Network Essentials: CompTIA + Exam Prep
The Critical Knowledge and Skills That All Techs Need To Effectively Build and Troubleshoot Networks
Instructor : Chip Reaves
The Keys to Improved Network Troubleshooting and Optimization are found in this Course!
Written by Chip Reaves (founder of Computer Troubleshooters) and Harry Brelsford (founder of SMBnation), and featuring Emily Wilson (Owner of Computer Troubleshooters Greensboro)
Networking Essentials is designed to give an experienced Level 1 tech a good foundation in networking technologies, both for real world benefits and to pass the newest CompTIA Network Plus certification (Exam N10-006).
Topics include:
- Network Devices
- The OSI Model
- WAN Technologies
- Wired Connections & Cable Types
- Wireless Connections
- DHCP & DNS
- SNMP, MIB, OID
- IP Addressing Schemas (v4 & v6)
- Unified Communication Technologies
- Ports and Protocols
- Subnetting
- VLANs and Switch Configuration
- Network Segmentation
- Areas of Risk & Attack Vectors
- Firewalls
- Troubleshooting
- Policies and Procedures
Objectives – You will be able to:
- Summarize Switches and VLANS
- Differentiate patches and updates
- distinguish common troubleshooting tools
Course Length
Lessons : 63
Seat Time : 12.5 Hours
Lessons Include:
0-0: Course Introduction (3:49)
1-1: Networking Theory (11:30)
1-2: The OSI Model (15:35)
1-3: Network Topologies (8:59)
1-4: WAN Technologies, part 1 (14:46)
1-5: Wan Technologies, part 2 (20:44)
1-6: Network Devices (14:07)
1-7: Network Concepts, part 1 (16:19)
1-8: Network Concepts, part 2 (14:27)
1-9: Wired Connections (18:25)
1-10: Cable Connectors, part 1 (13:44)
1-11: Cable Connectors, part 2 (15:57)
1-12: Cable Connectors, part 3 (11:28)
1-13: Wireless Connections (8:57)
1-14: Network Access (14:18)
1-15: DHCP and DNS, part 1 (12:19)
1-16: DHCP and DNS, part 2 (17:06)
1-17: Addressing Schema, part 1 (16:13)
1-18: Addressing Schema, part 2 (21:01)
1-19: Routing Protocols (16:31)
1-20: Unified Communication Technologies (8:26)
1-21: Cloud and Virtualization (8:24)
1-22: Cloud and Virtualization, part 2 (10:49)
1-23: Implementing a Network (8:02)
1-24: Ports and Protocols (14:27)
2-1: Monitoring Tools, part 1 (14:40)
2-2: Monitoring Tools, part 2 (8:57)
2-3: Metrics and Reports (10:25)
2-4: Configuration Management (13:36)
2-5: Network Segmentation (11:25)
2-6: Patches and Updates (8:21)
2-7: Switches and VLANs, part 1 (15:11)
1-1: Networking Theory (11:30)
1-2: The OSI Model (15:35)
1-3: Network Topologies (8:59)
1-4: WAN Technologies, part 1 (14:46)
1-5: Wan Technologies, part 2 (20:44)
1-6: Network Devices (14:07)
1-7: Network Concepts, part 1 (16:19)
1-8: Network Concepts, part 2 (14:27)
1-9: Wired Connections (18:25)
1-10: Cable Connectors, part 1 (13:44)
1-11: Cable Connectors, part 2 (15:57)
1-12: Cable Connectors, part 3 (11:28)
1-13: Wireless Connections (8:57)
1-14: Network Access (14:18)
1-15: DHCP and DNS, part 1 (12:19)
1-16: DHCP and DNS, part 2 (17:06)
1-17: Addressing Schema, part 1 (16:13)
1-18: Addressing Schema, part 2 (21:01)
1-19: Routing Protocols (16:31)
1-20: Unified Communication Technologies (8:26)
1-21: Cloud and Virtualization (8:24)
1-22: Cloud and Virtualization, part 2 (10:49)
1-23: Implementing a Network (8:02)
1-24: Ports and Protocols (14:27)
2-1: Monitoring Tools, part 1 (14:40)
2-2: Monitoring Tools, part 2 (8:57)
2-3: Metrics and Reports (10:25)
2-4: Configuration Management (13:36)
2-5: Network Segmentation (11:25)
2-6: Patches and Updates (8:21)
2-7: Switches and VLANs, part 1 (15:11)
2-8: Switches and VLANs, part 2 (11:46)
2-9: Switches and VLANs, part 3 (12:07)
2-10: Wireless Infrastructure, part 1 (13:56)
2-11: Wireless Infrastructure, part 2 (11:50)
3-1: Areas of Risk (11:01)
3-2: Attack Vectors (16:03)
3-3: Attack Vectors, part 2 (13:11)
3-4: Attack Vectors, part 3 (7:57)
3-5: Network Hardening Techniques, part 1 (12:19)
3-6: Network Hardening Technologies, part 2 (13:21)
3-7: Physical Security (6:35)
3-8: Firewalls (10:29)
3-9: Network Access Control (10:46)
3-10: Forensic Concepts (11:34)
4-1: Troubleshooting Methodologies (13:51)
4-2: Troubleshooting Tools (7:50)
4-3: Troubleshooting Tools, part 2 (8:24)
4-4: Troubleshooting Wireless Networks (10:48)
4-5: Troubleshooting Wireless Networks, part 2 (9:07)
4-6: Troubleshooting Copper Cabling (12:59)
4-7: Troubleshooting Fiber Cabling (7:08)
4-8: Troubleshooting Common Network Errors (11:45)
4-9: Troubleshooting Common Network Issues, part 2 (11:10)
4-10: Troubleshooting Common Security Issues (7:13)
4-11: Troubleshooting Common Security Issues, part 2 (9:24)
4-12: Troubleshooting WAN (8:35)
5-1: Policies and Procedures (9:02)
5-2: Safety Policies (12:59)
5-3: Installing and Configuring Equipment (9:41)
5-4: Installing and Configuring Equipment, part 2 (8:41)
5-5: Change Management (7:54)
2-9: Switches and VLANs, part 3 (12:07)
2-10: Wireless Infrastructure, part 1 (13:56)
2-11: Wireless Infrastructure, part 2 (11:50)
3-1: Areas of Risk (11:01)
3-2: Attack Vectors (16:03)
3-3: Attack Vectors, part 2 (13:11)
3-4: Attack Vectors, part 3 (7:57)
3-5: Network Hardening Techniques, part 1 (12:19)
3-6: Network Hardening Technologies, part 2 (13:21)
3-7: Physical Security (6:35)
3-8: Firewalls (10:29)
3-9: Network Access Control (10:46)
3-10: Forensic Concepts (11:34)
4-1: Troubleshooting Methodologies (13:51)
4-2: Troubleshooting Tools (7:50)
4-3: Troubleshooting Tools, part 2 (8:24)
4-4: Troubleshooting Wireless Networks (10:48)
4-5: Troubleshooting Wireless Networks, part 2 (9:07)
4-6: Troubleshooting Copper Cabling (12:59)
4-7: Troubleshooting Fiber Cabling (7:08)
4-8: Troubleshooting Common Network Errors (11:45)
4-9: Troubleshooting Common Network Issues, part 2 (11:10)
4-10: Troubleshooting Common Security Issues (7:13)
4-11: Troubleshooting Common Security Issues, part 2 (9:24)
4-12: Troubleshooting WAN (8:35)
5-1: Policies and Procedures (9:02)
5-2: Safety Policies (12:59)
5-3: Installing and Configuring Equipment (9:41)
5-4: Installing and Configuring Equipment, part 2 (8:41)
5-5: Change Management (7:54)
Trusted by Aspiring IT Professionals, Corporations and
Government agencies for more than a Decade
Get unlimited online access learn anywhere, anytime using your computer or mobile device!