Placement of a Wireless Access Point

Home > Videos > CompTIA Network + > Placement of a Wireless Access Point

Placement of a Wireless Access Point

Like This Video 0 52 Rick Trader
Added by May 15, 2019

This content is from our CompTIA Network + Video Certification Training Course. Start training today!


In this video, CompTIA Network + instructor Rick Trader teaches the best placements of a wireless access point.

In our environments, we’re not always going to want to be bound to the link of a cable to a wall.

There will be instances were we will need to make a device easily movable, such as a laptop or a Surface or a tablet or even a phone.

Videos You May Like

Cable Testers and How to Use them in Network Environments

0 150 0

This content is from our CompTIA Network + Video Certification Training Course. Start training today! In this video, CompTIA Network + instructor Rick Trader demonstrates how to use cable testers in network environments. Let’s look at some tools that we can use to test our different cables in our environment. Cable Testers Properly Wired Connectivity … Continue reading Cable Testers and How to Use them in Network Environments

Creating Users and Managing Passwords in Microsoft Office 365

0 635 3

In this Office 365 training video, instructor Spike Xavier demonstrates how to create users and manage passwords in Office 365.   For instructor-led Office 365 training classes, see our course schedulle: Spike Xavier SharePoint Instructor – Interface Technical Training Phoenix, AZ 20347: Enabling and Managing Office 365    

Detailed Forensic Investigation of Malware Infections – April 21, 2015

4 592 5

How does an investigator hunt down and identify unknown malware? In this recording of our IT Security training webinar on April 21, 2015, Security expert Mike Danseglio (CISSP / CEH) performed several malware investigations on infected computers and identify symptoms, find root cause, and follow the leads to determine what’s happening. He demonstrated his preferred … Continue reading Detailed Forensic Investigation of Malware Infections – April 21, 2015

Write a Comment

Share your thoughts...

Please fill out the comment form below to post a reply.