Why Use Cisco Emergency Responder (CER)?
This short video talks, specifically, about CER’s importance in routing emergency calls to a local Public Safety Answering Poing (PSAP). This video is a small
Introduction to Cisco Emergency Responder
These slides were used to present the Introduction to Cisco Emergency Responder Tech Session. (Click below to view/download these slides)
Introduction to Cisco Emergency Responder
In this 1-hour Tech Session, Kevin Koeper goes over how Cisco’s Emergency Responder server routes emergency calls to the local service provider’s PSAP (Public Safety
My Experience Preparing for the CLCOR Exam
By: Kevin Koeper I recently took Cisco’s CLCOR 350-801 exam and want to share how I prepared for the exam in hopes that it will
CCNA Composite Lab Build Part 2
Having a firm grasp on the Command Line Interface in Cisco IOS is fundamental to success in Network Management. In each of these 1-hour live
CCNA Composite Lab Build Part 1
Having a firm grasp on the Command Line Interface in Cisco IOS is fundamental to success in Network Management. In each of these 1-hour live
The Nature of Ransomware
This brief video provides key statistics about ransomware attacks as well as recent examples of companies who have fallen prey to these types of cyber
Evaluating Your Cyber Security Needs
This brief video outlines key components of any security solution as well as some things to consider when evaluating your cyber security needs. This video
The Ransomware Lifecycle
This short video walks you through the 6 steps involved in a ransomware attack: distribution, infection, communication, file search, encryption, and ransom demand. This video
What is Cyber Hygiene?
This short video explains what Cyber Hygiene is and what routine measures can be taken to minimize risks from cyber threats. This video is a
The Cyber Hygiene Security Pre-Quiz
This short video walks you through a list of common questions that help gauge an organization’s Cyber Hygiene. This video is a small portion of
Ransomware Example: Colonial Pipeline Attack
This brief video walks you through a recent example of a ransomware attack that occurred against Colonial Pipeline. This video is a small portion of
The Zero-Trust Approach
This short video explains the differences between the Traditional Approach to security and the Zero-Trust Approach. This video is a small portion of the Cyber
Initiating an SSH Session
This short video explains how a client initiates a session over SSH. This video is a small portion of the Introduction into NETCONF and YANG
YANG Overview
This video provides an overview of YANG including an explanation of what it is and why it is used. This video is a small portion
YANG Data Structure
This video describes the YANG Data Structure including components such as Module, Sub-Module, Leaf, List, and Container. This video is a small portion of the
YANG Data Structure Example
This short video provides an example of YANG Data Structure pointing out the various components such as Module and Leaf. This video is a small
Understanding JSON
This short video provides an overview of JSON (JavaScript Object Notation) including how it is formatted. This video is a small portion of the Introduction
RPC Request/Response
This brief video outlines the process of sending an RPC Request and the server issuing an RPC Response. This video is a small portion of
RESTCONF Overview
This brief video explains what RESTCONF is in relation to NETCONF and outlines the RESTCONF Protocol Stack. This video is a small portion of the
RESTCONF Request/Response Example
This brief video provides an example of a RESTCONF Request and Response and points out the different components. This video is a small portion of
Understanding XML
This short video provides an overview of XML (eXtensible Markup Language) including how it is formatted. This video is a small portion of the Introduction
NETCONF Overview
This brief video provides an overview of NETCONF including what it is and how it transports and retrieves configuration data. This video is a small
Introduction into NETCONF, RESTCONF, and YANG
NETCONF, RESTCONF, and YANG. Are these terms you hear at work but don’t exactly understand what they mean or why they are important to network
Introduction into NETCONF and YANG
These slides were used to present the Introduction into NETCONF and YANG Tech Session. (Click below to view/download these slides)
NETCONF Process
This brief video walks you through the NETCONF Process from the client initiating the session of SSH to the server’s response. This video is a
NETCONF Data Stores
This short video explains the function of NETCONF Data Stores and outlines the four different types: Running, Startup, Candidate, and URL. This video is a
NETCONF Protocol Stack
This short video walks you through the four layers of the NETCONF Protocol Stack: Content, Operations, Messages, and Transport. This video is a small portion
NETCONF Operations
This short video introduces the 9 NETCONF Operations including get, copy-config, unlock, kill-session, and more. This video is a small portion of the Introduction into
Cyber Security Essentials
In this exciting one hour talk, Cyber Security expert Kenya Thomas will be discussing the risks the recent ransomware attacks pose to small and medium
Cyber Security Essentials
These slides were used to present the Cyber Security Essentials Tech Session. (Click below to view/download these slides)
NBAR Summary
This brief video summarizes the “NBAR, a Closer Examination” Tech Session including topics such as classification, intelligent classification, capabilities of NBAR, and more. This video
Where Can I Use NBAR?
This brief video answers the questions, “Where can I use NBAR?” by outlining which machines and interfaces support it. This video is a small portion
NBAR2 Business – Relevance Attribute
This brief video introduces the categories of protocols and applications including business-relevant, default, and business-irrelevant. This video is a small portion of the NBAR, a
Network Based Application Recognition (NBAR2)
This brief video talks about the next phase of NBAR, NBAR2, including its’ ability to recognize over 120 encrypted applications. This video is a small
NBAR Customization
This brief video talks about how to customize NBAR to survey utilization using preset Port Maps. This video is a small portion of the NBAR,
NBAR2 1400 App/12-Class Model Configuration
This short video walks through the configuration for NBAR2 1400 App/12-Class Model. This video is a small portion of the NBAR, a Closer Examination Tech
NBAR Overview
This short video provides an overview of Network Based Application Recognition (NBAR) including how it can be used to survey utilization. This video is a
Static and Default Routing Demonstration
These slides were used to present the Static and Default Routing Demonstration Tech Session. (Click below to view/download these slides)
Static and Default Routing Demonstration
In this 1-hour Tech Session, Jim Goughenour takes a deep dive into Static and Default routing concepts through the use of a live demonstration. Click
When To Use Static Routing
This short video explains two situations in which you might use Static Routing: Small Networks, Troubleshooting, and Static Networks. This video is a small portion
When To Use Default Routing
This short video explains two situations in which you would use Default Routing: Unknown Destinations and SOHO Internet Access. This video is a small portion
Securing the Management Plane
This video discusses methods to Secure the Management Plane including creating and enforcing a login policy, implementing RBAC, and more. This video is a small
What is NetFlow?
This video explains what NetFlow is and how it operates. This video is a small portion of the SCOR Exam: Intro to Network Security, Part
NetFlow Cache
This short video describes three different types of NetFlow cache: Normal, Immediate, and Permanent. This video is a small portion of the SCOR Exam: Intro
What is IPFIX?
This brief video introduces IP Flow Information Export (IPFIX) and explains how it is different from NetFlow. This video is a small portion of the
NetFlow as a Security Tool
This short video describes how NetFlow can be used as a security tool including how it provides complete visibility, nonrepudiation, anomaly detection, and more. This
IPFIX Mediator
This brief video describes the role of the IPFIX Mediator which acts as a guard to external domain (i.e. proxy or firewall function). This video
IPFIX Architecture
This brief video describes the IPFIX Architecture including the Metering Process, Exporting Process, and Collecting Process. This video is a small portion of the SCOR
What Is Flow?
This short video explains what flow is, what types of information can be obtained, and how that information can be used to prevent things like
Flexible NetFlow
This brief video talks about Flexible NetFlow and, more specifically, what types of information can NetFlow track? This video is a small portion of the
NetFlow: Components, Capabilities, and Benefits
This short video describes the components, capabilities, and benefits of NetFlow which is an embedded instrumentation found within Cisco IOS Software to characterize network operation.
WLC Device Hardening Methods
This brief video provides an overview of Wireless LAN Controller (WLC) Device Hardening Methods in the Management Plane, Control Plane, and Data Plane. This video
Securing the Control Plane
This short video discusses methods to Secure the Control Plane including Control Plane Policing (CoPP) and Control Plane Protection (CPPr). This video is a small
Securing the Data Plane
This short video discusses ways to Secure the Data Plane to block unwanted traffic, reduce DoS attacks, reduce spoofing attacks, and more. This video is
Network Security Solutions
This short video outlines the various Network Security Solutions including Data Center Security, Enterprise Campus Security, and Cisco SAFE and also covers the different Deployment
NetFlow Versions
This brief video explains the differences between the various versions of NetFlow. This video is a small portion of the SCOR Exam: Intro to Network
Network Foundation Protection (NFP)
This short video explains what Network Foundation Protection (NFP) is by breaking it down into its’ three components: Management Plane, Control Plane, and Data Plane.
NBAR, a Closer Examination
These slides were used to present the NBAR, a Closer Examination Tech Session. (Click below to view/download these slides)
NBAR, a Closer Examination
In this 1-hour Tech Session, Keith Edward explains uses and configurations of Network Based Application Recognition (NBAR). NBAR is a very valuable and free tool
Troubleshooting Wireless Client Connectivity
This Tech Brief is derived from the Troubleshooting Wireless Client Connectivity Tech Session. (Click below to view/download this Tech Brief)
SCOR Exam: Intro to Network Security, Part 1
This is part 1 of 2 in a series of webinars in which we will be preparing you for the network security part of the
SCOR Exam: Intro to Network Security, Part 1 Continued: Learning by Example
In this live demonstration, Eric Smith shows you how to translate written instructions into meaningful commands in the Cisco IOS. In this tech session, we
SCOR Exam: Intro to Network Security, Part 1
These slides were used to present the SCOR Exam: Intro to Network Security, Part 1 Tech Session. (Click below to view/download these slides)
Spanning-Tree Live Demo
In this 1-hour presentation, Jim Goughenour takes a deeper dive into the Spanning Tree Protocol. We will look at how a switch comes to be
NAPALM Demo
This short video provides a live demo of how to use NAPALM to configure a Cisco device. This video is a small portion of the
NAPALM Multi-Vendor Support
This short video explains NAPALM’s multi-vendor support capabilities and shows you where you can download community drivers. This video is a small portion of the
NAPALM Script Review
This short video explains the different elements found in a NAPALM script and then compares a NAPALM script to a Netmiko script. This video is
What is NAPALM?
This brief video explains what NAPALM is, outlines its’ features, and provides use cases. This video is a small portion of the Introduction to Netmiko
The Napalm Process
This video walks you through the NAPALM configuration process from importing NAPALM to executing the commands. This video is a small portion of the Introduction
Introduction to Netmiko and NAPALM Part 2
In part two of this two-part series, Edwin Owen introduces NAPALM, discusses configuring a Cisco IOS device with NAPALM, and finishes with a live demo.
Netmiko Demo
This video provides a brief demo of Netmiko. This video is a small portion of the Introduction to Netmiko and NAPALM Part 1 Tech Session.
What is Netmiko?
This short video introduces Netmiko which is a multi-vendor SSH Python library built on top of Paramiko. This video is a small portion of the
The Network Automation Journey
This video breaks down the Network Automation Journey starting with simple Controllers and moving on to more ‘do it yourself’ protocols such as APIs, Netmiko,
Introduction to Netmiko and NAPALM Part 2
These slides were used to present the Introduction to Netmiko and NAPALM Part 2 Tech Session. (Click below to view/download these slides)
What is TextFSM?
This short video talks about TextFSM which takes unstructured data and converts it to structured data (a list or dictionary). This video is a small
The Netmiko Process
This video explains the Netmiko Process from Importing Netmiko to Executing Show/Configuration Commands. This video is a small portion of the Introduction to Netmiko and
Introduction to Netmiko and NAPALM Part 1
Do you want to start automating your network but you are not ready to jump into the deep end with NETCONF and YANG? Or maybe
Introduction to Netmiko and NAPALM Part 1
These slides were used to present the Introduction to Netmiko and NAPALM Part 1 Tech Session. (Click below to view/download these slides)
Thinking Through the Questions….Another Look – ENCOR Exam Prep
By: Jim Goughenour As I continue to prepare for my ENCOR exam, I had some additional thoughts that I wanted to share. I did not
Troubleshooting Phone Calling Issues Summary
This brief video provides a helpful summary of the key concepts related to Troubleshooting Phone Calling Issues including call routing, audio, secondary dial tone, and
Using the Dialed Number Analyzer
This video explains how to use the Dialed Number Analyzer (DNA) that allows you to test call routing, remotely. This video is a small portion
Troubleshooting: Secondary Dial Tone Issues
This brief video outlines the troubleshooting steps needed to fix common ‘secondary dial tone’ issues. This video is a small portion of the Troubleshooting Phone
Testing Inbound Calling From an SIP Trunk
This brief video explains how to test inbound calling from an SIP trunk using a Dialed Number Analyzer (DNA). This video is a small portion
Troubleshooting: Call Routing Delays
This short video walks you through the troubleshooting steps needed to fix a 15-second delay prior to a call going through. This video is a
Troubleshooting: Call Privilege Issues
This short video walks you through the troubleshooting steps needed to fix common ‘call privilege’ issues. This video is a small portion of the Troubleshooting
Troubleshooting: No Audio Issues
This short video walks you through the troubleshooting steps needed to fix common ‘no audio’ issues. This video is a small portion of the Troubleshooting
Troubleshooting Phone Calling Issues
In this 1-hour Tech Session, Kevin Koeper goes over how to troubleshoot issues with Cisco phones making calls. Click here to view/download the slides for
Implementing Network Services Summary
This brief video provides a helpful summary of key concepts related to Implementing Network Services including NetFlow, Flexible NetFlow, Embedded Event Manager (EEM), and more.
Logging Services: Syslog
This short video introduces Syslog Operations and explains how they work. This video is a small portion of the Implementing Network Services Tech Session. Be
Logging Services: SNMP
This short video discusses SNMP Operations as well as SNMP Versions (2, 2c, and 3) and Security (noAuthNoPriv, AuthNoPriv, and AuthPriv). This video is a
NTP Security
This brief video talks about NTP Security and the importance of validating your time including MD5 key authentication and ACL. This video is a small
NTP Modes
This short video outlines the four NTP Modes: Server, Client, Peer, and Broadcast/Multicast. This video is a small portion of the Implementing Network Services Tech
NTP Hierarchy
This brief video explains the NTP Hierarchy including the Authoritative Time Source, NTP Clients, and NTP Server. This video is a small portion of the
NTP Function
This brief video explains the NTP Function including Network Delay, dispersion of time packet exchanges, and clock offset. This video is a small portion of
Logging Services: NetFlow
This video provides an overview of NetFlow and its’ components including the Flow Exporter, Flow Collector, and Flow Analysis. This video is a small portion
Embedded Event Manager (EEM)
This short video introduces Embedded Event Manager (EEM) and explains what it does, where it lives, and how it works. This video is a small
Troubleshooting Phone Calling Issues
These slides were used to present the Troubleshooting Phone Calling Issues Tech Session. (Click below to view/download these slides)
Where To Classify and Mark
This short video answers the question, “Where do I Classify and Mark?” This video is a small portion of the Introducing QoS, Part 5: Implementation
Where To Use Rate Limiting
This short video answers the question, “Where do I use Rate Limiting?” by pointing out common places that Policing and Shaping can be used in