Find online courses made by experts from around the world.
Take your courses with you and learn anywhere, anytime.
Learn and practice real-world skills and achieve your goals.
Welcome to the CompTIA Network+ Certification; N10-006. The Total Course from Mike Meyers and Total Seminars.
This course is over 15 hours in length and covers everything you need to know to pass your CompTIA Network+ Certification (N10-006) Exam. The first goal of the course is to make you a good Network Tech and in the process make sure you are ready to pass the CompTIA exam.
The course covers all the exam topics including:
This is a Total Network+ Course and covers everything a good tech needs to know and prepares you to pass the CompTIA Network+ Certification exam.
Not for you? No problem.
30 day money back guarantee.
Learn on the go.
Desktop, iOS and Android.
Certificate of completion.
|Section 1: CompTIA Network+ in a Nutshell|
In this episode, Mike outlines a study strategy for success on the CompTIA Network+ exam. In the process, he describes the exam objectives in some detail.
You can download the Network+ N10-006 Glossary and exam objectives to see exactly what CompTIA says is covered on the exam. Run your mouse over the video and look for the "Resources Available" link in the upper left corner of the player.
|Section 2: Network Models|
|In this episode, Mike describes the basic components of networking, such as a NIC and hub, and introduces the primary data encapsulation unit, the frame.|
|In this episode, Mike discusses the basic addressing used for frames, the MAC address. Computers receiving a frame use the destination MAC address to determine whether or not to process the frame.|
|In this episode, Mike describes the typical frame traffic that uses destination and source MAC addresses for communicating over a network. He also shows the broadcast MAC address that all computers connected to the network will process.|
|Mike presents a short treatise on the differences between hubs and switches.|
|In this episode, Mikes introduces logical addressing, a scheme to enable larger groups of computers into networks. Specifically, he discusses IP addresses, the most commonly used addressing scheme today.|
|Mike discusses how TCP/IP networks use port numbers to keep track of multiple connections between two computers.|
|In this episode, Mike presents the concept of network models.|
This episode introduces you to the two models used to describe and troubleshoot networks.
In this episode, Mike takes an Ethernet frame through the processes involved incoming and outgoing, using both the OSI and TCP/IP models for reference.
|Section 3: Cabling and Topology|
|Mike covers the big three of coaxial cabling, the old RG-8 and RG-58, and the commonly used RG-6 used today.|
In this episode, Mike details the different types and categories of twisted pair cabling.
|In this episode, Mike discusses the different types of fiber used in modern networks, and includes references to connector types you'll see as a network technician.|
Cabling and Topology
|Section 4: Ethernet Basics|
Mike discusses the core technologies of Ethernet
|Here, Mike looks at the bad old days of coax-based Ethernet|
|Mike looks at how coax-based Ethernet transformed into Etherenet of Unshielded Twisted Pair|
|Section 5: Modern Ethernet|
|In this episode, Mike discusses 100BaseT and other modern versions of Ethernet, as well as how switches work.|
|Mike discusses how switches are connected together to expand a network.|
|Mike wraps up the Ethernet standards in this episode, covering 1000Base and 10GBase.|
|In this episode, Mike describes how backbone switches enable varying speed networks to interconnect.|
|Section 6: Installing a Physical Network|
|In this episode, Mike examines the basic component of structured cabling, such as an equipment room, horizontal runs, and the work area.|
|If you've ever wanted to make your own patch cables, watch this episode!|
|In this episode, Mike explores punchdown blocks, one of the key elements in structured cabling.|
Mike takes you on a tour of a typical SOHO infrastructure, from the equipment room to the demarc and back again.
|In this episode, Mike explores cable testing, covering wiremaps, continuity, and TDRs.|
In this episode, Mike shows how to test for problems with structured cabling and explains what types of problems to look out for.
Mike continues his discussion of structured cabling by examining how to use voltage monitors, environmental/temperature monitors, and TDRs to troubleshoot a cabling installation.
|Mike demonstrates using a tone generator and tone probe to locate cables and connectors.|
Installing a Physical Network
|Section 7: TCP/IP Basics|
In this episode, Mike takes an in-depth look at how IP addresses are constructed.
In this episode, Mike explores the address resolution protocol, which is used to resolve IP addresses.
|In this episode, Mike introduces the concept of subnet masks, which are used to determine if a packet is coming from inside or outside a network.|
|In this episode, Mike explains the concept of classful addressing, which separates IP addresses into five classes.|
|In this episode, Mike demonstrates how to subnet in binary.|
|In this episode, Mike offers more instruction for subnetting.|
|This episode examines the difference between assigning IP addresses manually and using DHCP to pass out addresses automatically.|
|In this episode, Mike shows how to check to make sure that your DHCP server is working, as well as how to check that you're not connecting to a rogue DHCP server.|
|In this episode, Mike looks at special IP addresses like APIPA addresses, loopback addresses, and private addresses.|
|Section 8: Routing|
In this episode, Mike explains how routers work to get packets from one network to another.
In this episode, Mike describes the purposes of well-known ports and ephemeral ports.
|In this episode, Mike explains NAT, including how it works and why we need it.|
|Mike demonstrates how to enable and configure NAT withing a router.|
|Continuing with the NAT discussion, this episode covers port forwarding technology.|
|In this episode, Mike explains the need for ways to configure a router, including DMZ, port range forwarding, and port triggering.|
In this episode, Mike walks you through setting up a SOHO router. He's like a talking user's manual!
Mike introduces you to routing concepts such as metrics and latency. The episode also discusses types of routing protocols, such as distance vector and link state.
In this episode, Mike discusses the distance vector routing protocol called Routing Information Protocol.
Continuing with the routing protocol discussion, Mike describes the most common IGP, OSPF.
|Mike explains the Border Gateway Protocol|
|Section 9: TCP/IP Applications|
In this episode, Mike explores connection-oriented and connectionless communication on an IP network via the TCP and UDP protocols.
|In this episode, Mike explains the importance of two of the fundamental protocols used in the Internet Protocol Suite, ICMP and IGMP.|
|In this episode, Mike introduces the concept of packet sniffing using the free third-party packet-sniffer Wireshark.|
|In this episode, Mike demonstrates uses for the powerful netstat command.|
In this episode, Mike takes a look at the computers that host the numberless pictures of cats that make up the Internet.
|In this episode, Mike discusses the venerable file transfer protocol.|
|In this must-see episode for all aspiring spammers out there, Mike explains the various protocols used in sending and receiving e-mail.|
|In this episode, Mike looks at the remote connection protocol called telnet, as well as methods for encrypting telnet connections via SSH.|
|Section 10: Network Naming|
This episode begins an overview of the DNS system, which resolves domain names to IP addresses.
In this episode, Mike concludes his overview of DNS, covering everything from forward lookup zones to AAAA records.
Take a look back in time at the earliest method for resolving IP addresses: the HOSTS file!
|In this episode, Mike demonstrates how to use the powerful nbtstat command and its switches.|
|In this episode, Mike explains how dynamic DNS works.|
|In this video, Mike shows you what to do if you suspect you're having issues with DNS.|
|Section 11: Securing TCP/IP|
In this episode, Mike explores the simplest type of encryption, symmetric encryption. Both parties have the same key to encrypt and decrypt.
|In this episode, Mike describes encryption that uses public and private keys for encrypting and decrypting text.|
|In this episode, Mike demonstrates how hashes, such as MD5 and SHA-1, work.|
In this episode, Mike dives into access control lists, describing the three levels of control commonly used in computing.
Mike describes the primary tools for providing network authentication, authorization, and accounting; notably RADIUS and TACACS+.
|In this episode, Mike discusses two commonly used authentication mechanisms for remote connectivity; Kerberos and EAP.|
In this episode, Mike explores the process of making secure connections through tunnels.
|In this brief episode, Mike reveals the secret importance of NTP.|
|Section 12: Advanced Networking Devices|
|In this episode, Mike looks at the two main types of networksclient/server and peer-to-peer.|
|In this episode, Mike explains virtually everything about technology that enables remote clients to connect to a local network, also called a Virtual Private Network (VPN).|
|In this episode, Mike explores the concepts and processes behind virtual LANs, including managed switches and trunking.|
|In this episode, Mike shows how to network between virtual LANs.|
|In this episode, Mike explains how to connect to and configure managed switches.|
|Mike looks at how to improve network throughput from a router by combining traffic onto multiple router ports.|
|Here, Mike talks about how to duplicate the traffic from one router port to another port.|
Mike shows how traffic is prioritized to maximize efficiency of communication.
Mike Meyers, affectionately called the "Alpha Geek", is the Industry's leading authority on CompTIA Certifications. He is the President and co-founder of Total Seminars, LLC, a provider of PC and network repair seminars, books, videos and courseware for thousands of organizations throughout the world. Mike has been involved in the computer and network repair industry since 1987 as a technician, instructor, author, consultant, and speaker.
Author of numerous popular PC books and videos, including the best-selling CompTIA A+ Certification All-in-One Exam Guide and CompTIA Network+ Certification All-in-One Exam Guide. Mike is also the series editor for the highly successful Mike Meyers' Certification Passport series and the Mike Meyers' Guide to series, all published by McGraw-Hill. Mike has sold over a million IT and certification books.
As well as writing Mike has personally taught thousands of students, including U.S. senators, U.S. Supreme Court Justices, members of the United Nation, every banch of the U.S. Armed Forces, many branches of the Department of Justice, hundreds of corporate clients and academic students at every level.
Mike's humorous and easy to follow approach to teaching comes through in his video training courses as well as his classroom instructor led courses. Making IT concepts easy to understand and fun to learn helps students stay engaged and retain the information.
Mike brings his unique style of video training to Udemy with the launch of his CompTIA A+ Certification and Network+ Certification courses. Check out the first few lessons which are available free and you will quickly see what is different about Mike's approach to learning. Also watch for more titles by Mike and Total Seminars, coming soon.