Courses

Cisco Collaboration User Types

In this video, Toby Sauer covers Cisco Collaboration User Types as well as: OAuth Flow Using OAuth Token to Authenticate to a Web Service Session and Token timers Recommended Timer Values This video is a small portion of the SSO Basics for Collaboration Application Tech Session. Be sure to view that video if you are …

Cisco Collaboration User Types Read More »

SSO Protocols

This video walks you through the different SSO protocols and standards including: LDAP SAML 2.0 OAuth GUI access and UC interfaces This video is a small portion of the SSO Basics for Collaboration Application Tech Session. Be sure to view that video if you are interested in more information on similar topics.

Authentication vs Authorization

In this short video, Toby Sauer covers the differences between Authentication and Authorization as well as the different types of Authentication (single-factor, two-factor, multi-factor). This video is a small portion of the SSO Basics for Collaboration Application Tech Session. Be sure to view that video if you are interested in more information on similar topics.

Why SSO?

In this short video, Toby Sauer goes through a number of issues that company’s face that can be fixed by implementing Single Sign-On (SSO) including: Distributed workforce BYOD Scalability Compliance Distributed applications Password problems This video is a small portion of the SSO Basics for Collaboration Application Tech Session. Be sure to view that video …

Why SSO? Read More »

SSO Collaboration

This brief video talks about the different Cisco Collaboration applications that support SSO including: CUCM IMP UCCX CUC Webex This video is a small portion of the SSO Basics for Collaboration Application Tech Session. Be sure to view that video if you are interested in more information on similar topics.

Security Assertion Markup Language (SAML)

In this brief video, Toby Sauer covers what SAML is as well as the two parts of the login process: Authentication and Authorization. This video is a small portion of the SSO Basics for Collaboration Application Tech Session. Be sure to view that video if you are interested in more information on similar topics.

What is RTMT?

Learn what Cisco’s Real Time Monitoring Tool (RTMT) is, what it can do, and what it CANNOT do. This video is a small portion of the Using Cisco’s Real Time Monitoring Tool (RTMT) Tech Session. Be sure to view that video if you are interested in more information on similar topics.

Zero Trust Lingo

This brief video introduces some of the language and concepts surrounding Zero Trust including Policy Engine (PE), Policy Administrator (PA), Policy Enforcement Point (PEP), Continuous Diagnostics and Mitigation (CDM), ID Management System, and Security Information and Event Management System (SIEM). This video is a small portion of the Zero-Trust: Deployment and Use Cases Tech Session. …

Zero Trust Lingo Read More »

Tenets of Zero Trust

Learn about the Seven Tenets of Zero Trust in this video: All data sources and computing services are considered resources. All communication is secured regardless of network location. Access to individual enterprise resources is granted on a per-session basis. Access to resources is determined by dynamic policy. The enterprise monitors and measures the integrity and …

Tenets of Zero Trust Read More »

Enterprise with RA Zero Trust Use Case

In this short video, Eric Smith walks through the common scenario of Enterprise with Remote Access. This video is a small portion of the Zero-Trust: Deployment and Use Cases Tech Session. Be sure to view that video if you are interested in more information on similar topics.

Enterprise with Nonemployee Access Zero Trust Use Case

In this short video, Eric Smith walks through the common scenario of Enterprise with Nonemployee Access. This video is a small portion of the Zero-Trust: Deployment and Use Cases Tech Session. Be sure to view that video if you are interested in more information on similar topics.

Multi-Cloud Scenario Zero Trust User Case

In this short video, Eric Smith walks through deploying Zero Trust Architecture in a Multi-Cloud Access scenario. This video is a small portion of the Zero-Trust: Deployment and Use Cases Tech Session. Be sure to view that video if you are interested in more information on similar topics.

Threats Against Zero Trust

This video outlines the various threats that surround Zero Trust including: Subversion of the ZTA decision process Denial of Service (DoS) or Network Disruption Stolen Credentials/Insider Threats and more This video is a small portion of the Zero-Trust: Deployment and Use Cases Tech Session. Be sure to view that video if you are interested in …

Threats Against Zero Trust Read More »

Variations of Zero Trust Architecture

In this video, learn about different variations of Zero Trust architecture including Pure ZTA and Hybrid ZTA. This video is a small portion of the Zero-Trust: Deployment and Use Cases Tech Session. Be sure to view that video if you are interested in more information on similar topics.

CompTIA Network+: Networking Fundamentals (Part 1 of 6)

In this first Tech Session of six, Jim Goughenour takes a deep dive into the Network Fundamentals part of the exam blueprint. Topics include OSI and Encapsulation, Topologies, Cables and Connectors, IPv4 and IP6, Ports and Protocols, Network Services, and Network Architecture. Click here to view/download the slides for this Tech Session.

Everything You Always Wanted To Know About CUCM Service Parameters (But Were Afraid To Ask)

In this Tech Session, Kevin Koeper goes over some commonly changed default settings in Communications Manager (CUCM). These settings are configured on the Enterprise Parameters and Service Parameters pages. He walks through how to: Enable dependency records to allow administrators to see a list of where certain resources are used Allow or disallow end users …

Everything You Always Wanted To Know About CUCM Service Parameters (But Were Afraid To Ask) Read More »