Default Networks
This short video outlines the differences between the three types of default networks, Bridge, None, and Host. This video is a small portion of the
Docker Demo
This video includes a live demo of Docker. This video is a small portion of the Docker Overview Tech Session. Be sure to view that video
Docker Editions
This short video explains the differences between the free Community Edition and the paid Enterprise Edition of Docker. This video is a small portion of
Docker Hub
This short video explains what the Docker Hub is and how to utilize it. This video is a small portion of the Docker Overview Tech Session.
Creating a Docker Image Demo
This live demo walks you through the steps to create a Docker Image. This video is a small portion of the Docker Overview Tech Session. Be
Docker Terminology
This video introduces terminology specific to Docker including Docker Engine, Docker File, and Docker Image. This video is a small portion of the Docker Overview Tech
Volume Mapping
This video explains what Volume Mapping is and how to configure it within Docker using a variety of commands such as docker run, docker stop,
What are Containers?
This video explains what containers are and how they work. This video is a small portion of the Docker Overview Tech Session. Be sure to view
Network Complexity Example
This short video gives an example of the type of network complexity that can occur when you are managing multiple applications without using containers. This
Problems Addressed by Docker
This video discusses some of the common problems that Docker addresses including missing or incorrect application dependencies and conflicts between programs. This video is a
What are Virtual Machines?
This video explains what virtual machines are and why you would use them. This video is a small portion of the Docker Overview Tech Session. Be
Virtual Machines and Containers
This brief video explains how, rather than deciding between virtual machines and containers, they can effectively be used together. This video is a small portion
What is Docker?
This short video explains what Docker is and how it is used. This video is a small portion of the Docker Overview Tech Session. Be sure
What is Network Automation?
This video defines what network automation is and how it has developed over time. This video is a small portion of the Overview of Network
Start Your Network Programmability Journey
This video provides guidance on how to get started on your Network Programmability Journey. Topics include Python, JSON, XML, Postman, Git, Docker, Ansible, and more.
The Evolution of Networking Skills
This short video talks about how the skills required to be a Network Engineer have changed over time in response to changing technology. This video
Network Automation and Scalability
This brief video talks about the difficulty of scaling up a network without automation in place. This video is a small portion of the Overview
Network Automation Benefits
This video outlines the numerous benefits of network automation including lower costs, improved business continuity, and greater agility. This video is a small portion of
Basic Git Commands
This video introduces basic Git commands such as git version, git init, and git clone and shows you how to use them. This video is
Introduction to Ansible
This brief video serves as an introduction to Ansible and discusses how it includes Configuration Management, Software Provisioning, and Application Deployment. This video is a
Ansible Tower
This video describes Ansible Tower, a REST API, web service, and web-based console designed to make Ansible more usable for IT teams with members of
How Does Ansible Work?
This video outlines how Ansible works including requirements and some of its distinguishing characteristics such as that it utilizes push configuration and it is agentless.
Installing Ansible
This short video walks you through how to install Ansible on a Linux, Mac, and Windows machine. This video is a small portion of the
Inventory Files
This brief video talks about what an Inventory File is, what it is used for, and provides three examples. This video is a small portion
Ansible Modules (1 of 2)
This brief video explains what a module is and how they are used within Ansible. This video is a small portion of the Ansible Overview Tech
Ansible Modules (2 of 2)
Continuing the discussion of Ansible modules, this video focuses on Ansible documentation and creating custom modules. This video is a small portion of the Ansible
Ansible Playbook Overview
This short video explains what an Ansible Playbook is and how it is used. This video is a small portion of the Ansible Overview Tech Session.
Ansible Playbook Example
This video provides an example of an Ansible Playbook outlining all of the necessary components. This video is a small portion of the Ansible Overview Tech
What is Ansible?
This short video provides a high-level overview of Ansible. This video is a small portion of the Ansible Overview Tech Session. Be sure to view that
Why Ansible?
This brief video explains the need for Ansible including better configuration management, decreased downtime, and greater agility. This video is a small portion of the
What is YAML?
This video describes what YAML is and includes a demonstration of how it works. This video is a small portion of the Ansible Overview Tech Session.
What is Git?
This video describes what Git is incorporating topics such as remote/local repositories, working directories, and hosting services. This video is a small portion of the
Git Installation
This brief video walks you through how to install Git on a Linux, Mac, and Windows machine. This video is a small portion of the
File Tracking With Git
This video walks you through file tracking with Git including commands such as git add, git status, git commit, git push origin, and git pull
File Tracking With Git Demo
This video demonstrates how file tracking works with Git and how to utilize the various commands in a live environment. This video is a small
Git Live Demo
This video provides a live demonstration of how Git works. This video is a small portion of the Git Overview Tech Session. Be sure to view
Branching Overview
This video provides an overview of Branching including trunk-based development, branch commands, and merge commands. This video is a small portion of the Git Overview Tech
Branching Strategy
This brief video outlines the branching strategy used by most companies and includes components such as the production branch, test branch, and design branch. This
Branching Commands Demo
This video provides a live demonstration of how to use common branching commands such as git branch, git checkout, and git log. This video is
Introducing QoS, Part 2: Congestion Management
In this 1-hour Tech Session, Keith Edwards discusses Queuing techniques and logic on Routers and Switching, to include Weighted Fair Queuing, CBWFQ, and LLQ, along
Data Center Comprehensive
This quiz will test your knowledge of Data Center including topics such as the MDS product line, SAN Analytics, SCSI, NVME, load balancing, zoning, and
Wireless Roaming and How It Works
In this 1-hour Tech Session, presented by Jim Goughenour, we take some time to understand a little bit more about how wireless clients roam in
Collaboration Comprehensive
This quiz will test your knowledge of Collaboration including topics such as Communications Manager, external phone number mask, route patterns, SRST reference, SIP trunk, MGCP
Advanced Networking Virtualization
This quiz will test your knowledge of Virtualization including topics such as hypervisors, virtual machines, virtual switching, VRF, GRE, IPsec tunneling, VXLAN, and more.
Advanced Networking Infrastructure
This quiz will test your knowledge of Advanced Networking Infrastructure including topics such as 802.1q trunking protocols, EtherChannels, Spanning Tree Protocols (RSTP and MST), EIGRP,
Advanced Networking Architecture
This quiz will test your knowledge of Advanced Network Architecture including topics such as design principles, redundancy, FHRP, SSO, WLAN deployment, SD-WAN, SD-Access, QoS components,
Advanced Networking Comprehensive
This quiz will test your comprehensive knowledge of Advanced Networking including topics within the areas of Architecture, Infrastructure, Virtualization, and more. Tip: Quiz questions are
Subnetting for the CCNA Exam
In this exciting 1 hour presentation, Kenya Thomas will give you the simplest and easiest way to calculate subnetting for the CCNA exam. Subnetting is
Wildcard Masking in IPv4
In this 1-hour Tech Session, Jim Goughenour takes an in-depth look at the fundamentals and usage of Wildcard Masks including where and how they are
Introducing QoS, Part 1: Classification and Marking
This 1-hour Tech Session, presented by Keith Edwards, provides a fundamental understanding of classification and Marking using the Modular QoS Command Line Interface, with in-depth
Spanning Tree Protocol (STP) Process
This video provides a brief overview of the Bridge Protocol Data Unit (BPDU) and its process. This video is a small portion of the
Spanning Tree Protocol (STP) Overview
This video provides a brief overview of Spanning Tree Protocol what it provides and the different types of Spanning Trees. This video is a small
Switching Overview
This video provides examples of Switching characteristics and how it allows us to virtualize different network segments. This video is a small portion of
The Need for Spanning Tree Protocol (STP)
This video provides a brief overview of the need for Spanning Tree Protocol and how the Data Planes can be affected. This video is a
Comparing PVST+ and Rapid PVST+
This video provides a brief overview of PVST+ & Rapid PVST+ and how it uses the 16-bit value to create a priority. This video is
Layer 2 Switching Redundancy
This video provides a brief overview of designing Layer 2 Switching with examples of best practices. This video is a small portion of the Building
Rapid Spanning Tree Protocol (STP) Process
This video provides a brief overview of the differences between Rapid Spanning Tree Protocol and Spanning Tree Protocol. This video is a small portion of
Spanning Tree Protocol Live Demo
This video provides a brief demo showing the difference between 2 switches, the redundant links, and which switch is the bridge. This video is
Spanning Tree Protocol (STP) Features
This video provides examples of the features for Spanning Tree Protocol which include PortFast, UplinkFast, BackboneFast, BPDU Guard, BPDU Filter, and Root Guard. This video
What Is Cisco AMP for Endpoints?
This video provides a brief overview of Hash of a file, Cisco’s AMP, and how it works. This video is a small portion of the
Anatomy of a Target Retailer Breach (1 of 4)
This video provides a brief overview of how businesses are using 2-step authentication when accessing the network. This video is a small portion of the
Anatomy of a Target Retailer Breach (3 of 4)
This video provides a brief overview of the multiple ways attackers use to get into the network. This video is a small portion of
Branch Networks
This video provides a brief overview of how branch networks have changed over the years. This video is a small portion of the Examining the
Cisco’s Philosophy
This video provides a brief overview of Cisco’s Philosophy including visibility, context, and control. This video is a small portion of the Examining the Security
Cybercriminals: Chaos = Opportunity
This video provides a brief overview of the increase in Cybercriminal opportunities to infect networks. This video is a small portion of the Examining the
Anatomy of a Target Retailer Breach
This video provides a brief overview of the 3 typical steps in a targeted malicious breach. This video is a small portion of the Examining
Increasing Cost of Cybercrime – Per Breach
This video provides a brief overview of the increasing cost of Cybercrime, the average cost, records stolen per breach, and the average time it takes
Anatomy of a Target Retailer Breach (2 of 4)
This video provides a brief overview of the Target Retail Breach and what went wrong. This video is a small portion of the Examining the
Anatomy of a Target Retailer Breach (4 of 4)
This video provides a brief overview of the Target Retailer breach, Malware, and Endpoints Solutions. This video is a small portion of the Examining the
Cisco Stealthwatch
This video provides a brief overview of Cisco’s Stealthwatch and how it works. This video is a small portion of the Examining the Security Threat
Threat Vectors
This video provides a brief overview of 3 primary threat vectors, Email, Malware, and URL’s. This video is a small portion of the Examining the
Umbrella Features
This video provides a brief overview of Cisco’s Umbrella and how it is used. This video is a small portion of the Examining the Security
Wireless Security Standards
This video provides a brief overview of 3 WPA (Wi-Fi Protective Access) standards. This video is a small portion of the Implementing Threat Defense Technologies
Wireless Security Concerns
This video provides some examples of challenges with a wireless security network. This video is a small portion of the Implementing Threat Defense Technologies
Wireless Security Solutions
This video provides solution examples used in Wireless Security. This video is a small portion of the Implementing Threat Defense Technologies Tech Session. Be sure
Threat Defense – The Big Picture
This video provides a brief overview of Threat Defense and the tools to manage the risks. This video is a small portion of the Implementing
SSL and TLS
This video is a small portion of the Implementing Threat Defense Technologies Tech Session. Be sure to view that video if you are interested in
IPSec Framework
This video provides an overview of how Confidentiality, Data integrity, Origin authentication, Anti-replay protection and, Key management are implemented in the IPSec Framework. This video
Firewalls and Intrusion Prevention Systems
This video provides examples of Firewalls and some basic form factors of Intrusion Prevention Systems. This video is a small portion of the Implementing Threat
IPSec Components (1 of 2)
This video is a small portion of the Implementing Threat Defense Technologies Tech Session. Be sure to view that video if you are interested in
Encryption
This video provides a brief overview of Encryption, Ciphers, hides the original content, and provides confidentiality at multiple layers. This video is a small portion
IPSec Components (2 of 2)
This video is a continuation of IPSec Components and provides an overview of Anti-Replay Protection and Key Management. This video is a small portion of
CIA Revisited: Cryptography
This video provides a brief overview of CIA: Integrity, Availability, Confidentiality, and Hashing Algorithms. This video is a small portion of the Implementing Threat Defense
Data Loss and Phishing
This video provides examples of preventing Data Loss which include Cisco Email Security Appliance, Cisco Web Security Appliance, and Cisco Next-Generation Firewall. This video is
DoS and DDoS
This video provides examples of Denial of Service & Distributed Denial of Service and the solutions. This video is a small portion of the
What Threat Defense Provides
This video provides a brief overview of the CIA Triangle which includes Integrity, Availability, and Confidentiality. This video is a small portion of the Implementing
Controls and Ownership
This video provides examples of the 3 controls Technical, Administrative, and Physical, and how they work together with Ownership. This video is a small portion
Cisco AnyConnect SSL VPN
This video provides a brief overview of Cisco’s AnyConnect and how it is used to create a tunnel. This video is a small portion
Attributes of Network Design
In this video, Jim Goughenour discusses Attributes of a Network Design including scalability, resiliency, security and quality of service. This video is a small portion
Benefits of Virtual Machines
This video outlines the benefits of Virtual Machines including partitioning, isolation, encapsulation, hardware abstraction, optimum performance, maintenance, and resource optimization. This video is a small
Cloud Computing Overview
This video provides an overview of Cloud Computing including characteristics such as On-Demand Self-Service, Broad Network Access, Resource Pooling, Rapid Elasticity, and Measured Service. This
Cloud Computing Types
This short video walks you through the various types of Cloud Computing including Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), and Software-as-a-Service (SaaS). This video is a small
Design Issue and Challenges
In this video, Jim Goughenour covers some of the issues and challenges faced when designing a network including Failure Domains, Security Vulnerabilities, Management Challenges, and
Modular Network Design
This video breaks down the components of a Modular Network Design and describes what each is responsible for. This video is a small portion of
Network Device Architecture
In this video, Jim Goughenour talks about the differences between a Traditional Architecture and a Software-Defined Architecture. This video is a small portion of the Introducing
Network Function Virtualization
In this short video, Jim Goughenour describes Network Function Virtualization including VLANs and Virtual Routing and Forwarding. This video is a small portion of the Introducing
Spine/Leaf Network Design
This brief video describes what a Spine/Leaf Network Design is and some of its advantages including improved latency, reduced bottlenecks, and increased bandwidth. This video
Three-Tier Network Design
This video provides a brief overview of the modularity between the Access Layer, Distribution Layer, and Core Layer. This video is a small portion of
Two-Tier Network Design
This video discusses the Two-Tier Network Design and looks at the two layers: Distribution Layer and Access Layer. This video is a small portion of
Virtualization Examples
In this short video, Jim Goughenour provides a hands on example of a Virtual Machine (VM). This video is a small portion of the Introducing Architectures