Past Tech Sessions
Below is a list of our past Tech Sessions delivered by Skyline instructors.
Click on the title to view the recorded session.
Overview of Cisco Phone Device Settings, Part 1
When configuring a phone in Cisco Unified Communications Manager, the device page has hundreds of fields but many of them are never changed. Have you
Troubleshooting Phone Registration Issues
In this 1-hour Tech Session, Kevin Koeper takes a deep dive into issues with Cisco Phones Registering to Cisco Unified Communications Manager. Click here to
JavaScript Essentials
Presented by Brandon Stryker, this Tech Session provides a high-level overview designed to introduce the fundamentals of JavaScript, the indispensable language for dynamic web interactions.
Introduction to Collaboration Edge
Cisco Expressways are used to connect with SIP and H.323 devices, network control, and firewall traversal. This Tech Session will serve as an introduction to
How to View the Audit Logs in CUCM
The Application Audit logs record all configuration changes made by a user through command line or through the GUI. Logs can be enabled for the
Introduction to Web Development (HTML, CSS, JavaScript, and Tooling)
The Application Audit logs record all configuration changes made by a user through command line or through the GUI. Logs can be enabled for the
All About Call Detail Records (CDRs) In CUCM
Call Detail Records (CDRs) are a record of all calls made and received by phones registered to Communications Manager. These records include information on the
Back to the Basics – Audio Codec Selection
In this Tech Session, Toby Sauer takes an in-depth look at: Audio codec selection Its impact on networking bandwidth and collaboration design Codec configuration in
All About Transferring Calls Out Of Voicemail
In this Tech Session, Kevin Koeper goes over the different options available to transfer a caller out of a voicemail box using Cisco Unity Connection.
Back to the Basics: Media Resources
In this Tech Session, Toby Sauer covers: Media resources Media resource groups Media resource lists Click here to view/download the slides for this Tech Session.
Back to the Basics: Device Pools
In this Tech Session, Toby Sauer delves into the many functions provided by Device pools. Click here to view/download the slides for this Tech Session.
CompTIA Network+: Networking Fundamentals (Part 1 of 6)
In this first Tech Session of six, Jim Goughenour takes a deep dive into the Network Fundamentals part of the exam blueprint. Topics include OSI
Simplifying Your Multi-Site Dial Plan Using Local Route Groups
In this Tech Session, Toby Sauer shows how to simplify your multi-site Dial Plan by implementing local route groups. He compares traditional dial plans with
Everything You Always Wanted To Know About CUCM Service Parameters (But Were Afraid To Ask)
In this Tech Session, Kevin Koeper goes over some commonly changed default settings in Communications Manager (CUCM). These settings are configured on the Enterprise Parameters
Advanced Uses for Translation Patterns in CUCM
In this session, Toby Sauer covers some advanced uses for translation patterns in Cisco Unified Communications Manager including: Searching multiple groups of phones (DID vs.
Webex Certificate-Based Local Gateway Implementation
In this session, Toby Sauer will explain the required implementation of the certificate-based Local Gateway in a Webex environment. Due to lab limitations, a demonstration
Webex Registration-Based Local Gateway Implementation
In this session, Toby Sauer explains and demonstrates the implementation of a Webex local PSTN Gateway. It includes a demonstration of the CUBE configuration to
Preparing for the CLCEI Test Part 5: MRA/Certificates
In the final session of Preparing for the CLCEI test, Toby Sauer focuses on MRA and Certificates.
Preparing for the CLCEI Test Part 4: B2B Communications
In this fourth session on preparing for the CLCEI, Toby Sauer covers the concepts and areas of focus for B2B communications using Cisco Expressways.
Grow Your Network programmability Skills with Cisco DevNet
In this 30-minute Tech Session, Edwin Owen teaches you how to advance your network programmability skills using the Cisco DevNet site. Learn: Where to find
Preparing for the CLCEI Test, Part 3: CUCM/Expressway Integrations
In this third session on preparing for the CLCEI, Toby Sauer covers the concepts and sample questions related to the CUCM and Expressway integrations.
CompTIA Network+ Overview
In this Tech Session, Jim Goughenour provides a high-level overview of the CompTIA Network+ credential. He shares his experience and information about the blueprint for
Preparing for the CLCEI Test: Expressway Optional Features
In this second session of CLCEI preparation, Toby Sauer covers the optional features of the Cisco Expressway series.
Preparing for the CLCEI Test: Expressway Fundamentals
In the first session about CLCEI topics, Toby Sauer covers the fundamentals of the Cisco Expressways covered in the test. Click here to view/download the
Changes to Webex Hybrid Calling: A CLCEI Addendum
There have been some fundamental changes to Webex Hybrid calling since CLCEI was written. While changes to the course are coming, this webinar will cover
Learn To Accelerate Your Cloud-Based Configuration With Terraform
This 40-minute Tech Session, presented by Edwin Owen, is a beginner level webinar that will teach you the basics of Terraform, and how to use
What Is New with Snort V3.0
In this 40 minute session, Eric Smith covers Snort v3.0, including: A brief history of Snort New features of Snort v3.0 How to migrate your
A Cloud Security Workshop – Zero Trust Architecture and Beyond
Remote and roaming users, cloud-based apps, and insecure networks are all leaving the door open to attacks like phishing, ransomware, and malware. With more users,
Five Things You Can Do with a Raspberry Pi in a Study Lab
In this 40 minute session, Eric Smith dives into the world of Rasberry Pi and covers: A brief history of small board computer systems Various
A Cloud Security Workshop – Zero Trust Architecture and Beyond
Remote and roaming users, cloud-based apps, and insecure networks are all leaving the door open to attacks like phishing, ransomware, and malware. With more users,
CompTIA: IT Fundamentals+: Security (Part 6 of 6)
Jim Goughenour continues his discussion of the IT Fundamentals Exam with part 8 where we take a look at the sixth domain of knowledge needed
CompTIA: IT Fundamentals+: Database Fundamentals (Part 5 of 6)
Jim Goughenour continues his discussion of the IT Fundamentals Exam with part 5 where we take a look at the fifth domain of knowledge needed
Configuring a Switch to Support Cisco Phones
This webinar is part of the CLCOR study series. In this session Kevin Koeper goes over how to configure a Cisco switch to support Cisco
SSO Basics for Collaboration Application
SSO simplifies the login process for users and administrators in Cisco Unified Communications products. In this 45-minute Tech Session, Toby Sauer presents: The login challenges
CompTIA: IT Fundamentals+: Software Development (Part 4 of 6)
Jim Goughenour continues his discussion of the IT Fundamentals Exam with part 4 where we take a look at the fourth domain of knowledge needed
Upgrading the Firmware on a Cisco Phone
In this 30-minute session, Kevin Koeper goes over: What phone firmware is Why it needs to be updated How often it needs to be updated
CompTIA: IT Fundamentals+: Applications and Software (Part 3 of 6)
Jim Goughenour continues his discussion of the IT Fundamentals Exam with part 3 where we take a look at the third domain of knowledge needed
Using Cisco’s Real Time Monitoring Tool (RTMT)
Cisco’s Real Time Monitoring Tool, known as RTMT, is a very useful program that can monitor server performance and device status in real time. It
Zero-Trust: Deployment and Use Cases
Zero trust (ZT) is the term for an evolving set of cybersecurity paradigms that move defenses from static, network-based perimeters to focus on users, assets,
CompTIA: IT Fundamentals+: Infrastructure (Part 2 of 6)
Jim Goughenour continues his discussion of the IT Fundamentals Exam with part 2 where we a look at the second domain of knowledge needed to
Overview of Network Programmability
This 1-hour Tech Session, presented by Edwin Owen, provides a sound understanding of what is meant by the term Programmability and the essential tools every
Zero Trust Security: A More Effective Security
In this 30-minute Tech Session, Skyline instructor Eric Smith discusses Zero Trust and how IT organizations can implement it, protecting your organization wherever your employees are
CompTIA: IT Fundamentals+: IT Concepts and Terminology (Part 1 of 6)
In this first of six Tech Sessions on this particular exam, Jim Goughenour looks not only at the entire credential, and answers questions about that,
MACSec: The New VPN
In this Tech Session, Skyline instructor Eric Smith discusses end-to-end security of data, how it needs to be secured when at rest (processed or stored
CCNA Composite Lab Build Part 12: Device Hardening
In the 12th and final installment of the CCNA Composite Lab Build, Jim Goughenour takes a deeper look at device hardening. What is device hardening
Everything You Always Wanted to Know About CUCM Music On Hold
In this 1-hour Tech Session, Kevin Koeper goes over how to record new MoH (Music on Hold) audio files, how to upload MoH files to
Part 2: Examples of Separation
Following up on his last Tech session (“Separation Anxiety – Examining Layer 2 Separation and Trustsec in Cisco Devices“), in this 1-hour session, Eric Smith
CCNA Composite Lab Build Part 11: Basic Network Security Policy Construction and Testing
In the 11th installment of the CCNA Composite Lab Build, we turn our attention to securing the devices that provide interconnection and data path services.
CCNA Composite Lab Build Part 10: Syslog Configuration and Testing
In the 10th Installment of the Composite Lab Build, Jim Goughenour takes a closer look at system logging, along with some other IP services used
Part 1: Examining Layer 2 Separation and TrustSec in Cisco Devices
In this 1-hour session, Eric Smith looks at layer 2 separation and TrustSec in Cisco devices. Click here to view/download the slides for this Tech
Introduction to Multifactor Authentication – Cisco Duo and a Zero Trust Solution
In this 30 minute session, our Cisco-certified cybersecurity expert, Kenya Thomas, highlights the importance of using MFA to protect yourself and your company from phishing
CCNA Composite Lab Build Part 9: Static and Dynamic NAT
In the 9th Installment of the Composite Lab Build, Jim Goughenour takes a closer look at static and dynamic network address translation and demos it
Dealing With Challenging Customers
Customer service is a necessary position in the job world today. It helps companies give customers what they want and what they need. In this
Ten Soft Skills You Need to Succeed
Having the technical skills and knowledge to successfully execute your job duties is only one part of being the best you can be in the
Preparing for Cisco’s CLCOR Exam
In this 1-hour Tech Session, Kevin Koeper goes over how to prepare for the 350-801 CLCOR exam. He looks at what resources are available to
CCNA Composite Lab Build Part 8
In Jim Goughenour’s 8th Installment of the Composite Lab Build, we take a closer look at named and numbered access control lists. Join us as
CCNA Composite Lab Build Part 7
In Jim Goughenour’s 7th Installment of the Composite Lab Build, we dive a little deeper into EtherChannel, and take a look at how this improves
CCNA Composite Lab Build Part 6
In Jim Goughenour’s 6th Installment of the Composite Lab Build, we take another look at Spanning Tree Protocol as it relates to EtherChannel, and set
Configuring Voice Translation Rules on a Voice Gateway
In this 1-hour Tech Session, Kevin Koeper goes through how to configure and test voice translation rules in a Cisco voice gateway. This session is
What is on the CCNA Exam?
In this Tech Session, Jim Goughenour answers the question, “So, what is actually on the CCNA exam?” In the first part of this session, you
Cisco Secure Hybrid Workforce Solutions
In this 45 minute session, Kenya Thomas explores how you can enable security everywhere so you can empower work anywhere. You’ll learn: How Cisco security
Configuring and Troubleshooting a PRI in a Cisco Voice Gateway
In this 1-hour Tech Session, Kevin Koeper goes through setting up an H.323 voice gateway with PRI connectivity to the PSTN. He then looks at
Analyzing Quality of Service Issues in Voice Networks
This Tech Session is part of the CLCOR study series. In this 1-hour Tech Session Kevin Koeper looks at the need for QoS in a
In-Office. At Home. On Guard with Meraki.
In this 45 minute session, Edwin Owen explores how Meraki solutions can empower collaboration and foster connection across distributed employees. You’ll learn: About Meraki and
Collaboration Security Concepts
Collaboration security is more than toll fraud prevention. In this 1-hour webinar, Toby Sauer covers the areas of Collaboration that should be addressed to fully
CCNA Composite Lab Build Part 5
In Jim Goughenour’s 5th Installment of the Composite Lab Build, we start to segment our LAN architecture by adding some VLANs and some inter-VLAN routing.
Configuring and Troubleshooting Dial Peers on a Voice Gateway
This webinar is part of the CLCOR study series. In this session, Kevin Koeper, goes over how to configure Dial Peers in a voice gateway
CCNA Composite Lab Build Part 4
In Jim Goughenour’s 4th Installment of the Composite Lab Build, we take a deeper look at IPv6 addressing, along with IPv6 static and default routing.
Remote Workforce Reimagined
In this 30 minute session, Edwin Owen and Kenya Thomas discuss the current remote work IT landscape and ways it can powerfully impact your business
Configuring and Troubleshooting an SIP Trunk
This webinar is part of the CLCOR study series. In this session Kevin Koeper goes over how to configure a SIP trunk in Communications Manager
Secure Network Management: Logs and Time
In this 1-hour session, Eric Smith examines the why and how to secure the management of network devices. This will include SNMPv3, secure logging and
CCNA Composite Lab Build Part 3
In Jim Goughenour’s 3rd installment of the Composite Lab Build, we now take our Access and Distribution segments and layer in some Default and Internet
The Basics of YANG
Not sure what YANG is all about? Come join Edwin Owen for this 1-hour Tech Session to learn the basics of YANG. We’ll start with
Introduction to Cisco Emergency Responder
In this 1-hour Tech Session, Kevin Koeper goes over how Cisco’s Emergency Responder server routes emergency calls to the local service provider’s PSAP (Public Safety
CCNA Composite Lab Build Part 2
Having a firm grasp on the Command Line Interface in Cisco IOS is fundamental to success in Network Management. In each of these 1-hour live
CCNA Composite Lab Build Part 1
Having a firm grasp on the Command Line Interface in Cisco IOS is fundamental to success in Network Management. In each of these 1-hour live
Introduction into NETCONF, RESTCONF, and YANG
NETCONF, RESTCONF, and YANG. Are these terms you hear at work but don’t exactly understand what they mean or why they are important to network
Cyber Security Essentials
In this exciting one hour talk, Cyber Security expert Kenya Thomas will be discussing the risks the recent ransomware attacks pose to small and medium
Static and Default Routing Demonstration
In this 1-hour Tech Session, Jim Goughenour takes a deep dive into Static and Default routing concepts through the use of a live demonstration. Click
NBAR, a Closer Examination
In this 1-hour Tech Session, Keith Edward explains uses and configurations of Network Based Application Recognition (NBAR). NBAR is a very valuable and free tool
SCOR Exam: Intro to Network Security, Part 1
This is part 1 of 2 in a series of webinars in which we will be preparing you for the network security part of the
SCOR Exam: Intro to Network Security, Part 1 Continued: Learning by Example
In this live demonstration, Eric Smith shows you how to translate written instructions into meaningful commands in the Cisco IOS. In this tech session, we
Spanning-Tree Live Demo
In this 1-hour presentation, Jim Goughenour takes a deeper dive into the Spanning Tree Protocol. We will look at how a switch comes to be
Introduction to Netmiko and NAPALM Part 2
In part two of this two-part series, Edwin Owen introduces NAPALM, discusses configuring a Cisco IOS device with NAPALM, and finishes with a live demo.
Introduction to Netmiko and NAPALM Part 1
Do you want to start automating your network but you are not ready to jump into the deep end with NETCONF and YANG? Or maybe
Troubleshooting Phone Calling Issues
In this 1-hour Tech Session, Kevin Koeper goes over how to troubleshoot issues with Cisco phones making calls. Click here to view/download the slides for
Implementing Network Services
In this 1-hour Tech Session, Jim Goughenour takes a closer look at some of the services that are available natively in IOS that help us
Introducing QoS, Part 5: Implementation and Flow Concepts
In this 1-hour Tech Session, Keith Edwards discusses implementing these tools in a cohesive and coherent fashion, based upon bidirectionality and technology placement. This video
SCOR Exam Part 1: Security Concepts
In this 1-hour Tech Session, we cover the SCOR Exam Security Concepts. Eric Smith looks at how the SCOR Exam fits into the Cisco CCNP
Troubleshooting Wireless Client Connectivity
In this 1-hour Tech Session, Jim Goughenour takes a closer look at some of the common wireless client connectivity issues, both from a client perspective
Cisco Switching Paths
We all know that Ethernet switches switch traffic. In this 1-hour Tech Session, Jim Goughenour takes a deeper look into what is happening behind the
Introducing QoS, Part 4: Policing and Shaping
In this 1-hour Tech Session, Keith Edwards discusses Class-based Shaping and Class -based Policing. We also discuss the different logic that the two mechanisms employ,
Wireless AP Operation
In this 1-hour Tech Session, Jim Goughenour takes a closer look at how APs and WLCs form relationships and take care of real-time and non-real
Practical Cisco Expressway Troubleshooting
In this 1-hour Tech Session, presented by Toby Sauer, learn the how to troubleshoot connectivity, DNS, and dialplan issues within Cisco Expressways. In many cases,
Introducing QoS, Part 3: Congestion Avoidance
In this 1-hour Tech Session, Keith Edwards discusses Weighted Random Early Detect, the default values used by WRED, both in IP Precedence and DSCP and
Cisco Enterprise Network Architecture
In this 1-hour Tech Session, Jim Goughenour takes a closer look at the fundamental building blocks of good network design, and answer the question about
Single Area OSPF for the CCNA Exam
In this 1-hour presentation, Kenya Thomas takes a deep dive into the OSPF Link State routing protocol as needed for the CCNA exam. We cover
Wireless Security
In this 1-hour Tech Session, Jim Goughenour explores the various Wireless Security methods, when to use them, and how each of them work. The Tech
Introducing QoS, Part 2: Congestion Management
In this 1-hour Tech Session, Keith Edwards discusses Queuing techniques and logic on Routers and Switching, to include Weighted Fair Queuing, CBWFQ, and LLQ, along
Wireless Roaming and How It Works
In this 1-hour Tech Session, presented by Jim Goughenour, we take some time to understand a little bit more about how wireless clients roam in
Subnetting for the CCNA Exam
In this exciting 1 hour presentation, Kenya Thomas will give you the simplest and easiest way to calculate subnetting for the CCNA exam. Subnetting is
Wildcard Masking in IPv4
In this 1-hour Tech Session, Jim Goughenour takes an in-depth look at the fundamentals and usage of Wildcard Masks including where and how they are
Introducing QoS, Part 1: Classification and Marking
This 1-hour Tech Session, presented by Keith Edwards, provides a fundamental understanding of classification and Marking using the Modular QoS Command Line Interface, with in-depth
Building Redundant Switched Topologies
In this 1-hour Tech Session, Jim Goughenour takes an in-depth look at providing and managing redundancy in our switched Ethernet networks. We will also examine
Introducing WAN Technologies
This 1-hour session, presented by Keith Edwards, discusses WAN technologies for both legacy and current Wide Area Networking connectivity types and services. These will include
Cisco Secure Endpoints (Formerly AMP for Endpoints)
Cisco Secure Endpoints provides protection from malware, ransomware and other types of malicious software that can compromise an endpoint. In this 1-hour Tech Session Kenya
Introducing Multicast Protocols
In this 1-hour Tech Session, Jim Goughenour goes through Multicast technology at a fairly high level. We will do a Multicast Overview, and also discuss
Understanding Enterprise Network Security Architecture
In this 1-hour Tech Session, Keith Edwards goes over the tenets and needs behind a good Enterprise Network Security Architecture. We will discuss the “threatscape”
MDS Basics
Cisco© MDS is one of the most powerful storage networking solutions offered today. It’s scalable, programmable, reduces IT costs, and easily responds to the business
APIs in DNA Center and vManage
In this 1-hour Tech Session, Edwin Owen takes a closer look at the basics of REST APIs such as methods, response codes and authentication. We
Achieving Low-Latency Switching with Exablaze
In this 1-hour Tech Session, David Hodde provides an overview of the Exablaze partnership and how they fit within the Cisco Intent-Based Networking portfolio. We
Understanding the Basics of Python Programming
In this 1-hour Tech Session, Edwin Owen discusses why most Network Engineers choose to use Python over other programming languages. We will look at how
Exploring Automation and Assurance using DNA Center
In this 1-hour Tech Session, Keith Edwards discusses Automation and Assurance tools and capabilities in Cisco DNA Center. We will discuss Intent-Based Networking and it’s
Introducing Network Programmability Protocols
In this 1-hour Tech Session, presented by Edwin Owen, we are learning about the evolution of network configuration management including an overview of the tools
Understanding the Working Principles of SD-WAN
In this 1-hour Tech Session, Keith Edwards presents an explanation of the architecture and blend of technologies used in the SD-WAN Solution. The SD-WAN Solution
Describing Collaboration Edge Architecture
This Tech Session, presented by Toby Sauer, is a continuation of the series discussing the “self-study” sections of the Implementing Cisco Collaboration Core Technologies (CLCOR)
Configuring Cisco Unity Connection Call Handlers (Part 2 of 2)
In this Tech Session, Kevin Koeper looks at what Directory Handlers and Interview Handlers in Unity Connection can do, what different options are available and
Examining the Cisco SD-Access Solution
In this 1-hour Tech Session, Keith Edwards presents an explanation of the architecture and blend of technologies used in the SD-Access Solution. We discuss Underlay
Configuring Cisco Unity Connection Call Handlers (Part 1 of 2)
In this 1-hour Tech Session, Kevin Koeper looks at what System Call Handlers in Unity Connection can do, what configuration options are available during the
How to Validate Your Python 3 Code
In this 1-hour Tech Session, presented by Dr. Allen Gradnigo, you will learn how to validate your Python 3 code with real-world use cases.
Ansible Overview
In this 1-hour Tech Session, presented by Edwin Owen, you will get an overview of Ansible. Additionally, you will learn how to configure a Playbook
Docker Overview
In this 1-hour Tech Session, presented by Edwin Owen, you will get an overview of Docker. You will learn how to write Docker files, build
Python Overview
In this 1-hour Tech Session, presented by Edwin Owen, you will get an overview of Python and will learn how to download Python, install packages,
Postman Overview
In this 1-hour Tech Session, presented by Edwin Owen, you will get an overview of Postman. You will learn about features in Postman used to
Git Overview
In this 1-hour Tech Session, presented by Edwin Owen, you will get an overview of Git. You will also learn the basic commands to setup
Implementing Threat Defense Technologies
In this 1-hour Tech Session, presented by Jim Goughenour, we will explore and discover many of the various technologies that serve to keep our networks,
Examining the Security Threat Landscape
In this 1 hour Tech Session, Kenya Thomas examines the Cisco Security Architecture and how it works together to combat cybersecurity threats. This video contains
Introducing Architectures and Virtualization
In this 1-hour Tech Session, Jim Goughenour takes a closer look at the variations in network design. We will explore hierarchical design methods, virtualization, cloud
Explaining Wireless Fundamentals
In this 1-hour Tech Session, Jim Goughenour takes a look at how wireless has become central to business communications, and explore some of the working
Introducing QoS
This 1-hour session, presented by Jim Goughenour, covers basic QoS tools, we will explain some typical enterprise traffic problems, and how various QoS tools can
Exploring Layer 3 Redundancy
This 1-hour session, presented by Keith Edwards, covers basic First Hop Redundancy Protocols primarily focused on Hot Standby Redundancy Protocol and Virtual Router Redundancy Protocol.