Courses

Ansible Overview

In this 1-hour Tech Session, presented by Edwin Owen, you will get an overview of Ansible. Additionally, you will learn how to configure a Playbook and setup an inventory file to configure network devices.  Click here to view/download the slides for this Tech Session.  Tags: configuration management, software provisioning, application deployment, YAML, inventory, modules, playbook, […]

Ansible Overview Read More »

Docker Overview

In this 1-hour Tech Session, presented by Edwin Owen, you will get an overview of Docker. You will learn how to write Docker files, build Docker images and run containers. Click here to view/download the slides for this Tech Session.  Tags: Docker engine, Docker file, Docker image, Docker container, volume mapping, Docker image

Docker Overview Read More »

Python Overview

In this 1-hour Tech Session, presented by Edwin Owen, you will get an overview of Python and will learn how to download Python, install packages, setup environments and basic commands and syntax. Click here to view/download the slides for this Tech Session.  Previous Next Tags: object-oriented, programming, immutable, mutable, data types, number, string, tuples, list,

Python Overview Read More »

Implementing Threat Defense Technologies

In this 1-hour Tech Session, presented by Jim Goughenour, we will explore and discover many of the various technologies that serve to keep our networks, our endpoints, and most importantly our data safe! We also take a look at many of the places we deploy security features and how they serve to protect us. Firewalls,

Implementing Threat Defense Technologies Read More »

Examining the Security Threat Landscape

In this 1 hour Tech Session, Kenya Thomas examines the Cisco Security Architecture and how it works together to combat cybersecurity threats. This video contains Knowledge Checks intended to test your understanding of the topic. We encourage you to pause the video, jot down your answer(s), and then hit ‘play’ to see the correct answer(s).

Examining the Security Threat Landscape Read More »

Introducing Architectures and Virtualization

In this 1-hour Tech Session, Jim Goughenour takes a closer look at the variations in network design. We will explore hierarchical design methods, virtualization, cloud computing, and leaf-spine architectures. This video contains Knowledge Checks intended to test your understanding of the topic. We encourage you to pause the video, jot down your answer(s), and then

Introducing Architectures and Virtualization Read More »

Explaining Wireless Fundamentals

In this 1-hour Tech Session, Jim Goughenour takes a look at how wireless has become central to business communications, and explore some of the working parts of what it takes to provide wireless services in the infrastructure. We will explore controllers, access points, and all the protocols that tie it all together. This video contains

Explaining Wireless Fundamentals Read More »

Introducing QoS

This 1-hour session, presented by Jim Goughenour, covers basic QoS tools, we will explain some typical enterprise traffic problems, and how various QoS tools can mitigate or cure those problems. We will discuss Classification, Marking, Queuing, Weighted Random Early Detect, Shaping, and Policing at a conceptual level. This video contains Knowledge Checks intended to test

Introducing QoS Read More »