Wireless, Virtual, Cloud and Mobile Networking
Get to grips with the complexities of wireless, virtual, cloud and mobile networking with this course covering wireless security standards, Wi-Fi Protected Setup (WPS), wireless scenarios and much more.
Networking can be complex, but with this course to guide you through, you’ll find your connection in no time! Take a look at wireless, virtual, cloud and mobile networking with modules covering 802.11 standards, Power Over Ethernet (PoE), wireless security standards, installing a wireless network and much more. You’ll even take a step back in time to look at retro threats like wardriving and warchalking, and then a step forward to the future of networking with modules on virtualization and the cloud.
Introduction to 802.11Duration: 11:38
Mike reviews the 802.11 wireless standards and how it works with wireless network traffic.
802.11 StandardsDuration: 12:17
This episode covers the various wireless networking standards and examines their relative merits.
Power Over Ethernet (PoE)Duration: 3:43
In this episode, Mike reviews the PoE WAP configurations, where these are used and the requirements needed to be able to implement this type of device.
Mike discusses the antenna concepts used in wireless 802.11 devices.
Wireless Security StandardsDuration: 15:46
Mike walks through all the 802.11 standards and the authentication and encryption methodology which has developed over time.
Implementing Wireless SecurityDuration: 6:56
What good is unimplemented security? In this episode, Mike demonstrates how to secure your wireless network so that your neighbors will stop hogging all your bandwidth.
Threats to Your Wireless NetworkDuration: 7:01
In this episode, Mike covers war driving, war chalking, rogue WAPs, evil twins and how to protect against them.
Retro ThreatsDuration: 5:05
Mike and Logan time travel back to the days of war driving and war chalking.
Wi-Fi Protected Setup (WPS)Duration: 5:21
In this episode, Mike explains the technology behind WPS, a method for easily connecting to a secure wireless network.
Enterprise WirelessDuration: 6:07
In this episode, Mike introduces the enterprise wireless configuration and management tools.
Installing a Wireless NetworkDuration: 14:44
Mike discusses topics that should be addressed when installing a wireless network and looks at interference, layout and quality of signal.
Wireless ScenariosDuration: 7:02
Mike looks at some of the issues that can arise to topple your wireless network, with a special focus on wireless interference.
More Wireless ScenariosDuration: 8:49
Mike looks at real-world issues that can take down a wireless network, with a special focus on wireless devices.
Virtualization BasicsDuration: 7:15
In this episode, Mike introduces virtualization and discusses the benefits of the various types you'll see.
Cloud OwnershipDuration: 2:36
In this episode, Mike discusses the difference between public and private clouds.
Cloud ImplementationDuration: 11:36
Mike creates a cloud service using AWS to demonstrate the ease of implementation of cloud infrastructure and service.
Your First Virtual MachineDuration: 9:15
Mike goes through the process of creating a virtual machine and installing an OS into that VM.
NAS and SANDuration: 16:17
In this episode, Mike discusses secure methods to save and access data on a network device.
Platform as a Service (PaaS)Duration: 8:54
Mike shows us the Heroku PaaS.
Software as a Service (SaaS)Duration: 2:39
Mike shows us that Software as a Service is all around us with DropBox and others.
Infrastructure as a Service (IaaS)Duration: 9:32
Here, Mike looks at Infrastructure as a Service via Amazon Web Services.
Cellular TechnologiesDuration: 5:17
In this episode, Mike discusses WiMax and other cellular networking options, such as HSPA+ and LTE.
Mobile ConnectivityDuration: 7:12
Mike walks through the various alternative mobile device connection types, looking at the specifications and how they are applied.
Deploying Mobile DevicesDuration: 5:16
In this episode, Mike delves into the opposing forces of corporate and personal use of mobile devices.
Mobile Access ControlDuration: 6:26
In this episode, Mike talks about the access and security consideration of BYOD mobile devices.
Meet the author
Mike Meyers, affectionately called the "Alpha Geek," is the industry's leading authority on CompTIA certifications. He is the president and co-founder of Total Seminars, LLC, a provider of PC and network repair seminars, books, videos and courseware for thousands of organizations throughout the world. Mike has been involved in the computer and network repair industry since 1987 as a technician, instructor, author, consultant and speaker. He has sold over a million IT and certification books, including the best-selling CompTIA A+ Certification All-in-One Exam Guide and CompTIA Network+ Certification All-in-One Exam Guide. He has personally taught thousands of students, including U.S. senators, U.S. Supreme Court Justices, members of the United Nation, every branch of the U.S. Armed Forces, many branches of the Department of Justice, hundreds of corporate clients and academic students at every level.
You're in good company
Infosec Skills is a very good place for building technical acumen and engineering development knowledge. It enables us to provide training to the entire team on relevant topics.
Romy Ricafort, West Division Senior Director of Sales Engineering
Comparing Infosec to other vendors is like comparing apples to oranges. My instructor was hands-down the best I've had.
James Coyle , Senior U.S. Public Sector Channel Sales Engineer
Train on your schedule
- 600+ courses
- 100s of hands-on labs and projects
- 70+ role-based learning paths
- Skill assessments
- Custom learning paths
- Custom certification practice exams
- Cloud-hosted cyber ranges
- Infosec peer community support
Infosec Skills Teams
- All Infosec Skills content for the year
- Team boot camp discounts — online or onsite (not included with subscription)
- Team administration and reporting
- Custom team learning paths
- Transferable licenses
- Dedicated client success manager
Award-winning training that you can trust
Best Software - Highest Satisfaction
Best IT Security-related Training Program
Best Cybersecurity Education Provider & Best Security Education Platform
Most Innovative Product - Cybersecurity Training for Infosec Professionals
Global Excellence - Cyber Security Education & Training
Exceptional learning experiences powered by LX Labs cyber expertise
Infosec Skills courses and labs are powered by LX Labs — our elite team of cyber SMEs, learning specialists and community of top-ranked security instructors, published authors and sought-after industry leaders. We rigorously vet all Infosec Skills training resources to guarantee they meet certification and compliance requirements and align with recognized guidelines like the NICE Cybersecurity Workforce Framework.