tone generator and tone probe to locate cables and connectors.
  • Lecture 9 :
  • Wired Connection Scenarios
  • Wired connections can have issues that lead to slow or poor performance and Mike talks through some common areas to consider.
  • Lecture 10 :
  • Installing a Physical Network
  • Installing a Physical Network

Section 6 : TCP/IP Basics

  • Lecture 1 :
  • Introduction to IP Addressing and Binary
  • In this episode, Mike takes an in-depth look at how IP addresses are constructed.
  • Lecture 2 :
  • Introduction to ARP
  • In this episode, Mike explores the address resolution protocol, which is used to resolve IP addresses.
  • Lecture 3 :
  • Classful Addressing
  • In this episode, Mike explains the concept of classful addressing, which separates IP addresses into five classes.
  • Lecture 4 :
  • Subnet Masks
  • In this episode, Mike introduces the concept of subnet masks, which are used to determine if a packet is coming from inside or outside a network.
  • Lecture 5 :
  • Subnetting with CIDR
  • In this episode, Mike demonstrates how to subnet in binary.
  • Lecture 6 :
  • More CIDR Subnetting Practice
  • In this episode, Mike offers more instruction for subnetting.
  • Lecture 7 :
  • Dynamic and Static IP Addressing
  • This episode examines the difference between assigning IP addresses manually and using DHCP to pass out addresses automatically.
  • Lecture 8 :
  • Rogue DHCP Servers
  • In this episode, Mike shows how to check to make sure that your DHCP server is working, as well as how to check that you're not connecting to a rogue DHCP server.
  • Lecture 9 :
  • Special IP Addresses
  • Learn about special IP addresses, which ones are reserved, and what the 169.254.x.x address is.
  • Lecture 10 :
  • IP Addressing Scenarios
  • Mike walks through some issues in IP addressing, including when everything should be working, but connection issues are prevalent.
  • Lecture 11 :
  • TCP/IP Basics
  • TCP/IP Basics

Section 7 : Routing

  • Lecture 1 :
  • Introducing Routers
  • In this episode, Mike explains how routers work to get packets from one network to another.
  • Lecture 2 :
  • Understanding Ports
  • In this episode, Mike describes the purposes of well-known ports and ephemeral ports.
  • Lecture 3 :
  • Network Address Translation
  • In this episode, Mike explains NAT, including how it works and why we need it.
  • Lecture 4 :
  • Implementing NAT
  • Mike demonstrates how to enable and configure NAT within a router.
  • Lecture 5 :
  • Forwarding Ports
  • Learn about port forwarding, its usage, and how to create ranges and triggers to allow external devices to have internal communication.
  • Lecture 6 :
  • Tour of a SOHO Router
  • In this episode, Mike walks you through setting up a SOHO router. He's like a talking user's manual.
  • Lecture 7 :
  • SOHO vs. Enterprise
  • In this episode, learn the major differences between and SOHO and enterprise routers.
  • Lecture 8 :
  • Static Routes
  • In this episode, Mike discusses static routes and explains their usage and the routing tables that use them.
  • Lecture 9 :
  • Dynamic Routing
  • Mike introduces you to routing concepts such as metrics and latency. The episode also discusses types of routing protocols, such as distance vector and link state.
  • Lecture 10 :
  • OSPF
  • Continuing with the routing protocol discussion, Mike describes the most common IGP, OSPF.
  • Lecture 11 :
  • BGP
  • Mike explains the Border Gateway Protocol
  • Lecture 12 :
  • RIP
  • Lecture 13 :
  • Routing
  • Routing

Section 8 : TCP/IP Applications

  • Lecture 1 :
  • TCP and UDP
  • Lecture 2 :
  • ICMP and IGMP
  • In this episode, Mike explains the importance of two of the fundamental protocols used in the Internet Protocol Suite, ICMP and IGMP.
  • Lecture 3 :
  • Handy Tools
  • Explore the various tools that can get quick answers when troubleshooting a network latency issue.
  • Lecture 4 :
  • Introduction to Wireshark
  • In this episode, Mike goes through a captured data stream using the Wireshark tool.
  • Lecture 5 :
  • Introduction to netstat
  • In this episode, Mike demonstrates uses for the powerful netstat command.
  • Lecture 6 :
  • Web Servers
  • In this episode, Mike discusses Web servers and some of the requirements and protocols used.
  • Lecture 7 :
  • FTP
  • In this episode, Mike discusses the venerable file transfer protocol.
  • Lecture 8 :
  • E-mail Servers and Clients
  • In this must-see episode for all aspiring spammers out there, Mike explains the various protocols used in sending and receiving e-mail.
  • Lecture 9 :
  • Securing E-mail
  • Historically, securing e-mail was a bit complicated. In this episode, Mike explains the various e-mail protocols and the evolution to STARTTLS.
  • Lecture 10 :
  • Telnet and SSH
  • In this episode, Mike looks at the remote connection protocol called telnet, as well as methods for encrypting telnet connections via SSH.
  • Lecture 11 :
  • Network Time Protocol
  • In this brief episode, Mike reveals the secret importance of NTP.
  • Lecture 12 :
  • Network Service Scenarios
  • In this episode, Mike works though some known issues for network service problems.
  • Lecture 13 :
  • TCP/IP Applications
  • TCP/IP Applications

Section 9 : Network Naming

  • Lecture 1 :
  • Understanding DNS
  • This episode begins an overview of the DNS system, which resolves domain names to IP addresses.
  • Lecture 2 :
  • Applying DNS
  • In this episode, Mike works with DNS and discusses the various record types that are available, what their purpose is, and how they can be used.
  • Lecture 3 :
  • The Hosts File
  • Take a look back in time at the earliest method for resolving IP addresses: the HOSTS file.
  • Lecture 4 :
  • Net Command
  • In this episode, Mike explores the venerable and still very useful net command to show things such as user names, shared network resources, mapping network drives, and more.
  • Lecture 5 :
  • Windows Name Resolution
  • In this episode, Mike looks at ways Windows machines figure out names of other computers on the network, through processes like NetBIOS and LLMNR.
  • Lecture 6 :
  • Dynamic DNS
  • In this episode, Mike explains how dynamic DNS works.
  • Lecture 7 :
  • DNS Troubleshooting
  • In this video, Mike shows you what to do if you suspect you're having issues with DNS.
  • Lecture 8 :
  • Network Naming
  • Network Naming

Section 10 : Securing TCP/IP

  • Lecture 1 :
  • Making TCP/IP Secure
  • Learn about the three core areas that provide security and access to TCP data to create a strong security program.
  • Lecture 2 :
  • Symmetric Encryption
  • In this episode, Mike explores the simplest type of encryption, symmetric encryption. Both parties have the same key to encrypt and decrypt.
  • Lecture 3 :
  • Asymmetric Encryption
  • In this episode, Mike describes encryption that uses public and private keys for encrypting and decrypting text.
  • Lecture 4 :
  • Cryptographic Hashes
  • In this episode, Mike demonstrates how hashes, such as MD5 and SHA-1, work.
  • Lecture 5 :
  • Identification
  • In this episode, Mike explains the issues of proving that you are who you are.
  • Lecture 6 :
  • Access Control
  • In this episode, Mike dives into access control lists, describing the three levels of control commonly used in computing.
  • Lecture 7 :
  • AAA
  • Mike describes the primary tools for providing network authentication, authorization, and accounting; notably RADIUS and TACACS+.
  • Lecture 8 :
  • Kerberos/EAP
  • In this episode, Mike discusses two commonly used authentication mechanisms for remote connectivity; Kerberos and EAP.
  • Lecture 9 :
  • Single Sign-On
  • In this episode, Mike describes how to log in to one computer and gain access to many.
  • Lecture 10 :
  • Certificates and Trust
  • In this episode, Mike explains certificates and how they are used to establish trust.
  • Lecture 11 :
  • Certificate Error Scenarios
  • In this episode, Mike looks at issues that can arise when using certificates.
  • Lecture 12 :
  • Securing TCP/IP
  • Securing TCP/IP

Section 11 : Advanced Networking Devices

  • Lecture 1 :
  • Understanding IP Tunneling
  • In this episode, Mike explores the process of making secure connections through tunnels.
  • Lecture 2 :
  • Virtual Private Networks
  • In this episode, Mike explains virtually everything about technology that enables remote clients to connect to a local network, also called a Virtual Private Network (VPN).
  • Lecture 3 :
  • Introduction to VLANs
  • In this episode, Mike explores the concepts and processes behind virtual LANs, including managed switches and trunking.
  • Lecture 4 :
  • InterVLAN Routing
  • In this episode, Mike shows how to network between virtual LANs.
  • Lecture 5 :
  • Interfacing with Managed Switches
  • In this episode, Mike explains how to connect to and configure managed switches.
  • Lecture 6 :
  • Switch Port Protection
  • Mike discusses the various switch port mitigation techniques and how they are used in a working network environment.
  • Lecture 7 :
  • Port Bonding
  • Mike looks at how to improve network throughput from a router by combining traffic onto multiple router ports.
  • Lecture 8 :
  • Port Mirroring
  • Here, Mike talks about how to duplicate the traffic from one router port to another port.
  • Lecture 9 :
  • Quality of Service
  • Mike shows how traffic is prioritized to maximize efficiency of communication.
  • Lecture 10 :
  • IDS vs. IPS
  • In this episode, Mike looks at intrusion detection systems and intrusion protection systems.
  • Lecture 11 :
  • Proxy Servers
  • In this episode, Mike discusses the different types of proxy servers and their purpose.
  • Lecture 12 :
  • Load Balancing
  • In this episode, Mike explores the concepts of load balancing, as well as why and how to implement this type of configuration.
  • Lecture 13 :
  • Device Placement Scenarios
  • Mike explores the different types of devices and locations for network security, as well as best performance outcomes. Learn the fundamentals of configuring certain devices either in-band or out-of-band.
  • Lecture 14 :
  • Advanced Networking Devices
  • Advanced Networking Devices

Section 12 : IPv6

  • Lecture 1 :
  • Introduction to IPv6
  • Mike walks through routing and switching concepts using IPv6. Learn to understand the simplicity of this protocol and how it allows for easy deployment in ever-changing environments.
  • Lecture 2 :
  • IPv6 Addressing
  • Learn how to handle IPv6 addressing, learn addressing shortcuts, and how special addressing components are handled.
  • Lecture 3 :
  • IPv6 In Action
  • Mike discusses IPv6 configurations, how IPv6 is handled by routers, and how it’s detected in a network and on the Internet.
  • Lecture 4 :
  • IPv4 and IPv6 Tunneling
  • Because most ISPs don't provide IPv6 access, you need to use a tunneling protocol to get to the IPv6 Internet. Mike goes through the processes required.
  • Lecture 5 :
  • IPv6
  • IPv6

Section 13 : Remote Connectivity

  • Lecture 1 :
  • Telephony Technologies
  • In this episode, Mike takes you on a tour of telephony technologies that paved the way for modern remote connectivity.
  • Lecture 2 :
  • Optical Carriers
  • In this episode, Mike explores the backbone connections of the Internet.
  • Lecture 3 :
  • Packet Switching
  • Mike discusses several monster technologies of packet switching, such as frame relay, ATM, and MPLS.
  • Lecture 4 :
  • Connecting with Dial-up
  • In this episode, Mike walks down memory lane, explaining how modems and PPP enable dial-up connectivity.
  • Lecture 5 :
  • Digital Subscriber Line (DSL)
  • Mike talks about DSL, how it’s used, and some of the characteristics that have been applied to access the Internet.
  • Lecture 6 :
  • Connecting with Cable Modems
  • In this episode, Mike explores cable modems, one of the most common high-speed connection types.
  • Lecture 7 :
  • Connecting with Satellites
  • In this exciting episode, Mike talks about connecting to the Internet from outer space!
  • Lecture 8 :
  • ISDN and BPL
  • In this episode, Mike looks at two more methods for connecting the Internet, ISDN and BPL.
  • Lecture 9 :
  • Remote Desktop Connectivity
  • In this episode, Mike shows how you can work on computers remotely through the Internet using tools like Tight VNC, Microsoft's RDP, and remote help.
  • Lecture 10 :
  • Advanced Remote Control Systems
  • Mike looks at Industrial Control Systems and the broader scale Supervisory Control and Data Acquisition technologies.
  • Lecture 11 :
  • Remote Connectivity
  • Remote Connectivity

Section 14 : Wireless Networking

  • Lecture 1 :
  • Introduction to 802.11
  • Mikes reviews the 802.11 wireless standards and how it works with wireless network traffic.
  • Lecture 2 :
  • 802.11 Standards
  • This episode covers the various wireless networking standards and examines their relative merits.
  • Lecture 3 :
  • Power over Ethernet (PoE)
  • In this episode, Mike reviews the PoE WAP configurations, where these are used, and the requirements needed to be able to implement this type of device.
  • Lecture 4 :
  • Antennas
  • Mike discusses the antenna concepts used in wireless 802.11 devices.
  • Lecture 5 :
  • Wireless Security Standards
  • Mikes walks through all the 802.11 standards and the authentication and encryption methodology which has developed over time.
  • Lecture 6 :
  • Implementing Wireless Security
  • What good is unimplemented security? In this episode, Mike demonstrates how to secure your wireless network so that your neighbors will stop hogging all your bandwidth.
  • Lecture 7 :
  • Threats to Your Wireless Network
  • In this episode, Mike covers war driving, war chalking, rogue WAPs, evil twins, and how to protect against them.
  • Lecture 8 :
  • Retro Threats
  • Mike and Logan time travel back to the days of war driving and war chalking.
  • Lecture 9 :
  • Wi-Fi Protected Setup (WPS)
  • In this episode, Mike explains the technology behind WPS, a method for easily connecting to a secure wireless network.
  • Lecture 10 :
  • Enterprise Wireless
  • In this episode, Mike introduces the enterprise wireless configuration and management tools.
  • Lecture 11 :
  • Installing a Wireless Network
  • Mike discusses topics that should be addressed when installing a wireless network and looks at interference, layout, and quality of signal.
  • Lecture 12 :
  • Wireless Scenarios
  • Mike looks at some of the issues that can arise to topple your wireless network, with a special focus on wireless interference.
  • Lecture 13 :
  • More Wireless Scenarios
  • Mike looks at real-world issues that can take down a wireless network, with a special focus on wireless devices.
  • Lecture 14 :
  • Wireless Networking
  • Wireless Networking

Section 15 : Virtualization and Cloud Computing

  • Lecture 1 :
  • Virtualization Basics
  • In this episode, Mike introduces virtualization and discusses the benefits of the various types you'll see.
  • Lecture 2 :
  • Cloud Ownership
  • In this episode, Mike discusses the difference between public and private clouds.
  • Lecture 3 :
  • Cloud Implementation
  • Mike creates a cloud service using AWS to demonstrate the ease of implementation of cloud infrastructure and service.
  • Lecture 4 :
  • Your First Virtual Machine
  • Mike creates a cloud service using AWS to demonstrate the ease of implementation of cloud infrastructure and service.
  • Lecture 5 :
  • NAS and SAN
  • In this episode, Mike discusses secure methods to save and access data on a network device.
  • Lecture 6 :
  • Platform as a Service (PaaS)
  • Mike shows us the Heroku PaaS.
  • Lecture 7 :
  • Software as a Service (SaaS)
  • Mike shows us that Software as a Service is all around us with DropBox and others.
  • Lecture 8 :
  • Infrastructure as a Service (IaaS)
  • Here, Mike looks at Infrastructure as a Service via Amazon Web Services.
  • Lecture 9 :
  • Virtualization and Cloud Computing
  • Virtualization and Cloud Computing

Section 16 : Mobile Networking

  • Lecture 1 :
  • Cellular Technologies
  • In this episode, Mike discusses WiMax and other cellular networking options, such as HSPA+ and LTE.
  • Lecture 2 :
  • Mobile Connectivity
  • Mikes walks through the various alternative mobile device connection types, looking at the specifications and how they are applied.
  • Lecture 3 :
  • Deploying Mobile Devices
  • In this episode, Mike delves into the opposing forces of corporate and personal use of mobile devices.
  • Lecture 4 :
  • Mobile Access Control
  • In this episode, Mike talks about the access and security consideration of BYOD mobile devices.
  • Lecture 5 :
  • Mobile Networking
  • Mobile Networking

Section 17 : Building a Real-World Network

  • Lecture 1 :
  • Network Types
  • Mike looks at the scope of different scales of networking.
  • Lecture 2 :
  • Network Design
  • Mike brings in some help to discuss network design aspects.
  • Lecture 3 :
  • Power Management
  • In this episode, Mike talks about how creating a power management and continuity plan is critical to good network design.
  • Lecture 4 :
  • Unified Communications
  • Mike introduces us to the conglomerated world of Unified Communications.
  • Lecture 5 :
  • Network Documentation
  • Mike walks through some of internal types of documentation needed for a network.
  • Lecture 6 :
  • Contingency Planning
  • In this episode, Mike explains the thought processes necessary to create an effective contingency plan.
  • Lecture 7 :
  • Predicting Hardware Failure
  • In this episode, Mike discusses equipment life cycles, expected failures, and repair or replacement downtimes.
  • Lecture 8 :
  • Backups
  • In this episode, Mike describes the when, why, and how of backups.
  • Lecture 9 :
  • Building a Real-World Network
  • Building a Real-World Network

Section 18 : Managing Risk

  • Lecture 1 :
  • What is Risk Management?
  • Mike talks about the Zen of risk management.
  • Lecture 2 :
  • Security Policies
  • In this episode, Mike reviews the types of policies to have in place for the IT department.
  • Lecture 3 :
  • Change Management
  • Mike shows us how the process of managing change to the network works.
  • Lecture 4 :
  • User Training
  • In this episode, Mike shows the how, why and when of training users.
  • Lecture 5 :
  • Standard Business Documentation
  • Mike reminds us that the world of IT is rife with paper.
  • Lecture 6 :
  • Mitigating Network Threats
  • In this episode, Mike examines the methods that an organization can use to protect its network from both external and internal threats.
  • Lecture 7 :
  • High Availability
  • Mike discusses the methods that can be considered to try to maintain 99.99% uptime for critical resources.
  • Lecture 8 :
  • Managing Risk
  • Managing Risk

Section 19 : Protecting Your Network

  • Lecture 1 :
  • Denial of Service
  • In this episode, Mike discusses attacks that prevent servers from providing their essential services.
  • Lecture 2 :
  • Malware
  • In this episode, Mike talks about types of malware and what they do.
  • Lecture 3 :
  • Social Engineering
  • In this episode, Mike explores social engineering attacks such as dumpster diving, shoulder surfing, and phishing.
  • Lecture 4 :
  • Access Control
  • In this episode, Mike discusses techniques for keeping unwanted users out of your network, focusing on effectively using firewalls.
  • Lecture 5 :
  • Man-in-the-Middle
  • In this episode, Mike shows attacks where bad actors function between encrypting hosts.
  • Lecture 6 :
  • Introduction to Firewalls
  • Mike shows us how to keep bad guys from getting into your network from the outside.
  • Lecture 7 :
  • Firewalls
  • Mike shows us techniques to use and configure firewalls.
  • Lecture 8 :
  • DMZ
  • In the episode, Mike reminds us that there is more than one way to do a DMZ.
  • Lecture 9 :
  • Hardening Devices
  • In this episode, Mike discuss how to control device access on a network.
  • Lecture 10 :
  • Physical Security Controls
  • In this episode, Mike explores preventative controls, such as guards and fences.
  • Lecture 11 :
  • Testing Network Security
  • Learn to scan your network for potential weaknesses in this action-packed episode.
  • Lecture 12 :
  • Network Protection Scenarios
  • Mike walks through several scenarios to consider when protecting a network, including how they could block access to services.
  • Lecture 13 :
  • Protecting your Network
  • Protecting your Network

Section 20 : Network Monitoring

  • Lecture 1 :
  • SNMP
  • Mike demonstrates a simple but fully functional SNMP network.
  • Lecture 2 :
  • Documenting Logs
  • In this episode, Mike examines the various log files that techs can use to troubleshoot networks. Botanists and woodworkers may be disappointed by this episode's misleading title.
  • Lecture 3 :
  • System Monitoring
  • In this episode, Mike explores the type of information we will want to consider when doing network monitoring.
  • Lecture 4 :
  • SIEM (Security Information and Event Management)
  • In this episode, Mike reveals the purpose of security information and event management (SIEM) tools.
  • Lecture 5 :
  • Network Monitoring
  • Network Monitoring

Section 21 : Network Troubleshooting

  • Lecture 1 :
  • Network Troubleshooting Theory
  • Mike closes the series with a review of the troubleshooting steps, and how to create a good troubleshooting program.
  • Lecture 2 :
  • Network Troubleshooting
  • Network Troubleshooting

Total Seminars,

Total Seminars provides certification training services and training materials to thousands of schools, corporations, and government agencies including the United Nations, the FBI and all branches of the Department of Defense. Total Seminars produces the #1 selling CompTIA A+ and Network+ Certification books with over 1 million books in print. Total Seminars has created a number of best-selling video courses by Mike Meyers and the Total Seminars Team of Instructors. They also develop supplemental materials such as the TotalTester certification practice tests and TotalSims lab simulations to support your certification preparation. These are available on the Total Seminars' web site.
View More...
learn-nxtgen-hacking-with-technology

Learn NxtGen Hacking with Technolog...

By : Gopikrishna C

Lecture 80

tcp-ip-the-complete-course

TCP/IP: The Complete Course

By : Lazaro (Laz) Diaz

Lecture 17

the-complete-ethical-hacking-certification-course

The Complete Ethical Hacking Certif...

By : Mohamed Amer

Lecture 151

voip-configuration-and-attacking-hacking

VoIP Configuration and Attacking (H...

By : Arpit Mittal

Lecture 6

cissp-certification-introduction

CISSP- Certification Introduction

By : MUKESH SINGH

Lecture 18

practical-blockchain-smart-contracts-ethereum-solidity

Practical Blockchain & Smart Contra...

By : Abhilash Nelson

Lecture 40

Buy

$19

Enjoy Limitless Learning. Get Access to Unlimited Courses with Premium Subscrption Subscribe Now

Sign up and start learning
By signing up. you agree to our Terms of Use and Privacy Policy
Forget Password