Network Essentials: CompTIA + Exam Prep

The Critical Knowledge and Skills That All Techs Need To Effectively Build and Troubleshoot Networks

Instructor : Chip Reaves

The Keys to Improved Network Troubleshooting and Optimization are found in this Course!

Written by Chip Reaves (founder of Computer Troubleshooters) and Harry Brelsford (founder of SMBnation), and featuring Emily Wilson (Owner of Computer Troubleshooters Greensboro)

Networking Essentials is designed to give an experienced Level 1 tech a good foundation in networking technologies, both for real world benefits and to pass the newest CompTIA Network Plus certification (Exam N10-006).

Topics include:

  • Network Devices
  • The OSI Model
  • WAN Technologies
  • Wired Connections & Cable Types
  • Wireless Connections
  • DHCP & DNS
  • SNMP, MIB, OID
  • IP Addressing Schemas (v4 & v6)
  • Unified Communication Technologies
  • Ports and Protocols
  • Subnetting
  • VLANs and Switch Configuration
  • Network Segmentation
  • Areas of Risk & Attack Vectors
  • Firewalls
  • Troubleshooting
  • Policies and Procedures

Objectives – You will be able to:

  • Summarize Switches and VLANS
  • Differentiate patches and updates
  • distinguish common troubleshooting tools

Course Length

Lessons : 63
Seat Time : 12.5 Hours

Lessons Include:

0-0: Course Introduction (3:49)
1-1: Networking Theory (11:30)
1-2: The OSI Model (15:35)
1-3: Network Topologies (8:59)
1-4: WAN Technologies, part 1 (14:46)
1-5: Wan Technologies, part 2 (20:44)
1-6: Network Devices (14:07)
1-7: Network Concepts, part 1 (16:19)
1-8: Network Concepts, part 2 (14:27)
1-9: Wired Connections (18:25)
1-10: Cable Connectors, part 1 (13:44)
1-11: Cable Connectors, part 2 (15:57)
1-12: Cable Connectors, part 3 (11:28)
1-13: Wireless Connections (8:57)
1-14: Network Access (14:18)
1-15: DHCP and DNS, part 1 (12:19)
1-16: DHCP and DNS, part 2 (17:06)
1-17: Addressing Schema, part 1 (16:13)
1-18: Addressing Schema, part 2 (21:01)
1-19: Routing Protocols (16:31)
1-20: Unified Communication Technologies (8:26)
1-21: Cloud and Virtualization (8:24)
1-22: Cloud and Virtualization, part 2 (10:49)
1-23: Implementing a Network (8:02)
1-24: Ports and Protocols (14:27)
2-1: Monitoring Tools, part 1 (14:40)
2-2: Monitoring Tools, part 2 (8:57)
2-3: Metrics and Reports (10:25)
2-4: Configuration Management (13:36)
2-5: Network Segmentation (11:25)
2-6: Patches and Updates (8:21)
2-7: Switches and VLANs, part 1 (15:11)
2-8: Switches and VLANs, part 2 (11:46)
2-9: Switches and VLANs, part 3 (12:07)
2-10: Wireless Infrastructure, part 1 (13:56)
2-11: Wireless Infrastructure, part 2 (11:50)
3-1: Areas of Risk (11:01)
3-2: Attack Vectors (16:03)
3-3: Attack Vectors, part 2 (13:11)
3-4: Attack Vectors, part 3 (7:57)
3-5: Network Hardening Techniques, part 1 (12:19)
3-6: Network Hardening Technologies, part 2 (13:21)
3-7: Physical Security (6:35)
3-8: Firewalls (10:29)
3-9: Network Access Control (10:46)
3-10: Forensic Concepts (11:34)
4-1: Troubleshooting Methodologies (13:51)
4-2: Troubleshooting Tools (7:50)
4-3: Troubleshooting Tools, part 2 (8:24)
4-4: Troubleshooting Wireless Networks (10:48)
4-5: Troubleshooting Wireless Networks, part 2 (9:07)
4-6: Troubleshooting Copper Cabling (12:59)
4-7: Troubleshooting Fiber Cabling (7:08)
4-8: Troubleshooting Common Network Errors (11:45)
4-9: Troubleshooting Common Network Issues, part 2 (11:10)
4-10: Troubleshooting Common Security Issues (7:13)
4-11: Troubleshooting Common Security Issues, part 2 (9:24)
4-12: Troubleshooting WAN (8:35)
5-1: Policies and Procedures (9:02)
5-2: Safety Policies (12:59)
5-3: Installing and Configuring Equipment (9:41)
5-4: Installing and Configuring Equipment, part 2 (8:41)
5-5: Change Management (7:54)

Trusted by Aspiring IT Professionals, Corporations and
Government agencies
for more than a Decade

Get unlimited online access learn anywhere, anytime using your computer or mobile device!