Jennifer Breeding
6. Understanding Common Switch Models
7:56
Jennifer Breeding
37. Three Tier Architecture
5:42
Jennifer Breeding
54. Answering the Epic Post Boot Question
8:42
Jennifer Breeding
232. OSPF Wildcards for Subnets
11:33
Jennifer Breeding
21. Introduction to Describe Network Functions and Equipment
1:13
Jennifer Breeding
138. What is VLSM?
14:57
Jennifer Breeding
55. Using Cisco IOS Navigation Commands
11:52
Jennifer Breeding
52. Configuring a Console Connection in Windows
7:31
Jennifer Breeding
236. OSPF and Point to Point Networks
5:12
Jennifer Breeding
207. Configuring Static IPv4 Network Routes
12:32
Jennifer Breeding
46. Two Styles of Fiber
6:57
Jennifer Breeding
71. Configuring and Verifying Interfaces and IP Addresses Lab
10:07
Jennifer Breeding
77. The OSI Model in Wireshark
11:36
Jennifer Breeding
27. Introduction to Explain Network Communication with the OSI Model
0:59
Jennifer Breeding
67. Review of Create a Base Configuration for Cisco Devices
5:00
Jennifer Breeding
214. IPv4 Static Route Case Study and Lab
13:51
Jennifer Breeding
63. Configuring IP Addresses and Enabling Interfaces
9:52
Jennifer Breeding
47. Fiber Port Types
9:30
Jennifer Breeding
235. OSPF LSAs and DRs
6:55
Jennifer Breeding
53. Configuring a Console Connection in MacOS
6:08
Jennifer Breeding
51. Methods of Managing Cisco Devices
9:16
Jennifer Breeding
136. Doing Subnetting Backwards
7:11
Jennifer Breeding
65. Telnet and SSH Implementation
15:57
Jennifer Breeding
93. Configuring and Testing Ubuntu Linux Network Access
14:58
Jennifer Breeding
69. Basic IOS Navigation Lab
14:59
Jennifer Breeding
222. IPv6 Static Routes Review
6:18
Jennifer Breeding
114. The Classes of Addresses from A to E
13:10
Jennifer Breeding
90. Introduction to Configure Windows, MAC, or Linux for Network Access
1:18
Jennifer Breeding
415. Automating the Data Center with ACI
7:28
Jennifer Breeding
96. Connecting Devices to a Switch
7:07
Jennifer Breeding
230. Wildcard Masks and Network Statements
8:10
Jennifer Breeding
198. Predicting the Correct L2 and L3 Addresses
12:46
Jennifer Breeding
218. Adding IPv6 Directly Connected Routes
13:28
Jennifer Breeding
86. How TCP Sends Data TCP Windowing
9:28
Jennifer Breeding
202. Reviewing End To End IP Communications
1:08
Jennifer Breeding
190. Introduction to Configure a Basic Cisco Wireless Network using the WLC GUI
1:10
Jennifer Breeding
80. Practical Wireshark: Rogue DHCP
8:29
Jennifer Breeding
317. Mitigation Techniques and Countermeasures
8:23
Jennifer Breeding
141. Comparing IPv4 and IPv6
9:42
Jennifer Breeding
131. Subnetting Class B Networks Based on Host Requirements
4:18
Jennifer Breeding
151. Battle of the Bands
13:52
Jennifer Breeding
179. Understanding STP Standards
10:26
Jennifer Breeding
164. Weird and Wacky World of VTP
8:57
Jennifer Breeding
231. OSPF Wildcards on Clean Octet Boundaries
10:27
Jennifer Breeding
182. Configuring Basic STP and Verifying Results
15:05
Jennifer Breeding
319. Introducing Security Program Elements
0:20
Jennifer Breeding
128. Review of Perform Subnetting Based on Network Requirements
13:03
Jennifer Breeding
228. OSPF Router ID RID
8:33
Jennifer Breeding
166. Limiting or Adding VLANs to Trunks
8:25
Jennifer Breeding
142. Binary, Decimal, and Hex
12:51
Jennifer Breeding
172. What is CDP and LLDP?
7:19
Jennifer Breeding
357. Port Security Defaults
4:10
Jennifer Breeding
288. Introducing Cisco NAT Concepts and Base Configurations
0:55
Jennifer Breeding
220. Configuring Static IPv6 Default and Network Routes
11:04
Jennifer Breeding
144. Types of IPv6 Addresses
21:24
Jennifer Breeding
276. Introducing a Router on a Stick
0:54
Jennifer Breeding
217. IPv6 Static Route Lab Topology
5:21
Jennifer Breeding
45. Copper Cable
9:12
Jennifer Breeding
32. Data Link and Physical Layer
9:44
Jennifer Breeding
41. On Premise vs Cloud Architecture
4:59
Jennifer Breeding
94. Review of Configure Windows, MAC, or Linux for Network Access
2:13
Jennifer Breeding
34. Review of Explain Network Communication with the OSI Model
6:21
Jennifer Breeding
205. Adding Directly Connected IPv4 Routes
13:04
Jennifer Breeding
168. Deploying VLSM in a VLAN Network
17:58
Jennifer Breeding
267. Winning Routes of a Routers Table Concepts
5:25
Jennifer Breeding
106. Deep Dive Into Interface Counters
21:57
Jennifer Breeding
242. Implementing OSPF with Exact Network Statements
5:14
Jennifer Breeding
169. Configuring VLANs, Trunking, and Routing Lab
23:20
Jennifer Breeding
377. Review of Configure and Verify Cisco Dynamic ARP Inspection
2:14
Jennifer Breeding
340. Commands to Implement AAA
5:32
Jennifer Breeding
178. What Does STP Do?
13:41
Jennifer Breeding
101. Review of Describe Network Switch Functions and How to Locate Network Devices
2:59
Jennifer Breeding
191. Cisco WLC Puzzle Pieces
9:37
Jennifer Breeding
237. Review of Describe Cisco Dynamic IPv4 Routing with OSPF
6:17
Jennifer Breeding
133. Troublesome Hosts
6:43
Jennifer Breeding
125. Subnetting Class B Networks Based on Network Requirements
15:41
Jennifer Breeding
119. Introduction to Converting from Decimal to Binary and Back
0:45
Jennifer Breeding
165. Configuring VTP
12:27
Jennifer Breeding
146. Configuring IPv6 Addressing
10:57
Jennifer Breeding
224. Review of Configure and Verify Cisco IPv6 Static Routes
2:45
Jennifer Breeding
154. Introduction to Explain VLAN Concepts and Configure VLANs on a Single Switch
1:02
Jennifer Breeding
233. DR and BDRs on Broadcast Networks
8:07
Jennifer Breeding
266. Introduction to Predict a Cisco Router’s IP Forwarding Decisions
0:45
Jennifer Breeding
244. OSPF Link Cost Calculation
11:56
Jennifer Breeding
300. Introduction to Configure DHCP Server and Relay Functions
1:08
Jennifer Breeding
310. TFTP FTP
6:26
Jennifer Breeding
303. Configuring DHCP Relay in a Cisco Network
10:39
Jennifer Breeding
293. Configuring and Verifying Cisco NAT Lab
15:23
Jennifer Breeding
314. Vulnerabilities
5:25
Jennifer Breeding
247. Implementing a Default Route in OSPF
8:36
Jennifer Breeding
7. Decimal to Binary and Vice Versa
11:19
Jennifer Breeding
350. Extended ACLs Concepts
4:54
Jennifer Breeding
262. The Routing Table Metric
5:00
Jennifer Breeding
354. Review of Apply and Verify Cisco Access Control Lists
4:13
Jennifer Breeding
345. Standard ACLs Concepts
6:36
Jennifer Breeding
337. AAA Overview
6:45
Jennifer Breeding
323. Introduction to Describe Elements of Secure Password Policies
0:51
Jennifer Breeding
320. Polices as Part of a Security Program
4:31
Jennifer Breeding
360. Configuring Auto Errdisable Recovery
7:34
Jennifer Breeding
251. FHRP First Hop Redundancy Protocols Overview
6:56