Welcome to the CompTIA Network+ Certification; N10-006. The Total Course from Mike Meyers and Total Seminars.
This course is over 15 hours in length and covers everything you need to know to pass your CompTIA Network+ Certification (N10-006) Exam. The first goal of the course is to make you a good Network Tech and in the process make sure you are ready to pass the CompTIA exam.
The course covers all the exam topics including:
- Network architectures
- Cabling and topology
- Ethernet basics
- Network installation
- TCP/IP applications and network protocols
- Routing
- Network naming
- Advanced networking devices
- IPv6
- Remote connectivity
- Wireless networking
- Virtualization and cloud computing
- Network operations
- Managing risk
This is a Total Network+ Course and covers everything a good tech needs to know and prepares you to pass the CompTIA Network+ Certification exam.
Who is the target audience?
- This course is intended for anyone that is preparing for a network technician position or looking to improve their skills and become CompTIA Network+ Certified. However, it goes beyond that and will give you the skills you need to be a better network tech on the job.
- Basic familiarity with networks.
- There are no specific prerequisites as the course covers all the topics in detail. However, it’s a good idea to have an understanding of CompTIA A+ Certification topics or to be A+ Certified. You can learn more about A+ Certification topics from our Mike Meyers – Total Seminars CompTIA A+ Certification course on Simpliv.
- This is a complete and comprehensive CompTIA Network+ Certification (N10-006) course. It is designed to prepare the student to be able to take and pass the certification exam needed to become CompTIA Network+ Certified.
- Once you complete the course, you will have the knowledge and confidence to pass the exams AND the skills to be a great Network tech. This course is ideal as both a study tool and an on-the-job reference.
- Your new skills and the CompTIA Network+ Certification will help you land a Network tech job or if you are already a network tech, get that raise or advancement you are seeking.
In this episode, Mike outlines a study strategy for success on the CompTIA Network+ exam. In the process, he describes the exam objectives in some detail.
You can download the Network+ N10-006 Glossary and exam objectives to see exactly what CompTIA says is covered on the exam. Run your mouse over the video and look for the "Resources Available" link in the upper left corner of the player.
In this episode, Mike describes the basic components of networking, such as a NIC and hub, and introduces the primary data encapsulation unit, the frame.
In this episode, Mike discusses the basic addressing used for frames, the MAC address. Computers receiving a frame use the destination MAC address to determine whether or not to process the frame.
In this episode, Mike describes the typical frame traffic that uses destination and source MAC addresses for communicating over a network. He also shows the broadcast MAC address that all computers connected to the network will process.
In this episode, Mikes introduces logical addressing, a scheme to enable larger groups of computers into networks. Specifically, he discusses IP addresses, the most commonly used addressing scheme today.
Mike discusses how TCP/IP networks use port numbers to keep track of multiple connections between two computers.
This episode introduces you to the two models used to describe and troubleshoot networks.
In this episode, Mike takes an Ethernet frame through the processes involved incoming and outgoing, using both the OSI and TCP/IP models for reference.
Mike covers the big three of coaxial cabling, the old RG-8 and RG-58, and the commonly used RG-6 used today.
In this episode, Mike details the different types and categories of twisted pair cabling.
In this episode, Mike discusses the different types of fiber used in modern networks, and includes references to connector types you'll see as a network technician.
Mike looks at how coax-based Ethernet transformed into Etherenet of Unshielded Twisted Pair.
In this episode, Mike discusses 100BaseT and other modern versions of Ethernet, as well as how switches work.
Mike wraps up the Ethernet standards in this episode, covering 1000Base and 10GBase.
In this episode, Mike describes how backbone switches enable varying speed networks to interconnect.
In this episode, Mike examines the basic component of structured cabling, such as an equipment room, horizontal runs, and the work area.
In this episode, Mike explores punchdown blocks, one of the key elements in structured cabling.
Mike takes you on a tour of a typical SOHO infrastructure, from the equipment room to the demarc and back again.
In this episode, Mike explores cable testing, covering wiremaps, continuity, and TDRs.
In this episode, Mike shows how to test for problems with structured cabling and explains what types of problems to look out for.
Mike continues his discussion of structured cabling by examining how to use voltage monitors, environmental/temperature monitors, and TDRs to troubleshoot a cabling installation.
Mike demonstrates using a tone generator and tone probe to locate cables and connectors.
In this episode, Mike takes an in-depth look at how IP addresses are constructed.
In this episode, Mike explores the address resolution protocol, which is used to resolve IP addresses.
In this episode, Mike introduces the concept of subnet masks, which are used to determine if a packet is coming from inside or outside a network.
In this episode, Mike explains the concept of classful addressing, which separates IP addresses into five classes.
This episode examines the difference between assigning IP addresses manually and using DHCP to pass out addresses automatically.
In this episode, Mike shows how to check to make sure that your DHCP server is working, as well as how to check that you're not connecting to a rogue DHCP server.
In this episode, Mike looks at special IP addresses like APIPA addresses, loopback addresses, and private addresses.
In this episode, Mike explains how routers work to get packets from one network to another.
In this episode, Mike describes the purposes of well-known ports and ephemeral ports.
In this episode, Mike explains NAT, including how it works and why we need it.
In this episode, Mike explains the need for ways to configure a router, including DMZ, port range forwarding, and port triggering.
In this episode, Mike walks you through setting up a SOHO router. He's like a talking user's manual!
Mike introduces you to routing concepts such as metrics and latency. The episode also discusses types of routing protocols, such as distance vector and link state.
In this episode, Mike discusses the distance vector routing protocol called Routing Information Protocol.
In this episode, Mike explores connection-oriented and connectionless communication on an IP network via the TCP and UDP protocols.
In this episode, Mike explains the importance of two of the fundamental protocols used in the Internet Protocol Suite, ICMP and IGMP.
In this episode, Mike introduces the concept of packet sniffing using the free third-party packet-sniffer Wireshark.
In this episode, Mike takes a look at the computers that host the numberless pictures of cats that make up the Internet.
In this must-see episode for all aspiring spammers out there, Mike explains the various protocols used in sending and receiving e-mail.
In this episode, Mike looks at the remote connection protocol called telnet, as well as methods for encrypting telnet connections via SSH.
This episode begins an overview of the DNS system, which resolves domain names to IP addresses.
In this episode, Mike concludes his overview of DNS, covering everything from forward lookup zones to AAAA records.
Take a look back in time at the earliest method for resolving IP addresses: the HOSTS file!
In this episode, Mike looks at ways Windows machines figure out names of other computers on the network, through processes like NetBIOS and LLMNR.
In this episode, Mike explores the venerable and still very useful net command to show things such as user names, shared network resources, mapping network drives, and more.
In this video, Mike shows you what to do if you suspect you're having issues with DNS.
In this episode, Mike explores the simplest type of encryption, symmetric encryption. Both parties have the same key to encrypt and decrypt.
In this episode, Mike describes encryption that uses public and private keys for encrypting and decrypting text.
In this episode, Mike dives into access control lists, describing the three levels of control commonly used in computing.
Mike describes the primary tools for providing network authentication, authorization, and accounting; notably RADIUS and TACACS+.
In this episode, Mike discusses two commonly used authentication mechanisms for remote connectivity; Kerberos and EAP.
In this episode, Mike explores the process of making secure connections through tunnels.
In this episode, Mike looks at the two main types of networksclient/server and peer-to-peer.
In this episode, Mike explains virtually everything about technology that enables remote clients to connect to a local network, also called a Virtual Private Network (VPN).
In this episode, Mike explores the concepts and processes behind virtual LANs, including managed switches and trunking.
In this episode, Mike explains how to connect to and configure managed switches.
Mike looks at how to improve network throughput from a router by combining traffic onto multiple router ports.
Here, Mike talks about how to duplicate the traffic from one router port to another port.
In this episode, Mike looks at intrusion detection systems and intrusion protection systems.
In this episode, Mike laments the ending of IPv4 and discusses the need for IPv6. He describes IPv6 addresses and shows how to abbreviate them properly.
Because most ISPs don't provide IPv6 access, you need to use a tunneling protocol to get to the IPv6 Internet. Mike goes through the processes required.
In this episode, Mike takes you on a tour of telephony technologies that paved the way for modern remote connectivity.
Mike discusses several monster technologies of packet switching, such as frame relay, ATM, and MPLS.
In this episode, Mike walks down memory lane, explaining how modems and PPP enable dial-up connectivity.
In this episode, Mike explores cable modems, one of the most common high-speed connection types.
In this exciting episode, Mike talks about connecting to the Internet from outer space!
In this episode, Mike discusses WiMax and other cellular networking options, such as HSPA+ and LTE.
In this episode, Mike looks at two more methods for connecting the Internet, ISDN and BPL.
In this episode, Mike shows how you can work on computers remotely through the Internet using tools like Tight VNC, Microsoft's RDP, and remote help.
In this episode, Mike explains the concepts behind wireless networking.
This episode covers the various wireless networking standards and examines their relative merits.
In this episode, Mike demonstrates the power of PoE, which provides electricity to network devices through their Ethernet ports.
This episode is an overview of the various encryption standards that exist to protect your wireless network.
What good is unimplemented security? In this episode, Mike demonstrates how to secure your wireless network so that your neighbors will stop hogging all your bandwidth.
In this episode, Mike covers war driving, war chalking, rogue WAPs, evil twins, and how to protect against them.
In this episode, Mike explains the technology behind WPS, a method for easily connecting to a secure wireless network.
Mike looks at some of the issues that can arise to topple your wireless network, with a special focus on wireless interference.
In this episode, Mike goes over the process of setting up a wireless network in a home or small office.
In this episode, Mike introduces virtualization and discusses the benefits of the various types you'll see.
Mike goes through the process of creating a virtual machine and installing an OS into that VM.
Here, Mike looks at Infrastructure as a Service via Amazon Web Services.
Mike shows us that Software as a Service is all around us with DropBox and others.
Mike looks at Industrial Control Systems and the broader scale Supervisory Control and Data Acquisition technologies.
Mike helps us identify critical assets, critical nodes and how do proactively deal with failures.
You're not paranoid if they're really out to get you. In this episode, Mike explains the myriad threats that array themselves against your network.
In this episode, Mike explores social engineering attacks such as dumpster diving, shoulder surfing, and phishing.
In this episode, Mike discusses techniques for keeping unwanted users out of your network, focusing on effectively using firewalls.
Learn to scan your network for potential weaknesses in this action-packed episode.
In this episode, Mike examines the methods that an organization can use to protect its network from both external and internal threats.
Mike shows us how to keep bad guys from getting into your network from the outside.
In this episode, Mike examines the various log files that techs can use to troubleshoot networks. Botanists and woodworkers may be disappointed by this episode's misleading title.
In this episode, Mike takes a long, hard look at MTU errors, such as the dreaded MTU black hole.
In this episode, Mike looks at the various ways a Network+ tech can solve connection issues.
In this episode, Ford joins Mike for a round of Titanium Tech. Together, they examine the troubleshooting process.

I am very happy and it is a great course with a unique instructor who accumulate an outstanding practical experience. Thanks



Best online course at Simpliv i have found ! The course was excellent, I have gained a lot of knowledge and the instructor was excellent. I loved this course and everything is very applicable to my every day work. I would recommend this course to anyone IT team!!!