All in One Offer! | Access Unlimited Courses in any category starting at just $29. Offer Ends in:

Browse Library

  • Business Solutions
  • Become an Instructor
  • 0
    Shopping Cart

    Your Cart is empty. Keep shopping to find a course!

    Browse Courses
Free
7 days left at this price!

This plan includes

  • Limited free courses access
  • Play & Pause Course Videos
  • Video Recorded Lectures
  • Learn on Mobile/PC/Tablet
  • Quizzes and Real Projects
  • Lifetime Course Certificate
  • Email & Chat Support
Get Unlimited Learning Access
$29
7 days left at this price!
30-Day Money-Back Guarantee

This plan includes

  • Access to 11,000+ Courses
  • Ads free experience Courses
  • Play & Pause Course Videos
  • HD Video Recorded Lectures
  • Learn on Mobile/PC/Tablet
  • Quizzes and Real Projects
  • Lifetime Course Certificate
  • Instructor Direct Support
  • Email & Chat Support
  • Cancel Anytime
$29
$29
$29
  • Once you complete the course, you will have the knowledge and confidence to pass the exams AND the skills to be a great network tech. This course is ideal as both a study tool and an on-the-job reference.
  • Your new skills and the CompTIA Network+ Certification will help you land a network tech job or if you are already a network tech, get that raise or advancement you are seeking.

Welcome to the CompTIA Network+ Certification; N10-007. The Total Course from Mike Meyers and Total Seminars.

This course is over 24 hours in length and covers everything you need to know to pass your CompTIA Network+ Certification (N10-007) Exam. The first goal of the course is to make you a good Network Tech and, in the process, make sure you are ready to pass the CompTIA exam.

 

WHAT OUR STUDENTS ARE SAYING:

"I used these courses to pass the A+, Security+, and Network+ in a span of 2.5 months. I had no IT experience 4 months ago. Now I am a network engineer at a managed service provider with a great salary and solid upward mobility." - Ryan D.

 

The course covers all the exam topics including:

  • Network architectures

  • Cabling and topology

  • Ethernet basics

  • Network Installation

  • TCP/IP applications and network protocols

  • Routing

  • Network naming

  • Advanced networking devices

  • IPv6

  • Remote connectivity

  • Wireless networking

  • Virtualization and cloud computing

  • Network operations

  • Managing risk

This is a Total Network+ Course and covers everything a good tech needs to know and prepares you to pass the CompTIA Network+ Certification exam.

  • Basic familiarity with networks.
  • There are no specific prerequisites as the course covers all the topics in detail. However, it’s a good idea to have an understanding of CompTIA A+ Certification topics or to be A+ Certified. You can learn more about A+ Certification topics from our Mike Meyers – Total Seminars CompTIA A+ Certification course on Udemy.
  • This course is intended for anyone that is preparing for a network technician position or looking to improve their skills and become CompTIA Network+ Certified. However, it goes beyond that and will give you the skills you need to be a better network tech on the job.
  • This is a complete and comprehensive CompTIA Network+ Certification (N10-007) course. It is designed to prepare the student to be able to take and pass the certification exam needed to become CompTIA Network+ Certified.
View More...
  • Section 1 : Network Models 10 Lectures 00:54:40

    • Lecture 1 :
    • What is a Model? Preview
      In this episode, Mike presents the concept of network models.
    • Lecture 2 :
    • OSI vs. TCP/IP Model
      This episode introduces the two models used to describe and troubleshoot networks.
    • Lecture 3 :
    • Walking Through OSI and TCP/IP
      In this episode, Mike takes an Ethernet frame through the incoming and outgoing processes, using both the OSI and TCP/IP models for reference.
    • Lecture 4 :
    • Meet the Frame
      In this episode, Mike introduces the primary data encapsulation unit, the frame.
    • Lecture 5 :
    • The MAC Address
      In this episode, Mike discusses the basic addressing used for frames: the MAC address. Computers receiving a frame use the destination MAC address to determine whether or not to process the frame.
    • Lecture 6 :
    • Broadcast vs. Unicast
      What is the difference between broadcast and unicast in a network? In this episode, Mike describes the typical unicast frame that uses destination and source MAC addresses for sending communication to a specific host in the network. He also shows the broadcast MAC address that all hosts connected to the network will receive.
    • Lecture 7 :
    • Introduction to IP Addressing
      In this episode, Mikes introduces logical addressing to enable communication between groups of computers within networks.
    • Lecture 8 :
    • Packets and Ports
      In this episode, Mike discusses how TCP/IP networks use port numbers to keep track of multiple connections between computers.
    • Lecture 9 :
    • Introduction to Net+
    • Lecture 10 :
    • Network Models
      Network Models
  • Section 2 : Cabling and Topology 8 Lectures 00:49:12

    • Lecture 1 :
    • Network Topologies
      In this episode, Mike explains the concepts used in wired network topologies and describes logical flow of data.
    • Lecture 2 :
    • Coaxial Cabling
      In the episode, learn the specifications and connector types associated with coaxial cable.
    • Lecture 3 :
    • Twisted Pair Cabling
      Mike covers the 568A/568B wiring schema using twisted pair cable.
    • Lecture 4 :
    • Cat Ratings
      Mike describes and shows the various Cat cables and details their speed and distance specifications.
    • Lecture 5 :
    • Fiber Optic Cabling
      In this episode, Mike discusses the different types of fiber used in modern networks and includes references to connector types you'll see as a network technician.
    • Lecture 6 :
    • Fire Ratings
      In this episode, Mike describes the various fire ratings of cable and explains their intended site usage.
    • Lecture 7 :
    • Legacy Network Connections
      Find out about legacy connections, and their usefulness in today’s network environments.
    • Lecture 8 :
    • Cabling and Topology
      Cabling and Topology
  • Section 3 : Ethernet Basics 7 Lectures 00:51:20

    • Lecture 1 :
    • What is Ethernet?
      Mike discusses the core technologies of Ethernet.
    • Lecture 2 :
    • Early Ethernet
      Mike looks at the bad old days of coax-based Ethernet.
    • Lecture 3 :
    • The Daddy of Ethernet, 10BaseT
      Mike looks at how coax-based Ethernet transformed into Ethernet of Unshielded Twisted Pair
    • Lecture 4 :
    • Terminating Twisted Pair
      In this episode, Mike will terminate a cable to the 568A specification, showing the preparation, and crimping process.
    • Lecture 5 :
    • Hubs vs. Switches
      Mike explains the difference of traffic patterns between hubs and switches, and how the MAC address is used by switches.
    • Lecture 6 :
    • Ethernet Frames
      Understand the Ethernet frame, its components, and how they are used by the various devices to route data traffic.
    • Lecture 7 :
    • Ethernet Basics
      Ethernet Basics
  • Section 4 : Modern Ethernet 6 Lectures 00:36:35

    • Lecture 1 :
    • 100BaseT
      In this episode, various 100Base specifications are defined for speed and distance.
    • Lecture 2 :
    • Connecting Switches
      Mike discusses how switches are connected together to expand a network.
    • Lecture 3 :
    • Gigabit Ethernet and 10-Gigabit Ethernet
      Mike wraps up the Ethernet standards in this episode, covering 1000Base and 10GBase.
    • Lecture 4 :
    • Transceivers
      Learn about the various types of transceivers and how they are specified as vendor-neutral devices.
    • Lecture 5 :
    • Connecting Ethernet Scenarios
      Learn about different cabling or switch configuration issues that can be difficult to diagnose.
    • Lecture 6 :
    • Modern Ethernet
      Modern Ethernet
  • Section 5 : Installing a Physical Network 10 Lectures 00:55:56

    • Lecture 1 :
    • Introduction to Structured Cabling
      In this episode, Mike examines the basic component of structured cabling, such as an equipment room, horizontal runs, and the work area.
    • Lecture 2 :
    • Terminating Structured Cabling
      In this episode, Mike explores punchdown blocks, one of the key elements in structured cabling.
    • Lecture 3 :
    • Equipment Room
      Mike takes you on a tour of a typical SOHO infrastructure, from the equipment room to the demarc and back again.
    • Lecture 4 :
    • Alternative Distribution Panels
      Mike hangs out in the equipment room to show the distribution panels.
    • Lecture 5 :
    • Testing Cable
      In this episode, Mike explores cable testing, covering wire maps, continuity, and TDRs.
    • Lecture 6 :
    • Troubleshooting Structured Cabling, Part 1
      In this episode, Mike shows how to test for problems with structured cabling and explains what types of problems to look out for.
    • Lecture 7 :
    • Troubleshooting Structured Cabling, Part 2
      Mike continues his discussion of structured cabling by examining how to use voltage monitors, environmental/temperature monitors, and TDRs to troubleshoot a cabling installation.
    • Lecture 8 :
    • Using a Toner and Probe
      Mike demonstrates using a tone generator and tone probe to locate cables and connectors.
    • Lecture 9 :
    • Wired Connection Scenarios
      Wired connections can have issues that lead to slow or poor performance and Mike talks through some common areas to consider.
    • Lecture 10 :
    • Installing a Physical Network
      Installing a Physical Network
  • Section 6 : TCP/IP Basics 11 Lectures 01:44:51

    • Lecture 1 :
    • Introduction to IP Addressing and Binary
      In this episode, Mike takes an in-depth look at how IP addresses are constructed.
    • Lecture 2 :
    • Introduction to ARP
      In this episode, Mike explores the address resolution protocol, which is used to resolve IP addresses.
    • Lecture 3 :
    • Classful Addressing
      In this episode, Mike explains the concept of classful addressing, which separates IP addresses into five classes.
    • Lecture 4 :
    • Subnet Masks
      In this episode, Mike introduces the concept of subnet masks, which are used to determine if a packet is coming from inside or outside a network.
    • Lecture 5 :
    • Subnetting with CIDR
      In this episode, Mike demonstrates how to subnet in binary.
    • Lecture 6 :
    • More CIDR Subnetting Practice
      In this episode, Mike offers more instruction for subnetting.
    • Lecture 7 :
    • Dynamic and Static IP Addressing
      This episode examines the difference between assigning IP addresses manually and using DHCP to pass out addresses automatically.
    • Lecture 8 :
    • Rogue DHCP Servers
      In this episode, Mike shows how to check to make sure that your DHCP server is working, as well as how to check that you're not connecting to a rogue DHCP server.
    • Lecture 9 :
    • Special IP Addresses
      Learn about special IP addresses, which ones are reserved, and what the 169.254.x.x address is.
    • Lecture 10 :
    • IP Addressing Scenarios
      Mike walks through some issues in IP addressing, including when everything should be working, but connection issues are prevalent.
    • Lecture 11 :
    • TCP/IP Basics
      TCP/IP Basics
  • Section 7 : Routing 13 Lectures 01:44:56

    • Lecture 1 :
    • Introducing Routers
      In this episode, Mike explains how routers work to get packets from one network to another.
    • Lecture 2 :
    • Understanding Ports
      In this episode, Mike describes the purposes of well-known ports and ephemeral ports.
    • Lecture 3 :
    • Network Address Translation
      In this episode, Mike explains NAT, including how it works and why we need it.
    • Lecture 4 :
    • Implementing NAT
      Mike demonstrates how to enable and configure NAT within a router.
    • Lecture 5 :
    • Forwarding Ports
      Learn about port forwarding, its usage, and how to create ranges and triggers to allow external devices to have internal communication.
    • Lecture 6 :
    • Tour of a SOHO Router
      In this episode, Mike walks you through setting up a SOHO router. He's like a talking user's manual.
    • Lecture 7 :
    • SOHO vs. Enterprise
      In this episode, learn the major differences between and SOHO and enterprise routers.
    • Lecture 8 :
    • Static Routes
      In this episode, Mike discusses static routes and explains their usage and the routing tables that use them.
    • Lecture 9 :
    • Dynamic Routing
      Mike introduces you to routing concepts such as metrics and latency. The episode also discusses types of routing protocols, such as distance vector and link state.
    • Lecture 10 :
    • OSPF
      Continuing with the routing protocol discussion, Mike describes the most common IGP, OSPF.
    • Lecture 11 :
    • BGP
      Mike explains the Border Gateway Protocol
    • Lecture 12 :
    • RIP
    • Lecture 13 :
    • Routing
      Routing
  • Section 8 : TCP/IP Applications 13 Lectures 01:39:22

    • Lecture 1 :
    • TCP and UDP
    • Lecture 2 :
    • ICMP and IGMP
      In this episode, Mike explains the importance of two of the fundamental protocols used in the Internet Protocol Suite, ICMP and IGMP.
    • Lecture 3 :
    • Handy Tools
      Explore the various tools that can get quick answers when troubleshooting a network latency issue.
    • Lecture 4 :
    • Introduction to Wireshark
      In this episode, Mike goes through a captured data stream using the Wireshark tool.
    • Lecture 5 :
    • Introduction to netstat
      In this episode, Mike demonstrates uses for the powerful netstat command.
    • Lecture 6 :
    • Web Servers
      In this episode, Mike discusses Web servers and some of the requirements and protocols used.
    • Lecture 7 :
    • FTP
      In this episode, Mike discusses the venerable file transfer protocol.
    • Lecture 8 :
    • E-mail Servers and Clients
      In this must-see episode for all aspiring spammers out there, Mike explains the various protocols used in sending and receiving e-mail.
    • Lecture 9 :
    • Securing E-mail
      Historically, securing e-mail was a bit complicated. In this episode, Mike explains the various e-mail protocols and the evolution to STARTTLS.
    • Lecture 10 :
    • Telnet and SSH
      In this episode, Mike looks at the remote connection protocol called telnet, as well as methods for encrypting telnet connections via SSH.
    • Lecture 11 :
    • Network Time Protocol
      In this brief episode, Mike reveals the secret importance of NTP.
    • Lecture 12 :
    • Network Service Scenarios
      In this episode, Mike works though some known issues for network service problems.
    • Lecture 13 :
    • TCP/IP Applications
      TCP/IP Applications
  • Section 9 : Network Naming 8 Lectures 01:13:03

    • Lecture 1 :
    • Understanding DNS
      This episode begins an overview of the DNS system, which resolves domain names to IP addresses.
    • Lecture 2 :
    • Applying DNS
      In this episode, Mike works with DNS and discusses the various record types that are available, what their purpose is, and how they can be used.
    • Lecture 3 :
    • The Hosts File
      Take a look back in time at the earliest method for resolving IP addresses: the HOSTS file.
    • Lecture 4 :
    • Net Command
      In this episode, Mike explores the venerable and still very useful net command to show things such as user names, shared network resources, mapping network drives, and more.
    • Lecture 5 :
    • Windows Name Resolution
      In this episode, Mike looks at ways Windows machines figure out names of other computers on the network, through processes like NetBIOS and LLMNR.
    • Lecture 6 :
    • Dynamic DNS
      In this episode, Mike explains how dynamic DNS works.
    • Lecture 7 :
    • DNS Troubleshooting
      In this video, Mike shows you what to do if you suspect you're having issues with DNS.
    • Lecture 8 :
    • Network Naming
      Network Naming
  • Section 10 : Securing TCP/IP 12 Lectures 01:19:21

    • Lecture 1 :
    • Making TCP/IP Secure
      Learn about the three core areas that provide security and access to TCP data to create a strong security program.
    • Lecture 2 :
    • Symmetric Encryption
      In this episode, Mike explores the simplest type of encryption, symmetric encryption. Both parties have the same key to encrypt and decrypt.
    • Lecture 3 :
    • Asymmetric Encryption
      In this episode, Mike describes encryption that uses public and private keys for encrypting and decrypting text.
    • Lecture 4 :
    • Cryptographic Hashes
      In this episode, Mike demonstrates how hashes, such as MD5 and SHA-1, work.
    • Lecture 5 :
    • Identification
      In this episode, Mike explains the issues of proving that you are who you are.
    • Lecture 6 :
    • Access Control
      In this episode, Mike dives into access control lists, describing the three levels of control commonly used in computing.
    • Lecture 7 :
    • AAA
      Mike describes the primary tools for providing network authentication, authorization, and accounting; notably RADIUS and TACACS+.
    • Lecture 8 :
    • Kerberos/EAP
      In this episode, Mike discusses two commonly used authentication mechanisms for remote connectivity; Kerberos and EAP.
    • Lecture 9 :
    • Single Sign-On
      In this episode, Mike describes how to log in to one computer and gain access to many.
    • Lecture 10 :
    • Certificates and Trust
      In this episode, Mike explains certificates and how they are used to establish trust.
    • Lecture 11 :
    • Certificate Error Scenarios
      In this episode, Mike looks at issues that can arise when using certificates.
    • Lecture 12 :
    • Securing TCP/IP
      Securing TCP/IP
  • Section 11 : Advanced Networking Devices 14 Lectures 01:46:14

    • Lecture 1 :
    • Understanding IP Tunneling
      In this episode, Mike explores the process of making secure connections through tunnels.
    • Lecture 2 :
    • Virtual Private Networks
      In this episode, Mike explains virtually everything about technology that enables remote clients to connect to a local network, also called a Virtual Private Network (VPN).
    • Lecture 3 :
    • Introduction to VLANs
      In this episode, Mike explores the concepts and processes behind virtual LANs, including managed switches and trunking.
    • Lecture 4 :
    • InterVLAN Routing
      In this episode, Mike shows how to network between virtual LANs.
    • Lecture 5 :
    • Interfacing with Managed Switches
      In this episode, Mike explains how to connect to and configure managed switches.
    • Lecture 6 :
    • Switch Port Protection
      Mike discusses the various switch port mitigation techniques and how they are used in a working network environment.
    • Lecture 7 :
    • Port Bonding
      Mike looks at how to improve network throughput from a router by combining traffic onto multiple router ports.
    • Lecture 8 :
    • Port Mirroring
      Here, Mike talks about how to duplicate the traffic from one router port to another port.
    • Lecture 9 :
    • Quality of Service
      Mike shows how traffic is prioritized to maximize efficiency of communication.
    • Lecture 10 :
    • IDS vs. IPS
      In this episode, Mike looks at intrusion detection systems and intrusion protection systems.
    • Lecture 11 :
    • Proxy Servers
      In this episode, Mike discusses the different types of proxy servers and their purpose.
    • Lecture 12 :
    • Load Balancing
      In this episode, Mike explores the concepts of load balancing, as well as why and how to implement this type of configuration.
    • Lecture 13 :
    • Device Placement Scenarios
      Mike explores the different types of devices and locations for network security, as well as best performance outcomes. Learn the fundamentals of configuring certain devices either in-band or out-of-band.
    • Lecture 14 :
    • Advanced Networking Devices
      Advanced Networking Devices
  • Section 12 : IPv6 5 Lectures 00:46:34

    • Lecture 1 :
    • Introduction to IPv6
      Mike walks through routing and switching concepts using IPv6. Learn to understand the simplicity of this protocol and how it allows for easy deployment in ever-changing environments.
    • Lecture 2 :
    • IPv6 Addressing
      Learn how to handle IPv6 addressing, learn addressing shortcuts, and how special addressing components are handled.
    • Lecture 3 :
    • IPv6 In Action
      Mike discusses IPv6 configurations, how IPv6 is handled by routers, and how it’s detected in a network and on the Internet.
    • Lecture 4 :
    • IPv4 and IPv6 Tunneling
      Because most ISPs don't provide IPv6 access, you need to use a tunneling protocol to get to the IPv6 Internet. Mike goes through the processes required.
    • Lecture 5 :
    • IPv6
      IPv6
  • Section 13 : Remote Connectivity 11 Lectures 00:50:46

    • Lecture 1 :
    • Telephony Technologies
      In this episode, Mike takes you on a tour of telephony technologies that paved the way for modern remote connectivity.
    • Lecture 2 :
    • Optical Carriers
      In this episode, Mike explores the backbone connections of the Internet.
    • Lecture 3 :
    • Packet Switching
      Mike discusses several monster technologies of packet switching, such as frame relay, ATM, and MPLS.
    • Lecture 4 :
    • Connecting with Dial-up
      In this episode, Mike walks down memory lane, explaining how modems and PPP enable dial-up connectivity.
    • Lecture 5 :
    • Digital Subscriber Line (DSL)
      Mike talks about DSL, how it’s used, and some of the characteristics that have been applied to access the Internet.
    • Lecture 6 :
    • Connecting with Cable Modems
      In this episode, Mike explores cable modems, one of the most common high-speed connection types.
    • Lecture 7 :
    • Connecting with Satellites
      In this exciting episode, Mike talks about connecting to the Internet from outer space!
    • Lecture 8 :
    • ISDN and BPL
      In this episode, Mike looks at two more methods for connecting the Internet, ISDN and BPL.
    • Lecture 9 :
    • Remote Desktop Connectivity
      In this episode, Mike shows how you can work on computers remotely through the Internet using tools like Tight VNC, Microsoft's RDP, and remote help.
    • Lecture 10 :
    • Advanced Remote Control Systems
      Mike looks at Industrial Control Systems and the broader scale Supervisory Control and Data Acquisition technologies.
    • Lecture 11 :
    • Remote Connectivity
      Remote Connectivity
  • Section 14 : Wireless Networking 14 Lectures 01:53:08

    • Lecture 1 :
    • Introduction to 802.11
      Mikes reviews the 802.11 wireless standards and how it works with wireless network traffic.
    • Lecture 2 :
    • 802.11 Standards
      This episode covers the various wireless networking standards and examines their relative merits.
    • Lecture 3 :
    • Power over Ethernet (PoE)
      In this episode, Mike reviews the PoE WAP configurations, where these are used, and the requirements needed to be able to implement this type of device.
    • Lecture 4 :
    • Antennas
      Mike discusses the antenna concepts used in wireless 802.11 devices.
    • Lecture 5 :
    • Wireless Security Standards
      Mikes walks through all the 802.11 standards and the authentication and encryption methodology which has developed over time.
    • Lecture 6 :
    • Implementing Wireless Security
      What good is unimplemented security? In this episode, Mike demonstrates how to secure your wireless network so that your neighbors will stop hogging all your bandwidth.
    • Lecture 7 :
    • Threats to Your Wireless Network
      In this episode, Mike covers war driving, war chalking, rogue WAPs, evil twins, and how to protect against them.
    • Lecture 8 :
    • Retro Threats
      Mike and Logan time travel back to the days of war driving and war chalking.
    • Lecture 9 :
    • Wi-Fi Protected Setup (WPS)
      In this episode, Mike explains the technology behind WPS, a method for easily connecting to a secure wireless network.
    • Lecture 10 :
    • Enterprise Wireless
      In this episode, Mike introduces the enterprise wireless configuration and management tools.
    • Lecture 11 :
    • Installing a Wireless Network
      Mike discusses topics that should be addressed when installing a wireless network and looks at interference, layout, and quality of signal.
    • Lecture 12 :
    • Wireless Scenarios
      Mike looks at some of the issues that can arise to topple your wireless network, with a special focus on wireless interference.
    • Lecture 13 :
    • More Wireless Scenarios
      Mike looks at real-world issues that can take down a wireless network, with a special focus on wireless devices.
    • Lecture 14 :
    • Wireless Networking
      Wireless Networking
  • Section 15 : Virtualization and Cloud Computing 9 Lectures 01:08:15

    • Lecture 1 :
    • Virtualization Basics
      In this episode, Mike introduces virtualization and discusses the benefits of the various types you'll see.
    • Lecture 2 :
    • Cloud Ownership
      In this episode, Mike discusses the difference between public and private clouds.
    • Lecture 3 :
    • Cloud Implementation
      Mike creates a cloud service using AWS to demonstrate the ease of implementation of cloud infrastructure and service.
    • Lecture 4 :
    • Your First Virtual Machine
      Mike creates a cloud service using AWS to demonstrate the ease of implementation of cloud infrastructure and service.
    • Lecture 5 :
    • NAS and SAN
      In this episode, Mike discusses secure methods to save and access data on a network device.
    • Lecture 6 :
    • Platform as a Service (PaaS)
      Mike shows us the Heroku PaaS.
    • Lecture 7 :
    • Software as a Service (SaaS)
      Mike shows us that Software as a Service is all around us with DropBox and others.
    • Lecture 8 :
    • Infrastructure as a Service (IaaS)
      Here, Mike looks at Infrastructure as a Service via Amazon Web Services.
    • Lecture 9 :
    • Virtualization and Cloud Computing
      Virtualization and Cloud Computing
  • Section 16 : Mobile Networking 5 Lectures 00:24:11

    • Lecture 1 :
    • Cellular Technologies
      In this episode, Mike discusses WiMax and other cellular networking options, such as HSPA+ and LTE.
    • Lecture 2 :
    • Mobile Connectivity
      Mikes walks through the various alternative mobile device connection types, looking at the specifications and how they are applied.
    • Lecture 3 :
    • Deploying Mobile Devices
      In this episode, Mike delves into the opposing forces of corporate and personal use of mobile devices.
    • Lecture 4 :
    • Mobile Access Control
      In this episode, Mike talks about the access and security consideration of BYOD mobile devices.
    • Lecture 5 :
    • Mobile Networking
      Mobile Networking
  • Section 17 : Building a Real-World Network 9 Lectures 01:00:02

    • Lecture 1 :
    • Network Types
      Mike looks at the scope of different scales of networking.
    • Lecture 2 :
    • Network Design
      Mike brings in some help to discuss network design aspects.
    • Lecture 3 :
    • Power Management
      In this episode, Mike talks about how creating a power management and continuity plan is critical to good network design.
    • Lecture 4 :
    • Unified Communications
      Mike introduces us to the conglomerated world of Unified Communications.
    • Lecture 5 :
    • Network Documentation
      Mike walks through some of internal types of documentation needed for a network.
    • Lecture 6 :
    • Contingency Planning
      In this episode, Mike explains the thought processes necessary to create an effective contingency plan.
    • Lecture 7 :
    • Predicting Hardware Failure
      In this episode, Mike discusses equipment life cycles, expected failures, and repair or replacement downtimes.
    • Lecture 8 :
    • Backups
      In this episode, Mike describes the when, why, and how of backups.
    • Lecture 9 :
    • Building a Real-World Network
      Building a Real-World Network
  • Section 18 : Managing Risk 8 Lectures 00:38:47

    • Lecture 1 :
    • What is Risk Management?
      Mike talks about the Zen of risk management.
    • Lecture 2 :
    • Security Policies
      In this episode, Mike reviews the types of policies to have in place for the IT department.
    • Lecture 3 :
    • Change Management
      Mike shows us how the process of managing change to the network works.
    • Lecture 4 :
    • User Training
      In this episode, Mike shows the how, why and when of training users.
    • Lecture 5 :
    • Standard Business Documentation
      Mike reminds us that the world of IT is rife with paper.
    • Lecture 6 :
    • Mitigating Network Threats
      In this episode, Mike examines the methods that an organization can use to protect its network from both external and internal threats.
    • Lecture 7 :
    • High Availability
      Mike discusses the methods that can be considered to try to maintain 99.99% uptime for critical resources.
    • Lecture 8 :
    • Managing Risk
      Managing Risk
  • Section 19 : Protecting Your Network 13 Lectures 01:57:51

    • Lecture 1 :
    • Denial of Service
      In this episode, Mike discusses attacks that prevent servers from providing their essential services.
    • Lecture 2 :
    • Malware
      In this episode, Mike talks about types of malware and what they do.
    • Lecture 3 :
    • Social Engineering
      In this episode, Mike explores social engineering attacks such as dumpster diving, shoulder surfing, and phishing.
    • Lecture 4 :
    • Access Control
      In this episode, Mike discusses techniques for keeping unwanted users out of your network, focusing on effectively using firewalls.
    • Lecture 5 :
    • Man-in-the-Middle
      In this episode, Mike shows attacks where bad actors function between encrypting hosts.
    • Lecture 6 :
    • Introduction to Firewalls
      Mike shows us how to keep bad guys from getting into your network from the outside.
    • Lecture 7 :
    • Firewalls
      Mike shows us techniques to use and configure firewalls.
    • Lecture 8 :
    • DMZ
      In the episode, Mike reminds us that there is more than one way to do a DMZ.
    • Lecture 9 :
    • Hardening Devices
      In this episode, Mike discuss how to control device access on a network.
    • Lecture 10 :
    • Physical Security Controls
      In this episode, Mike explores preventative controls, such as guards and fences.
    • Lecture 11 :
    • Testing Network Security
      Learn to scan your network for potential weaknesses in this action-packed episode.
    • Lecture 12 :
    • Network Protection Scenarios
      Mike walks through several scenarios to consider when protecting a network, including how they could block access to services.
    • Lecture 13 :
    • Protecting your Network
      Protecting your Network
  • Section 20 : Network Monitoring 5 Lectures 00:39:31

    • Lecture 1 :
    • SNMP
      Mike demonstrates a simple but fully functional SNMP network.
    • Lecture 2 :
    • Documenting Logs
      In this episode, Mike examines the various log files that techs can use to troubleshoot networks. Botanists and woodworkers may be disappointed by this episode's misleading title.
    • Lecture 3 :
    • System Monitoring
      In this episode, Mike explores the type of information we will want to consider when doing network monitoring.
    • Lecture 4 :
    • SIEM (Security Information and Event Management)
      In this episode, Mike reveals the purpose of security information and event management (SIEM) tools.
    • Lecture 5 :
    • Network Monitoring
      Network Monitoring
  • Section 21 : Network Troubleshooting 2 Lectures 00:05:12

    • Lecture 1 :
    • Network Troubleshooting Theory
      Mike closes the series with a review of the troubleshooting steps, and how to create a good troubleshooting program.
    • Lecture 2 :
    • Network Troubleshooting
      Network Troubleshooting
  • How do i access the course after purchase?

    It's simple. When you sign up, you'll immediately have unlimited viewing of thousands of expert courses, paths to guide your learning, tools to measure your skills and hands-on resources like exercise files. There’s no limit on what you can learn and you can cancel at any time.
  • Are these video based online self-learning courses?

    Yes. All of the courses comes with online video based lectures created by certified instructors. Instructors have crafted these courses with a blend of high quality interactive videos, lectures, quizzes & real world projects to give you an indepth knowledge about the topic.
  • Can i play & pause the course as per my convenience?

    Yes absolutely & thats one of the advantage of self-paced courses. You can anytime pause or resume the course & come back & forth from one lecture to another lecture, play the videos mulitple times & so on.
  • How do i contact the instructor for any doubts or questions?

    Most of these courses have general questions & answers already covered within the course lectures. However, if you need any further help from the instructor, you can use the inbuilt Chat with Instructor option to send a message to an instructor & they will reply you within 24 hours. You can ask as many questions as you want.
  • Do i need a pc to access the course or can i do it on mobile & tablet as well?

    Brilliant question? Isn't it? You can access the courses on any device like PC, Mobile, Tablet & even on a smart tv. For mobile & a tablet you can download the Learnfly android or an iOS app. If mobile app is not available in your country, you can access the course directly by visting our website, its fully mobile friendly.
  • Do i get any certificate for the courses?

    Yes. Once you complete any course on our platform along with provided assessments by the instructor, you will be eligble to get certificate of course completion.
  • For how long can i access my course on the platform?

    You require an active subscription to access courses on our platform. If your subscription is active, you can access any course on our platform with no restrictions.
  • Is there any free trial?

    Currently, we do not offer any free trial.
  • Can i cancel anytime?

    Yes, you can cancel your subscription at any time. Your subscription will auto-renew until you cancel, but why would you want to?

471036 Course Views

6 Courses

Total Seminars provides certification training services and training materials to thousands of schools, corporations, and government agencies including the United Nations, the FBI and all branches of the Department of Defense. Total Seminars produces the #1 selling CompTIA A+ and Network+ Certification books with over 1 million books in print. Total Seminars has created a number of best-selling video courses by Mike Meyers and the Total Seminars Team of Instructors. They also develop supplemental materials such as the TotalTester certification practice tests and TotalSims lab simulations to support your certification preparation. These are available on the Total Seminars' web site.
View More...
  • Unmatched Variety and Value!
    Learnfly's monthly subscription offers unlimited access to a vast range of courses. Affordable pricing, compared to competitors, makes it the ultimate choice for continuous learning.
    Jessica M.

    4.7

    JM
  • Top-Notch Quality, Affordable Rates!
    High-quality courses with certified instructors make Learnfly stand out. The affordable pricing is a game-changer for those seeking premium education.
    Alex P.

    4.5

    AP
  • Certified Excellence Every Time!
    Learnfly's courses, taught by certified instructors, ensure top-notch learning experiences. The course completion certificates add significant value to one's skill set.
    Sarah R.

    4.3

    SR
  • Round-the-Clock Support!
    Learnfly goes the extra mile with 24/7 course support. Their dedication to helping students succeed is commendable.
    Ryan K.

    4.1

    RK
  • Learn Anywhere, Anytime!
    Whether on mobile, PC, or tablet, Learnfly's platform offers flexibility. Learning on the go has never been easier.
    Emily S.

    4.7

    ES
  • Job-Ready Skills!
    Learnfly's job-oriented courses equip learners with practical skills for the workplace. An investment in career growth!
    Jake M.

    4.2

    JM
  • Budget-Friendly Brilliance!
    Learnfly's pricing is a steal for the quality and variety of courses offered. Quality education without breaking the bank.
    Olivia T.

    4.5

    OT
  • Instructor Excellence Unleashed!
    Learn from the best with Learnfly's certified instructors. The platform ensures that knowledge is imparted by industry experts.
    Daniel L.

    4.0

    DL
  • Achievement Unlocked!
    Learnfly not only offers courses but also recognizes your efforts with course completion certificates. A sense of accomplishment with every course finished.
    Maya H.

    4.6

    MH
  • Learning Revolution!
    Learnfly's platform is a revolution in education. Access to unlimited courses at affordable rates is a game-changer.
    Ethan W.

    4.7

    EW
  • learn-nxtgen-hacking-with-technology

    Learn NxtGen Hacking with Technolog...

    By : Gopikrishna C

    Lectures 80 Beginner 8:29:27
  • tcp-ip-the-complete-course

    TCP/IP: The Complete Course

    By : Lazaro (Laz) Diaz

    Lectures 17 Beginner 1:52:18
  • voip-configuration-and-attacking-hacking

    VoIP Configuration and Attacking (H...

    By : Arpit Mittal

    Lectures 6 Beginner 0:10:40
  • practical-blockchain-smart-contracts-ethereum-solidity

    Practical Blockchain & Smart Contra...

    By : Abhilash Nelson

    Lectures 40 Beginner 4:56:0
  • complete-ethical-hacking-penetration-testing-for-web-apps

    Complete Ethical Hacking & Penetrat...

    By : Abhilash Nelson

    Lectures 30 Beginner 3:28:56
  • the-complete-xmpp-course-chat-server-setup-android-ios-apps

    The Complete XMPP Course: Chat Serv...

    By : Abhilash Nelson

    Lectures 10 Beginner 0:47:3

Students learning on Learnfly works with Fortune 500 companies around the globe.

Sign Up & Start Learning
By signing up, you agree to our Terms of Use and Privacy Policy
Reset Password
Enter your email address and we'll send you a link to reset your password.