Courses

Introducing WAN Technologies

This 1-hour session, presented by Keith Edwards, discusses WAN technologies for both legacy and current Wide Area Networking connectivity types and services. These will include Serial lines, Ethernet connectivity to the Carrier, a Carrier using MPLS internally and providing connectivity to both other enterprise sites, as well as the Internet, and VPN’s. This video contains […]

Introducing WAN Technologies Read More »

Cisco Secure Endpoints (Formerly AMP for Endpoints)

Cisco Secure Endpoints provides protection from malware, ransomware and other types of malicious software that can compromise an endpoint. In this 1-hour Tech Session Kenya Thomas explains Cisco Secure Endpoint and Cisco Threat Grid which combined together give unparalleled protection at the endpoint. This video contains Knowledge Checks intended to test your understanding of the

Cisco Secure Endpoints (Formerly AMP for Endpoints) Read More »

Introducing Multicast Protocols

In this 1-hour Tech Session, Jim Goughenour goes through Multicast technology at a fairly high level. We will do a Multicast Overview, and also discuss some particulars, like IGMPV1, IGMPV2 and IGMPV3. We will discuss Multicast Distribution Tree concepts, such as Source Trees and Shared Trees. We will also touch on Multicast Routing and the

Introducing Multicast Protocols Read More »

Understanding Enterprise Network Security Architecture

In this 1-hour Tech Session, Keith Edwards goes over the tenets and needs behind a good Enterprise Network Security Architecture. We will discuss the “threatscape” which must be mitigated with Security Architecture tools and systems. We will also discuss tools like VPN, Content Security, Logging, Endpoint Security tools, Firewalls and more. This discussion is designed

Understanding Enterprise Network Security Architecture Read More »

MDS Basics

Cisco© MDS is one of the most powerful storage networking solutions offered today. It’s scalable, programmable, reduces IT costs, and easily responds to the business needs of today’s enterprise networks. In this 1-hour Tech Session, presented by David Hodde, you will learn, first-hand, how Cisco MDS consistently delivers high-performance, provides better data protection and lowers

MDS Basics Read More »

Achieving Low-Latency Switching with Exablaze

In this 1-hour Tech Session, David Hodde provides an overview of the Exablaze partnership and how they fit within the Cisco Intent-Based Networking portfolio. We will then dive further into the Exablaze solution, demonstrating why they are the market leader in low-latency networking, layer 1 switching technologies and low-latency FPGA expertise.

Achieving Low-Latency Switching with Exablaze Read More »

Understanding the Basics of Python Programming

In this 1-hour Tech Session, Edwin Owen discusses why most Network Engineers choose to use Python over other programming languages. We will look at how to build and execute scripts, discuss data types how to work with list and dictionaries, and how to use functions to help you get started on your journey in this

Understanding the Basics of Python Programming Read More »

Exploring Automation and Assurance using DNA Center

In this 1-hour Tech Session, Keith Edwards discusses Automation and Assurance tools and capabilities in Cisco DNA Center. We will discuss Intent-Based Networking and it’s building blocks. We will look at how analytics provide contextual insights which aide in Network Assurance. We will also speak to DNA Center as a product including its use, licensing

Exploring Automation and Assurance using DNA Center Read More »

Introducing Network Programmability Protocols

In this 1-hour Tech Session, presented by Edwin Owen, we are learning about the evolution of network configuration management including an overview of the tools such as Puppet, Chef, Ansible and Saltstack. Then we’ll explore encoding such as Extensible markup Language(XML), and JSON. Along with management protocols such as REST, NETCONF and RESTCONF and a

Introducing Network Programmability Protocols Read More »