The Best Courses on LinkedIn Learning for Network Administrators

The Best Courses on LinkedIn Learning for Network Administrators

Solutions Review compiled the courses on LinkedIn Learning for network administrators of all skill levels.

Network management is a critical task for business IT, as cyber threats continue to be a pressing issue for companies of all sizes. Having the ability to detect network security and performance problems before they happen and prevent them from accessing your systems is fundamental for keeping your users safely connected. Online courses and training are great resources who those who want to learn more about network administration.

With this in mind, the editors at Solutions Review have compiled this list of top-rated LinkedIn Learning courses for network administrators to consider taking. Each course in its catalog is taught by industry experts in software, creativity, and business skills. Courses are listed in no particular order.

The Best Courses on LinkedIn Learning for Network Administrators

Course Title: Networking Foundations: Networking Basics

OUR TAKE: If you’re looking to get your start in networking, we recommend that you start with this course by instructor Kevin Wallace. Students will be given an overview of foundational topics that every networking professional needs to know, as well as an introduction to emerging technologies.

Description: When someone begins to study networking, they’re challenged with knowing where to start. This is due to the wide spectrum of technologies falling under the umbrella of networking. This course provides an overview of the foundational topics any networking professional should know, as well as an introduction to emerging technologies. Instructor Kevin Wallace delves into the purpose of networks, as well as how networking technologies benefit us in both our personal and business lives. He covers network addresses, including the structures of Internet Protocol (IP) version 4 and version 6 addresses. Plus, learn about switches, routers, fiber-optic cabling, and other essential pieces and parts that make networks work; the OSI model; common network services; wireless networks; and more.


Course Title: Learning Network Troubleshooting

OUR TAKE: Led by Mark Jacob, the training discusses fundamental network troubleshooting techniques such as NSLOOKUP, ping, ipconfig, and traceroute. The course also provides an overview of critical network troubleshooting tools and solutions, such as Wireshark.

Description: Troubleshooting network issues is a key skill for a wide range of IT professionals and network professionals. In this course, instructor Robert McMillen teaches you the skills and tools that you need to start network troubleshooting. Robert begins with an overview on how to triage network problems, including basic TCP/IP issues and causes, then steps you through some common home networking and wireless issues. He covers the most common issues with corporate wireless networks and how to troubleshoot Wi-Fi interference. Robert explains different types of VPN, common errors you may encounter, and how to fix them. After showing you some network tools that administrators need to know, he discusses how to fix problems you may run into with routing, switching, and firewalls.


Course Title: Network Forensics

OUR TAKE: Jungwon Ryoo, a Professor of Information Science and Technology and Division Head for Business and Engineering, provides training on the functions of network forensics, including investigating network traffic, protocol analysis, and network forensics tools.

Description: Network forensics is used to find legal evidence in network devices. In this course, Jungwoo Ryoo covers all of the major concepts and tools in this growing technical field. Jungwoo begins by reviewing the basics: the goals of network forensics, a network forensic investigator’s typical toolset, and the legal implications of this type of work. Then, he shows how to prepare for an investigation; acquire network logs and investigate network events; collect and investigate network traffic; and leverage various network forensics tools, such as Wireshark, Splunk, and tcpdump. Along the way, he uses a combination of open-source and commercial software, so you can uncover the information you need with tools that are in your budget.


Course Title: Learning Network Routing

OUR TAKE: Mark Jacob has been an instructor at Interface Technical Training for nearly 14 years. He teaches students about the basics of network routing through this course, including trunk links, virtual LANs, vector and link state protocols, and relay agents.

Description: Learn about the fundamentals of network routing in this course with Mark Jacob. Mark explains what a virtual local area network (VLAN) is and how routing between VLANs works, and provides a better understanding of the Dynamic Host Configuration Protocol (DHCP). The course also covers using a relay agent, configuring a point-to-point serial link, working with dynamic routing protocols, and implementing an Open Shortest Path First (OSPF) protocol.


Course Title: Wireless Networking Essential Training

OUR TAKE: This course, offered by Cisco Certified Internetwork expert Kevin Wallace, this course on the essential mechanics of wireless networking covers topics like wireless LAN design, Wi-Fi channels, IEEE Wi-Fi standards, and installing autonomous and lightweight access points.

Description: Get a broad overview of how wireless networks operate and walk through the steps of setting one up with instructor Kevin Wallace. Kevin discusses wireless LAN design options, wireless standards and security, and more. Kevin also demonstrates how to set up two different types of wireless networks—one using a common consumer-grade router and the other using professional-grade hardware.


Course Title: Ethical Hacking: Wireless Networks

OUR TAKE: Instructor Malcolm Shore, a chief security architect with decades of experience in the cybersecurity field, covers everything you need to know about hacking wireless networks. This course is part of a test prep series for the Certified Ethical Hacker exam offered by EC-Council.

Description: Wireless networks are convenient and popular, but poor configuration and encryption leave them open to attack. Hackers can use Wi-Fi vulnerabilities to infiltrate your entire network. Security professionals need to know how to detect, prevent, and counter these kinds of attacks using the latest tools and techniques—the subject of this course with cybersecurity expert Malcolm Shore. Malcolm covers everything from configuring basic security to understanding how hackers extract passwords, harvest connections at rogue access point, and attack networks via Bluetooth. He also explains how to select the right antennae for testing and introduces some sophisticated Windows and Linux tools to scan for vulnerabilities, including Acrylic, Ekahau, and Wireshark. By the end of the course, you should be able to shore up your wireless connections and gain confidence that your local network is safe to use.


Looking for a solution to help you improve your network performance? Our Network Monitoring Buyer’s Guide contains profiles on the top network performance monitor vendors, as well as questions you should ask providers and yourself before buying.

Check us out on Twitter for the latest in Network Monitoring news and developments!

Daniel Hein