Wireless networking and the internet

In this course, you will learn all about wireless networking including Wi-Fi standards, how to setup and configure a wireless access point (WAP), encrypting your traffic for security and privacy, and troubleshooting your wireless network.


  • Wireless network hardware Video — 00:10:28
    • The 802.11 standard has had a number of improvements over the years, but every version shares common devices and functions that haven’t changed in over 20 years. This video explores wireless access points (WAPs), home routers, and the antennas that make t

  • Wi-fi standards Video — 00:09:22
    • Since the original 802.11 standard back in 1999, there have been five major and hundreds of minor revisions. It’s impossible to support an 802.11 network without a working understanding of these standards.

  • Basic WAP setup Video — 00:10:58
    • The standard wireless access point (WAP) doesn’t just work out of the box. It’s important to understand how to perform a basic setup for a WAP to make sure it operates properly in your network.

  • Wireless encryption Video — 00:10:29
    • Everything on an unencrypted (open) wireless network is easily intercepted by anyone with the right capture tools. Over the years, 802.11 has developed three different encryption standards, each with its own idiosyncrasies, strengths, and weaknesses.

  • Connecting to a Wi-fi network Video — 00:08:33
    • The best 802.11 network is useless unless your users can connect to it. Smartphones, desktops, IoT devices, and other networked gizmos need to be individually configured to access your 802.11 network.

  • It’s a huge mesh Video — 00:04:07
    • Mesh networking is here and gaining in popularity daily. But what does mesh networking do for your 802.11 network? Where do you use it and how is it deployed?

  • Enterprise wireless Video — 00:15:30
    • There’s a big difference between the 802.11 network in your home and small office vs. 802.11 in larger organization such as businesses, schools and government offices. Multiple SSIDS, advanced technologies, and more aggressive authentication and encryptio

  • Beyond Wi-fi Video — 00:06:38
    • The 802.11 standard isn’t the only wireless out there today. Standards such as Bluetooth, RFID and NFC also need the support of good techs.

  • Troubleshooting wireless connections Video — 00:06:50
    • There are few worse feelings than a wireless connection that just doesn’t…connect. In situations like this, good techs will have the right tools and skills to diagnose and repair the issue.

  • Beyond the LAN Video — 00:02:45
    • In this video, Mike explores the crazy acronym soup around networking, explaining the differences among terms like LAN, WAN, MAN, PAN, and HAM. (Just kidding on the last term!) This helps minimize confusion in later networking episodes.

  • Internet tiers Video — 00:05:50
    • In this video, Mike discusses the structure of the Internet. Starting with the Tier 1 carriers, he shows how carriers at each layer relate to their peers and also how they interact with Tiers above and customers below. This vide provides a good structure

  • Broadband connections Video — 00:11:15
    • In this video, Mike explores common always-on broadband connections to the Internet. Starting with DSL, we also look at fiber, cable, satellite, and 802.11 Wi-Fi.

  • Firewalls and servers Video — 00:06:04
    • In this video, Mike begins the discussion of Application-layer protocols. Starting with a review of the interaction between IP packets and servers, the video analyzes the functions of local and server-based firewalls.

  • Telnet and SSH Video — 00:06:47
    • The Telnet and SSH protocols enable techs to access and control hosts remotely using the command-line interface in Windows. Telnet offers no security. SSH connections are encrypted for better security.

  • Remote desktop connections Video — 00:07:49
    • The Remote Desktop Protocol (RDP) enables you to connect to a remote Windows system and control it using the graphical user interface. Virtual Network Computing (VNC) enables you to connect to all sorts of computers, including Windows, Linux, and Mac, and

  • The world wide web Video — 00:08:55
    • The web puts a graphical face on the Internet. You access it via a web browser, connecting with HTTP (insecure) or HTTPS (secure). Certificates give you a resource for whether or not a website can be trusted.

  • File transfer protocol (FTP) Video — 00:08:18
    • In this video, Mike tackles one of the earliest and most common protocols for moving files, File Transfer Protocol (FTP). He explores how FTP works, including passive mode and active mode, and port triggering.

  • E-mail Video — 00:07:31
    • Continuing with the Application-layer protocols, this video explores e-mail. Mike covers the three classic e-mail protocols, SMTP for sending and POP3 and IMAP4 for receiving. The video covers typical client configuration using the classic protocols and p

  • Proxy servers Video — 00:06:12
    • In this video, Mike describes how proxy servers work to block certain web sites and filter outgoing or incoming content. The video shows how to set up a browser to connect to a proxy server.

  • Virtual private networks (VPNs) Video — 00:07:49
    • In this video, Mike shows how Virtual Private Networks (VPNs) work and why people use VPN connections. He discusses the types of protocols and clients that make this work today and walks through a generic VPN setup.

  • Internet of Things (IoT) Video — 00:03:36
    • Mike explores some of the latest and greatest networking technologies with the Internet of Things (IoT). He describes the three common wireless technologies used to connect to IoT devices, 802.11, Zigbee, and Z-wave. Mike finishes with a discussion and de

  • Troubleshooting internet connections Video — 00:06:47
    • The CompTIA A+ exams have many network troubleshooting scenario questions. The Great Mikestrami gives you a few rules to help you get through these questions. In addition, a few basic tools and preparation makes troubleshooting most problems easy if not t

  • Browser security Video — 00:09:15
    • With the variety of browsers available to download, it’s important to know where the trusted sources are. There are also many other important features to browsers such as extensions and plugins, settings, ad blockers, password managers, and more.


Course description

Next, you’ll dive into the fascinating world of the Internet and learn how it all got started, and the differences between cable, fiber, satellite, and 802.11 wireless. You’ll round out this course by understanding other connection protocols such as Telnet, SSH, Remote Desktop Protocol (RDP), File Transfer Protocol (FTP), e-mail, virtual private networks (VPNs), and finally the Internet of Things (IoT).

Meet the author

Mike Meyers, affectionately called the “Alpha Geek,” is the industry’s leading authority on CompTIA certifications. He is the president and co-founder of Total Seminars, LLC, a provider of PC and network repair seminars, books, videos and courseware for thousands of organizations throughout the world. Mike has been involved in the computer and network repair industry since 1987 as a technician, instructor, author, consultant and speaker. He has sold over a million IT and certification books, including the best-selling CompTIA A+ Certification All-in-One Exam Guide and CompTIA Network+ Certification All-in-One Exam Guide. He has personally taught thousands of students, including U.S. senators, U.S. Supreme Court Justices, members of the United Nation, every branch of the U.S. Armed Forces, many branches of the Department of Justice, hundreds of corporate clients and academic students at every level.

You're in good company


We use Infosec Skills to provide continuous training to our technicians and to prepare them for various certifications. Infosec Skills allows us to create personalized training programs that focus on each of our technicians’ particular roles and see their progress as they take courses. We also, recommend it to clients to make their IT support teams better.

Caleb Yankus


This has been utilized to bridge the skills gap across our cyber team and to aid them as they prepare for their various certifications. It also has provided a nice learning foundation for our various cyber team members to utilize as we continue to find ways for cross-utilization with operations while minimizing the downtime needed to ensure everyone’s knowledge is the same.

Daniel Simpson


We use Infosec Skills to provide base level knowledge for employees. We also use the services to provide in depth learning for employees as they encounter new technologies. If an employee is is assigned to a new project, we can rely on Infosec Skills to provide a rapid concentrated learning environment. This rapid concentrated learning positions our employees for success.

Infosec Skills Teams client

Plans & pricing

  • Infosec Skills Personal

    $299 / year

    • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
    • 100s of hands-on labs in cloud-hosted cyber ranges
    • Custom certification practice exams (e.g., CISSP, Security+)
    • Skill assessments
    • Infosec peer community support
  • Infosec Skills Teams

    $799 per license / year

    • Team administration and reporting
    • Dedicated client success manager
    • Single sign-on (SSO)
      Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
    • Integrations via API
      Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
    • 190+ role-guided learning paths and assessments (e.g., Incident Response)
    • 100s of hands-on labs in cloud-hosted cyber ranges
    • Create and assign custom learning paths
    • Custom certification practice exams (e.g., CISSP, CISA)
    • Optional upgrade: Guarantee team certification with live boot camps

Unlock 7 days of free training

  • 1,400+ hands-on courses and labs
  • Certification practice exams
  • Skill assessments

Award-winning training that you can trust

Comprehensive Cybersecurity Training - Infosec Skills
Cybersecurity Education and Training Gold Award - Infosec IQ
Top Rated Award - Infosec Skills
2021 G2 Summer - Leader - Tech Skills Dev, Online Course, eLearning Content
Top 20 Company - Online Learning Library