Courses

Firewalls and Intrusion Prevention Systems

This video provides examples of Firewalls and some basic form factors of Intrusion Prevention Systems. This video is a small portion of the Implementing Threat Defense Technologies Tech Session. Be sure to view that video if you are interested in more information on similar topics.

IPSec Components (1 of 2)

This video is a small portion of the Implementing Threat Defense Technologies Tech Session. Be sure to view that video if you are interested in more information on similar topics.

Encryption

This video provides a brief overview of Encryption, Ciphers, hides the original content, and provides confidentiality at multiple layers. This video is a small portion of the Implementing Threat Defense Technologies Tech Session. Be sure to view that video if you are interested in more information on similar topics.

IPSec Components (2 of 2)

This video is a continuation of IPSec Components and provides an overview of Anti-Replay Protection and Key Management. This video is a small portion of the Implementing Threat Defense Technologies Tech Session. Be sure to view that video if you are interested in more information on similar topics.

CIA Revisited: Cryptography

This video provides a brief overview of CIA: Integrity, Availability, Confidentiality, and Hashing Algorithms. This video is a small portion of the Implementing Threat Defense Technologies Tech Session. Be sure to view that video if you are interested in more information on similar topics.

Data Loss and Phishing

This video provides examples of preventing Data Loss which include Cisco Email Security Appliance, Cisco Web Security Appliance, and Cisco Next-Generation Firewall. This video is a small portion of the Implementing Threat Defense Technologies Tech Session. Be sure to view that video if you are interested in more information on similar topics.

DoS and DDoS

This video provides examples of Denial of Service & Distributed Denial of Service and the solutions.   This video is a small portion of the Implementing Threat Defense Technologies Tech Session. Be sure to view that video if you are interested in more information on similar topics.

What Threat Defense Provides

This video provides a brief overview of the CIA Triangle which includes Integrity, Availability, and Confidentiality. This video is a small portion of the Implementing Threat Defense Technologies Tech Session. Be sure to view that video if you are interested in more information on similar topics.

Controls and Ownership

This video provides examples of the 3 controls Technical, Administrative, and Physical, and how they work together with Ownership. This video is a small portion of the Implementing Threat Defense Technologies Tech Session. Be sure to view that video if you are interested in more information on similar topics.

Cisco AnyConnect SSL VPN

This video provides a brief overview of Cisco’s AnyConnect and how it is used to create a tunnel.   This video is a small portion of the Implementing Threat Defense Technologies Tech Session. Be sure to view that video if you are interested in more information on similar topics.

Attributes of Network Design

In this video, Jim Goughenour discusses Attributes of a Network Design including scalability, resiliency, security and quality of service. This video is a small portion of the Introducing Architectures and Virtualization Tech Session. Be sure to view that video if you are interested in more information on similar topics.

Benefits of Virtual Machines

This video outlines the benefits of Virtual Machines including partitioning, isolation, encapsulation, hardware abstraction, optimum performance, maintenance, and resource optimization. This video is a small portion of the Introducing Architectures and Virtualization Tech Session. Be sure to view that video if you are interested in more information on similar topics.

Cloud Computing Overview

This video provides an overview of Cloud Computing including characteristics such as On-Demand Self-Service, Broad Network Access, Resource Pooling, Rapid Elasticity, and Measured Service. This video is a small portion of the Introducing Architectures and Virtualization Tech Session. Be sure to view that video if you are interested in more information on similar topics.

Cloud Computing Types

This short video walks you through the various types of Cloud Computing including Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), and Software-as-a-Service (SaaS). This video is a small portion of the Introducing Architectures and Virtualization Tech Session. Be sure to view that video if you are interested in more information on similar topics.

Design Issue and Challenges

In this video, Jim Goughenour covers some of the issues and challenges faced when designing a network including Failure Domains, Security Vulnerabilities, Management Challenges, and Large Broadcast Domains. This video is a small portion of the Introducing Architectures and Virtualization Tech Session. Be sure to view that video if you are interested in more information on …

Design Issue and Challenges Read More »

Modular Network Design

This video breaks down the components of a Modular Network Design and describes what each is responsible for. This video is a small portion of the Introducing Architectures and Virtualization Tech Session. Be sure to view that video if you are interested in more information on similar topics.

Network Device Architecture

In this video, Jim Goughenour talks about the differences between a Traditional Architecture and a Software-Defined Architecture. This video is a small portion of the Introducing Architectures and Virtualization Tech Session. Be sure to view that video if you are interested in more information on similar topics.

Network Function Virtualization

In this short video, Jim Goughenour describes Network Function Virtualization including VLANs and Virtual Routing and Forwarding. This video is a small portion of the Introducing Architectures and Virtualization Tech Session. Be sure to view that video if you are interested in more information on similar topics.

Spine/Leaf Network Design

This brief video describes what a Spine/Leaf Network Design is and some of its advantages including improved latency, reduced bottlenecks, and increased bandwidth. This video is a small portion of the Introducing Architectures and Virtualization Tech Session. Be sure to view that video if you are interested in more information on similar topics.

Three-Tier Network Design

This video provides a brief overview of the modularity between the Access Layer, Distribution Layer, and Core Layer. This video is a small portion of the Introducing Architectures and Virtualization Tech Session. Be sure to view that video if you are interested in more information on similar topics.

Two-Tier Network Design

This video discusses the Two-Tier Network Design and looks at the two layers: Distribution Layer and Access Layer. This video is a small portion of the Introducing Architectures and Virtualization Tech Session. Be sure to view that video if you are interested in more information on similar topics.