Wireless, Virtual, Cloud and Mobile Networking

Get to grips with the complexities of wireless, virtual, cloud and mobile networking with this course covering wireless security standards, Wi-Fi Protected Setup (WPS), wireless scenarios and much more.

25 videos  //  205 minutes of training

Free training week — 1,400+ on-demand courses and hands-on labs

Course description

Networking can be complex, but with this course to guide you through, you’ll find your connection in no time! Take a look at wireless, virtual, cloud and mobile networking with modules covering 802.11 standards, Power Over Ethernet (PoE), wireless security standards, installing a wireless network and much more. You’ll even take a step back in time to look at retro threats like wardriving and warchalking, and then a step forward to the future of networking with modules on virtualization and the cloud.

Course syllabus

Introduction to 802.11Duration: 11:38

Mike reviews the 802.11 wireless standards and how it works with wireless network traffic.

802.11 StandardsDuration: 12:17

This episode covers the various wireless networking standards and examines their relative merits.

Power Over Ethernet (PoE)Duration: 3:43

In this episode, Mike reviews the PoE WAP configurations, where these are used and the requirements needed to be able to implement this type of device.

AntennasDuration: 8:38

Mike discusses the antenna concepts used in wireless 802.11 devices.

Wireless Security StandardsDuration: 15:46

Mike walks through all the 802.11 standards and the authentication and encryption methodology which has developed over time.

Implementing Wireless SecurityDuration: 6:56

What good is unimplemented security? In this episode, Mike demonstrates how to secure your wireless network so that your neighbors will stop hogging all your bandwidth.

Threats to Your Wireless NetworkDuration: 7:01

In this episode, Mike covers war driving, war chalking, rogue WAPs, evil twins and how to protect against them.

Retro ThreatsDuration: 5:05

Mike and Logan time travel back to the days of war driving and war chalking.

Wi-Fi Protected Setup (WPS)Duration: 5:21

In this episode, Mike explains the technology behind WPS, a method for easily connecting to a secure wireless network.

Enterprise WirelessDuration: 6:07

In this episode, Mike introduces the enterprise wireless configuration and management tools.

Installing a Wireless NetworkDuration: 14:44

Mike discusses topics that should be addressed when installing a wireless network and looks at interference, layout and quality of signal.

Wireless ScenariosDuration: 7:02

Mike looks at some of the issues that can arise to topple your wireless network, with a special focus on wireless interference.

More Wireless ScenariosDuration: 8:49

Mike looks at real-world issues that can take down a wireless network, with a special focus on wireless devices.

Virtualization BasicsDuration: 7:15

In this episode, Mike introduces virtualization and discusses the benefits of the various types you'll see.

Cloud OwnershipDuration: 2:36

In this episode, Mike discusses the difference between public and private clouds.

Cloud ImplementationDuration: 11:36

Mike creates a cloud service using AWS to demonstrate the ease of implementation of cloud infrastructure and service.

Your First Virtual MachineDuration: 9:15

Mike goes through the process of creating a virtual machine and installing an OS into that VM.

NAS and SANDuration: 16:17

In this episode, Mike discusses secure methods to save and access data on a network device.

Platform as a Service (PaaS)Duration: 8:54

Mike shows us the Heroku PaaS.

Software as a Service (SaaS)Duration: 2:39

Mike shows us that Software as a Service is all around us with DropBox and others.

Infrastructure as a Service (IaaS)Duration: 9:32

Here, Mike looks at Infrastructure as a Service via Amazon Web Services.

Cellular TechnologiesDuration: 5:17

In this episode, Mike discusses WiMax and other cellular networking options, such as HSPA+ and LTE.

Mobile ConnectivityDuration: 7:12

Mike walks through the various alternative mobile device connection types, looking at the specifications and how they are applied.

Deploying Mobile DevicesDuration: 5:16

In this episode, Mike delves into the opposing forces of corporate and personal use of mobile devices.

Mobile Access ControlDuration: 6:26

In this episode, Mike talks about the access and security consideration of BYOD mobile devices.

Meet the author

Mike Meyers

LinkedIn

Mike Meyers, affectionately called the "Alpha Geek," is the industry's leading authority on CompTIA certifications. He is the president and co-founder of Total Seminars, LLC, a provider of PC and network repair seminars, books, videos and courseware for thousands of organizations throughout the world. Mike has been involved in the computer and network repair industry since 1987 as a technician, instructor, author, consultant and speaker. He has sold over a million IT and certification books, including the best-selling CompTIA A+ Certification All-in-One Exam Guide and CompTIA Network+ Certification All-in-One Exam Guide. He has personally taught thousands of students, including U.S. senators, U.S. Supreme Court Justices, members of the United Nation, every branch of the U.S. Armed Forces, many branches of the Department of Justice, hundreds of corporate clients and academic students at every level.

Plans & pricing

Infosec Skills Personal

  • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (e.g., CISSP, Security+)
  • Skill assessments
  • Infosec peer community support

Infosec Skills Teams

$799 per license / year

Book a Meeting
  • Team administration and reporting
  • Dedicated client success manager
  • Single sign-on (SSO)
    Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
  • Integrations via API
    Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
  • 190+ role-guided learning paths and assessments (e.g., Incident Response)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Create and assign custom learning paths
  • Custom certification practice exams (e.g., CISSP, CISA)
  • Optional upgrade: Guarantee team certification with live boot camps

Award-winning training that you can trust

IDC MarketScape Leader: U.S. IT Training

IDC MarketScape Leader: U.S. IT Training

Infosec Skills

eLearning Content

eLearning Content

Infosec Skills

Best Product - Cybersecurity Training for Infosec Professionals

Best Product - Cybersecurity Training for Infosec Professionals

Infosec Skills

Security Education & Platform

Security Education & Platform

Infosec Skills

Ranked #52 in Top 100 Global Software Sellers

Ranked #52 in Top 100 Global Software Sellers

Infosec