• Category

  • Format

The Nature of Ransomware

This brief video provides key statistics about ransomware attacks as well as recent examples of companies who have fallen prey to these types of cyber

Read More »

The Ransomware Lifecycle

This short video walks you through the 6 steps involved in a ransomware attack: distribution, infection, communication, file search, encryption, and ransom demand. This video

Read More »

The Zero-Trust Approach

This short video explains the differences between the Traditional Approach to security and the Zero-Trust Approach. This video is a small portion of the Cyber

Read More »

YANG Overview

This video provides an overview of YANG including an explanation of what it is and why it is used. This video is a small portion

Read More »

YANG Data Structure

This video describes the YANG Data Structure including components such as Module, Sub-Module, Leaf, List, and Container. This video is a small portion of the

Read More »

Understanding JSON

This short video provides an overview of JSON (JavaScript Object Notation) including how it is formatted. This video is a small portion of the Introduction

Read More »

RPC Request/Response

This brief video outlines the process of sending an RPC Request and the server issuing an RPC Response. This video is a small portion of

Read More »

RESTCONF Overview

This brief video explains what RESTCONF is in relation to NETCONF and outlines the RESTCONF Protocol Stack. This video is a small portion of the

Read More »

Understanding XML

This short video provides an overview of XML (eXtensible Markup Language) including how it is formatted. This video is a small portion of the Introduction

Read More »

NETCONF Overview

This brief video provides an overview of NETCONF including what it is and how it transports and retrieves configuration data. This video is a small

Read More »

NETCONF Process

This brief video walks you through the NETCONF Process from the client initiating the session of SSH to the server’s response. This video is a

Read More »

NETCONF Data Stores

This short video explains the function of NETCONF Data Stores and outlines the four different types: Running, Startup, Candidate, and URL. This video is a

Read More »

NETCONF Protocol Stack

This short video walks you through the four layers of the NETCONF Protocol Stack: Content, Operations, Messages, and Transport. This video is a small portion

Read More »

NETCONF Operations

This short video introduces the 9 NETCONF Operations including get, copy-config, unlock, kill-session, and more. This video is a small portion of the Introduction into

Read More »

NBAR Summary

This brief video summarizes the “NBAR, a Closer Examination” Tech Session including topics such as classification, intelligent classification, capabilities of NBAR, and more. This video

Read More »

Where Can I Use NBAR?

This brief video answers the questions, “Where can I use NBAR?” by outlining which machines and interfaces support it. This video is a small portion

Read More »

NBAR Customization

This brief video talks about how to customize NBAR to survey utilization using preset Port Maps. This video is a small portion of the NBAR,

Read More »

NBAR Overview

This short video provides an overview of Network Based Application Recognition (NBAR) including how it can be used to survey utilization. This video is a

Read More »

When To Use Static Routing

This short video explains two situations in which you might use Static Routing: Small Networks, Troubleshooting, and Static Networks. This video is a small portion

Read More »

What is NetFlow?

This video explains what NetFlow is and how it operates. This video is a small portion of the SCOR Exam: Intro to Network Security, Part

Read More »

NetFlow Cache

This short video describes three different types of NetFlow cache: Normal, Immediate, and Permanent. This video is a small portion of the SCOR Exam: Intro

Read More »

What is IPFIX?

This brief video introduces IP Flow Information Export (IPFIX) and explains how it is different from NetFlow.  This video is a small portion of the

Read More »

NetFlow as a Security Tool

This short video describes how NetFlow can be used as a security tool including how it provides complete visibility, nonrepudiation, anomaly detection, and more. This

Read More »

IPFIX Mediator

This brief video describes the role of the IPFIX Mediator which acts as a guard to external domain (i.e. proxy or firewall function). This video

Read More »

IPFIX Architecture

This brief video describes the IPFIX Architecture including the Metering Process, Exporting Process, and Collecting Process. This video is a small portion of the SCOR

Read More »

What Is Flow?

This short video explains what flow is, what types of information can be obtained, and how that information can be used to prevent things like

Read More »

Flexible NetFlow

This brief video talks about Flexible NetFlow and, more specifically, what types of information can NetFlow track? This video is a small portion of the

Read More »

Securing the Control Plane

This short video discusses methods to Secure the Control Plane including Control Plane Policing (CoPP) and Control Plane Protection (CPPr). This video is a small

Read More »

Securing the Data Plane

This short video discusses ways to Secure the Data Plane to block unwanted traffic, reduce DoS attacks, reduce spoofing attacks, and more. This video is

Read More »

Network Security Solutions

This short video outlines the various Network Security Solutions including Data Center Security, Enterprise Campus Security, and Cisco SAFE and also covers the different Deployment

Read More »

NetFlow Versions

This brief video explains the differences between the various versions of NetFlow. This video is a small portion of the SCOR Exam: Intro to Network

Read More »

NBAR, a Closer Examination

In this 1-hour Tech Session, Keith Edward explains uses and configurations of Network Based Application Recognition (NBAR). NBAR is a very valuable and free tool

Read More »

NAPALM Demo

This short video provides a live demo of how to use NAPALM to configure a Cisco device. This video is a small portion of the

Read More »

NAPALM Multi-Vendor Support

This short video explains NAPALM’s multi-vendor support capabilities and shows you where you can download community drivers. This video is a small portion of the

Read More »

NAPALM Script Review

This short video explains the different elements found in a NAPALM script and then compares a NAPALM script to a Netmiko script. This video is

Read More »

What is NAPALM?

This brief video explains what NAPALM is, outlines its’ features, and provides use cases. This video is a small portion of the Introduction to Netmiko

Read More »

The Napalm Process

This video walks you through the NAPALM configuration process from importing NAPALM to executing the commands. This video is a small portion of the Introduction

Read More »

Netmiko Demo

This video provides a brief demo of Netmiko. This video is a small portion of the Introduction to Netmiko and NAPALM Part 1 Tech Session.

Read More »

What is Netmiko?

This short video introduces Netmiko which is a multi-vendor SSH Python library built on top of Paramiko. This video is a small portion of the

Read More »

What is TextFSM?

This short video talks about TextFSM which takes unstructured data and converts it to structured data (a list or dictionary). This video is a small

Read More »

The Netmiko Process

This video explains the Netmiko Process from Importing Netmiko to Executing Show/Configuration Commands. This video is a small portion of the Introduction to Netmiko and

Read More »

Logging Services: Syslog

This short video introduces Syslog Operations and explains how they work. This video is a small portion of the Implementing Network Services Tech Session. Be

Read More »

Logging Services: SNMP

This short video discusses SNMP Operations as well as SNMP Versions (2, 2c, and 3) and Security (noAuthNoPriv, AuthNoPriv, and AuthPriv). This video is a

Read More »

NTP Security

This brief video talks about NTP Security and the importance of validating your time including MD5 key authentication and ACL. This video is a small

Read More »

NTP Modes

This short video outlines the four NTP Modes: Server, Client, Peer, and Broadcast/Multicast. This video is a small portion of the Implementing Network Services Tech

Read More »

NTP Hierarchy

This brief video explains the NTP Hierarchy including the Authoritative Time Source, NTP Clients, and NTP Server. This video is a small portion of the

Read More »

NTP Function

This brief video explains the NTP Function including Network Delay, dispersion of time packet exchanges, and clock offset. This video is a small portion of

Read More »

Logging Services: NetFlow

This video provides an overview of NetFlow and its’ components including the Flow Exporter, Flow Collector, and Flow Analysis. This video is a small portion

Read More »