-
Introduction to 802.11
-
Mike reviews the 802.11 wireless standards and how it works with wireless network traffic.
-
-
802.11 Standards
-
This episode covers the various wireless networking standards and examines their relative merits.
-
-
Power Over Ethernet (PoE)
-
In this episode, Mike reviews the PoE WAP configurations, where these are used and the requirements needed to be able to implement this type of device.
-
-
Antennas
-
Mike discusses the antenna concepts used in wireless 802.11 devices.
-
-
Wireless Security Standards
-
Mike walks through all the 802.11 standards and the authentication and encryption methodology which has developed over time.
-
-
Implementing Wireless Security
-
What good is unimplemented security? In this episode, Mike demonstrates how to secure your wireless network so that your neighbors will stop hogging all your bandwidth.
-
-
Threats to Your Wireless Network
-
In this episode, Mike covers war driving, war chalking, rogue WAPs, evil twins and how to protect against them.
-
-
Retro Threats
-
Mike and Logan time travel back to the days of war driving and war chalking.
-
-
Wi-Fi Protected Setup (WPS)
-
In this episode, Mike explains the technology behind WPS, a method for easily connecting to a secure wireless network.
-
-
Enterprise Wireless
-
In this episode, Mike introduces the enterprise wireless configuration and management tools.
-
-
Installing a Wireless Network
-
Mike discusses topics that should be addressed when installing a wireless network and looks at interference, layout and quality of signal.
-
-
Wireless Scenarios
-
Mike looks at some of the issues that can arise to topple your wireless network, with a special focus on wireless interference.
-
-
More Wireless Scenarios
-
Mike looks at real-world issues that can take down a wireless network, with a special focus on wireless devices.
-
-
Virtualization Basics
-
In this episode, Mike introduces virtualization and discusses the benefits of the various types you’ll see.
-
-
Cloud Ownership
-
In this episode, Mike discusses the difference between public and private clouds.
-
-
Cloud Implementation
-
Mike creates a cloud service using AWS to demonstrate the ease of implementation of cloud infrastructure and service.
-
-
Your First Virtual Machine
-
Mike goes through the process of creating a virtual machine and installing an OS into that VM.
-
-
NAS and SAN
-
In this episode, Mike discusses secure methods to save and access data on a network device.
-
-
Platform as a Service (PaaS)
-
Mike shows us the Heroku PaaS.
-
-
Software as a Service (SaaS)
-
Mike shows us that Software as a Service is all around us with DropBox and others.
-
-
Infrastructure as a Service (IaaS)
-
Here, Mike looks at Infrastructure as a Service via Amazon Web Services.
-
-
Cellular Technologies
-
In this episode, Mike discusses WiMax and other cellular networking options, such as HSPA+ and LTE.
-
-
Mobile Connectivity
-
Mike walks through the various alternative mobile device connection types, looking at the specifications and how they are applied.
-
-
Deploying Mobile Devices
-
In this episode, Mike delves into the opposing forces of corporate and personal use of mobile devices.
-
-
Mobile Access Control
-
In this episode, Mike talks about the access and security consideration of BYOD mobile devices.
-
Syllabus
Syllabus
Course description
Networking can be complex, but with this course to guide you through, you’ll find your connection in no time! Take a look at wireless, virtual, cloud and mobile networking with modules covering 802.11 standards, Power Over Ethernet (PoE), wireless securit


Meet the author
Mike Meyers, affectionately called the “Alpha Geek,” is the industry’s leading authority on CompTIA certifications. He is the president and co-founder of Total Seminars, LLC, a provider of PC and network repair seminars, books, videos and courseware for thousands of organizations throughout the world. Mike has been involved in the computer and network repair industry since 1987 as a technician, instructor, author, consultant and speaker. He has sold over a million IT and certification books, including the best-selling CompTIA A+ Certification All-in-One Exam Guide and CompTIA Network+ Certification All-in-One Exam Guide. He has personally taught thousands of students, including U.S. senators, U.S. Supreme Court Justices, members of the United Nation, every branch of the U.S. Armed Forces, many branches of the Department of Justice, hundreds of corporate clients and academic students at every level.
Associated NICE Work Roles
All Infosec training maps directly to the NICE Workforce Framework for Cybersecurity to guide you from beginner to expert across 52 Work Roles.
- All-Source Analyst
- Mission Assessment Specialist
- Exploitation Analyst
You're in good company
We use Infosec Skills to provide continuous training to our technicians and to prepare them for various certifications. Infosec Skills allows us to create personalized training programs that focus on each of our technicians’ particular roles and see their progress as they take courses. We also, recommend it to clients to make their IT support teams better.
Caleb Yankus
This has been utilized to bridge the skills gap across our cyber team and to aid them as they prepare for their various certifications. It also has provided a nice learning foundation for our various cyber team members to utilize as we continue to find ways for cross-utilization with operations while minimizing the downtime needed to ensure everyone’s knowledge is the same.
Daniel Simpson
We use Infosec Skills to provide base level knowledge for employees. We also use the services to provide in depth learning for employees as they encounter new technologies. If an employee is is assigned to a new project, we can rely on Infosec Skills to provide a rapid concentrated learning environment. This rapid concentrated learning positions our employees for success.
Infosec Skills Teams client
Plans & pricing
-
Infosec Skills Personal
- 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
- 100s of hands-on labs in cloud-hosted cyber ranges
- Custom certification practice exams (e.g., CISSP, Security+)
- Skill assessments
- Infosec peer community support
-
Infosec Skills Teams
- Team administration and reporting
- Dedicated client success manager
-
Single sign-on (SSO)
Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
-
Integrations via API
Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
- 190+ role-guided learning paths and assessments (e.g., Incident Response)
- 100s of hands-on labs in cloud-hosted cyber ranges
- Create and assign custom learning paths
- Custom certification practice exams (e.g., CISSP, CISA)
- Optional upgrade: Guarantee team certification with live boot camps
Unlock 7 days of free training
- 1,400+ hands-on courses and labs
- Certification practice exams
- Skill assessments
Award-winning training that you can trust




