Wireless networking and the internet Course

In this course, you will learn all about wireless networking including Wi-Fi standards, how to setup and configure a wireless access point (WAP), encrypting your traffic for security and privacy, and troubleshooting your wireless network.

3 hours, 2 minutes

Course description

Next, you'll dive into the fascinating world of the Internet and learn how it all got started, and the differences between cable, fiber, satellite, and 802.11 wireless. You'll round out this course by understanding other connection protocols such as Telnet, SSH, Remote Desktop Protocol (RDP), File Transfer Protocol (FTP), e-mail, virtual private networks (VPNs), and finally the Internet of Things (IoT).

Syllabus

Browser security

Video - 00:09:00

With the variety of browsers available to download, it’s important to know where the trusted sources are. There are also many other important features to browsers such as extensions and plugins, settings, ad blockers, password managers, and more.
Troubleshooting internet connections

Video - 00:07:00

The CompTIA A+ exams have many network troubleshooting scenario questions. The Great Mikestrami gives you a few rules to help you get through these questions. In addition, a few basic tools and preparation makes troubleshooting most problems easy if not trivial.
Internet of Things (IoT)

Video - 00:04:00

Mike explores some of the latest and greatest networking technologies with the Internet of Things (IoT). He describes the three common wireless technologies used to connect to IoT devices, 802.11, Zigbee, and Z-wave. Mike finishes with a discussion and demonstration of typical IoT set ups and configurations.
Virtual private networks (VPNs)

Video - 00:08:00

In this video, Mike shows how Virtual Private Networks (VPNs) work and why people use VPN connections. He discusses the types of protocols and clients that make this work today and walks through a generic VPN setup.
Proxy servers

Video - 00:06:00

In this video, Mike describes how proxy servers work to block certain web sites and filter outgoing or incoming content. The video shows how to set up a browser to connect to a proxy server.
E-mail

Video - 00:08:00

Continuing with the Application-layer protocols, this video explores e-mail. Mike covers the three classic e-mail protocols, SMTP for sending and POP3 and IMAP4 for receiving. The video covers typical client configuration using the classic protocols and port numbers.
File transfer protocol (FTP)

Video - 00:08:00

In this video, Mike tackles one of the earliest and most common protocols for moving files, File Transfer Protocol (FTP). He explores how FTP works, including passive mode and active mode, and port triggering.
The world wide web

Video - 00:09:00

The web puts a graphical face on the Internet. You access it via a web browser, connecting with HTTP (insecure) or HTTPS (secure). Certificates give you a resource for whether or not a website can be trusted.
Remote desktop connections

Video - 00:08:00

The Remote Desktop Protocol (RDP) enables you to connect to a remote Windows system and control it using the graphical user interface. Virtual Network Computing (VNC) enables you to connect to all sorts of computers, including Windows, Linux, and Mac, and control the computers via the GUI.
Telnet and SSH

Video - 00:07:00

The Telnet and SSH protocols enable techs to access and control hosts remotely using the command-line interface in Windows. Telnet offers no security. SSH connections are encrypted for better security.
Firewalls and servers

Video - 00:06:00

In this video, Mike begins the discussion of Application-layer protocols. Starting with a review of the interaction between IP packets and servers, the video analyzes the functions of local and server-based firewalls.
Broadband connections

Video - 00:11:00

In this video, Mike explores common always-on broadband connections to the Internet. Starting with DSL, we also look at fiber, cable, satellite, and 802.11 Wi-Fi.
Internet tiers

Video - 00:06:00

In this video, Mike discusses the structure of the Internet. Starting with the Tier 1 carriers, he shows how carriers at each layer relate to their peers and also how they interact with Tiers above and customers below. This vide provides a good structure for layering your wide-area-networking knowledge.
Beyond the LAN

Video - 00:03:00

In this video, Mike explores the crazy acronym soup around networking, explaining the differences among terms like LAN, WAN, MAN, PAN, and HAM. (Just kidding on the last term!) This helps minimize confusion in later networking episodes.
Troubleshooting wireless connections

Video - 00:07:00

There are few worse feelings than a wireless connection that just doesn’t...connect. In situations like this, good techs will have the right tools and skills to diagnose and repair the issue.
Beyond Wi-fi

Video - 00:07:00

The 802.11 standard isn’t the only wireless out there today. Standards such as Bluetooth, RFID and NFC also need the support of good techs.
Enterprise wireless

Video - 00:16:00

There’s a big difference between the 802.11 network in your home and small office vs. 802.11 in larger organization such as businesses, schools and government offices. Multiple SSIDS, advanced technologies, and more aggressive authentication and encryption are common in every enterprise.
It's a huge mesh

Video - 00:04:00

Mesh networking is here and gaining in popularity daily. But what does mesh networking do for your 802.11 network? Where do you use it and how is it deployed?
Connecting to a Wi-fi network

Video - 00:09:00

The best 802.11 network is useless unless your users can connect to it. Smartphones, desktops, IoT devices, and other networked gizmos need to be individually configured to access your 802.11 network.
Wireless encryption

Video - 00:10:00

Everything on an unencrypted (open) wireless network is easily intercepted by anyone with the right capture tools. Over the years, 802.11 has developed three different encryption standards, each with its own idiosyncrasies, strengths, and weaknesses.
Basic WAP setup

Video - 00:11:00

The standard wireless access point (WAP) doesn’t just work out of the box. It’s important to understand how to perform a basic setup for a WAP to make sure it operates properly in your network.
Wi-fi standards

Video - 00:09:00

Since the original 802.11 standard back in 1999, there have been five major and hundreds of minor revisions. It’s impossible to support an 802.11 network without a working understanding of these standards.
Wireless network hardware

Video - 00:10:00

The 802.11 standard has had a number of improvements over the years, but every version shares common devices and functions that haven't changed in over 20 years. This video explores wireless access points (WAPs), home routers, and the antennas that make them work.

Meet the author

Mike Meyers

Mike Meyers, affectionately called the "Alpha Geek," is the industry's leading authority on CompTIA certifications. He is the president and co-founder of Total Seminars, LLC, a provider of PC and network repair seminars, books, videos and courseware for thousands of organizations throughout the world. Mike has been involved in the computer and network repair industry since 1987 as a technician, instructor, author, consultant and speaker. He has sold over a million IT and certification books, including the best-selling CompTIA A+ Certification All-in-One Exam Guide and CompTIA Network+ Certification All-in-One Exam Guide. He has personally taught thousands of students, including U.S. senators, U.S. Supreme Court Justices, members of the United Nation, every branch of the U.S. Armed Forces, many branches of the Department of Justice, hundreds of corporate clients and academic students at every level.

Unlock 7 days of free training

  • 1,400+ hands-on courses and labs
  • Certification practice exams
  • Skill assessments

Plans & pricing

Infosec Skills Personal

$299 / year

  • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (e.g., CISSP, Security+)
  • Skill assessments
  • Infosec peer community support

Infosec Skills Teams

$799 per license / year

  • Team administration and reporting
  • Dedicated client success manager
  • Single sign-on (SSO)
    Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
  • Integrations via API
    Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
  • 190+ role-guided learning paths and assessments (e.g., Incident Response)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Create and assign custom learning paths
  • Custom certification practice exams (e.g., CISSP, CISA)
  • Optional upgrade: Guarantee team certification with live boot camps

Learn about scholarships and financing with

Affirm logo

Award-winning training you can trust