Understanding Enterprise Network Security Architecture
These slides were used to present the Understanding Enterprise Network Security Architecture Tech Session. (Click below to view/download these slides)
Introducing QoS, Part 1: Classification and Marking
These slides were used to present the Introducing QoS, Part 1: Classification and Marking Tech Session. (Click below to view/download these slides)
Wireless Security
These slides were used to present the Wireless Security Tech Session. (Click below to view/download these slides)
Cisco Secure Endpoints (Formerly AMP for Endpoints)
These slides were used to present the Cisco Secure Endpoints (Formerly AMP for Endpoints) Tech Session. (Click below to view/download these slides)
Introducing Multicast Protocols
These slides were used to present the Introducing Multicast Protocols Tech Session. (Click below to view/download these slides)
APIs in DNA Center and vManage
These slides were used to present the APIs in DNA Center and vManage Tech Session. (Click below to view/download these slides)
Examining the Cisco SD-Access Solution
These slides were used to present the Examining the Cisco SD-Access Solution Tech Session. (Click below to view/download these slides)
Understanding the Working Principles of SD-WAN
These slides were used to present the Understanding the Working Principles of SD-WAN Tech Session. (Click below to view/download these slides)
How to Validate Your Python 3 Code
These slides were used to present the How to Validate Your Python 3 Code Tech Session. (Click below to view/download these slides)
Ansible Overview
These slides were used to present the Ansible Overview Tech Session. (Click below to view/download these slides)
Docker Overview
These slides were used to present the Docker Overview Tech Session. (Click below to view/download these slides)
Python Overview
These slides were used to present the Python Overview Tech Session. (Click below to view/download these slides)
Postman Overview
These slides were used to present the Postman Overview Tech Session. (Click below to view/download these slides)
Git Overview
These slides were used to present the Git Overview Tech Session. (Click below to view/download these slides)
Overview of Network Programmability
These slides were used to present the Overview of Network Programmability Tech Session. (Click below to view/download these slides)
Configuring Cisco Unity Connection Call Handlers (Part 2 of 2)
These slides were used to present the Configuring Cisco Unity Connection Handlers (Part 2 of 2) Tech Session. (Click below to view/download these slides)
Describing Collaboration Edge Architecture
These slides were used to present the Describing Collaboration Edge Architecture Tech Session. (Click below to view/download these slides)
Configuring Cisco Unity Connection Call Handlers (Part 1 of 2)
These slides were used to present the Configuring Cisco Unity Connection Handlers (Part 1 of 2) Tech Session. (Click below to view/download these slides)
Centralized Web Authentication
This brief video talks about Centralized Web Authentication and how it works. This video is a small portion of the Wireless Security Tech Session. Be
Local Web Authentication
This video talks about Local Web Authentication including topics such as Auto Anchor and Local Web Portals. This video is a small portion of the
How EAP-FAST Works
This brief video explains what EAP-FAST is and how it works. This video is a small portion of the Wireless Security Tech Session. Be sure
How PEAP Works
This brief video explains what PEAP is and how it works. This video is a small portion of the Wireless Security Tech Session. Be sure
How EAP-TLS Works
This brief video explains what EAP-TLS is and how it works. This video is a small portion of the Wireless Security Tech Session. Be sure
Extensible Authentication Protocol (EAP)
This short video explains what Extensible Authentication Protocol (EAP) is and an overview of some of the more common EAPs such as EAP-TLS, PEAP, and
Wireless Security Overview
This short video provides an overview of Wireless Security including the three wireless security methods: Personal Mode, Enterprise Mode, and Web Authentication. This video is
802.1X Overview
This video provides an overview of 802.1X Port-Based Security Method including the three roles: Supplicant, Authenticator, and Authentication Server. This video is a small portion
Types of Cyberattacks (2 of 2)
This video picks up where Part 1 left off in describing types of Cyberattacks including Reconnaissance Attacks, Buffer Overflow Attacks, and Man-in-the-Middle Attacks. This video
Types of Cyberattacks (1 of 2)
This video describes different types of Cyberattacks including DOS/DDOS, Spoofing, Reflection, and Social Engineering. This video is a small portion of the Understanding Enterprise Network
Enterprise Network Security – Summary
This video provides a brief summary of Enterprise Network Security Architecture including topics such as Enterprise Solutions, Endpoint Security, and Analytics. This video is a
Content Security – Secure Web Appliance
This brief video outlines some of the main functions of Secure Web Appliance and walks through, step-by-step, how it works. This video is a small
Firewalls Overview
This video provides an overview of Firewalls including requirements and an example of a Typical Three-Zone Scenario that utilizes a firewall. This video is a
Endpoint Security
This video provides a brief overview of Endpoint Security and talks, more specifically, about Personal Firewalls. This video is a small portion of the Understanding
What is Content Security?
This short video explains what Content Security is and walks through, step-by-step, how Cisco Secure Email Gateway (formerly ESA) works. This video is a small
Cisco Trusted Security (TrustSec)
This video explains what Cisco Trusted Security (TrustSec) is, how it came to be, and how it works. This video is a small portion of
Antivirus and Antispyware Software
This short video talks about how Antivirus and Antispyware software work as well thing to consider when implementing. This video is a small portion of
802.1X for Wired Authentication with RADIUS
This brief video explains how 802.1X can be used for Wired Authentication with RADIUS. This video is a small portion of the Understanding Enterprise Network
Why Multicast?
This short video answers the question ‘Why use Multicast?’ touching upon some of its characteristics including lower bandwidth requirements, UDP-based, and enhanced network efficiency. This
Multicast Pros and Cons
This video briefly reviews Unicast and Multicast and provides the pros and cons of Multicast such as enhanced efficiency but jerky voice quality. This video
Unicast vs. Multicast Routing
This short video compares Unicast Routing to Multicast Routing outlining important differences such as how they forward traffic and the importance of source and/or destination
Multicast Distribution Tree
This video introduces two types of Multicast Distribution Trees, Source Trees which are the simplest form and Shared Trees that have a single common root
PIM Dense Mode and PIM Sparse Mode
This video introduces PIM Dense Mode (PIM-DM) which uses a push model and PIM Sparse Mode (PIM-SM) which uses a pull model. This video is
Multicast Applications
This brief video provides examples of Multicast Applications including Live TV, Data Replication, Video Conferencing, and Whiteboard Applications. This video is a small portion of
IPv4 Multicast Addressing
This brief video discusses IPv4 Multicast Addressing including Class D Address Range, Local Scope, Global Scope, and Administratively Scoped. This video is a small portion
What is IGMP?
This short video introduces IGMPv1, IGMPv2, and IGMPv3, and explains the differences between them. This video is a small portion of the Introducing Multicast Protocols
How IP Multicast Works
This video breaks down how IP Multicast works into 4 simple steps. This video is a small portion of the Introducing Multicast Protocols Tech Session.
What is Cisco Secure Endpoint?
This video provides a brief overview of what Cisco Secure Endpoint is and some if its main services and functions such as file reputation, file
Today’s Security Landscape – Overview
This video provides a brief overview of the prevalence of cyberattacks and data breaches in today’s security landscape and the rising costs of those data
What is TALOS?
This video explains what TALOS Threat Intelligence is, how it gathers data, and how it is utilized by Secure Endpoints. This video is a small
What is SecureX?
This video explains what SecureX is and how it can be used to access Secure Endpoint. This video is a small portion of the Cisco
Secure Endpoint and Secure Malware Analytics Integration
This short video explains how Secure Endpoint and Cisco Secure Malware Analytics work together to protect your network. This video is a small portion of
How Does Cisco Secure Malware Analytics Work?
This video walks you through the steps taken by Cisco Secure Malware Analytics to protect your network. This video is a small portion of the
Secure Endpoint – Proactive Protection Tools
This video briefly explains how Secure Endpoint proactively protects against vulnerabilities, identifies “under the radar” applications, and provides built-in sandboxing for easy, secure file analysis.
Point-in-Time Threat Detection
This short video talks about different Point-in-Time Detections including one-to-one signature, fuzzy fingerprinting, machine learning and rootkit scanning. This video is a small portion of
What is Cisco Secure Malware Analytics?
This short video explains how Cisco Secure Malware Analytics feeds dynamic malware analysis and threat intelligence to Cisco Secure Endpoint. This video is a small
File Analysis: What is a Hash?
This brief video explains what a Hash is and how it is operates as a file’s fingerprint. This video is a small portion of the
dCloud Demos
This video shows how to access dCloud Demos and how to navigate the SecureX Dashboard. This video is a small portion of the Cisco Secure
Continuous Analysis and Retrospective Security
This short video explains how Secure Endpoint monitors, records, and continuously analyzes all file activity to catch threats that reached the network. This video is
Cisco’s Philosophy
This brief video presents Cisco’s Philosophy as it relates to Endpoint Protection: “You can never prevent 100% of malware from reaching your network, therefore, you
Attack Continuum Protection
This short video explains Cisco Secure Endpoint’s approach to handling issues before, during, and after an attack. This video is a small portion of the
API Types in DNA Center
This video introduces the types of APIs in DNA Center including Intent APIs and Integration APIs like ITSM/IT4IT and Assurance. This video is a small
APIs in a Traditional Network Architecture
This short video explains how APIs function in a Traditional Network Architecture. This video is a small portion of the API’s in DNA Center and
APIs in an SDN Architecture
This video explains how Northbound and Southbound APIs function in an SDN Architecture. This video is a small portion of the API’s in DNA Center
How do REST APIs Work?
This video explains how REST APIs work from the original REST Request sent to Cisco DNA Center to the REST Response that is returned to
What are REST APIs?
This short video explains what REST APIs are and why they were developed. This video is a small portion of the API’s in DNA Center
DNA Center API Library and Documentation
This brief video shows two ways to access the DNA Center REST API library and documentation. This video is a small portion of the API’s
Introduction to APIs
This video provides a brief overview of APIs including how they work and how they enable modular programming. This video is a small portion of
DNA Center Documentation – DevNet Website
This brief video introduces the DevNet site (developer.cisco.com) which provides helpful DNA Center documentation. This video is a small portion of the API’s in DNA
API Types in vManage
This brief video talks about the different types of APIs in vManage including Administration, Configuration, Device Inventory, and Monitoring, and what they are used for.
API Calls and Responses in vManage
This short video explains how API calls and responses work in vManage. This video is a small portion of the API’s in DNA Center and
API Calls and Responses in DNA Center
This short video explains how API calls and responses work in DNA Center. This video is a small portion of the API’s in DNA Center
Wireless Security
In this 1-hour Tech Session, Jim Goughenour explores the various Wireless Security methods, when to use them, and how each of them work. The Tech
SD-Access Wireless Integration
This video explains the steps that occur during SD-Access Wireless Integration including components like LISP Map Server/Map Resolver, SD-Access Switches, and Centralized Wireless Control Plane.
SD-Access Wireless Client Onboarding
This video walks through the steps involved in wireless client onboarding with SD-Access. This video is a small portion of the Examining the Cisco SD-Access
How VXLAN GPO Works
This brief video explains how VXLAN Group Policy Extension (GPO) works by adding the SGT field to the VXLAN header. This video is a small
VXLAN and LISP
This video explains what VXLAN and LISP do and where they are located in the network. This video is a small portion of the Examining
Underlays and Overlays
This video explains what Underlays are (such as VLAN and ISIS), what Overlays are (such as GRE and VXLAN), and provides an example at the
Physical and Virtual Topologies
This short video discusses both Physical and Virtual Topologies and what those look like. This video is a small portion of the Examining the Cisco
The Need for Cisco SD-Access (1 of 2)
This brief video summarizes some of the drawbacks of a Traditional Network including manual entry in CLI, increased human error, and more expensive to manage.
SD-Access Policy Summary
This brief video summarizes the main takeaways of SD-Access including such topics as DNA Center, Overlays, LISP, VXLAN GPO, and Fabric-Enabled WAP. This video is
The Need for Cisco SD-Access (2 of 2)
This brief video explains some of the benefits of an SD-Access Network including automated device configurations, reduction in human error, and “Point-and-Click” implementation of configurations.
SD-Access Fabric Components
This short video outlines the different SD-Access Fabric Components including Fabric Border, Fabric Wireless LAN Controller, Intermediate Node, Fabric Edge Nodes, and Control Plane Node.
Encapsulation/Overlay Types
This brief video describes how Overlays use Encapsulation including LISP and VXLAN Encapsulation. This video is a small portion of the Examining the Cisco SD-Access
Virtual Private Networks (VPNs)
This video explains what VPNs are, how they work, and what is required for setup. This video is a small portion of the Describing Collaboration
Collaboration Edge Summary
This short video outlines some of the main takeaways from this topic including MRA, Expressways, and Business-to-Business Calling. This video is a small portion of
Service Discovery
This short video walks you through how Service Discovery works. This video is a small portion of the Describing Collaboration Edge Architecture Tech Session. Be
Service Discovery Flow
This short video walks you through how Service Discovery Flow works. This video is a small portion of the Describing Collaboration Edge Architecture Tech Session.
Problems With B2B Communications – Firewalls
This brief video explains how Firewalls can cause problems with B2B Communications. This video is a small portion of the Describing Collaboration Edge Architecture Tech
Collaboration Edge Architecture Overview
This video explains what Collaboration Edge Architecture is and describes how various components work including Communications Manager, Unity Connection, and CUBE. This video is a
Multiple Expressways – E Servers
This brief video describes some of the benefits and challenges of setting up Multiple Expressway – E Servers. This video is a small portion of
MRA Overview
This video provides a brief overview of MRA including supported devices and features. This video is a small portion of the Describing Collaboration Edge Architecture
MRA Ports
This short video provides best practices for configuring MRA Ports. This video is a small portion of the Describing Collaboration Edge Architecture Tech Session. Be
MRA Authentication and Encryption
This brief video explains how MRA Authentication and Encryption work between Expressways. This video is a small portion of the Describing Collaboration Edge Architecture Tech
MRA Architecture
This short video introduces different types of MRA Architectures including Single Network, Multiple Clustered Networks, and Clustered CM/IMP Networks. This video is a small portion
Hybrid Deployment Overview
This brief video provides an overview of Hybrid Deployments and how they work. This video is a small portion of the Describing Collaboration Edge Architecture
How Do Expressways Work?
This video explains what Expressways are and the two functions: Mobile and Remote Access (MRA). This video is a small portion of the Describing Collaboration
Steps to Deploy MRA
This brief video walks you through the steps to deploy MRA. This video is a small portion of the Describing Collaboration Edge Architecture Tech Session.
CUBE Functionality
This short video explains how CUBE works through examples of four different scenarios including SIP Trunks for PSTN Access and IVR Integration for Contact Centers.
CUBE Features
This short video walks you through the various Session Control, Security, Interworking, and Demarcation features of CUBE. This video is a small portion of the
Call Manager vs. Expressways
This brief video compares and contrasts Call Manager and Expressways in terms of how they handle certificates. This video is a small portion of the
Business to Business (B2B) Logic Flow
This brief video walks you through B2B Logic Flow including how data flows between the Default Zone, Traversal Server Zone, and Local Zones. This video