CompTIA A+ Core 1: Wireless Networking & Services

CompTIA    |    Intermediate
  • 16 videos | 2h 25m 40s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 248 users Rating 4.6 of 248 users (248)
Wireless networks are much more versatile than wired networks, especially in an environment where running wires might be difficult. This course covers the most efficient wireless networking protocols for various scenarios. You will explore wireless frequencies and channels and learn how to differentiate between 802.11 standards: - a, - b, - g, - n, - ac, and - ax. Next, delve into considerations for working with long-range fixed wireless, including licensed, unlicensed, power, and regulatory requirements. You will also identify features of near-field communication (NFC) and radio-frequency identification (RFID). Finally, explore server roles such as domain name system (DNS) and dynamic host configuration protocol (DHCP), and discover the global market for Internet of things (IoT) end-user solutions. After completing this course, you'll be able to differentiate between wireless networking protocols and tune common host services. This course will prepare learners for the CompTIA A+ Core 1 (220-1101) certification exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Differentiate between 802.11 standards including - a, - b, - g, - n, - ac, and - ax
    Differentiate between 2.4ghz and 5ghz frequencies
    Outline channel regulations and differentiate between 2.4ghz and 5ghz channels
    Identify scenarios where bluetooth can be used for wireless networking
    Outline considerations for working with long-range fixed wireless including licensed, unlicensed, power, and regulatory requirements
    List features of near-field communication (nfc) and radio-frequency identification (rfid)
    List features of the domain name system (dns)
  • Recognize when to implement dynamic host configuration protocol (dhcp)
    Recognize when and where to implement print, mail, and web servers
    Provide an overview of the syslog server role
    Provide an overview of authentication, authorization, and accounting (aaa) framework
    Identify common online activities they can be used for internet appliances
    Identify risks associated with outdated computing software and hardware commonly found on supervisory control and data acquisition (scada) systems
    Define the internet of things and identify its essential components and their impact on society
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 52s
  • 14m 55s
    In this video, find out how to differentiate between 802.11 standards including 802.11a, 802.11b, 802.11g, 802.11n, 802.11ac, and 802.11ax. FREE ACCESS
  • Locked
    3.  Wireless Frequencies
    11m 23s
    During this video, you will learn how to differentiate between two frequencies, 2.4GHz and 5GHz. FREE ACCESS
  • Locked
    4.  Wireless Channels
    9m 59s
    Learn how to outline channel regulations and differentiate between 2.4GHz and 5GHz channels. FREE ACCESS
  • Locked
    5.  Bluetooth Wireless Networking
    5m 18s
    Learn how to identify scenarios where Bluetooth can be used for wireless networking. FREE ACCESS
  • Locked
    6.  Long-range Fixed Wireless
    4m 43s
    In this video, you will outline considerations for working with long-range fixed wireless including licensed, unlicensed, power, and regulatory requirements. FREE ACCESS
  • Locked
    7.  NFC and RFID
    6m 54s
    After completing this video, you will be able to list features of near-field communication (NFC) and radio-frequency identification (RFID). FREE ACCESS
  • Locked
    8.  Domain Name System (DNS)
    16m 1s
    After completing this video, you will be able to list features of the domain name system (DNS). FREE ACCESS
  • Locked
    9.  Dynamic Host Configuration Protocol (DHCP)
    11m 19s
    After completing this video, you will be able to recognize when to implement the dynamic host configuration protocol (DHCP). FREE ACCESS
  • Locked
    10.  Print, Mail, Syslog , and Web Servers
    15m 14s
    After completing this video, you will be able to recognize when and where to implement print, mail, and web servers. FREE ACCESS
  • Locked
    11.  Syslog Server Role
    7m 41s
    After completing this video, you will be able to provide an overview of the syslog server role. FREE ACCESS
  • Locked
    12.  Authentication, Authorization, and Accounting (AAA)
    12m 40s
    After completing this video, you will be able to provide an overview of authentication, authorization, and accounting (AAA) framework. FREE ACCESS
  • Locked
    13.  Internet Appliances
    12m 44s
    In this video, you will learn how to identify common online activities and how they can be used for internet appliances. FREE ACCESS
  • Locked
    14.  Legacy Systems
    9m 25s
    In this video, learn how to identify risks associated with outdated computing software and hardware commonly found on supervisory control and data acquisition (SCADA) systems. FREE ACCESS
  • Locked
    15.  Internet of Things Devices
    4m 31s
    In this video, learn how to identify risks associated with outdated computing software and hardware commonly found on supervisory control and data acquisition (SCADA) systems. FREE ACCESS
  • Locked
    16.  Course Summary
    1m 4s
    d7a4180d-6d08-4f7a-b8fd-0c0dfe4b41a5 FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 80 users Rating 4.6 of 80 users (80)
Rating 4.4 of 5 users Rating 4.4 of 5 users (5)
Rating 4.4 of 17 users Rating 4.4 of 17 users (17)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 120 users Rating 4.6 of 120 users (120)
Rating 4.5 of 1054 users Rating 4.5 of 1054 users (1054)
Rating 4.4 of 93 users Rating 4.4 of 93 users (93)