6. Understanding Common Switch Models
Jennifer Breeding
6. Understanding Common Switch Models
7:56
37. Three Tier Architecture
Jennifer Breeding
37. Three Tier Architecture
5:42
54. Answering the Epic Post Boot Question
Jennifer Breeding
54. Answering the Epic Post Boot Question
8:42
232. OSPF Wildcards for Subnets
Jennifer Breeding
232. OSPF Wildcards for Subnets
11:33
21. Introduction to Describe Network Functions and Equipment
Jennifer Breeding
21. Introduction to Describe Network Functions and Equipment
1:13
138. What is VLSM?
Jennifer Breeding
138. What is VLSM?
14:57
55. Using Cisco IOS Navigation Commands
Jennifer Breeding
55. Using Cisco IOS Navigation Commands
11:52
52. Configuring a Console Connection in Windows
Jennifer Breeding
52. Configuring a Console Connection in Windows
7:31
236. OSPF and Point to Point Networks
Jennifer Breeding
236. OSPF and Point to Point Networks
5:12
207. Configuring Static IPv4 Network Routes
Jennifer Breeding
207. Configuring Static IPv4 Network Routes
12:32
46. Two Styles of Fiber
Jennifer Breeding
46. Two Styles of Fiber
6:57
71. Configuring and Verifying Interfaces and IP Addresses Lab
Jennifer Breeding
71. Configuring and Verifying Interfaces and IP Addresses Lab
10:07
77. The OSI Model in Wireshark
Jennifer Breeding
77. The OSI Model in Wireshark
11:36
27. Introduction to Explain Network Communication with the OSI Model
Jennifer Breeding
27. Introduction to Explain Network Communication with the OSI Model
0:59
67. Review of Create a Base Configuration for Cisco Devices
Jennifer Breeding
67. Review of Create a Base Configuration for Cisco Devices
5:00
214. IPv4 Static Route Case Study and Lab
Jennifer Breeding
214. IPv4 Static Route Case Study and Lab
13:51
63. Configuring IP Addresses and Enabling Interfaces
Jennifer Breeding
63. Configuring IP Addresses and Enabling Interfaces
9:52
47. Fiber Port Types
Jennifer Breeding
47. Fiber Port Types
9:30
235. OSPF LSAs and DRs
Jennifer Breeding
235. OSPF LSAs and DRs
6:55
53. Configuring a Console Connection in MacOS
Jennifer Breeding
53. Configuring a Console Connection in MacOS
6:08
51. Methods of Managing Cisco Devices
Jennifer Breeding
51. Methods of Managing Cisco Devices
9:16
136. Doing Subnetting Backwards
Jennifer Breeding
136. Doing Subnetting Backwards
7:11
65. Telnet and SSH Implementation
Jennifer Breeding
65. Telnet and SSH Implementation
15:57
93. Configuring and Testing Ubuntu Linux Network Access
Jennifer Breeding
93. Configuring and Testing Ubuntu Linux Network Access
14:58
69. Basic IOS Navigation Lab
Jennifer Breeding
69. Basic IOS Navigation Lab
14:59
222. IPv6 Static Routes Review
Jennifer Breeding
222. IPv6 Static Routes Review
6:18
114. The Classes of Addresses from A to E
Jennifer Breeding
114. The Classes of Addresses from A to E
13:10
90. Introduction to Configure Windows, MAC, or Linux for Network Access
Jennifer Breeding
90. Introduction to Configure Windows, MAC, or Linux for Network Access
1:18
415. Automating the Data Center with ACI
Jennifer Breeding
415. Automating the Data Center with ACI
7:28
96. Connecting Devices to a Switch
Jennifer Breeding
96. Connecting Devices to a Switch
7:07
230. Wildcard Masks and Network Statements
Jennifer Breeding
230. Wildcard Masks and Network Statements
8:10
198. Predicting the Correct L2 and L3 Addresses
Jennifer Breeding
198. Predicting the Correct L2 and L3 Addresses
12:46
218. Adding IPv6 Directly Connected Routes
Jennifer Breeding
218. Adding IPv6 Directly Connected Routes
13:28
86. How TCP Sends Data TCP Windowing
Jennifer Breeding
86. How TCP Sends Data TCP Windowing
9:28
202. Reviewing End To End IP Communications
Jennifer Breeding
202. Reviewing End To End IP Communications
1:08
190. Introduction to Configure a Basic Cisco Wireless Network using the WLC GUI
Jennifer Breeding
190. Introduction to Configure a Basic Cisco Wireless Network using the WLC GUI
1:10
80. Practical Wireshark: Rogue DHCP
Jennifer Breeding
80. Practical Wireshark: Rogue DHCP
8:29
317. Mitigation Techniques and Countermeasures
Jennifer Breeding
317. Mitigation Techniques and Countermeasures
8:23
141. Comparing IPv4 and IPv6
Jennifer Breeding
141. Comparing IPv4 and IPv6
9:42
131. Subnetting Class B Networks Based on Host Requirements
Jennifer Breeding
131. Subnetting Class B Networks Based on Host Requirements
4:18
151. Battle of the Bands
Jennifer Breeding
151. Battle of the Bands
13:52
179. Understanding STP Standards
Jennifer Breeding
179. Understanding STP Standards
10:26
164. Weird and Wacky World of VTP
Jennifer Breeding
164. Weird and Wacky World of VTP
8:57
231. OSPF Wildcards on Clean Octet Boundaries
Jennifer Breeding
231. OSPF Wildcards on Clean Octet Boundaries
10:27
182. Configuring Basic STP and Verifying Results
Jennifer Breeding
182. Configuring Basic STP and Verifying Results
15:05
319. Introducing Security Program Elements
Jennifer Breeding
319. Introducing Security Program Elements
0:20
128. Review of Perform Subnetting Based on Network Requirements
Jennifer Breeding
128. Review of Perform Subnetting Based on Network Requirements
13:03
228. OSPF Router ID RID
Jennifer Breeding
228. OSPF Router ID RID
8:33
166. Limiting or Adding VLANs to Trunks
Jennifer Breeding
166. Limiting or Adding VLANs to Trunks
8:25
142. Binary, Decimal, and Hex
Jennifer Breeding
142. Binary, Decimal, and Hex
12:51
172. What is CDP and LLDP?
Jennifer Breeding
172. What is CDP and LLDP?
7:19
357. Port Security Defaults
Jennifer Breeding
357. Port Security Defaults
4:10
288. Introducing Cisco NAT Concepts and Base Configurations
Jennifer Breeding
288. Introducing Cisco NAT Concepts and Base Configurations
0:55
220. Configuring Static IPv6 Default and Network Routes
Jennifer Breeding
220. Configuring Static IPv6 Default and Network Routes
11:04
144. Types of IPv6 Addresses
Jennifer Breeding
144. Types of IPv6 Addresses
21:24
276. Introducing a Router on a Stick
Jennifer Breeding
276. Introducing a Router on a Stick
0:54
217. IPv6 Static Route Lab Topology
Jennifer Breeding
217. IPv6 Static Route Lab Topology
5:21
45. Copper Cable
Jennifer Breeding
45. Copper Cable
9:12
32. Data Link and Physical Layer
Jennifer Breeding
32. Data Link and Physical Layer
9:44
41. On Premise vs  Cloud Architecture
Jennifer Breeding
41. On Premise vs Cloud Architecture
4:59
94. Review of Configure Windows, MAC, or Linux for Network Access
Jennifer Breeding
94. Review of Configure Windows, MAC, or Linux for Network Access
2:13
34. Review of Explain Network Communication with the OSI Model
Jennifer Breeding
34. Review of Explain Network Communication with the OSI Model
6:21
205. Adding Directly Connected IPv4 Routes
Jennifer Breeding
205. Adding Directly Connected IPv4 Routes
13:04
168. Deploying VLSM in a VLAN Network
Jennifer Breeding
168. Deploying VLSM in a VLAN Network
17:58
267. Winning Routes of a Routers Table Concepts
Jennifer Breeding
267. Winning Routes of a Routers Table Concepts
5:25
106. Deep Dive Into Interface Counters
Jennifer Breeding
106. Deep Dive Into Interface Counters
21:57
242. Implementing OSPF with Exact Network Statements
Jennifer Breeding
242. Implementing OSPF with Exact Network Statements
5:14
169. Configuring VLANs, Trunking, and Routing Lab
Jennifer Breeding
169. Configuring VLANs, Trunking, and Routing Lab
23:20
377. Review of Configure and Verify Cisco Dynamic ARP Inspection
Jennifer Breeding
377. Review of Configure and Verify Cisco Dynamic ARP Inspection
2:14
340. Commands to Implement AAA
Jennifer Breeding
340. Commands to Implement AAA
5:32
178. What Does STP Do?
Jennifer Breeding
178. What Does STP Do?
13:41
101. Review of Describe Network Switch Functions and How to Locate Network Devices
Jennifer Breeding
101. Review of Describe Network Switch Functions and How to Locate Network Devices
2:59
191. Cisco WLC Puzzle Pieces
Jennifer Breeding
191. Cisco WLC Puzzle Pieces
9:37
237. Review of Describe Cisco Dynamic IPv4 Routing with OSPF
Jennifer Breeding
237. Review of Describe Cisco Dynamic IPv4 Routing with OSPF
6:17
133. Troublesome Hosts
Jennifer Breeding
133. Troublesome Hosts
6:43
125. Subnetting Class B Networks Based on Network Requirements
Jennifer Breeding
125. Subnetting Class B Networks Based on Network Requirements
15:41
119. Introduction to Converting from Decimal to Binary and Back
Jennifer Breeding
119. Introduction to Converting from Decimal to Binary and Back
0:45
165. Configuring VTP
Jennifer Breeding
165. Configuring VTP
12:27
146. Configuring IPv6 Addressing
Jennifer Breeding
146. Configuring IPv6 Addressing
10:57
224. Review of Configure and Verify Cisco IPv6 Static Routes
Jennifer Breeding
224. Review of Configure and Verify Cisco IPv6 Static Routes
2:45
154. Introduction to Explain VLAN Concepts and Configure VLANs on a Single Switch
Jennifer Breeding
154. Introduction to Explain VLAN Concepts and Configure VLANs on a Single Switch
1:02
233. DR and BDRs on Broadcast Networks
Jennifer Breeding
233. DR and BDRs on Broadcast Networks
8:07
266. Introduction to Predict a Cisco Router’s IP Forwarding Decisions
Jennifer Breeding
266. Introduction to Predict a Cisco Router’s IP Forwarding Decisions
0:45
244. OSPF Link Cost Calculation
Jennifer Breeding
244. OSPF Link Cost Calculation
11:56
300. Introduction to Configure DHCP Server and Relay Functions
Jennifer Breeding
300. Introduction to Configure DHCP Server and Relay Functions
1:08
310. TFTP FTP
Jennifer Breeding
310. TFTP FTP
6:26
303. Configuring DHCP Relay in a Cisco Network
Jennifer Breeding
303. Configuring DHCP Relay in a Cisco Network
10:39
293. Configuring and Verifying Cisco NAT Lab
Jennifer Breeding
293. Configuring and Verifying Cisco NAT Lab
15:23
314. Vulnerabilities
Jennifer Breeding
314. Vulnerabilities
5:25
247. Implementing a Default Route in OSPF
Jennifer Breeding
247. Implementing a Default Route in OSPF
8:36
7. Decimal to Binary and Vice Versa
Jennifer Breeding
7. Decimal to Binary and Vice Versa
11:19
350. Extended ACLs Concepts
Jennifer Breeding
350. Extended ACLs Concepts
4:54
262. The Routing Table Metric
Jennifer Breeding
262. The Routing Table Metric
5:00
354. Review of Apply and Verify Cisco Access Control Lists
Jennifer Breeding
354. Review of Apply and Verify Cisco Access Control Lists
4:13
345. Standard ACLs Concepts
Jennifer Breeding
345. Standard ACLs Concepts
6:36
337. AAA Overview
Jennifer Breeding
337. AAA Overview
6:45
323. Introduction to Describe Elements of Secure Password Policies
Jennifer Breeding
323. Introduction to Describe Elements of Secure Password Policies
0:51
320. Polices as Part of a Security Program
Jennifer Breeding
320. Polices as Part of a Security Program
4:31
360. Configuring Auto Errdisable Recovery
Jennifer Breeding
360. Configuring Auto Errdisable Recovery
7:34
251. FHRP First Hop Redundancy Protocols Overview
Jennifer Breeding
251. FHRP First Hop Redundancy Protocols Overview
6:56