本站已收录 番号和无损神作磁力链接/BT种子 

CBT Nuggets - Cisco Certification Training 200-301 Cisco CCNA

种子简介

种子名称: CBT Nuggets - Cisco Certification Training 200-301 Cisco CCNA
文件类型: 其他
文件数目: 415个文件
文件大小: 15.02 GB
收录时间: 2021-2-1 08:25
已经下载: 3
资源热度: 275
最近下载: 2024-5-16 01:05

下载BT种子文件

下载Torrent文件(.torrent) 立即下载

磁力链接下载

magnet:?xt=urn:btih:372743ebbd1b377a1ec2a8e274f415eef197e670&dn=CBT Nuggets - Cisco Certification Training 200-301 Cisco CCNA 复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。

喜欢这个种子的人也喜欢

种子包含的文件

CBT Nuggets - Cisco Certification Training 200-301 Cisco CCNA.torrent
  • 1-Introduction to CCNA (200-301) with Jeremy/1. Introduction to CCNA (200-301) with Jeremy.ts10.81MB
  • 10-Discern Copper and Fiber Optic Network Cable Characteristics/1. Introduction Connect Networks with Copper and Fiber Optic Cable.ts3.77MB
  • 10-Discern Copper and Fiber Optic Network Cable Characteristics/2. Copper Cable.ts41.09MB
  • 10-Discern Copper and Fiber Optic Network Cable Characteristics/3. Two Styles of Fiber.ts31.06MB
  • 10-Discern Copper and Fiber Optic Network Cable Characteristics/4. Fiber Port Types.ts42.47MB
  • 10-Discern Copper and Fiber Optic Network Cable Characteristics/5. Part 1 Connecting the CCNA Lab.ts37.54MB
  • 11-Connect and Navigate Cisco Internetwork Operating System (IOS)/1. Introduction to Connect and Navigate Cisco Internetwork Operating System (IOS).ts6.81MB
  • 11-Connect and Navigate Cisco Internetwork Operating System (IOS)/10. Review of Connect and Navigate Cisco Internetwork Operating System (IOS).ts23.28MB
  • 11-Connect and Navigate Cisco Internetwork Operating System (IOS)/2. Methods of Managing Cisco Devices.ts41.4MB
  • 11-Connect and Navigate Cisco Internetwork Operating System (IOS)/3. Configuring a Console Connection in Windows.ts33.58MB
  • 11-Connect and Navigate Cisco Internetwork Operating System (IOS)/4. Configuring a Console Connection in MacOS.ts27.45MB
  • 11-Connect and Navigate Cisco Internetwork Operating System (IOS)/5. Answering the Epic Post-Boot Question.ts38.83MB
  • 11-Connect and Navigate Cisco Internetwork Operating System (IOS)/6. Using Cisco IOS Navigation Commands.ts53.13MB
  • 11-Connect and Navigate Cisco Internetwork Operating System (IOS)/7. Modes that Made Cisco Famous.ts50.83MB
  • 11-Connect and Navigate Cisco Internetwork Operating System (IOS)/8. Interface Connections and Numbering.ts27.59MB
  • 11-Connect and Navigate Cisco Internetwork Operating System (IOS)/9. Preparing for the Initial Configuration.ts109.21MB
  • 12-Create a Base Configuration for Cisco Devices/1. Introduction to Create a Base Configuration for Cisco Devices.ts6.1MB
  • 12-Create a Base Configuration for Cisco Devices/2. Configuring Device Identification (Hostname and Banner).ts37.72MB
  • 12-Create a Base Configuration for Cisco Devices/3. Configuring Foundation Security and Passwords (Console, VTY, Enable Sec).ts67.2MB
  • 12-Create a Base Configuration for Cisco Devices/4. Configuring IP Addresses and Enabling Interfaces.ts44.03MB
  • 12-Create a Base Configuration for Cisco Devices/5. Initial Tuning and Configuration Management.ts64.57MB
  • 12-Create a Base Configuration for Cisco Devices/6. Telnet and SSH Implementation.ts71.21MB
  • 12-Create a Base Configuration for Cisco Devices/7. Ensuring Proper Base Configurations.ts169.61MB
  • 12-Create a Base Configuration for Cisco Devices/8. Review of Create a Base Configuration for Cisco Devices.ts22.29MB
  • 13-Create a Base Configuration for Cisco Devices Hands-On Lab/1. Introduction to Your Virtual Hands-on Labs.ts4.05MB
  • 13-Create a Base Configuration for Cisco Devices Hands-On Lab/2. Basic IOS Navigation Lab.ts67.14MB
  • 13-Create a Base Configuration for Cisco Devices Hands-On Lab/3. Hostnames and MOTD Banners Lab.ts33.25MB
  • 13-Create a Base Configuration for Cisco Devices Hands-On Lab/4. Configuring and Verifying Interfaces and IP Addresses Lab.ts45.36MB
  • 13-Create a Base Configuration for Cisco Devices Hands-On Lab/5. Configure DNS and Router Interfaces.ts48.26MB
  • 13-Create a Base Configuration for Cisco Devices Hands-On Lab/6. Cisco Router and Switch CLI Review Lab.ts18.38MB
  • 13-Create a Base Configuration for Cisco Devices Hands-On Lab/7. Review of Hands-On Lab.ts15.51MB
  • 14-Wireshark Fundamentals Capturing, Viewing, and Filtering Data/1. Introducing Wireshark Fundamentals.ts3.41MB
  • 14-Wireshark Fundamentals Capturing, Viewing, and Filtering Data/2. Performing an Initial Capture.ts45.49MB
  • 14-Wireshark Fundamentals Capturing, Viewing, and Filtering Data/3. The OSI Model in Wireshark.ts51.66MB
  • 14-Wireshark Fundamentals Capturing, Viewing, and Filtering Data/4. Learning from Idle Network Data.ts50.17MB
  • 14-Wireshark Fundamentals Capturing, Viewing, and Filtering Data/5. Practical Wireshark ARP.ts27.37MB
  • 14-Wireshark Fundamentals Capturing, Viewing, and Filtering Data/6. Practical Wireshark Rogue DHCP.ts37.88MB
  • 14-Wireshark Fundamentals Capturing, Viewing, and Filtering Data/7. Practical Wireshark DNS.ts32.67MB
  • 14-Wireshark Fundamentals Capturing, Viewing, and Filtering Data/8. Practical Wireshark Telnet.ts23.02MB
  • 14-Wireshark Fundamentals Capturing, Viewing, and Filtering Data/9. Reviewing Wireshark Fundamentals.ts22.7MB
  • 15-Describe and Analyze TCP and UDP Communication/1. Introduction to Describe and Analyze TCP and UDP Communication.ts4.11MB
  • 15-Describe and Analyze TCP and UDP Communication/2. How TCP Starts a Session.ts70.91MB
  • 15-Describe and Analyze TCP and UDP Communication/3. How TCP Sends Data (TCP Windowing).ts42.22MB
  • 15-Describe and Analyze TCP and UDP Communication/4. How TCP Ends a Session.ts40.14MB
  • 15-Describe and Analyze TCP and UDP Communication/5. How UDP Communicates.ts48.23MB
  • 15-Describe and Analyze TCP and UDP Communication/6. Review of Describe and Analyze TCP and UDP Communication.ts22.71MB
  • 16-Configure Windows, MAC, or Linux for Network Access/1. Introduction to Configure Windows, MAC, or Linux for Network Access.ts5.84MB
  • 16-Configure Windows, MAC, or Linux for Network Access/2. Configuring and Testing Windows Network Access.ts45.94MB
  • 16-Configure Windows, MAC, or Linux for Network Access/3. Configuring and Testing MacOS Network Access.ts29.64MB
  • 16-Configure Windows, MAC, or Linux for Network Access/4. Configuring and Testing Ubuntu Linux Network Access.ts66.84MB
  • 16-Configure Windows, MAC, or Linux for Network Access/5. Review of Configure Windows, MAC, or Linux for Network Access.ts9.86MB
  • 17-Describe Network Switch Functions and How to Locate Network Devices/2. Connecting Devices to a Switch.ts31.72MB
  • 17-Describe Network Switch Functions and How to Locate Network Devices/3. Switches Learning MAC Addresses.ts54.8MB
  • 17-Describe Network Switch Functions and How to Locate Network Devices/4. Viewing and Filtering MAC Address Tables.ts37.12MB
  • 17-Describe Network Switch Functions and How to Locate Network Devices/5. Locating Devices on a Network Switch.ts78.92MB
  • 17-Describe Network Switch Functions and How to Locate Network Devices/6. Locating Devices Lab.ts35.43MB
  • 17-Describe Network Switch Functions and How to Locate Network Devices/7. Review of Describe Network Switch Functions and How to Locate Network Devices.ts13.32MB
  • 18-Diagnose Interface Status, Errors, and Cabling Issues on a Cisco Switch/2. Common Copper and Fiber Physical Issues.ts55.23MB
  • 18-Diagnose Interface Status, Errors, and Cabling Issues on a Cisco Switch/3. The Quick Way to See Interface Status.ts30.3MB
  • 18-Diagnose Interface Status, Errors, and Cabling Issues on a Cisco Switch/4. Examining Speed and Duplex Mismatches.ts40.58MB
  • 18-Diagnose Interface Status, Errors, and Cabling Issues on a Cisco Switch/5. Deep-Dive Into Interface Counters.ts98.06MB
  • 19-Describe Power over Ethernet (PoE) Capabilities and Standards/1. Introduction to Describe Power over Ethernet (PoE) Capabilities and Standards.ts5.06MB
  • 19-Describe Power over Ethernet (PoE) Capabilities and Standards/2. How Power over Ethernet (PoE) Works.ts44.8MB
  • 19-Describe Power over Ethernet (PoE) Capabilities and Standards/3. Exploring PoE Standards.ts42.68MB
  • 19-Describe Power over Ethernet (PoE) Capabilities and Standards/4. PoE in Action on a Cisco Switch.ts26.9MB
  • 19-Describe Power over Ethernet (PoE) Capabilities and Standards/5. Review of Describe Power over Ethernet (PoE) Capabilities and Standards.ts13.87MB
  • 2-Introduction to CCNA (200-301) with Keith/1. Introduction to CCNA (200-301) with Keith.ts39.6MB
  • 20-Explain IP Addressing and Subnetting Concepts/1. Introduction to Explain IP Addressing and Subnetting Concepts.ts4.7MB
  • 20-Explain IP Addressing and Subnetting Concepts/2. The Classes of Addresses from A to E.ts58.81MB
  • 20-Explain IP Addressing and Subnetting Concepts/3. The Fundamentals of IP, Mask, and Gateway.ts63.54MB
  • 20-Explain IP Addressing and Subnetting Concepts/4. Public and Private Address Ranges.ts80.92MB
  • 20-Explain IP Addressing and Subnetting Concepts/5. Network Designs that Require Subnetting.ts49.84MB
  • 20-Explain IP Addressing and Subnetting Concepts/6. Review of Explain IP Addressing and Subnetting Concepts.ts13.76MB
  • 21-Convert Decimal to Binary and Back/1. Introduction to Converting from Decimal to Binary and Back.ts3.35MB
  • 21-Convert Decimal to Binary and Back/2. Process of Binary Conversion.ts45.45MB
  • 21-Convert Decimal to Binary and Back/3. Practicing Decimal to Binary.ts35.87MB
  • 21-Convert Decimal to Binary and Back/4. Practicing Binary to Decimal.ts18.29MB
  • 22-Perform Subnetting Based on Network Requirements/1. Introduction to Perform Subnetting Based on Network Requirements.ts3.93MB
  • 22-Perform Subnetting Based on Network Requirements/2. Subnetting Class C Networks Based on Network Requirements.ts89.72MB
  • 22-Perform Subnetting Based on Network Requirements/3. Subnetting Class B Networks Based on Network Requirements.ts70.05MB
  • 22-Perform Subnetting Based on Network Requirements/4. Subnetting Class A Networks Based on Network Requirements.ts45.9MB
  • 22-Perform Subnetting Based on Network Requirements/5. Troublesome Networks.ts31.01MB
  • 22-Perform Subnetting Based on Network Requirements/6. Review of Perform Subnetting Based on Network Requirements.ts58.2MB
  • 23-Perform Subnetting Based on Host Requirements/1. Introduction to Perform Subnetting Based on Host Requirements.ts3.6MB
  • 23-Perform Subnetting Based on Host Requirements/2. Subnetting Class C Networks Based on Host Requirements.ts35.73MB
  • 23-Perform Subnetting Based on Host Requirements/3. Subnetting Class B Networks Based on Host Requirements.ts19.25MB
  • 23-Perform Subnetting Based on Host Requirements/4. Subnetting Class A Networks Based on Host Requirements.ts37.64MB
  • 23-Perform Subnetting Based on Host Requirements/5. Troublesome Hosts.ts30.03MB
  • 23-Perform Subnetting Based on Host Requirements/6. Additional Examples of Subnetting Based on Host Requirements.ts52.17MB
  • 24-Reverse Engineering Subnets and Using VLSM/1. Introduction to Reverse Engineering Subnets and VLSM.ts4.98MB
  • 24-Reverse Engineering Subnets and Using VLSM/2. Doing Subnetting Backwards.ts32.12MB
  • 24-Reverse Engineering Subnets and Using VLSM/3. Practical Reverse Engineering Examples.ts60.04MB
  • 24-Reverse Engineering Subnets and Using VLSM/4. What is VLSM.ts66.76MB
  • 24-Reverse Engineering Subnets and Using VLSM/5. VLSM Scenario.ts104.39MB
  • 25-Describe IPv6 Core Addressing Concepts/1. Introduction to Describe IPv6 Core Addressing Concepts.ts4.79MB
  • 25-Describe IPv6 Core Addressing Concepts/2. Comparing IPv4 and IPv6.ts43.35MB
  • 25-Describe IPv6 Core Addressing Concepts/3. Binary, Decimal, and Hex.ts57.37MB
  • 25-Describe IPv6 Core Addressing Concepts/4. Making IPv6 Addresses Shorter.ts35.13MB
  • 25-Describe IPv6 Core Addressing Concepts/5. Types of IPv6 Addresses.ts95.56MB
  • 25-Describe IPv6 Core Addressing Concepts/6. Designing IPv6 Addressing.ts58.17MB
  • 25-Describe IPv6 Core Addressing Concepts/7. Configuring IPv6 Addressing.ts48.92MB
  • 25-Describe IPv6 Core Addressing Concepts/8. Configure IPv6 Addressing Lab.ts34.57MB
  • 25-Describe IPv6 Core Addressing Concepts/9. Review of Describe IPv6 Core Addressing Concepts.ts27.42MB
  • 26-Design a Basic Wireless Network/1. Introduction to Describe Wireless Frequency and Design Fundamentals.ts5.35MB
  • 26-Design a Basic Wireless Network/2. What is a Wireless Signal.ts73.19MB
  • 26-Design a Basic Wireless Network/3. Battle of the Bands.ts61.95MB
  • 26-Design a Basic Wireless Network/4. Basic and Extended SSIDs and WAP Placement.ts57.22MB
  • 26-Design a Basic Wireless Network/5. Review of Describe Wireless Frequency and Design Fundamentals.ts24.91MB
  • 27-Explain VLANs and Configure VLANs on a Single Switch/1. Introduction to Explain VLAN Concepts and Configure VLANs on a Single Switch.ts4.57MB
  • 27-Explain VLANs and Configure VLANs on a Single Switch/2. How VLANs Changed the World.ts67.41MB
  • 27-Explain VLANs and Configure VLANs on a Single Switch/3. Routing Between VLANs.ts56.11MB
  • 27-Explain VLANs and Configure VLANs on a Single Switch/4. Configuring VLANs on a Single Switch.ts102.04MB
  • 27-Explain VLANs and Configure VLANs on a Single Switch/5. Configuring a Router on a Stick.ts90.16MB
  • 27-Explain VLANs and Configure VLANs on a Single Switch/6. Configuring VLANs on a Single Switch Lab.ts60.26MB
  • 27-Explain VLANs and Configure VLANs on a Single Switch/7. Review of Explain VLAN Concepts and Configure VLANs on a Single Switch.ts17.03MB
  • 28-Configure Trunking Between Switches, WAPs, and Servers/1. Introduction to Configure Trunking Between Switches, WAPs, Servers.ts4.62MB
  • 28-Configure Trunking Between Switches, WAPs, and Servers/10. Review of Configure Trunking Between Switches, WAPs, Servers, and More.ts32.97MB
  • 28-Configure Trunking Between Switches, WAPs, and Servers/2. Understanding DTP and the Native VLAN.ts83.81MB
  • 28-Configure Trunking Between Switches, WAPs, and Servers/3. Configuring Trunks the Right Way.ts39.97MB
  • 28-Configure Trunking Between Switches, WAPs, and Servers/4. Weird and Wacky World of VTP.ts39.95MB
  • 28-Configure Trunking Between Switches, WAPs, and Servers/5. Configuring VTP.ts55.6MB
  • 28-Configure Trunking Between Switches, WAPs, and Servers/6. Limiting or Adding VLANs to Trunks.ts37.65MB
  • 28-Configure Trunking Between Switches, WAPs, and Servers/7. Connecting Trunks to Servers, WAPs, and More.ts60.3MB
  • 28-Configure Trunking Between Switches, WAPs, and Servers/8. Deploying VLSM in a VLAN Network.ts80.21MB
  • 28-Configure Trunking Between Switches, WAPs, and Servers/9. Configuring VLANs, Trunking, and Routing Lab.ts104.1MB
  • 29-Create a Network Diagram with Cisco CDP and LLDP/1. Introduction to Create a Network Diagram with Cisco CDP and LLDP.ts5.19MB
  • 29-Create a Network Diagram with Cisco CDP and LLDP/2. What is CDP and LLDP.ts32.79MB
  • 29-Create a Network Diagram with Cisco CDP and LLDP/3. Configuring and Tuning CDP and LLDP.ts44.04MB
  • 29-Create a Network Diagram with Cisco CDP and LLDP/4. Creating a Network Diagram using CDP and LLDP.ts36.24MB
  • 29-Create a Network Diagram with Cisco CDP and LLDP/5. Creating a Network Diagram with CDP Lab.ts25.22MB
  • 29-Create a Network Diagram with Cisco CDP and LLDP/6. Review of Create a Network Diagram with Cisco CDP and LLDP.ts13.13MB
  • 3-Introduction to CCNA (200-301) with NetworkChuck/Introduction to CCNA (200-301) with NetworkChuck.ts9.61MB
  • 30-Design and Configure a Rapid Spanning Tree Protocol (STP) Network/1. Introduction to Design and Configure a Rapid Spanning Tree Protocol (STP) Network.ts4.71MB
  • 30-Design and Configure a Rapid Spanning Tree Protocol (STP) Network/2. What Does STP Do.ts61.08MB
  • 30-Design and Configure a Rapid Spanning Tree Protocol (STP) Network/3. Understanding STP Standards.ts46.67MB
  • 30-Design and Configure a Rapid Spanning Tree Protocol (STP) Network/4. How the Root Bridge is Elected.ts71.87MB
  • 30-Design and Configure a Rapid Spanning Tree Protocol (STP) Network/5. How to Determine Your STP Topology.ts104.97MB
  • 30-Design and Configure a Rapid Spanning Tree Protocol (STP) Network/6. Configuring Basic STP and Verifying Results.ts67.28MB
  • 30-Design and Configure a Rapid Spanning Tree Protocol (STP) Network/7. Identifying and Configuring STP Ports and Root Bridge Lab.ts78.61MB
  • 30-Design and Configure a Rapid Spanning Tree Protocol (STP) Network/8. Review of Design and Configure a Rapid Spanning Tree Protocol (STP) Network.ts26.61MB
  • 31-Increase Network Capacity Using EtherChannel/1. Introduction to Increase Network Capacity Using EtherChannel.ts5.93MB
  • 31-Increase Network Capacity Using EtherChannel/2. What is EtherChannel.ts60.37MB
  • 31-Increase Network Capacity Using EtherChannel/3. Configuring and Verifying EtherChannel.ts105.24MB
  • 31-Increase Network Capacity Using EtherChannel/4. Modifying EtherChannel Load Distribution.ts47.33MB
  • 31-Increase Network Capacity Using EtherChannel/5. Review of Increase Network Capacity Using EtherChannel.ts14.11MB
  • 32-Configure a Basic Cisco Wireless Network using the WLC GUI/1. Introduction to Configure a Basic Cisco Wireless Network using the WLC GUI.ts5.22MB
  • 32-Configure a Basic Cisco Wireless Network using the WLC GUI/2. Cisco WLC Puzzle Pieces.ts42.94MB
  • 32-Configure a Basic Cisco Wireless Network using the WLC GUI/3. Accessing a Cisco WLC for the First Time.ts45.24MB
  • 32-Configure a Basic Cisco Wireless Network using the WLC GUI/4. Base Level WLC Configuration.ts72.4MB
  • 32-Configure a Basic Cisco Wireless Network using the WLC GUI/5. Review of Configure a Basic Cisco Wireless Network using the WLC GUI.ts14.58MB
  • 33-Explain End-To-End IP Communications/1. Introducing End-To-End IP Communications.ts15.61MB
  • 33-Explain End-To-End IP Communications/2. TCPIP Protocol Stack Review.ts41.09MB
  • 33-Explain End-To-End IP Communications/3. Routers and Multilayer Switches.ts37.45MB
  • 33-Explain End-To-End IP Communications/4. Predicting the Correct L2 and L3 Addresses.ts57.14MB
  • 33-Explain End-To-End IP Communications/5. Logical and Physical Topologies Lab.ts44.43MB
  • 33-Explain End-To-End IP Communications/6. Identifying and Correcting a Layer 2 Path.ts48.47MB
  • 33-Explain End-To-End IP Communications/7. Topology and Lab Strategy.ts22.61MB
  • 33-Explain End-To-End IP Communications/8. Reviewing End-To-End IP Communications.ts5.08MB
  • 34-Configure and Verify Cisco IPv4 Static Routes/1. Introducing IPv4 Static Routing.ts4.81MB
  • 34-Configure and Verify Cisco IPv4 Static Routes/10. Static Routes using an Outbound Interface.ts37.32MB
  • 34-Configure and Verify Cisco IPv4 Static Routes/11. IPv4 Static Routes Review.ts43.7MB
  • 34-Configure and Verify Cisco IPv4 Static Routes/12. IPv4 Static Route Case Study and Lab.ts61.97MB
  • 34-Configure and Verify Cisco IPv4 Static Routes/13. Review of Configure and Verify Cisco IPv4 Static Routes.ts57.52MB
  • 34-Configure and Verify Cisco IPv4 Static Routes/2. How a Router Learns IP Routes.ts32.84MB
  • 34-Configure and Verify Cisco IPv4 Static Routes/3. Adding Directly Connected IPv4 Routes.ts58.54MB
  • 34-Configure and Verify Cisco IPv4 Static Routes/4. Planning Static Network Routes.ts52.25MB
  • 34-Configure and Verify Cisco IPv4 Static Routes/5. Configuring Static IPv4 Network Routes.ts56.13MB
  • 34-Configure and Verify Cisco IPv4 Static Routes/6. Adding Static Host Routes.ts46.17MB
  • 34-Configure and Verify Cisco IPv4 Static Routes/7. Implementing Static Default Routes.ts33.54MB
  • 34-Configure and Verify Cisco IPv4 Static Routes/8. Floating Static Routes Overview.ts41.29MB
  • 34-Configure and Verify Cisco IPv4 Static Routes/9. Configuring and Verifying Static Floating Routes.ts51.96MB
  • 35-Configure and Verify Cisco IPv6 Static Routes/1. Introducing IPv6 Static Routes.ts6.19MB
  • 35-Configure and Verify Cisco IPv6 Static Routes/2. IPv6 Static Route Lab Topology.ts24.05MB
  • 35-Configure and Verify Cisco IPv6 Static Routes/3. Adding IPv6 Directly Connected Routes.ts60.32MB
  • 35-Configure and Verify Cisco IPv6 Static Routes/4. Planning Static IPv6 Network and Default Routes.ts34.53MB
  • 35-Configure and Verify Cisco IPv6 Static Routes/5. Configuring Static IPv6 Default and Network Routes.ts49.64MB
  • 35-Configure and Verify Cisco IPv6 Static Routes/6. Floating Static IPv6 Host Routes.ts51.33MB
  • 35-Configure and Verify Cisco IPv6 Static Routes/7. IPv6 Static Routes Review.ts28.34MB
  • 35-Configure and Verify Cisco IPv6 Static Routes/8. IPv6 Static Route Case Study and Lab.ts70.92MB
  • 35-Configure and Verify Cisco IPv6 Static Routes/9. Review of Configure and Verify Cisco IPv6 Static Routes.ts12.36MB
  • 36-Describe Cisco Dynamic IPv4 Routing with OSPF/1. Introducing OSPF Concepts.ts3.19MB
  • 36-Describe Cisco Dynamic IPv4 Routing with OSPF/10. Verifying OSPF Adjacencies.ts40.02MB
  • 36-Describe Cisco Dynamic IPv4 Routing with OSPF/11. OSPF LSAs and DRs.ts30.98MB
  • 36-Describe Cisco Dynamic IPv4 Routing with OSPF/12. OSPF and Point-to-Point Networks.ts23.29MB
  • 36-Describe Cisco Dynamic IPv4 Routing with OSPF/13. Review of Describe Cisco Dynamic IPv4 Routing with OSPF.ts28.19MB
  • 36-Describe Cisco Dynamic IPv4 Routing with OSPF/14. OSPF Concepts Wrap-Up.ts3.04MB
  • 36-Describe Cisco Dynamic IPv4 Routing with OSPF/2. Dynamic vs. Static Routing.ts52.32MB
  • 36-Describe Cisco Dynamic IPv4 Routing with OSPF/3. OSPF Path Cost.ts43.78MB
  • 36-Describe Cisco Dynamic IPv4 Routing with OSPF/4. OSPF Router ID (RID).ts38.31MB
  • 36-Describe Cisco Dynamic IPv4 Routing with OSPF/5. OSPF Areas.ts28.49MB
  • 36-Describe Cisco Dynamic IPv4 Routing with OSPF/6. Wildcard Masks and Network Statements.ts36.47MB
  • 36-Describe Cisco Dynamic IPv4 Routing with OSPF/7. OSPF Wildcards on Clean Octet Boundaries.ts46.8MB
  • 36-Describe Cisco Dynamic IPv4 Routing with OSPF/8. OSPF Wildcards for Subnets.ts51.7MB
  • 36-Describe Cisco Dynamic IPv4 Routing with OSPF/9. DR and BDRs on Broadcast Networks.ts36.21MB
  • 37-Implement Cisco Dynamic IPv4 Routing with OSPF/1. Introduction to Implement Cisco Dynamic IPv4 Routing with OSPF.ts3.84MB
  • 37-Implement Cisco Dynamic IPv4 Routing with OSPF/10. Real World OSPF Case Study and Lab.ts110.65MB
  • 37-Implement Cisco Dynamic IPv4 Routing with OSPF/11. Review of Implement Cisco Dynamic IPv4 Routing with OSPF.ts11.3MB
  • 37-Implement Cisco Dynamic IPv4 Routing with OSPF/2. Lab Topology Introduction.ts18.92MB
  • 37-Implement Cisco Dynamic IPv4 Routing with OSPF/3. Implementing Loopbacks for OSPF.ts48.81MB
  • 37-Implement Cisco Dynamic IPv4 Routing with OSPF/4. Implementing OSPF with Exact Network Statements.ts23.46MB
  • 37-Implement Cisco Dynamic IPv4 Routing with OSPF/5. Adding more OSPF Routers.ts38.02MB
  • 37-Implement Cisco Dynamic IPv4 Routing with OSPF/6. OSPF Link Cost Calculation.ts53.49MB
  • 37-Implement Cisco Dynamic IPv4 Routing with OSPF/7. OSPF Neighbor Adjacencies.ts42.88MB
  • 37-Implement Cisco Dynamic IPv4 Routing with OSPF/8. Default Routes in OSPF Overview.ts23.05MB
  • 37-Implement Cisco Dynamic IPv4 Routing with OSPF/9. Implementing a Default Route in OSPF.ts38.51MB
  • 38-Interpret and Describe a Cisco IP Routing Table/1. Introduction to Interpret and Describe a Cisco IP Routing Table.ts4.05MB
  • 38-Interpret and Describe a Cisco IP Routing Table/2. Routing Protocol Codes.ts21.77MB
  • 38-Interpret and Describe a Cisco IP Routing Table/3. Network Prefix and Mask.ts21.95MB
  • 38-Interpret and Describe a Cisco IP Routing Table/4. Next Hop.ts30.51MB
  • 38-Interpret and Describe a Cisco IP Routing Table/5. Administrative Distance (AD).ts39.65MB
  • 38-Interpret and Describe a Cisco IP Routing Table/6. The Routing Table Metric.ts22.4MB
  • 38-Interpret and Describe a Cisco IP Routing Table/7. Gateway of Last Resort.ts26.14MB
  • 38-Interpret and Describe a Cisco IP Routing Table/8. Using a Routing Table in a Production Network.ts63.9MB
  • 38-Interpret and Describe a Cisco IP Routing Table/9. Review of Interpret and Describe a Cisco IP Routing Table.ts31.16MB
  • 39-Predict a Cisco Router’s IP Forwarding Decisions/1. Introduction to Predict a Cisco Router’s IP Forwarding Decisions.ts3.45MB
  • 39-Predict a Cisco Router’s IP Forwarding Decisions/10. Review of Predict a Cisco Router’s IP Forwarding Decisions.ts25.12MB
  • 39-Predict a Cisco Router’s IP Forwarding Decisions/2. Winning Routes of a Router's Table (Concepts).ts24.35MB
  • 39-Predict a Cisco Router’s IP Forwarding Decisions/3. Preferring a Better Route Due to AD Lab.ts36.44MB
  • 39-Predict a Cisco Router’s IP Forwarding Decisions/4. Choosing a Route Based on the Metric or Cost.ts28.93MB
  • 39-Predict a Cisco Router’s IP Forwarding Decisions/5. Concepts of Using the Longest Match in the Routing Table.ts15.8MB
  • 39-Predict a Cisco Router’s IP Forwarding Decisions/6. Longest Match Routing Lab.ts51.94MB
  • 39-Predict a Cisco Router’s IP Forwarding Decisions/7. Identifying Which Routes Include a Specific IP.ts62.01MB
  • 39-Predict a Cisco Router’s IP Forwarding Decisions/8. Route or Drop The Prediction Game.ts62.86MB
  • 39-Predict a Cisco Router’s IP Forwarding Decisions/9. Case Study and Lab Predicting the Router's Decisions.ts69.8MB
  • 4-Build a Physical Cisco Lab Environment/1. Introduction to Build a Physical Cisco Lab Environment.ts8.3MB
  • 4-Build a Physical Cisco Lab Environment/2. Why Use a Physical Lab.ts43.02MB
  • 4-Build a Physical Cisco Lab Environment/3. Understanding Common Switch Models.ts35.51MB
  • 4-Build a Physical Cisco Lab Environment/4. Understanding Common Router Models.ts29.16MB
  • 4-Build a Physical Cisco Lab Environment/5. Understanding Device Memory Requirements.ts29.56MB
  • 4-Build a Physical Cisco Lab Environment/6. Understanding Common Modules.ts61.79MB
  • 4-Build a Physical Cisco Lab Environment/7. Performing Password Recovery.ts65.51MB
  • 4-Build a Physical Cisco Lab Environment/8. Building a CCNA Lab Environment.ts57.9MB
  • 40-Configure and Verify Cisco’s Router on a Stick/1. Introducing a Router on a Stick.ts4.14MB
  • 40-Configure and Verify Cisco’s Router on a Stick/2. Router on a Stick Concepts.ts30.72MB
  • 40-Configure and Verify Cisco’s Router on a Stick/3. Implementing Router on a Stick.ts48.53MB
  • 40-Configure and Verify Cisco’s Router on a Stick/4. Using Router on a Stick in Production.ts54.07MB
  • 40-Configure and Verify Cisco’s Router on a Stick/5. Review of Configure and Verify Cisco’s Router on a Stick.ts12.35MB
  • 41-Troubleshoot an IP Network/1. Introducing the Troubleshooting Labs.ts3.2MB
  • 41-Troubleshoot an IP Network/2. Troubleshooting Tips.ts21.77MB
  • 41-Troubleshoot an IP Network/3. Troubleshooting Topology.ts18.16MB
  • 41-Troubleshoot an IP Network/4. Trouble Ticket 1 with Guest Jeff Kish.ts85.76MB
  • 41-Troubleshoot an IP Network/5. Trouble Ticket 2 with Guest Knox Hutchinson.ts56.88MB
  • 41-Troubleshoot an IP Network/6. Trouble Ticket 3 with Guest Bart Castle.ts73.61MB
  • 41-Troubleshoot an IP Network/7. Trouble Ticket 4 with Keith Barker.ts60.03MB
  • 42-Cisco NAT Concepts and Base Configurations Static and Overload/1. Introducing Cisco NAT Concepts and Base Configurations.ts4.04MB
  • 42-Cisco NAT Concepts and Base Configurations Static and Overload/2. Using Different NAT Strategies.ts102.57MB
  • 42-Cisco NAT Concepts and Base Configurations Static and Overload/3. Defining NAT Terminology.ts46.13MB
  • 42-Cisco NAT Concepts and Base Configurations Static and Overload/4. Configuring NAT Overload.ts121.91MB
  • 42-Cisco NAT Concepts and Base Configurations Static and Overload/5. Configuring Static NAT.ts88.3MB
  • 42-Cisco NAT Concepts and Base Configurations Static and Overload/6. Configuring and Verifying Cisco NAT Lab.ts68.68MB
  • 42-Cisco NAT Concepts and Base Configurations Static and Overload/7. Reviewing Cisco NAT Concepts and Base Configurations.ts29.31MB
  • 43-Configure and Verify Cisco NTP/1. Introduction to Configure and Verify Cisco NTP.ts3.83MB
  • 43-Configure and Verify Cisco NTP/2. What is NTP.ts30.24MB
  • 43-Configure and Verify Cisco NTP/3. Configuring an NTP Client.ts30.41MB
  • 43-Configure and Verify Cisco NTP/4. Configuring an NTP Server.ts30.65MB
  • 43-Configure and Verify Cisco NTP/5. Review of Configure and Verify Cisco NTP.ts13.27MB
  • 44-Configure DHCP Server and Relay Functions/1. Introduction to Configure DHCP Server and Relay Functions.ts5.01MB
  • 44-Configure DHCP Server and Relay Functions/2. DHCP Server, Client, and Relay.ts51.47MB
  • 44-Configure DHCP Server and Relay Functions/3. Configuring a Cisco DHCP Server.ts75.81MB
  • 44-Configure DHCP Server and Relay Functions/4. Configuring DHCP Relay in a Cisco Network.ts47.56MB
  • 44-Configure DHCP Server and Relay Functions/5. DHCP Lab.ts33.17MB
  • 44-Configure DHCP Server and Relay Functions/6. Review of Configure DHCP Server and Relay Functions.ts16.44MB
  • 45-Explain Common Network Services SNMP, Syslog, QoS, and TFTP-FTP/1. Introducing Common Network Services.ts4.88MB
  • 45-Explain Common Network Services SNMP, Syslog, QoS, and TFTP-FTP/2. SNMP.ts80.58MB
  • 45-Explain Common Network Services SNMP, Syslog, QoS, and TFTP-FTP/3. Syslog.ts42.8MB
  • 45-Explain Common Network Services SNMP, Syslog, QoS, and TFTP-FTP/4. QoS.ts80.5MB
  • 45-Explain Common Network Services SNMP, Syslog, QoS, and TFTP-FTP/5. TFTP-FTP.ts28.78MB
  • 45-Explain Common Network Services SNMP, Syslog, QoS, and TFTP-FTP/6. Reviewing Common Network Services.ts17.13MB
  • 46-Define Key Concepts Regarding Network Security/1. Introduction to Define Key Concepts Regarding Network Security.ts2.3MB
  • 46-Define Key Concepts Regarding Network Security/2. Security Overview and CIA.ts16.77MB
  • 46-Define Key Concepts Regarding Network Security/3. Vulnerabilities.ts24.34MB
  • 46-Define Key Concepts Regarding Network Security/4. Exploits.ts31.69MB
  • 46-Define Key Concepts Regarding Network Security/5. Threats and Risk.ts18.38MB
  • 46-Define Key Concepts Regarding Network Security/6. Mitigation Techniques and.ts37.64MB
  • 46-Define Key Concepts Regarding Network Security/7. Review of Define Key Concepts Regarding Network Security.ts12.76MB
  • 47-Describe Security Program Elements/1. Introducing Security Program Elements.ts1.54MB
  • 47-Describe Security Program Elements/2. Polices as Part of a Security Program.ts20.3MB
  • 47-Describe Security Program Elements/3. User Awareness and Training.ts19.5MB
  • 47-Describe Security Program Elements/4. Physical Controls and Review.ts23.89MB
  • 48-Describe Elements of Secure Password Policies/1. Introduction to Describe Elements of Secure Password Policies.ts3.85MB
  • 48-Describe Elements of Secure Password Policies/2. Password Policies.ts29.79MB
  • 48-Describe Elements of Secure Password Policies/3. Password Managers.ts26.36MB
  • 48-Describe Elements of Secure Password Policies/4. Multi-Factor Authentication (MFA).ts43.41MB
  • 48-Describe Elements of Secure Password Policies/5. Review of Describe Elements of Secure Password Policies.ts16.21MB
  • 49-Configure Cisco Device Access Control Using Local Passwords/1. Introducing Local Passwords.ts3.76MB
  • 49-Configure Cisco Device Access Control Using Local Passwords/2. Default Behavior for Console Access.ts35.83MB
  • 49-Configure Cisco Device Access Control Using Local Passwords/3. Default Behavior for Aux Access.ts39.84MB
  • 49-Configure Cisco Device Access Control Using Local Passwords/4. Passwords for VTY Login.ts39.04MB
  • 49-Configure Cisco Device Access Control Using Local Passwords/5. Storing Local Passwords.ts28.34MB
  • 49-Configure Cisco Device Access Control Using Local Passwords/6. Type 9 Local Passwords.ts12.24MB
  • 49-Configure Cisco Device Access Control Using Local Passwords/7. Local Usernames and Passwords.ts24.39MB
  • 49-Configure Cisco Device Access Control Using Local Passwords/8. Configure Cisco Device Access Control Using Local Passwords Review.ts16.61MB
  • 5-6 Set Up Packet Tracer for Hands-On Cisco Practice/1. Why You'll Benefit from Packet Tracer.ts19.56MB
  • 5-6 Set Up Packet Tracer for Hands-On Cisco Practice/2. Getting and Installing Packet Tracer.ts11.27MB
  • 5-6 Set Up Packet Tracer for Hands-On Cisco Practice/3. Configuring Your First PT Network.ts68.88MB
  • 5-6 Set Up Packet Tracer for Hands-On Cisco Practice/4. Getting Physical.ts16.78MB
  • 5-6 Set Up Packet Tracer for Hands-On Cisco Practice/5. Visualizing Network Traffic with Simple PDUs.ts60.79MB
  • 5-6 Set Up Packet Tracer for Hands-On Cisco Practice/6. Visualizing Network Traffic with Complex PDUs.ts44.3MB
  • 5-6 Set Up Packet Tracer for Hands-On Cisco Practice/7. Replicating a Physical Rack.ts45.95MB
  • 5-6 Set Up Packet Tracer for Hands-On Cisco Practice/8. Using Packet Tracer on your Tablet.ts21.96MB
  • 5-6 Set Up Packet Tracer for Hands-On Cisco Practice/9. Final Challenge and Review.ts48.65MB
  • 50-Summarize and Differentiate AAA Concepts/1. Introducing AAA.ts3.56MB
  • 50-Summarize and Differentiate AAA Concepts/2. AAA Overview.ts30.29MB
  • 50-Summarize and Differentiate AAA Concepts/3. Building Blocks of AAA.ts29.07MB
  • 50-Summarize and Differentiate AAA Concepts/4. AAA New-Model Framework.ts25.35MB
  • 50-Summarize and Differentiate AAA Concepts/5. Commands to Implement AAA.ts24.79MB
  • 50-Summarize and Differentiate AAA Concepts/6. Implementing and Verifying AAA.ts60.31MB
  • 50-Summarize and Differentiate AAA Concepts/7. Summarize and Differentiate AAA Concepts Review.ts20.25MB
  • 51-Apply and Verify Cisco Access Control Lists/1. Introducing Access Control Lists (ACLs) for Packet Filtering.ts3.76MB
  • 51-Apply and Verify Cisco Access Control Lists/10. Using Named Extended ACLs.ts59.67MB
  • 51-Apply and Verify Cisco Access Control Lists/11. ACL Production Case Study and Lab.ts60.97MB
  • 51-Apply and Verify Cisco Access Control Lists/12. Review of Apply and Verify Cisco Access Control Lists.ts18.77MB
  • 51-Apply and Verify Cisco Access Control Lists/2. ACL Concepts.ts30.47MB
  • 51-Apply and Verify Cisco Access Control Lists/3. Standard ACLs Concepts.ts29.61MB
  • 51-Apply and Verify Cisco Access Control Lists/4. Standard ACLs Lab.ts43.87MB
  • 51-Apply and Verify Cisco Access Control Lists/5. Wildcard Masks Concepts.ts23.2MB
  • 51-Apply and Verify Cisco Access Control Lists/6. Wildcard Masks Lab.ts22.69MB
  • 51-Apply and Verify Cisco Access Control Lists/7. Wildcard Masks for Subnets Lab.ts31.03MB
  • 51-Apply and Verify Cisco Access Control Lists/8. Extended ACLs Concepts.ts21.99MB
  • 51-Apply and Verify Cisco Access Control Lists/9. Extended ACLs Lab.ts45.83MB
  • 52-Configure and Verify Cisco Port Security/1. Introducing Port Security.ts4.53MB
  • 52-Configure and Verify Cisco Port Security/2. Understanding Port Security and Why we Need It.ts31.22MB
  • 52-Configure and Verify Cisco Port Security/3. Port Security Defaults.ts18.7MB
  • 52-Configure and Verify Cisco Port Security/4. Implementing Port Security on Layer 2 Interface.ts30.33MB
  • 52-Configure and Verify Cisco Port Security/5. Customizing Port Security.ts43.36MB
  • 52-Configure and Verify Cisco Port Security/6. Configuring Auto Errdisable Recovery.ts33.92MB
  • 52-Configure and Verify Cisco Port Security/7. Applying Port Security Skills in Production.ts26.45MB
  • 52-Configure and Verify Cisco Port Security/8. Review of Configure and Verify Cisco Port Security.ts11.69MB
  • 53-Configure and Verify Cisco DHCP Snooping/1. Introducing DHCP Snooping.ts4.33MB
  • 53-Configure and Verify Cisco DHCP Snooping/2. Why is DHCP Snooping Needed.ts20.61MB
  • 53-Configure and Verify Cisco DHCP Snooping/3. The Recipe for DHCP Snooping.ts26.66MB
  • 53-Configure and Verify Cisco DHCP Snooping/4. Building and Implementing DHCP Snooping in PT.ts52.79MB
  • 53-Configure and Verify Cisco DHCP Snooping/5. Adding Source Guard to a Switch.ts25.21MB
  • 53-Configure and Verify Cisco DHCP Snooping/6. Applying DHCP Snooping in Production.ts56.13MB
  • 53-Configure and Verify Cisco DHCP Snooping/7. Review of Configure and Verify Cisco DHCP Snooping.ts13.4MB
  • 54-Configure and Verify Cisco Dynamic ARP Inspection/1. Introducing Dynamic ARP Inspection (DAI).ts2.88MB
  • 54-Configure and Verify Cisco Dynamic ARP Inspection/2. Why is DAI Needed.ts16.23MB
  • 54-Configure and Verify Cisco Dynamic ARP Inspection/3. The Recipe and Commands for DAI.ts17.82MB
  • 54-Configure and Verify Cisco Dynamic ARP Inspection/4. Implementing DAI.ts22.44MB
  • 54-Configure and Verify Cisco Dynamic ARP Inspection/5. ARP Access Lists for Non-DHCP Devices.ts30.21MB
  • 54-Configure and Verify Cisco Dynamic ARP Inspection/6. Additional DAI Options and Features.ts30.28MB
  • 54-Configure and Verify Cisco Dynamic ARP Inspection/7. Applying DAI to the Production Network.ts27.58MB
  • 54-Configure and Verify Cisco Dynamic ARP Inspection/8. Review of Configure and Verify Cisco Dynamic ARP Inspection.ts9.96MB
  • 55-Describe Remote Access and Site-to-Site VPNs/1. Introducing VPNs.ts2.76MB
  • 55-Describe Remote Access and Site-to-Site VPNs/2. Virtual Private Network (VPN) Overview.ts22.54MB
  • 55-Describe Remote Access and Site-to-Site VPNs/3. Building Blocks for Cryptography.ts37.26MB
  • 55-Describe Remote Access and Site-to-Site VPNs/4. Site-To-Site VPN Concepts.ts28.28MB
  • 55-Describe Remote Access and Site-to-Site VPNs/5. Verifying Site-To-Site Encryption Lab.ts43.72MB
  • 55-Describe Remote Access and Site-to-Site VPNs/6. Remote-Access VPN Concepts.ts30.58MB
  • 55-Describe Remote Access and Site-to-Site VPNs/7. Remote-Access VPN Client Examples.ts36.86MB
  • 55-Describe Remote Access and Site-to-Site VPNs/8. Review of Describe Remote Access and Site-To-Site VPNs.ts13.68MB
  • 56-Describe, Configure, and Verify Wireless Security protocols/1. Introduction to Describe, Configure, and Verify Wireless Security protocols.ts4.05MB
  • 56-Describe, Configure, and Verify Wireless Security protocols/2. Wireless Security Protocol Options.ts29.39MB
  • 56-Describe, Configure, and Verify Wireless Security protocols/3. Options for Controlling Wi-Fi Networks.ts21.2MB
  • 56-Describe, Configure, and Verify Wireless Security protocols/4. Implementing WPA2 PSK on a SOHO Network.ts28.99MB
  • 56-Describe, Configure, and Verify Wireless Security protocols/5. Planning WPA2 on a Controller-Based Wi-Fi Network.ts18.78MB
  • 56-Describe, Configure, and Verify Wireless Security protocols/6. Implementing WPA2 on a Controller-based Wi-Fi Network.ts63.75MB
  • 56-Describe, Configure, and Verify Wireless Security protocols/7. Review of Describe, Configure, and Verify Wireless Security Protocols.ts12.68MB
  • 57-What is Network Automation/1. Introducing Network Automation.ts3.76MB
  • 57-What is Network Automation/2. What is Network Automation.ts24.02MB
  • 57-What is Network Automation/3. Automating Network Device Deployment.ts54.99MB
  • 57-What is Network Automation/4. Automating Network Device Backup, Monitoring, and Data Collection.ts46.88MB
  • 57-What is Network Automation/5. Automating Network Troubleshooting Lab.ts37.75MB
  • 57-What is Network Automation/6. Let's Keep Automating.ts4.08MB
  • 58-Use REST APIs and JSON/1. You are a Network Developer.ts5.98MB
  • 58-Use REST APIs and JSON/10. REST API Lab.ts39.25MB
  • 58-Use REST APIs and JSON/11. Becoming a Network Developer.ts6.36MB
  • 58-Use REST APIs and JSON/2. API vs. SNMP vs. CLI.ts47.01MB
  • 58-Use REST APIs and JSON/3. What is a REST API.ts33.26MB
  • 58-Use REST APIs and JSON/4. Navigating a REST API.ts40.23MB
  • 58-Use REST APIs and JSON/5. HTTP Verbs.ts55.41MB
  • 58-Use REST APIs and JSON/6. Programming 101 Data.ts66.39MB
  • 58-Use REST APIs and JSON/7. Programming Playground Lab.ts28.9MB
  • 58-Use REST APIs and JSON/8. JSON, YAML, or XML.ts31.03MB
  • 58-Use REST APIs and JSON/9. Interpreting JSON.ts53.9MB
  • 59-Controller-Based Networking/1. Forget Everything You Know About Networking.ts8.05MB
  • 59-Controller-Based Networking/10. DNA Center Lab.ts55.13MB
  • 59-Controller-Based Networking/11. Controller-Based Networks Review.ts7.3MB
  • 59-Controller-Based Networking/2. Reviewing the Planes.ts27.25MB
  • 59-Controller-Based Networking/3. What is Controller-Based Networking.ts47.13MB
  • 59-Controller-Based Networking/4. Why do we Need an SDN Controller.ts30.51MB
  • 59-Controller-Based Networking/5. SDN Architectures.ts43.96MB
  • 59-Controller-Based Networking/6. Automating the Data Center with ACI.ts34.8MB
  • 59-Controller-Based Networking/7. Magic of Software-Defined Access.ts75.04MB
  • 59-Controller-Based Networking/8. DNA Center Overview.ts75.47MB
  • 59-Controller-Based Networking/9. Using Postman with the DNA Center REST API.ts51.49MB
  • 60-Network Automation Tools Ansible, Puppet, and Chef/1. Introducing Ansible, Puppet, and Chef.ts5.03MB
  • 60-Network Automation Tools Ansible, Puppet, and Chef/2. Configuration Managament with DevOps Tools.ts51.22MB
  • 60-Network Automation Tools Ansible, Puppet, and Chef/3. Ansible.ts61.56MB
  • 60-Network Automation Tools Ansible, Puppet, and Chef/4. Puppet.ts39.55MB
  • 60-Network Automation Tools Ansible, Puppet, and Chef/5. Chef.ts25.03MB
  • 60-Network Automation Tools Ansible, Puppet, and Chef/6. Summing it All Up.ts37.09MB
  • 7-Describe Network Functions and Equipment/1. Introduction to Describe Network Functions and Equipment.ts5.47MB
  • 7-Describe Network Functions and Equipment/2. Primary Switch Functions.ts45.91MB
  • 7-Describe Network Functions and Equipment/3. Primary Wireless Access Point Functions.ts40.61MB
  • 7-Describe Network Functions and Equipment/4. Primary Router Functions.ts46.91MB
  • 7-Describe Network Functions and Equipment/5. Assembling the Network Pieces.ts46.44MB
  • 7-Describe Network Functions and Equipment/6. Review of Describe Network Functions and Equipment.ts33.58MB
  • 8-Explain Network Communication Using the OSI and TCP-IP Model/1. Introduction to Explain Network Communication with the OSI Model.ts4.53MB
  • 8-Explain Network Communication Using the OSI and TCP-IP Model/2. Why We Have Two Models.ts20.36MB
  • 8-Explain Network Communication Using the OSI and TCP-IP Model/3. Application Layers.ts27.71MB
  • 8-Explain Network Communication Using the OSI and TCP-IP Model/4. Transport Layer.ts48.47MB
  • 8-Explain Network Communication Using the OSI and TCP-IP Model/5. Network Layer.ts24.65MB
  • 8-Explain Network Communication Using the OSI and TCP-IP Model/6. Data Link and Physical Layer.ts43.4MB
  • 8-Explain Network Communication Using the OSI and TCP-IP Model/7. Describing Network Communication Using the OSI and TCPIP Models.ts68.07MB
  • 8-Explain Network Communication Using the OSI and TCP-IP Model/8. Review of Explain Network Communication with the OSI Model.ts28.33MB
  • 9-Describe Common Network Architectures/1. Introduction to Describe Common Network Architectures.ts3.36MB
  • 9-Describe Common Network Architectures/2. Two-Tier Architecture.ts49.44MB
  • 9-Describe Common Network Architectures/3. Three-Tier Architecture.ts25.44MB
  • 9-Describe Common Network Architectures/4. Spine-Leaf Architecture.ts49.1MB
  • 9-Describe Common Network Architectures/5. WAN Architecture.ts56.17MB
  • 9-Describe Common Network Architectures/6. SOHO Architecture.ts37.5MB
  • 9-Describe Common Network Architectures/7. On-Premise vs. Cloud Architecture.ts22.27MB
  • 9-Describe Common Network Architectures/8. Building a Network Architecture.ts59.69MB
  • 9-Describe Common Network Architectures/9. Review of Describe Common Network Architectures.ts31.72MB