CompTIA Network+ (N10-008) Cert Prep
With Joe Ramm, Mike Meyers, and Total Seminars
Liked by 337 users
Duration: 21h 40m
Skill level: Intermediate
Released: 6/14/2024
Course details
CompTIA A+ is one of the world’s leading vendor-neutral certifications—with more than one million certified IT professionals to date. Get ready to take your skills to the next level and tackle the CompTIA Network+ (N10-008) certification exam. Join instructors and CompTIA experts Joe Ramm and Mike Meyers as they provide a comprehensive overview of this widely popular IT networking certification, which vets your ability to establish, maintain, troubleshoot, and secure networks, regardless of technology or platform, empowering you to pursue a high-growth career in networking and cybersecurity. By the end of this course, you’ll be ready to tackle the CompTIA Network+ (N10-008) certification exam.
Note: This Total Seminars course covers the topics tested on the CompTIA A+ Core 1 (220-1101) certification exam. For information on additional study resources—including practice tests, lab simulations, books, and discounted exam vouchers—visit the Total Seminars website. LinkedIn Learning members receive special pricing.
Skills you’ll gain
Earn a sharable certificate
Share what you’ve learned, and be a standout professional in your desired industry with a certificate showcasing your knowledge gained from the course.
Learning
LinkedIn Learning
Certificate of Completion
-
Showcase on your LinkedIn profile under “Licenses and Certificate” section
-
Download or print out as PDF to share with others
-
Share as image online to demonstrate your skill
Meet the instructors
Learner reviews
4.9 out of 5
-
ChengRui Zhai
ChengRui Zhai
Student at Singapore Polytechnic
Contents
-
-
Introduction to structured cabling4m 7s
-
(Locked)
Terminating structured cabling7m 45s
-
(Locked)
Equipment room7m 10s
-
(Locked)
Alternative distribution panels3m 41s
-
(Locked)
Testing cable8m 43s
-
(Locked)
Troubleshooting structured cabling, part 14m 9s
-
(Locked)
Troubleshooting structured cabling, part 23m 39s
-
(Locked)
Using a toner and probe2m 36s
-
(Locked)
Wired connection scenarios10m 21s
-
-
-
Introduction to IP addressing and binary12m 33s
-
(Locked)
Introduction to ARP3m 37s
-
(Locked)
Subnet masks12m
-
(Locked)
Classful addressing10m 10s
-
(Locked)
Subnetting with CIDR9m 36s
-
(Locked)
More CIDR subnetting practice9m 48s
-
(Locked)
Dynamic and static IP addressing13m 40s
-
(Locked)
Special IP addresses6m 52s
-
(Locked)
IP addressing scenarios14m 38s
-
-
-
Introducing routers15m 9s
-
(Locked)
Understanding ports5m 17s
-
(Locked)
Network address translation6m 15s
-
(Locked)
Implementing NAT2m 28s
-
(Locked)
Forwarding ports17m 31s
-
(Locked)
Tour of a SOHO router11m 53s
-
(Locked)
SOHO vs. enterprise8m 32s
-
(Locked)
Static routes12m 31s
-
(Locked)
Dynamic routing10m 27s
-
(Locked)
RIP4m 18s
-
(Locked)
OSPF3m 25s
-
(Locked)
BGP5m 30s
-
-
-
TCP and UDP7m 13s
-
(Locked)
ICMP and IGMP5m 59s
-
(Locked)
Handy tools6m 35s
-
(Locked)
Introduction to Wireshark10m 29s
-
(Locked)
Introduction to netstat8m 42s
-
(Locked)
Web servers11m 43s
-
(Locked)
FTP11m 37s
-
(Locked)
Email servers and clients9m 9s
-
(Locked)
Securing email5m 39s
-
(Locked)
Telnet and SSH9m 8s
-
(Locked)
Network Time Protocol2m 47s
-
(Locked)
Network service scenarios9m 25s
-
-
-
(Locked)
Making TCP/IP secure4m 17s
-
(Locked)
Symmetric encryption5m 24s
-
(Locked)
Asymmetric encryption3m 12s
-
(Locked)
Cryptographic hashes4m 48s
-
(Locked)
Identification8m
-
(Locked)
Access control4m 12s
-
(Locked)
AAA4m 51s
-
(Locked)
Kerberos/EAP7m 24s
-
(Locked)
Single sign-on10m 1s
-
(Locked)
Certificates and trust13m 53s
-
(Locked)
Certificate error scenarios7m 58s
-
(Locked)
-
-
(Locked)
Switch management8m 54s
-
(Locked)
Introduction to VLANs10m 13s
-
(Locked)
InterVLAN routing3m 1s
-
(Locked)
Trunking7m 44s
-
(Locked)
Cisco commands6m 21s
-
(Locked)
Switch port protection6m 33s
-
(Locked)
Port bonding7m 7s
-
(Locked)
Port mirroring3m 24s
-
(Locked)
Quality of service5m 2s
-
(Locked)
IDS vs. IPS4m 20s
-
(Locked)
Proxy servers12m 36s
-
(Locked)
Load balancing8m 24s
-
(Locked)
Device placement scenarios12m 46s
-
(Locked)
-
-
(Locked)
Understanding IP tunneling5m 56s
-
(Locked)
WAN technologies5m 35s
-
(Locked)
Digital subscriber line (DSL)4m 24s
-
(Locked)
Connecting with cable modems4m 8s
-
(Locked)
Connecting with satellites2m 21s
-
(Locked)
Cellular technologies3m 54s
-
(Locked)
Remote desktop connectivity4m 24s
-
(Locked)
Virtual private networks (VPNs)8m 42s
-
(Locked)
WAN troubleshooting scenarios4m 40s
-
(Locked)
-
-
(Locked)
Introduction to 802.1111m 30s
-
(Locked)
802.11 standards12m 9s
-
(Locked)
Power over Ethernet (PoE)3m 35s
-
(Locked)
Antennas8m 30s
-
(Locked)
Wireless security standards5m 59s
-
(Locked)
Implementing wireless security6m 48s
-
(Locked)
Threats to your wireless network6m 54s
-
(Locked)
Enterprise wireless5m 59s
-
(Locked)
Installing a wireless network14m 36s
-
(Locked)
Wireless scenarios6m 4s
-
(Locked)
NEEDS TITLE8m 42s
-
(Locked)
-
-
(Locked)
Virtualization basics6m 34s
-
(Locked)
Your first virtual machine7m 17s
-
(Locked)
Cloud basics3m 7s
-
(Locked)
Cloud services6m 52s
-
(Locked)
Cloud ownership2m 27s
-
(Locked)
Infrastructure as code (IaC)3m 19s
-
(Locked)
Heroku demo8m 46s
-
(Locked)
Enterprise virtualization5m 25s
-
(Locked)
Cloud implementation11m 28s
-
(Locked)
-
-
(Locked)
What are network operations?3m 15s
-
(Locked)
Hardening and security policies8m 21s
-
(Locked)
Change management6m 32s
-
(Locked)
Patching and updating7m 12s
-
(Locked)
Security risk management5m 14s
-
(Locked)
Points of failure4m 5s
-
(Locked)
Standard business documentation4m 59s
-
(Locked)
Incident response and forensics5m 27s
-
(Locked)
Disaster recovery and backups12m 28s
-
(Locked)
Business continuity11m 36s
-
(Locked)
Deployment models5m 15s
-
(Locked)
-
-
(Locked)
Security concepts5m 57s
-
(Locked)
Defense in depth5m 17s
-
(Locked)
Rogue DHCP servers3m 50s
-
(Locked)
Denial of Service (DoS)9m 53s
-
(Locked)
On-path and spoofing attacks22m 31s
-
(Locked)
Password attacks6m 24s
-
(Locked)
VLAN hopping6m 10s
-
(Locked)
System life cycle4m 29s
-
(Locked)
Malware6m 12s
-
(Locked)
Social engineering7m 39s
-
(Locked)
Common vulnerabilities3m 12s
-
(Locked)
Physical security12m 34s
-
(Locked)
Network hardening8m 1s
-
(Locked)
Demilitarized Zone (DMZ)5m 21s
-
(Locked)
Introduction to firewalls4m 22s
-
(Locked)
Firewalls10m 3s
-
(Locked)
What’s included
- Learn on the go Access on tablet and phone