• Category

  • Format

Git Overview

These slides were used to present the Git Overview Tech Session. (Click below to view/download these slides)

Read More »

How EAP-FAST Works

This brief video explains what EAP-FAST is and how it works. This video is a small portion of the Wireless Security Tech Session. Be sure

Read More »

How PEAP Works

This brief video explains what PEAP is and how it works. This video is a small portion of the Wireless Security Tech Session. Be sure

Read More »

How EAP-TLS Works

This brief video explains what EAP-TLS is and how it works. This video is a small portion of the Wireless Security Tech Session. Be sure

Read More »

Wireless Security Overview

This short video provides an overview of Wireless Security including the three wireless security methods: Personal Mode, Enterprise Mode, and Web Authentication. This video is

Read More »

802.1X Overview

This video provides an overview of 802.1X Port-Based Security Method including the three roles: Supplicant, Authenticator, and Authentication Server. This video is a small portion

Read More »

Types of Cyberattacks (2 of 2)

This video picks up where Part 1 left off in describing types of Cyberattacks including Reconnaissance Attacks, Buffer Overflow Attacks, and Man-in-the-Middle Attacks. This video

Read More »

Types of Cyberattacks (1 of 2)

This video describes different types of Cyberattacks including DOS/DDOS, Spoofing, Reflection, and Social Engineering. This video is a small portion of the Understanding Enterprise Network

Read More »

Firewalls Overview

This video provides an overview of Firewalls including requirements and an example of a Typical Three-Zone Scenario that utilizes a firewall. This video is a

Read More »

Endpoint Security

This video provides a brief overview of Endpoint Security and talks, more specifically, about Personal Firewalls. This video is a small portion of the Understanding

Read More »

What is Content Security?

This short video explains what Content Security is and walks through, step-by-step, how Cisco Secure Email Gateway (formerly ESA) works. This video is a small

Read More »

Why Multicast?

This short video answers the question ‘Why use Multicast?’ touching upon some of its characteristics including lower bandwidth requirements, UDP-based, and enhanced network efficiency. This

Read More »

Multicast Pros and Cons

This video briefly reviews Unicast and Multicast and provides the pros and cons of Multicast such as enhanced efficiency but jerky voice quality. This video

Read More »

Unicast vs. Multicast Routing

This short video compares Unicast Routing to Multicast Routing outlining important differences such as how they forward traffic and the importance of source and/or destination

Read More »

Multicast Applications

This brief video provides examples of Multicast Applications including Live TV, Data Replication, Video Conferencing, and Whiteboard Applications. This video is a small portion of

Read More »

IPv4 Multicast Addressing

This brief video discusses IPv4 Multicast Addressing including Class D Address Range, Local Scope, Global Scope, and Administratively Scoped. This video is a small portion

Read More »

What is IGMP?

This short video introduces IGMPv1, IGMPv2, and IGMPv3, and explains the differences between them. This video is a small portion of the Introducing Multicast Protocols

Read More »

How IP Multicast Works

This video breaks down how IP Multicast works into 4 simple steps. This video is a small portion of the Introducing Multicast Protocols Tech Session.

Read More »

What is TALOS?

This video explains what TALOS Threat Intelligence is, how it gathers data, and how it is utilized by Secure Endpoints. This video is a small

Read More »

What is SecureX?

This video explains what SecureX is and how it can be used to access Secure Endpoint. This video is a small portion of the Cisco

Read More »

Point-in-Time Threat Detection

This short video talks about different Point-in-Time Detections including one-to-one signature, fuzzy fingerprinting, machine learning and rootkit scanning. This video is a small portion of

Read More »

dCloud Demos

This video shows how to access dCloud Demos and how to navigate the SecureX Dashboard. This video is a small portion of the Cisco Secure

Read More »

Cisco’s Philosophy

This brief video presents Cisco’s Philosophy as it relates to Endpoint Protection: “You can never prevent 100% of malware from reaching your network, therefore, you

Read More »

API Types in DNA Center

This video introduces the types of APIs in DNA Center including Intent APIs and Integration APIs like ITSM/IT4IT and Assurance. This video is a small

Read More »

What are REST APIs?

This short video explains what REST APIs are and why they were developed. This video is a small portion of the API’s in DNA Center

Read More »

Introduction to APIs

This video provides a brief overview of APIs including how they work and how they enable modular programming.  This video is a small portion of

Read More »

API Types in vManage

This brief video talks about the different types of APIs in vManage including Administration, Configuration, Device Inventory, and Monitoring, and what they are used for.

Read More »

Wireless Security

In this 1-hour Tech Session, Jim Goughenour explores the various Wireless Security methods, when to use them, and how each of them work. The Tech

Read More »

SD-Access Wireless Integration

This video explains the steps that occur during SD-Access Wireless Integration including components like LISP Map Server/Map Resolver, SD-Access Switches, and Centralized Wireless Control Plane.

Read More »

How VXLAN GPO Works

This brief video explains how VXLAN Group Policy Extension (GPO) works by adding the SGT field to the VXLAN header. This video is a small

Read More »

VXLAN and LISP

This video explains what VXLAN and LISP do and where they are located in the network. This video is a small portion of the Examining

Read More »

SD-Access Policy Summary

This brief video summarizes the main takeaways of SD-Access including such topics as DNA Center, Overlays, LISP, VXLAN GPO, and Fabric-Enabled WAP. This video is

Read More »

SD-Access Fabric Components

This short video outlines the different SD-Access Fabric Components including Fabric Border, Fabric Wireless LAN Controller, Intermediate Node, Fabric Edge Nodes, and Control Plane Node.

Read More »

Encapsulation/Overlay Types

This brief video describes how Overlays use Encapsulation including LISP and VXLAN Encapsulation. This video is a small portion of the Examining the Cisco SD-Access

Read More »

Collaboration Edge Summary

This short video outlines some of the main takeaways from this topic including MRA, Expressways, and Business-to-Business Calling. This video is a small portion of

Read More »

Service Discovery

This short video walks you through how Service Discovery works. This video is a small portion of the Describing Collaboration Edge Architecture Tech Session. Be

Read More »

Service Discovery Flow

This short video walks you through how Service Discovery Flow works. This video is a small portion of the Describing Collaboration Edge Architecture Tech Session.

Read More »

MRA Overview

This video provides a brief overview of MRA including supported devices and features.  This video is a small portion of the Describing Collaboration Edge Architecture

Read More »

MRA Ports

This short video provides best practices for configuring MRA Ports. This video is a small portion of the Describing Collaboration Edge Architecture Tech Session. Be

Read More »

MRA Architecture

This short video introduces different types of MRA Architectures including Single Network, Multiple Clustered Networks, and Clustered CM/IMP Networks. This video is a small portion

Read More »

How Do Expressways Work?

This video explains what Expressways are and the two functions: Mobile and Remote Access (MRA). This video is a small portion of the Describing Collaboration

Read More »

Steps to Deploy MRA

This brief video walks you through the steps to deploy MRA. This video is a small portion of the Describing Collaboration Edge Architecture Tech Session.

Read More »

CUBE Functionality

This short video explains how CUBE works through examples of four different scenarios including SIP Trunks for PSTN Access and IVR Integration for Contact Centers.

Read More »

CUBE Features

This short video walks you through the various Session Control, Security, Interworking, and Demarcation features of CUBE. This video is a small portion of the

Read More »