• Category

  • Format

Volume Mapping

This video explains what Volume Mapping is and how to configure it within Docker using a variety of commands such as docker run, docker stop,

Read More »

What are Containers?

This video explains what containers are and how they work. This video is a small portion of the Docker Overview Tech Session. Be sure to view

Read More »

Network Complexity Example

This short video gives an example of the type of network complexity that can occur when you are managing multiple applications without using containers. This

Read More »

Problems Addressed by Docker

This video discusses some of the common problems that Docker addresses including missing or incorrect application dependencies and conflicts between programs. This video is a

Read More »

What is Docker?

This short video explains what Docker is and how it is used. This video is a small portion of the Docker Overview Tech Session. Be sure

Read More »

Network Automation Benefits

This video outlines the numerous benefits of network automation including lower costs, improved business continuity, and greater agility. This video is a small portion of

Read More »

Basic Git Commands

This video introduces basic Git commands such as git version, git init, and git clone and shows you how to use them. This video is

Read More »

Introduction to Ansible

This brief video serves as an introduction to Ansible and discusses how it includes Configuration Management, Software Provisioning, and Application Deployment.   This video is a

Read More »

Ansible Tower

This video describes Ansible Tower, a REST API, web service, and web-based console designed to make Ansible more usable for IT teams with members of

Read More »

How Does Ansible Work?

This video outlines how Ansible works including requirements and some of its distinguishing characteristics such as that it utilizes push configuration and it is agentless.

Read More »

Installing Ansible

This short video walks you through how to install Ansible on a Linux, Mac, and Windows machine. This video is a small portion of the

Read More »

Inventory Files

This brief video talks about what an Inventory File is, what it is used for, and provides three examples. This video is a small portion

Read More »

Ansible Modules (2 of 2)

Continuing the discussion of Ansible modules, this video focuses on Ansible documentation and creating custom modules. This video is a small portion of the Ansible

Read More »

Ansible Playbook Example

This video provides an example of an Ansible Playbook outlining all of the necessary components. This video is a small portion of the Ansible Overview Tech

Read More »

What is Ansible?

This short video provides a high-level overview of Ansible. This video is a small portion of the Ansible Overview Tech Session. Be sure to view that

Read More »

Why Ansible?

This brief video explains the need for Ansible including better configuration management, decreased downtime, and greater agility. This video is a small portion of the

Read More »

What is YAML?

This video describes what YAML is and includes a demonstration of how it works. This video is a small portion of the Ansible Overview Tech Session.

Read More »

What is Git?

This video describes what Git is incorporating topics such as remote/local repositories, working directories, and hosting services. This video is a small portion of the

Read More »

Git Installation

This brief video walks you through how to install Git on a Linux, Mac, and Windows machine. This video is a small portion of the

Read More »

File Tracking With Git

This video walks you through file tracking with Git including commands such as git add, git status, git commit, git push origin, and git pull

Read More »

Git Live Demo

This video provides a live demonstration of how Git works. This video is a small portion of the Git Overview Tech Session. Be sure to view

Read More »

Branching Overview

This video provides an overview of Branching including trunk-based development, branch commands, and merge commands. This video is a small portion of the Git Overview Tech

Read More »

Branching Strategy

This brief video outlines the branching strategy used by most companies and includes components such as the production branch, test branch, and design branch. This

Read More »

Data Center Comprehensive

This quiz will test your knowledge of Data Center including topics such as the MDS product line, SAN Analytics, SCSI, NVME, load balancing, zoning, and

Read More »

Collaboration Comprehensive

This quiz will test your knowledge of Collaboration including topics such as Communications Manager, external phone number mask, route patterns, SRST reference, SIP trunk, MGCP

Read More »

Advanced Networking Architecture

This quiz will test your knowledge of Advanced Network Architecture including topics such as design principles, redundancy, FHRP, SSO, WLAN deployment, SD-WAN, SD-Access, QoS components,

Read More »

Advanced Networking Comprehensive

This quiz will test your comprehensive knowledge of Advanced Networking including topics within the areas of Architecture, Infrastructure, Virtualization, and more. Tip: Quiz questions are

Read More »

Switching Overview

This video provides examples of Switching characteristics and how it allows us to virtualize different network segments.   This video is a small portion of

Read More »

Branch Networks

This video provides a brief overview of how branch networks have changed over the years. This video is a small portion of the Examining the

Read More »

Cisco’s Philosophy

This video provides a brief overview of Cisco’s Philosophy including visibility, context, and control. This video is a small portion of the Examining the Security

Read More »

Cisco Stealthwatch

This video provides a brief overview of Cisco’s Stealthwatch and how it works. This video is a small portion of the Examining the Security Threat

Read More »

Threat Vectors

This video provides a brief overview of 3 primary threat vectors, Email, Malware, and URL’s. This video is a small portion of the Examining the

Read More »

Umbrella Features

This video provides a brief overview of Cisco’s Umbrella and how it is used. This video is a small portion of the Examining the Security

Read More »

Wireless Security Standards

This video provides a brief overview of 3 WPA (Wi-Fi Protective Access) standards. This video is a small portion of the Implementing Threat Defense Technologies

Read More »

Wireless Security Concerns

This video provides some examples of challenges with a wireless security network.   This video is a small portion of the Implementing Threat Defense Technologies

Read More »

Wireless Security Solutions

This video provides solution examples used in Wireless Security. This video is a small portion of the Implementing Threat Defense Technologies Tech Session. Be sure

Read More »

SSL and TLS

This video is a small portion of the Implementing Threat Defense Technologies Tech Session. Be sure to view that video if you are interested in

Read More »

IPSec Framework

This video provides an overview of how Confidentiality, Data integrity, Origin authentication, Anti-replay protection and, Key management are implemented in the IPSec Framework. This video

Read More »

Encryption

This video provides a brief overview of Encryption, Ciphers, hides the original content, and provides confidentiality at multiple layers. This video is a small portion

Read More »

IPSec Components (2 of 2)

This video is a continuation of IPSec Components and provides an overview of Anti-Replay Protection and Key Management. This video is a small portion of

Read More »

CIA Revisited: Cryptography

This video provides a brief overview of CIA: Integrity, Availability, Confidentiality, and Hashing Algorithms. This video is a small portion of the Implementing Threat Defense

Read More »

Data Loss and Phishing

This video provides examples of preventing Data Loss which include Cisco Email Security Appliance, Cisco Web Security Appliance, and Cisco Next-Generation Firewall. This video is

Read More »

DoS and DDoS

This video provides examples of Denial of Service & Distributed Denial of Service and the solutions.   This video is a small portion of the

Read More »

What Threat Defense Provides

This video provides a brief overview of the CIA Triangle which includes Integrity, Availability, and Confidentiality. This video is a small portion of the Implementing

Read More »

Controls and Ownership

This video provides examples of the 3 controls Technical, Administrative, and Physical, and how they work together with Ownership. This video is a small portion

Read More »

Attributes of Network Design

In this video, Jim Goughenour discusses Attributes of a Network Design including scalability, resiliency, security and quality of service. This video is a small portion

Read More »

Benefits of Virtual Machines

This video outlines the benefits of Virtual Machines including partitioning, isolation, encapsulation, hardware abstraction, optimum performance, maintenance, and resource optimization. This video is a small

Read More »

Cloud Computing Overview

This video provides an overview of Cloud Computing including characteristics such as On-Demand Self-Service, Broad Network Access, Resource Pooling, Rapid Elasticity, and Measured Service. This

Read More »

Cloud Computing Types

This short video walks you through the various types of Cloud Computing including Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), and Software-as-a-Service (SaaS). This video is a small

Read More »

Design Issue and Challenges

In this video, Jim Goughenour covers some of the issues and challenges faced when designing a network including Failure Domains, Security Vulnerabilities, Management Challenges, and

Read More »

Modular Network Design

This video breaks down the components of a Modular Network Design and describes what each is responsible for. This video is a small portion of

Read More »

Network Device Architecture

In this video, Jim Goughenour talks about the differences between a Traditional Architecture and a Software-Defined Architecture. This video is a small portion of the Introducing

Read More »

Network Function Virtualization

In this short video, Jim Goughenour describes Network Function Virtualization including VLANs and Virtual Routing and Forwarding. This video is a small portion of the Introducing

Read More »

Spine/Leaf Network Design

This brief video describes what a Spine/Leaf Network Design is and some of its advantages including improved latency, reduced bottlenecks, and increased bandwidth. This video

Read More »

Two-Tier Network Design

This video discusses the Two-Tier Network Design and looks at the two layers: Distribution Layer and Access Layer. This video is a small portion of

Read More »

Virtualization Examples

In this short video, Jim Goughenour provides a hands on example of a Virtual Machine (VM). This video is a small portion of the Introducing Architectures

Read More »

VMs vs. Containers

This video compares and contrasts Virtual Machines (VMs) and Containers. This video is a small portion of the Introducing Architectures and Virtualization Tech Session. Be sure

Read More »

FlexConnect Mode APs

This video introduces the topic of FlexConnect Mode APs in which WLC and APs are physically separated. This video is a small portion of the

Read More »