Wireless, Virtual, Cloud and Mobile Networking

Get to grips with the complexities of wireless, virtual, cloud and mobile networking with this course covering wireless security standards, Wi-Fi Protected Setup (WPS), wireless scenarios and much more.


  • Introduction to 802.11 Video — 00:11:38
    • Mike reviews the 802.11 wireless standards and how it works with wireless network traffic.

  • 802.11 Standards Video — 00:12:17
    • This episode covers the various wireless networking standards and examines their relative merits.

  • Power Over Ethernet (PoE) Video — 00:03:43
    • In this episode, Mike reviews the PoE WAP configurations, where these are used and the requirements needed to be able to implement this type of device.

  • Antennas Video — 00:08:38
    • Mike discusses the antenna concepts used in wireless 802.11 devices.

  • Wireless Security Standards Video — 00:15:46
    • Mike walks through all the 802.11 standards and the authentication and encryption methodology which has developed over time.

  • Implementing Wireless Security Video — 00:06:56
    • What good is unimplemented security? In this episode, Mike demonstrates how to secure your wireless network so that your neighbors will stop hogging all your bandwidth.

  • Threats to Your Wireless Network Video — 00:07:01
    • In this episode, Mike covers war driving, war chalking, rogue WAPs, evil twins and how to protect against them.

  • Retro Threats Video — 00:05:05
    • Mike and Logan time travel back to the days of war driving and war chalking.

  • Wi-Fi Protected Setup (WPS) Video — 00:05:21
    • In this episode, Mike explains the technology behind WPS, a method for easily connecting to a secure wireless network.

  • Enterprise Wireless Video — 00:06:07
    • In this episode, Mike introduces the enterprise wireless configuration and management tools.

  • Installing a Wireless Network Video — 00:14:44
    • Mike discusses topics that should be addressed when installing a wireless network and looks at interference, layout and quality of signal.

  • Wireless Scenarios Video — 00:07:02
    • Mike looks at some of the issues that can arise to topple your wireless network, with a special focus on wireless interference.

  • More Wireless Scenarios Video — 00:08:50
    • Mike looks at real-world issues that can take down a wireless network, with a special focus on wireless devices.

  • Virtualization Basics Video — 00:07:15
    • In this episode, Mike introduces virtualization and discusses the benefits of the various types you’ll see.

  • Cloud Ownership Video — 00:02:36
    • In this episode, Mike discusses the difference between public and private clouds.

  • Cloud Implementation Video — 00:11:36
    • Mike creates a cloud service using AWS to demonstrate the ease of implementation of cloud infrastructure and service.

  • Your First Virtual Machine Video — 00:09:15
    • Mike goes through the process of creating a virtual machine and installing an OS into that VM.

  • NAS and SAN Video — 00:16:17
    • In this episode, Mike discusses secure methods to save and access data on a network device.

  • Platform as a Service (PaaS) Video — 00:08:54
    • Mike shows us the Heroku PaaS.

  • Software as a Service (SaaS) Video — 00:02:39
    • Mike shows us that Software as a Service is all around us with DropBox and others.

  • Infrastructure as a Service (IaaS) Video — 00:09:32
    • Here, Mike looks at Infrastructure as a Service via Amazon Web Services.

  • Cellular Technologies Video — 00:05:17
    • In this episode, Mike discusses WiMax and other cellular networking options, such as HSPA+ and LTE.

  • Mobile Connectivity Video — 00:07:12
    • Mike walks through the various alternative mobile device connection types, looking at the specifications and how they are applied.

  • Deploying Mobile Devices Video — 00:05:16
    • In this episode, Mike delves into the opposing forces of corporate and personal use of mobile devices.

  • Mobile Access Control Video — 00:06:26
    • In this episode, Mike talks about the access and security consideration of BYOD mobile devices.


Course description

Networking can be complex, but with this course to guide you through, you’ll find your connection in no time! Take a look at wireless, virtual, cloud and mobile networking with modules covering 802.11 standards, Power Over Ethernet (PoE), wireless securit

Meet the author

Mike Meyers, affectionately called the “Alpha Geek,” is the industry’s leading authority on CompTIA certifications. He is the president and co-founder of Total Seminars, LLC, a provider of PC and network repair seminars, books, videos and courseware for thousands of organizations throughout the world. Mike has been involved in the computer and network repair industry since 1987 as a technician, instructor, author, consultant and speaker. He has sold over a million IT and certification books, including the best-selling CompTIA A+ Certification All-in-One Exam Guide and CompTIA Network+ Certification All-in-One Exam Guide. He has personally taught thousands of students, including U.S. senators, U.S. Supreme Court Justices, members of the United Nation, every branch of the U.S. Armed Forces, many branches of the Department of Justice, hundreds of corporate clients and academic students at every level.

Associated NICE Work Roles

All Infosec training maps directly to the NICE Workforce Framework for Cybersecurity to guide you from beginner to expert across 52 Work Roles.

  • All-Source Analyst
  • Mission Assessment Specialist
  • Exploitation Analyst

You're in good company


We use Infosec Skills to provide continuous training to our technicians and to prepare them for various certifications. Infosec Skills allows us to create personalized training programs that focus on each of our technicians’ particular roles and see their progress as they take courses. We also, recommend it to clients to make their IT support teams better.

Caleb Yankus


This has been utilized to bridge the skills gap across our cyber team and to aid them as they prepare for their various certifications. It also has provided a nice learning foundation for our various cyber team members to utilize as we continue to find ways for cross-utilization with operations while minimizing the downtime needed to ensure everyone’s knowledge is the same.

Daniel Simpson


We use Infosec Skills to provide base level knowledge for employees. We also use the services to provide in depth learning for employees as they encounter new technologies. If an employee is is assigned to a new project, we can rely on Infosec Skills to provide a rapid concentrated learning environment. This rapid concentrated learning positions our employees for success.

Infosec Skills Teams client

Plans & pricing

  • Infosec Skills Personal

    $299 / year

    • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
    • 100s of hands-on labs in cloud-hosted cyber ranges
    • Custom certification practice exams (e.g., CISSP, Security+)
    • Skill assessments
    • Infosec peer community support
  • Infosec Skills Teams

    $799 per license / year

    • Team administration and reporting
    • Dedicated client success manager
    • Single sign-on (SSO)
      Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
    • Integrations via API
      Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
    • 190+ role-guided learning paths and assessments (e.g., Incident Response)
    • 100s of hands-on labs in cloud-hosted cyber ranges
    • Create and assign custom learning paths
    • Custom certification practice exams (e.g., CISSP, CISA)
    • Optional upgrade: Guarantee team certification with live boot camps

Unlock 7 days of free training

  • 1,400+ hands-on courses and labs
  • Certification practice exams
  • Skill assessments

Award-winning training that you can trust

Comprehensive Cybersecurity Training - Infosec Skills
Cybersecurity Education and Training Gold Award - Infosec IQ
Top Rated Award - Infosec Skills
2021 G2 Summer - Leader - Tech Skills Dev, Online Course, eLearning Content
Top 20 Company - Online Learning Library