Library

Course: CompTIA Network+ Cert.; N10-006. The Total Course

CompTIA Network+ Cert.; N10-006. The Total Course

  • Life Time Access
  • Certificate on Completion
  • Access on Android and iOS App
About this Course

Welcome to the CompTIA Network+ Certification; N10-006. The Total Course from Mike Meyers and Total Seminars.

This course is over 15 hours in length and covers everything you need to know to pass your CompTIA Network+ Certification (N10-006) Exam. The first goal of the course is to make you a good Network Tech and in the process make sure you are ready to pass the CompTIA exam.

The course covers all the exam topics including:

  • Network architectures
  • Cabling and topology
  • Ethernet basics
  • Network installation
  • TCP/IP applications and network protocols
  • Routing
  • Network naming
  • Advanced networking devices
  • IPv6
  • Remote connectivity
  • Wireless networking
  • Virtualization and cloud computing
  • Network operations
  • Managing risk

This is a Total Network+ Course and covers everything a good tech needs to know and prepares you to pass the CompTIA Network+ Certification exam.

Who is the target audience?

  • This course is intended for anyone that is preparing for a network technician position or looking to improve their skills and become CompTIA Network+ Certified. However, it goes beyond that and will give you the skills you need to be a better network tech on the job.
Basic knowledge
  • Basic familiarity with networks.
  • There are no specific prerequisites as the course covers all the topics in detail. However, it’s a good idea to have an understanding of CompTIA A+ Certification topics or to be A+ Certified. You can learn more about A+ Certification topics from our Mike Meyers – Total Seminars CompTIA A+ Certification course on Simpliv.
What you will learn
  • This is a complete and comprehensive CompTIA Network+ Certification (N10-006) course. It is designed to prepare the student to be able to take and pass the certification exam needed to become CompTIA Network+ Certified.
  • Once you complete the course, you will have the knowledge and confidence to pass the exams AND the skills to be a great Network tech. This course is ideal as both a study tool and an on-the-job reference.
  • Your new skills and the CompTIA Network+ Certification will help you land a Network tech job or if you are already a network tech, get that raise or advancement you are seeking.
Curriculum
Number of Lecture: 132
Total Duration: 15:33:05
CompTIA Network+ in a Nutshell
  • Studying for the Exam  

    In this episode, Mike outlines a study strategy for success on the CompTIA Network+ exam. In the process, he describes the exam objectives in some detail.

    You can download the Network+ N10-006 Glossary and exam objectives to see exactly what CompTIA says is covered on the exam. Run your mouse over the video and look for the "Resources Available" link in the upper left corner of the player.

Network Models
  • Meet the Frame  

    In this episode, Mike describes the basic components of networking, such as a NIC and hub, and introduces the primary data encapsulation unit, the frame.

  • The MAC Address  

    In this episode, Mike discusses the basic addressing used for frames, the MAC address. Computers receiving a frame use the destination MAC address to determine whether or not to process the frame.

  • Broadcast vs. Unicast  

    In this episode, Mike describes the typical frame traffic that uses destination and source MAC addresses for communicating over a network. He also shows the broadcast MAC address that all computers connected to the network will process.

  • Hubs vs. Switches  

    Mike presents a short treatise on the differences between hubs and switches.

  • Introduction to IP Addressing  

    In this episode, Mikes introduces logical addressing, a scheme to enable larger groups of computers into networks. Specifically, he discusses IP addresses, the most commonly used addressing scheme today.

  • Packets and Ports  

    Mike discusses how TCP/IP networks use port numbers to keep track of multiple connections between two computers.

  • What is a Model?  

    In this episode, Mike presents the concept of network models.

  • OSI Model vs. TCP/IP Model  

    This episode introduces you to the two models used to describe and troubleshoot networks.

  • OSI and TCP/IP Model Walkthroughs  

    In this episode, Mike takes an Ethernet frame through the processes involved incoming and outgoing, using both the OSI and TCP/IP models for reference.

Cabling and Topology
  • Coaxial Cabling  

    Mike covers the big three of coaxial cabling, the old RG-8 and RG-58, and the commonly used RG-6 used today.

  • UTP and STP Cabling  

    In this episode, Mike details the different types and categories of twisted pair cabling.

  • Fiber Optic Cabling  

    In this episode, Mike discusses the different types of fiber used in modern networks, and includes references to connector types you'll see as a network technician.

Ethernet Basics
  • What is Ethernet?  

    Mike discusses the core technologies of Ethernet.

  • Early Ethernet  

    Here, Mike looks at the bad old days of coax-based Ethernet.

  • The Daddy of Ethernet - 10BaseT  

    Mike looks at how coax-based Ethernet transformed into Etherenet of Unshielded Twisted Pair.

Modern Ethernet
  • Modern Ethernet, Switches, and Duplex  

    In this episode, Mike discusses 100BaseT and other modern versions of Ethernet, as well as how switches work.

  • Connecting Switches  

    Mike discusses how switches are connected together to expand a network.

  • Gigabit Ethernet and 10 Gigabit Ethernet  

    Mike wraps up the Ethernet standards in this episode, covering 1000Base and 10GBase.

  • Switch Backbones  

    In this episode, Mike describes how backbone switches enable varying speed networks to interconnect.

Installing a Physical Network
  • Introduction to Structured Cabling  

    In this episode, Mike examines the basic component of structured cabling, such as an equipment room, horizontal runs, and the work area.

  • Crimping Cables  

    If you've ever wanted to make your own patch cables, watch this episode!

  • Punchdown Blocks  

    In this episode, Mike explores punchdown blocks, one of the key elements in structured cabling.

  • MDF, IDF, Dmarc, and the Equipment Room  

    Mike takes you on a tour of a typical SOHO infrastructure, from the equipment room to the demarc and back again.

  • Testing Cable  

    In this episode, Mike explores cable testing, covering wiremaps, continuity, and TDRs.

  • Troubleshooting Structured Cabling, pt. 1  

    In this episode, Mike shows how to test for problems with structured cabling and explains what types of problems to look out for.

  • Troubleshooting Structured Cabling, pt. 2  

    Mike continues his discussion of structured cabling by examining how to use voltage monitors, environmental/temperature monitors, and TDRs to troubleshoot a cabling installation.

  • Using a Toner and Probe  

    Mike demonstrates using a tone generator and tone probe to locate cables and connectors.

TCP/IP Basics
  • Introduction to IP Addressing and Binary  

    In this episode, Mike takes an in-depth look at how IP addresses are constructed.

  • Introduction to ARP  

    In this episode, Mike explores the address resolution protocol, which is used to resolve IP addresses.

  • Subnet Masks  

    In this episode, Mike introduces the concept of subnet masks, which are used to determine if a packet is coming from inside or outside a network.

  • Classful Addressing  

    In this episode, Mike explains the concept of classful addressing, which separates IP addresses into five classes.

  • Subnetting with CIDR  

    Subnetting with CIDR

  • More CIDR Subnetting Practice  

    In this episode, Mike offers more instruction for subnetting.

  • Dynamic and Static IP Addressing  

    This episode examines the difference between assigning IP addresses manually and using DHCP to pass out addresses automatically.

  • Rogue DHCP Servers  

    In this episode, Mike shows how to check to make sure that your DHCP server is working, as well as how to check that you're not connecting to a rogue DHCP server.

  • Special IP Addresses  

    In this episode, Mike looks at special IP addresses like APIPA addresses, loopback addresses, and private addresses.

Routing
  • Introducing Routers  

    In this episode, Mike explains how routers work to get packets from one network to another.

  • Understanding Ports  

    In this episode, Mike describes the purposes of well-known ports and ephemeral ports.

  • Network Address Translation  

    In this episode, Mike explains NAT, including how it works and why we need it.

  • Implementing NAT  

    Mike demonstrates how to enable and configure NAT withing a router.

  • Port Forwarding  

    Continuing with the NAT discussion, this episode covers port forwarding technology.

  • DMZ, Port Range Forwarding, and Port Triggering  

    In this episode, Mike explains the need for ways to configure a router, including DMZ, port range forwarding, and port triggering.

  • Tour of a SOHO Router  

    In this episode, Mike walks you through setting up a SOHO router. He's like a talking user's manual!

  • Introduction to Routing Protocols  

    Mike introduces you to routing concepts such as metrics and latency. The episode also discusses types of routing protocols, such as distance vector and link state.

  • RIP  

    In this episode, Mike discusses the distance vector routing protocol called Routing Information Protocol.

  • OSPF  

    Continuing with the routing protocol discussion, Mike describes the most common IGP, OSPF.

  • BGP  

    Mike explains the Border Gateway Protocol.

TCP/IP Applications
  • Introduction to TCP and UDP  

    In this episode, Mike explores connection-oriented and connectionless communication on an IP network via the TCP and UDP protocols.

  • ICMP and IGMP  

    In this episode, Mike explains the importance of two of the fundamental protocols used in the Internet Protocol Suite, ICMP and IGMP.

  • Introduction to Wireshark  

    In this episode, Mike introduces the concept of packet sniffing using the free third-party packet-sniffer Wireshark.

  • Introduction to netstat  

    In this episode, Mike demonstrates uses for the powerful netstat command.

  • Web Servers  

    In this episode, Mike takes a look at the computers that host the numberless pictures of cats that make up the Internet.

  • FTP  

    In this episode, Mike discusses the venerable file transfer protocol.

  • E-mail Servers and Clients  

    In this must-see episode for all aspiring spammers out there, Mike explains the various protocols used in sending and receiving e-mail.

  • Telnet and SSH  

    In this episode, Mike looks at the remote connection protocol called telnet, as well as methods for encrypting telnet connections via SSH.

Network Naming
  • The Domain Name System (DNS), Pt. 1  

    This episode begins an overview of the DNS system, which resolves domain names to IP addresses.

  • The Domain Name System (DNS), Pt. 2  

    In this episode, Mike concludes his overview of DNS, covering everything from forward lookup zones to AAAA records.

  • The HOSTS File  

    Take a look back in time at the earliest method for resolving IP addresses: the HOSTS file!

  • Windows Name Resolution  

    In this episode, Mike looks at ways Windows machines figure out names of other computers on the network, through processes like NetBIOS and LLMNR.

  • NET Command  

    In this episode, Mike explores the venerable and still very useful net command to show things such as user names, shared network resources, mapping network drives, and more.

  • Dynamic DNS  

    In this episode, Mike explains how dynamic DNS works.

  • DNS Troubleshooting  

    In this video, Mike shows you what to do if you suspect you're having issues with DNS.

Securing TCP/IP
  • Symmetric Encryption  

    In this episode, Mike explores the simplest type of encryption, symmetric encryption. Both parties have the same key to encrypt and decrypt.

  • Asymmetric Encryption  

    In this episode, Mike describes encryption that uses public and private keys for encrypting and decrypting text.

  • Cryptographic Hashes  

    In this episode, Mike demonstrates how hashes, such as MD5 and SHA-1, work.

  • Access Control  

    In this episode, Mike dives into access control lists, describing the three levels of control commonly used in computing.

  • AAA  

    Mike describes the primary tools for providing network authentication, authorization, and accounting; notably RADIUS and TACACS+.

  • Kerberos/EAP  

    In this episode, Mike discusses two commonly used authentication mechanisms for remote connectivity; Kerberos and EAP.

  • Cryptographic Tunnels with SSH  

    In this episode, Mike explores the process of making secure connections through tunnels.

  • Network Time Protocol  

    In this brief episode, Mike reveals the secret importance of NTP.

Advanced Networking Devices
  • Client/Server vs. Peer-to-Peer  

    In this episode, Mike looks at the two main types of networksclient/server and peer-to-peer.

  • Virtual Private Networks (VPNs)  

    In this episode, Mike explains virtually everything about technology that enables remote clients to connect to a local network, also called a Virtual Private Network (VPN).

  • Introduction to VLANs  

    In this episode, Mike explores the concepts and processes behind virtual LANs, including managed switches and trunking.

  • InterVLAN Routing  

    In this episode, Mike shows how to network between virtual LANs.

  • Interfacing with Managed Switches  

    In this episode, Mike explains how to connect to and configure managed switches.

  • Port Bonding  

    Mike looks at how to improve network throughput from a router by combining traffic onto multiple router ports.

  • Port Mirroring  

    Here, Mike talks about how to duplicate the traffic from one router port to another port.

  • Quality of Service  

    Mike shows how traffic is prioritized to maximize efficiency of communication.

  • IDS vs IPS  

    In this episode, Mike looks at intrusion detection systems and intrusion protection systems.

IPv6
  • Introduction to IPv6 Addressing  

    In this episode, Mike laments the ending of IPv4 and discusses the need for IPv6. He describes IPv6 addresses and shows how to abbreviate them properly.

  • Advanced IPv6 Addressing  

    In this episode, Mike explores automatic and manual IPv6 addressing.

  • IPv6 Tunnels  

    Because most ISPs don't provide IPv6 access, you need to use a tunneling protocol to get to the IPv6 Internet. Mike goes through the processes required.

Remote Connectivity
  • Telephony Technologies  

    In this episode, Mike takes you on a tour of telephony technologies that paved the way for modern remote connectivity.

  • Optical Carriers  

    In this episode, Mike explores the backbone connections of the Internet.

  • Packet Switching  

    Mike discusses several monster technologies of packet switching, such as frame relay, ATM, and MPLS.

  • Connecting with Dial-up  

    In this episode, Mike walks down memory lane, explaining how modems and PPP enable dial-up connectivity.

  • Digital Subscriber Line  

    In this episode, Mike explains xDSL technology and components.

  • Connecting with Cable Modems  

    In this episode, Mike explores cable modems, one of the most common high-speed connection types.

  • Connecting with Satellites  

    In this exciting episode, Mike talks about connecting to the Internet from outer space!

  • Cellular WAN  

    In this episode, Mike discusses WiMax and other cellular networking options, such as HSPA+ and LTE.

  • ISDN and BPL  

    In this episode, Mike looks at two more methods for connecting the Internet, ISDN and BPL.

  • Remote Connectivity  

    In this episode, Mike shows how you can work on computers remotely through the Internet using tools like Tight VNC, Microsoft's RDP, and remote help.

Wireless Networking
  • Introduction to Wi-Fi and Wireless Access Points  

    In this episode, Mike explains the concepts behind wireless networking.

  • 802.11 Standards  

    This episode covers the various wireless networking standards and examines their relative merits.

  • Power Over Ethernet (PoE)  

    In this episode, Mike demonstrates the power of PoE, which provides electricity to network devices through their Ethernet ports.

  • Wireless Security Standards  

    This episode is an overview of the various encryption standards that exist to protect your wireless network.

  • Implementing Wireless Security  

    What good is unimplemented security? In this episode, Mike demonstrates how to secure your wireless network so that your neighbors will stop hogging all your bandwidth.

  • Threats to Your Wireless Network  

    In this episode, Mike covers war driving, war chalking, rogue WAPs, evil twins, and how to protect against them.

  • Retro Threats  

    Mike and Logan time travel back to the days of war driving and war chalking.

  • Wi-Fi Protected Setup (WPS)  

    In this episode, Mike explains the technology behind WPS, a method for easily connecting to a secure wireless network.

  • Wireless Problem Scenarios  

    Mike looks at some of the issues that can arise to topple your wireless network, with a special focus on wireless interference.

  • Planning and Installing a Wireless Network  

    In this episode, Mike goes over the process of setting up a wireless network in a home or small office.

Virtualization and Cloud Computing
  • Virtualization Basics  

    In this episode, Mike introduces virtualization and discusses the benefits of the various types you'll see.

  • Your First Virtual Machine  

    Mike goes through the process of creating a virtual machine and installing an OS into that VM.

  • Infrastructure as a Service (IaaS)  

    Here, Mike looks at Infrastructure as a Service via Amazon Web Services.

  • Platform as a Service (PaaS)  

    Mike shows us the Heroku PaaS.

  • Software as a Service (SaaS)  

    Mike shows us that Software as a Service is all around us with DropBox and others.

  • Cloud Ownership  

    In this episode, Mike discusses the difference between public and private clouds.

Building a Real-World Network
  • Network Types  

    Mike looks at the scope of different scales of networking.

  • Network Design  

    Mike brings in some help to discuss network design aspects.

  • SCADA and ICS  

    Mike looks at Industrial Control Systems and the broader scale Supervisory Control and Data Acquisition technologies.

  • Unified Communications  

    Mike introduces us to the conglomerated world of Unified Communications.

Managing Risk
  • What is Risk Management  

    Mike talks about the Zen of risk management.

  • Security Policies  

    In this episode, Mike demonstrates some example security policies.

  • Change Management  

    Mike shows us how the process of managing change to the netowrk works.

  • User Training  

    In this episode, Mike shows the how, why and when of training users.

  • Points of Failure  

    Mike helps us identify critical assets, critical nodes and how do proactively deal with failures.

  • Standard Business Documentation  

    Mike reminds us that the world of IT is rife with paper.

Protecting Your Network
  • Threats  

    You're not paranoid if they're really out to get you. In this episode, Mike explains the myriad threats that array themselves against your network.

  • Social Engineering  

    In this episode, Mike explores social engineering attacks such as dumpster diving, shoulder surfing, and phishing.

  • Access Controls  

    In this episode, Mike discusses techniques for keeping unwanted users out of your network, focusing on effectively using firewalls.

  • Testing Network Security  

    Learn to scan your network for potential weaknesses in this action-packed episode.

  • Mitigating Network Threats  

    In this episode, Mike examines the methods that an organization can use to protect its network from both external and internal threats.

  • Introduction to Firewalls  

    Mike shows us how to keep bad guys from getting into your network from the outside.

  • Firewalls  

    Mike shows us techniques to use and configure firewalls.

  • DMZ  

    In the episode, Mike reminds us that there is more than one way to do a DMZ.

Network Monitoring
  • SNMP  

    Mike demonstrates a simple but fully functional SNMP network.

  • Documenting Logs  

    In this episode, Mike examines the various log files that techs can use to troubleshoot networks. Botanists and woodworkers may be disappointed by this episode's misleading title.

Network Troubleshooting
  • MTU Problems  

    In this episode, Mike takes a long, hard look at MTU errors, such as the dreaded MTU black hole.

  • Bad Connection Solutions  

    In this episode, Mike looks at the various ways a Network+ tech can solve connection issues.

  • Titanium Tech  

    In this episode, Ford joins Mike for a round of Titanium Tech. Together, they examine the troubleshooting process.

Reviews (0)