Courses

Spanning Tree Protocol Live Demo

This video provides a brief demo showing the difference between 2 switches, the redundant links, and which switch is the bridge.    This video is a small portion of the Building Redundant Switched Topologies Tech Session. Be sure to view that video if you are interested in more information on similar topics.

Spanning Tree Protocol (STP) Features

This video provides examples of the features for Spanning Tree Protocol which include PortFast, UplinkFast, BackboneFast, BPDU Guard, BPDU Filter, and Root Guard. This video is a small portion of the Building Redundant Switched Topologies Tech Session. Be sure to view that video if you are interested in more information on similar topics.

What Is Cisco AMP for Endpoints?

This video provides a brief overview of Hash of a file, Cisco’s AMP, and how it works. This video is a small portion of the Examining the Security Threat Landscape Tech Session. Be sure to view that video if you are interested in more information on similar topics.

Anatomy of a Target Retailer Breach (1 of 4)

This video provides a brief overview of how businesses are using 2-step authentication when accessing the network. This video is a small portion of the Examining the Security Threat Landscape Tech Session. Be sure to view that video if you are interested in more information on similar topics.

Anatomy of a Target Retailer Breach (3 of 4)

This video provides a brief overview of the multiple ways attackers use to get into the network.   This video is a small portion of the Examining the Security Threat Landscape Tech Session. Be sure to view that video if you are interested in more information on similar topics.

Branch Networks

This video provides a brief overview of how branch networks have changed over the years. This video is a small portion of the Examining the Security Threat Landscape Tech Session. Be sure to view that video if you are interested in more information on similar topics.

Cisco’s Philosophy

This video provides a brief overview of Cisco’s Philosophy including visibility, context, and control. This video is a small portion of the Examining the Security Threat Landscape Tech Session. Be sure to view that video if you are interested in more information on similar topics.

Cybercriminals: Chaos = Opportunity

This video provides a brief overview of the increase in Cybercriminal opportunities to infect networks. This video is a small portion of the Examining the Security Threat Landscape Tech Session. Be sure to view that video if you are interested in more information on similar topics.

Anatomy of a Target Retailer Breach

This video provides a brief overview of the 3 typical steps in a targeted malicious breach. This video is a small portion of the Examining the Security Threat Landscape Tech Session. Be sure to view that video if you are interested in more information on similar topics.

Anatomy of a Target Retailer Breach (2 of 4)

This video provides a brief overview of the Target Retail Breach and what went wrong. This video is a small portion of the Examining the Security Threat Landscape Tech Session. Be sure to view that video if you are interested in more information on similar topics.

Anatomy of a Target Retailer Breach (4 of 4)

This video provides a brief overview of the Target Retailer breach, Malware, and Endpoints Solutions. This video is a small portion of the Examining the Security Threat Landscape Tech Session. Be sure to view that video if you are interested in more information on similar topics.

Cisco Stealthwatch

This video provides a brief overview of Cisco’s Stealthwatch and how it works. This video is a small portion of the Examining the Security Threat Landscape Tech Session. Be sure to view that video if you are interested in more information on similar topics.

Threat Vectors

This video provides a brief overview of 3 primary threat vectors, Email, Malware, and URL’s. This video is a small portion of the Examining the Security Threat Landscape Tech Session. Be sure to view that video if you are interested in more information on similar topics.

Umbrella Features

This video provides a brief overview of Cisco’s Umbrella and how it is used. This video is a small portion of the Examining the Security Threat Landscape Tech Session. Be sure to view that video if you are interested in more information on similar topics.

Wireless Security Standards

This video provides a brief overview of 3 WPA (Wi-Fi Protective Access) standards. This video is a small portion of the Implementing Threat Defense Technologies Tech Session. Be sure to view that video if you are interested in more information on similar topics.

Wireless Security Concerns

This video provides some examples of challenges with a wireless security network.   This video is a small portion of the Implementing Threat Defense Technologies Tech Session. Be sure to view that video if you are interested in more information on similar topics.

Wireless Security Solutions

This video provides solution examples used in Wireless Security. This video is a small portion of the Implementing Threat Defense Technologies Tech Session. Be sure to view that video if you are interested in more information on similar topics.

Threat Defense – The Big Picture

This video provides a brief overview of Threat Defense and the tools to manage the risks. This video is a small portion of the Implementing Threat Defense Technologies Tech Session. Be sure to view that video if you are interested in more information on similar topics.

SSL and TLS

This video is a small portion of the Implementing Threat Defense Technologies Tech Session. Be sure to view that video if you are interested in more information on similar topics.

IPSec Framework

This video provides an overview of how Confidentiality, Data integrity, Origin authentication, Anti-replay protection and, Key management are implemented in the IPSec Framework. This video is a small portion of the Implementing Threat Defense Technologies Tech Session. Be sure to view that video if you are interested in more information on similar topics.