Welcome to the TOTAL: CompTIA Network+ Certification (N10-008) course from Mike Meyers, Joe Ramm, and Total Seminars.
Mike is a CompTIA expert and best-selling author with over 25 years of experience teaching and creating certification prep materials. He is the author of the #1 selling CompTIA Network+ Certification All-in-One Exam Guide. Mike has sold over 1 million CompTIA certification prep books. Joe is an enthusiastic instructor with over 20 years of experience teaching and a master's degree in Instructional Design.
Welcome to the TOTAL: CompTIA Network+ Certification (N10-008) course from Mike Meyers, Joe Ramm, and Total Seminars.
Mike is a CompTIA expert and best-selling author with over 25 years of experience teaching and creating certification prep materials. He is the author of the #1 selling CompTIA Network+ Certification All-in-One Exam Guide. Mike has sold over 1 million CompTIA certification prep books. Joe is an enthusiastic instructor with over 20 years of experience teaching and a master's degree in Instructional Design.
Since the requirements and costs are high (the exam voucher is $358), you'll want to make sure you're prepared to pass the exam the first time and never pay full price. This course will prepare you and then you can get discounted exam vouchers at the Total Seminars website.
This course is over 21 hours in length and covers everything you need to know to pass your CompTIA Network+ Certification (N10-008) Exam. The first goal of the course is to make you a good Network Tech and, in the process, make sure you are ready to pass the CompTIA exam.
You'll love Mike and Joe's fun and engaging style as they walk you through all the Network+ topics. This is not a boring voice-over-PowerPoint lecture. Mike and Joe use props and illustrations to make learning fun.
5 months. I had no IT experience 4 months ago. Now I am a network engineer at a managed service provider with a great salary and solid upward mobility." - Ryan D.
The course covers all the exam topics including:
Network architectures
Cabling and topology
Ethernet basics
Network Installation
TCP/IP applications and network protocols
Routing
Network naming
Advanced networking devices
IPv6
Remote connectivity
Wireless networking
Virtualization and cloud computing
Network operations
Managing risk
The Network+ N10-008 exam covers these objectives:
0 Networking Fundamentals 24%2.0 Network Implementation 19%3.0 Network Operations 16%4.0 Network Security 19%5.0 Network Troubleshooting 22%
Introduction to the CompTIA Network+ (N10-008) video course.
This episode covers the existing and updated exam objectives.
Once you've passed your Network+ exam, what kinds of jobs can you get with this certification?
In this episode, Mike presents the concept of network models.
This episode introduces the two models used to describe and troubleshoot networks.
In this episode, Mike introduces the primary data encapsulation unit, the frame.
In this episode, Mike discusses the basic addressing used for frames, the MAC address. Computers receiving a frame use the destination MAC address to determine whether to process the frame.
In this episode, Mike describes the typical frame traffic that uses destination and source MAC addresses for communicating over a network. He also shows the broadcast MAC address that all computers connected to the network will process.
In this episode, Mike introduces logical addressing to enable communication between groups of computers within networks.
Mike discusses how TCP/IP networks use port numbers to keep track of multiple connections between computers.
In this episode, Joe explains the concepts used in wired network topologies and describes the logical flow of data.
In this episode, learn the specifications and connector types associated with coaxial cable.
Joe covers the 568A/568B wiring schema using twisted pair cable.
In this episode, Mike discusses the different types of fiber used in modern networks and includes references to connector types you'll see as a network technician.
In this episode, Mike describes the various fire ratings of cable and explains their intended site usage.
Mike discusses the core technologies of Ethernet.
Understand the Ethernet frame, its components, and how they are used by the various devices to route data traffic.
In this episode, Joe terminates a cable to the 568B specification, showing the preparation and crimping process.
Mike explains the difference of traffic patterns between hubs and switches, and how the MAC address is used by switches.
Joe explains how to connect switches together to expand your network.
In this episode, various 100Base specifications are defined for speed and distance.
Mike wraps up the Ethernet standards in this episode, covering 1000Base and 10GBase.
Learn about the various types of transceivers and how they are specified as vendor-neutral devices.
Learn about different cabling or switch configuration issues that can be difficult to diagnose.
In this episode, Mike examines the basic components of structured cabling, such as an equipment room, horizontal runs, and the work area.
In this episode, Mike explores punchdown blocks, one of the key elements in structured cabling.
Mike takes you on a tour of a typical SOHO infrastructure, from the equipment room to the demarc and back again.
Mike hangs out in the equipment room to show the distribution panels.
In this episode, Mike explores cable testing, covering wiremaps, continuity, and TDRs.
In this episode, Joe shows how to test for problems with structured cabling and explains what types of problems to look out for.
Joe continues his discussion of structured cabling by examining how to use voltage monitors, environmental/temperature monitors, and TDRs to troubleshoot a cabling installation.
Mike demonstrates using a tone generator and tone probe to locate cables and connectors.
Wired connections can have issues that lead to slow or poor performance and Mike talks through some common areas to consider.
In this episode, Mike takes an in-depth look at how IP addresses are constructed.
In this episode, Mike explores the address resolution protocol, which is used to resolve IP addresses.
In this episode, Mike introduces the concept of subnet masks, which are used to determine if a packet is coming from inside or outside a network.
In this episode, Mike explains the concept of classful addressing, which separates IP addresses into five classes.
In this episode, Mike demonstrates how to subnet in binary.
In this episode, Mike offers more instruction for subnetting.
This episode examines the difference between assigning IP addresses manually and using DHCP to pass out addresses automatically.
Learn about special IP addresses, which ones are reserved, and what the 169.254.x.x address is.
Mike walks through some issues in IP addressing, including when everything should be working, but connection issues are prevalent.
In this episode, Mike explains how routers work to get packets from one network to another.
In this episode, Mike describes the purposes of well-known ports and ephemeral ports.
In this episode, Mike explains NAT, including how it works and why we need it.
Mike demonstrates how to enable and configure NAT within a router.
Learn about port forwarding, its usage, and how to create ranges and triggers to allow external devices to have internal communication.
In this episode, Mike walks you through setting up a SOHO router. He's like a talking user's manual.
In this episode, learn the major differences between and SOHO and enterprise routers.
In this episode, Mike discusses static routes and explains their usage and the routing tables that use them.
Mike introduces you to routing concepts such as metrics and latency. The episode also discusses types of routing protocols, such as distance vector and link state.
In this episode, Mike discusses the distance vector routing protocol called Routing Information Protocol.
Continuing with the routing protocol discussion, Mike describes the most common IGP, OSPF.
Mike explains the Border Gateway Protocol (BGP).
In this episode, Mike discusses TCP (connection-based) and UDP (connectionless) protocols.
In this episode, Mike explains the importance of two of the fundamental protocols used in the Internet Protocol Suite, Internet Control Message Protocol (ICMP) and Internet Group Message Protocol (IGMP).
Explore the various tools that can get quick answers when troubleshooting a network latency issue.
In this episode, Mike goes through a captured data stream using the Wireshark tool.
In this episode, Mike demonstrates uses for the powerful netstat command.
In this episode, Mike discusses Web servers and some of the requirements and protocols used.
In this episode, Mike discusses the venerable file transfer protocol.
In this must-see episode for all aspiring spammers out there, Mike explains the various protocols used in sending and receiving e-mail.
In this episode, Mike discusses the various ways to secure e-mail.
In this episode, Mike looks at the remote connection protocol called telnet, as well as methods for encrypting telnet connections via SSH.
Joe goes over how we synchronize time with all our devices using NTP.
In this episode, Mike works though some known issues for network service problems.
This episode begins an overview of the DNS system, which resolves domain names to IP addresses.
In this episode, Mike works with DNS and discusses the various record types that are available, what their purpose is, and how they can be used.
In this episode, Mike explores the venerable and still very useful net command to show things such as user names, shared network resources, mapping network drives, and more.
In this episode, Mike looks at ways Windows machines figure out names of other computers on the network, through processes like NetBIOS and LLMNR.
In this episode, Mike explains how dynamic DNS works.
In this video, Mike shows you what to do if you suspect you're having issues with DNS.
Learn about the three core areas that provide security and access to TCP data to create a strong security program.
In this episode, Mike explores the simplest type of encryption, symmetric encryption. Both parties have the same key to encrypt and decrypt.
In this episode, Mike describes encryption that uses public and private keys for encrypting and decrypting text.
In this episode, Mike demonstrates how hashes, such as MD5 and SHA-1, work.
In this episode, Mike explains the issues of proving that you are who you are.
In this episode, Mike dives into access control lists, describing the three levels of control commonly used in computing.
Mike describes the primary tools for providing network authentication, authorization, and accounting; notably RADIUS and TACACS+.
In this episode, Mike discusses two commonly used authentication mechanisms for remote connectivity; Kerberos and EAP.
In this episode, Mike describes how to log in to one computer and gain access to many.
OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.
Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.
Find this site helpful? Tell a friend about us.
We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.
Your purchases help us maintain our catalog and keep our servers humming without ads.
Thank you for supporting OpenCourser.