CCNA Security 2019 210-260 Video Boot Camp With Chris Bryant

BY
Udemy

Get ready for the CCNA Security 2019 210-260 certification through Udemy.

Mode

Online

Fees

₹ 3099

Quick Facts

particular details
Medium of instructions English
Mode of learning Self study
Mode of Delivery Video and Text Based

Course overview

CCNA Security 2019 210-260 Video Boot Camp With Chris Bryant Course is an online certification prepared by Chris Bryant to facilitate the learners to gather the knowledge and skills to prepare and clear the CCNA Security 210-260 Certification. The curriculum will help the students to have the  Cisco Certified Network Associate certification by providing a detailed understanding of networking, Firewalls, Ethernet, Cabling, and many more. 

Delivered by Udemy, CCNA Security 2019 210-260 Video Boot Camp With Chris Bryant Online Course includes downloadable lecture videos and practical aspects to prepare the learners for the real-world networking industry. CCNA Security 2019 210-260 Video Boot Camp With Chris Bryant Certification, the candidates will be awarded lifetime access to the study materials, a 30-day money-back guarantee, etc. 

The highlights

  • 100% Online course
  • Downloadable resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of completion
  • English videos with multiple subtitles
  • 30-Day Money-Back Guarantee

Program offerings

  • 62 hours on-demand video
  • Full lifetime access
  • Access on mobile and tv
  • Certificate of completion

Course and certificate fees

Fees information
₹ 3,099
certificate availability

Yes

certificate providing authority

Udemy

What you will learn

After the completion of CCNA Security 2019 210-260 Video Boot Camp With Chris Bryant Online Certification,  the learners will learn all the gamut of topics needed to pass the CCNA Security 2019 210-260 and will explore Cloud Computing, network monitoring, HSRP,  Spanning Tree Protocol and the like. 

The syllabus

CCNA Security 210-260, Section 1: Network Attack Fundamentals

  • Fund. 1: Citizen C.I.A.
  • Fund. 2: Intro To SIEM
  • Fund 3: More SIEM
  • Fund 4: Recon Attacks and Phishing
  • Fund 5: Spear Phishing, QPQ, And Pretexting
  • Fund 6: Privilege Escalation and Telnet
  • Fund 7: Privilege Escalation Continues
  • Fund 8: DoS and DDoS Attacks
  • Fund 9: Advanced Persistent Threats

CCNA Security 210-260, Section 2: Specific Attacks And Defenses

  • Attack 1: Man-In-The-Middle Attacks
  • Attack 2: ARP Poisoning and Dynamic ARP Inspection
  • Attack 3: DAI Commands
  • Attack 4: MAC Spoofing and CAM Table Overflows
  • Attack 5: Port Security Fundamentals
  • Attack 6: Port Security and Dynamic Secure Addresses
  • Attack 7: Port Security Shutdown!
  • Attack 8: Port Security And Automatic Port Reenabling
  • Attack 9: Port Security Static Address Aging
  • Attack 10: Port Security Dynamic Address Aging
  • Attack 11: Refresh Your VLAN Knowledge Here!
  • Attack 12: Private VLAN Theory
  • Attack 13: Private VLAN Lab
  • Attack 14: OSPF Authentication Fundamentals
  • Attack 15: OSPF Clear-Text Authentication
  • Attack 16: OSPF MD5 Authentication
  • Attack 17: Root Guard
  • Attack 18: BPDU Guard and Loop Guard
  • Attack 19: VLAN ACLs, Part 1
  • Attack 20: VLAN ACLs, Part 2
  • Attack 21: Stoppin' VLAN Hoppin'
  • Attack 22: DHCP Snooping Intro
  • Attack 23: DHCP Snooping Address Renewal
  • Attack 24: DHCP Snooping -- 1st Time Address Acquisition Lab
  • Attack 25: IPSG Theory, Lab 1 Begins
  • Attack 26: IPSG Lab 1 Continues
  • Attack 27: IPSG Static Bindings Lab
  • Attack 28: Segue To The Next Section

CCNA Security 210-260: Privilege Levels

  • Levels 1: The Fundamentals
  • Levels 2: The Other Defaults
  • Levels 3: Intro To Custom Levels
  • Levels 4: Custom Level Lab Continues (Interface-Level Commands)
  • Levels 5: The Autocommand and One-Time Password Options
  • Levels 6: Privilege Levels and "Show Run"
  • Levels 7: Role-Based CLI Begins
  • Levels 8: Role-Based CLI Continues
  • Levels 9: Superviews!
  • Levels 10: Applying The Views, Part 1
  • Levels 11: Applying The Views, Part 2
  • Levels 12: Intro To Lawful Intercept
  • Levels 13: Resilient Config Labs Begin
  • Levels 14: Resilient Config Labs Continue
  • Levels 15: Resilient Config Test
  • Levels 16: Resilient Image Test

CCNA Security Course: Protecting The Control Plane

  • Control Plane 1: Intro To CoPP
  • Control Plane 2: Class Maps and CoPP
  • Control Plane 3: Policy Maps and CoPP
  • Control Plane 4: Verifying CoPP / Intro To CPPp

CCNA Security 210-260: New VPN Section

  • VPN 1: Site-to-Site Theory
  • VPN 2: ISAKMP Phases 1 and 2
  • VPN 3: Writing The ISAKMP Policy, Part 1
  • VPN 4: Writing The ISAKMP Policy, Part 2
  • VPN 5: Finishing The ISAKMP Policy / Adding The Keys
  • VPN 6: Writing The Transform Sets
  • VPN 6A: Defining Interesting Traffic
  • VPN 7: Writing The Crypto Map
  • VPN 8: Testing and Troubleshooting
  • VPN 9: Crypto Map This n' That
  • VPN 10: Debugging A Tunnel Build
  • VPN 11: Diffie-Hellman Details
  • VPN 12: Using ASDM To Build A VPN
  • VPN 13: More ASDM VPN Building
  • VPN 14: Wrapping Up Our 1st ADSM VPN Build

CCNA Security 210-260: Firewalls

  • Firewall 1: So Just What IS A Firewall?
  • Firewall 2: Stateless and Stateful Filtering
  • Firewall 3: Proxy Firewalls
  • Firewall 4: Personal Firewalls
  • Firewalls 5: The ZBF And Zone Pairs
  • Firewalls 6: The DMZ
  • Firewalls 7: IP Addressing For Firewall Labs
  • Firewalls 8: Basic Firewall Lab With CCP
  • Firewall 9: Basic Firewall Wizard Lab Concludes
  • Firewall 10: Advanced Firewall Wizard Lab Begins
  • Firewall 11: Advanced Firewall Wizard Lab Concludes
  • Firewall 12: Intro To ASA Firewalling
  • Firewall 13: Configuring A New ASA
  • Firewall 14: ADSM Lab Begins -- Outside Interface
  • Firewall 15: ADSM Lab Continues
  • Firewall 16: ADSM Lab Continues (Access Rule Application)
  • Firewall 17: ADSM Lab Continues (Global Rule Permit IP Any Any?)
  • Firewall 18: ADSM Lab Concludes
  • Firewall 19: Same Security Levels... And "Phone Home"

CCNA Security 210-260: The IPS and IDS

  • IPS 1: The Differences
  • IPS 2: Where They Can Go and What They Can DO
  • IPS 3: Sensor Types
  • IPS 4: CCP Lab: Installing SDEE, IPS Wizard, and Signatures
  • IPS 5: CCP Lab Continues -- Editing SDF Signatures
  • IPS 6: The Monitor Window
  • IPS 7: Second Verse, Not Same As The First
  • IPS 8: HIPS, NIPS, and WIPS

CCNA Security: NAT Review... And More!

  • NAT 1: NAT And PAT Basics
  • NAT 2: Static NAT
  • NAT 3: Dynamic NAT
  • NAT 4: In-Depth PAT

CCNA Security: NTP

  • NTP 1: The Beginning
  • NTP 2: Client-Server Lab
  • NTP 3: Peering Lab
  • NTP 4: Broadcast Mode
  • NTP 5: Authentication Lab Begins
  • NTP 6: Authentication Lab Continues (with debugging!)
  • NTP 7: Adding Another Time Server
  • NTP 8: Troubleshooting Tips

CCNA Security: AAA, TACACS, RADIUS, Dot1x, And A Little TCP!

  • AAA 1: The Facts
  • AAA 2: Command Walkthrough (Tacacs and Radius servers)
  • AAA 3: Configuring Multiple Groups For AAA Authentication
  • AAA 4: More Lab Work; The "none" Option
  • AAA 5
  • AAA 6: Dot1x Refresher
  • AAA 7: Dot1x Lab Work
  • AAA 8: Introduction To EAPs
  • AAA 9: The TCP Finite Machine

CCNA Security 210-260: IPv6

  • Intro To The IPv6 Section
  • IPv6 1: Curing Address Anxiety
  • IPv6 2: The Global Routing Prefix and Subnet ID
  • IPv6 3: Enabling IPv6 -- Twice!
  • IPV6 4: Configuring And Verifying IPV6 Addresses
  • IPV6 5: Link Local Addresses
  • IPv6 : Calculating the Interface Identifier
  • IPV6 7: Using The Interface Identifier as Host Address
  • IPV6 8: Router Discovery With NDP
  • IPV6 9: Host Discovery With NDP
  • IPV6 10: DHCP On Planet IPV6
  • IP 11: Smart Stuff Our DAD Says
  • IPV6 12: The IPV6 Routing Table
  • IPV6 13: Pinging IPV6 Addresses
  • IPV6 14: Static Routes (Recursive and Directly Connected)
  • IPV6 15: Static Routes (Fully Specified)
  • IPV6 16: Using The Link-Local Address With Static Routes
  • IPV6 17: Default and Host Static Routes
  • IPV6 18: Nuts, Bolts, and Frame Format Comparison

TNT: This n' That!

  • TNT 1: Unicast Reverse Path Forwarding
  • TNT 2: Whitelisting, Blacklisting, and URL Filtering
  • TNT 3: MD5 and Bands
  • TNT 4: EIGRP Authentication
  • TNT 5: Filtering "Debug IP Packet" Output
  • TNT 6: Core Dumps
  • TNT 6: Memory Issues?

Your Free CCNA 200-125 Course Starts Here!

  • 1/1 Network Fundamentals: Why We Network!
  • 1/2: The OSI Model
  • 1/3: The TCP/IP Model (And Real-World Networking Tips)

CCNA 200-125, ICND 1, Sec. 2: Ethernet and Cabling

  • Physical 1: Ethernet Standards
  • Physical 2: Cable Types
  • Physical 3:The Fields of Ethernet

CCNA 200-125, ICND 1, Sec. 3: Hubs, History, and Switches

  • Switching 1: Why Hubs Came, Why They Left
  • Switching 2: Bridges, Switches, and Logical Segmentation
  • Switching 3: Building The MAC Table, Part 1
  • Switching 4: Building The MAC Table, Part 2
  • Switching 5: Frame Processing, Hex Conversions, and Breaking Down MAC Addresses
  • Switching 6: Hex-to-Decimal Practice Session
  • Switching 7: Decimal-to-Hex Practice Session

CCNA 200-125, ICND 1, Sec. 4: Config Modes, IOS Help, and Trunking

  • Config 1: Configuration Modes and IOS Help Introduction
  • Config 2: Exec Timeout, Logging Synch, and the Console Port
  • Config 3: VLAN Lab Begins
  • Config 4: VLAN Lab Concludes
  • Config 5: More VLANs, Switch Erases, and VLAN.DAT
  • Config 6: Intro to Trunking
  • Config 7: Trunking Port Modes
  • Config 8: Filtering Trunk Traffic on a Per-VLAN Basis

CCNA 200-125, ICND 1, Sec. 5: Memories, Boots, and Passwords

  • Memory 1: Memory Contents and Boot Processes
  • Memory 2: Setup Mode -- One Way In, Two Ways Out
  • Memory 3: Enable Secret v. Enable Password
  • Memory 4: Console Port Protection (One Password)
  • Memory 5: Console Port Protection (Username / PW Database)
  • Memory 6: Port Security Success Foundations
  • Memory 7: Port Security Options
  • Memory 8: Port Security Static Lab Begins
  • Memory 9: Port Security Static Lab Concludes
  • Memory 10: Port Security Dynamic Learning Lab
  • Memory 11: Port Security Sticky Addresses / Errdisable Recovery

CCNA 200-125, ICND 1: IP Addressing, Binary, and Static Routes

  • Routing 1: IP Addresses, Subnet Masks, and Binary Conversions
  • Routing 2: The Public IP Address Classes
  • Routing 3: The Private IP Address Classes
  • Routing 4: Connected Routes Walkthrough
  • Routing 5: Static Route Walkthrough

CCNA 200-125, ICND 1: Switches, Default Gateways, and Telnet

  • Intro To SVIs
  • Creating A Non-Default SVI
  • Telnet Labs Begin
  • Telnet Labs End
  • Autonegotiation
  • Slashes and Console Port Options
  • The Description and Interface Range Commands

CCNA 200-125, ICND 1: TCP and UDP

  • "TCP Good, UDP Bad"?
  • The Comparison Continues
  • Multiplexing / Intro To Port Numbers

CCNA 200-125, ICND 1: DHCP, DNS, and ARP

  • DNS and ARP
  • DHCP Fun(damentals)

CCNA 200-125, ICND 1: Static Routing, Pings, and Default RoutesCCNA 200-125, ICND 1: Static Routing, Pings, and Default Routes

  • Lab Topology, Pings, and HAS Networking
  • Lab Continues; Intro To "Debug IP Packet"
  • Lab Continues, Static Host Routes
  • Lab Continues, Static Default Routes
  • Default Routes Are Beautiful (Sometimes)

CCNA 200-125, ICND 1: Distance Vector In General, RIP In Particular

  • Intro To Distance Vector Protocols
  • Split Horizon and Poison Reverse
  • RIP Lab Begins
  • RIP Lab Continues
  • RIP Lab Concludes
  • The Dangers Of Autosummarization
  • More Autosummarization
  • Passive Interfaces
  • Administrative Distances
  • Fun With RIP Load Balancing
  • More RIP Load Balancing
  • RIP Version Mismatches / Debugging
  • Floating Static Route Lab Begins
  • Floating Static Route Lab Continues
  • Originating A Default Route With RIP

CCNA 200-125, ICND 1 and 2: Subnetting Success

  • The Whys, Ins, and Outs Of Subnetting
  • Decimal-to-Binary Conversions
  • Decimal-to-Binary Conversions (2)
  • Binary-to-Decimal Conversions
  • Number Of Valid Subnets: The Classic Approach
  • Number Of Valid Subnets: The Bulldog Approach
  • Number of Valid Hosts
  • Finding The Subnet of an IP Address
  • Determining Broadcast Addresses
  • Subnetting!

ACLs1

  • 1: ACL Rules
  • 2: Wildcard Masks Made Easy
  • 3: Standard ACL Lab Begins
  • 4: Standard ACL Lab Concludes
  • 5: Extended ACL Lab
  • 6: "Host", "Any", and Line Order Importance
  • 7: Named Standard ACL Lab
  • 8: Named Extended ACL Lab
  • 9: Telnet and Extended ACLs
  • 10: Telnet, Extended ACLs, and Time Ranges
  • 11: Sequence Numbers, Telnet, and Extended ACLs
  • 12: More Telnet / Absolute Time Ranges
  • 13: ACL Placement

CCNA 200-125, ICND 1: The Network Time Protocol

  • NTP 1: What's Going On?
  • NTP 2: Server-Client Lab
  • NTP 3: Peering Lab
  • NTP 4: Broadcast Mode

CCNA 200-125, ICND 1: NAT And PAT

  • NAT 1: The Fundamentals Of NAT And PAT
  • NAT 2: Static NAT Lab
  • NAT 3: Dynamic NAT Lab
  • NAT 4: Port Address Translation Lab

CCNA 200-125, ICND 1: IP Version 6

  • IPv6 1: Curing Address Anxiety
  • IPv6 2: The Global Routing Prefix and Subnet ID
  • IPv6 3: Enabling IPv6 (Twice!)
  • IPv6 4: Configuring and Verifying IPv6 Addresses
  • IPv6 5: Link-Local Addresses
  • IPv6 6: Calculating The Interface Identifier
  • IPv6 7: Using The Interface Identifier As A Host Address
  • IPv6 8: Router Discovery With NDP
  • IPv6 9: Host Discovery with NDP
  • IPv6 10: DHCP on Planet IPv6
  • IPv6 11: Smart Stuff Your DAD Says
  • IPv6 12: The Routing Table
  • IPv6 13: Pinging
  • IPv6 14: Static Routes (Recursive and Directly Connected)
  • Ipv6 15: Static Routes (Fully Specified)
  • IPv6 16: Using The Link-Local Address With Static Routes
  • IPv6 17: Default and Host Static Routes
  • IPv6 18: Nuts, Bolts, and Frame Format Comparison

CCNA 200-125, ICND 1 *AND* 2: This n' That

  • TNT 1: Timestamps
  • TNT 2: The Password Encryption Services
  • TNT 3: Console Logging
  • TNT 4: Buffer and Syslog Logging
  • TNT 5: "Where ARE My Log Messages?"
  • TNT 6: Banners
  • TNT 7: CDP Fundamentals
  • TNT 8: More Fun With CDP
  • TNT 9: The Link Layer Discovery Protocol
  • TNT 10: Cisco Password Recovery Procedures
  • TNT 11: A Little More Config Register Work

CCNA 200-125, ICND 2: VTP

  • VTP 1: Why VTP?
  • VTP 2: The Lab Continues
  • VTP 3: The Mysterious Automagical Joins
  • VTP 4: The Modes
  • VTP 5: The Config Revision Number
  • VTP 6: CRN Lab / Fully Initializing The Switch
  • VTP 7: The Password
  • VTP 8: More Password Info
  • VTP 9: Pruning / Real-World Version 3 Tips

CCNA 200-125, ICND 2: The Spanning Tree Protocol

  • STP 1: The Fundamentals
  • STP 2: Switching Loops and More STP Fundamentals
  • STP 3: Root Bridge Election Walkthrough
  • Root Bridge Election Results (On The Root Bridge)
  • STP 5: Root Bridge Election Results (On The Non-Roots)
  • STP 6: Timer Changes
  • STP 7: Root Path Cost vs. Port Cost
  • STP 8: Root Port Selection Tiebreakers
  • STP 9: DP Selection On Non-Root Switches
  • STP 10: Speed Changes and Port Costs
  • STP 11: Per-VLAN Load Balancing
  • STP 12: Choosing Your Roots
  • STP 13: Choosing Your Secondary Roots
  • STP 14: Stone Cole Priority and PortFast
  • STP 15: Root Guard
  • STP 16: BPDU Guard

Etherchannels

  • EC 1: The Theory
  • EC 2: The Configuration
  • EC 3: The Verification
  • EC 4: The Negotiation

CCNA 200-125, ICND 2: RSTP

  • RSTP 1: It Begins
  • RSTP 2: Edge Ports and Lab Work
  • RSTP 3: More Lab Work!

CCNA 200-125 (ICND2): OSPF

  • OSPF 1: Intro to Link State Protocols
  • OSPF 2: LSAs and Adjacencies
  • OSPF 3: Network Mask Matching
  • OSPF 4: Hello and Dead Timers
  • OSPF 5: The Adjacency States
  • OSPF 6: The DR, BDR, and RID
  • OSPF 7: Why Areas?
  • OSPF 8: Broadcast Network Build
  • OSPF 9: NBMA Network Build
  • OSPF 10: RID Fix, Pings, and Shows
  • OSPF 11: Point-to-Point Network Build
  • OSPF 12: Broadcast Network Build / Something's Missing...
  • OSPF 13: Virtual Link Build
  • OSPF 14: Configuring Passive Interfaces
  • OSPF 15: Verifying Passive Interfaces
  • OSPF 16: New Router In The Network...
  • OSPF 17: Stub Areas
  • OSPF 18: Total Stub Areas
  • OSPF 19: ABRs, ASBRs, and Other Router Types
  • OSPF 20: The Default-Information Originate Command
  • OSPF 21: Changing The Port Cost Calculation
  • OSPF 22: More Port Cost Calculation
  • OSPF 23: Bandwidth Lab
  • OSPF 24: Multiple Routers, One Broadcast Segment
  • OSPF 25: Enabling OSPF On A Per-Interface Basis
  • OSPF 26: The Finale!

CCNA 200-125, ICND2: EIGRP

  • EIGRP 1: The Fundamentals Of Success
  • EIGRP 2: The Successor and Feasible Successors
  • EIGRP 3: NBMA Network Build
  • EIGRP 4: The Spoke-to-Spoke Dilemma
  • EIGRP 5: The Broadcast Network Build
  • EIGRP 6: From Feasible Successor to Successor
  • EIGRP 7: Variance Lab 1
  • EIGRP 8: Variance Lab 2
  • EIGRP 9: The No-Wildcard-Mask Lab
  • EIGRP 10: DUAL Queries and the RID
  • EIGRP 11: Packet Types and Adjacencies
  • EIGRP 12: Timers and Adjacencies
  • EIGRP 13: "Show Neighbor" and FD / DR
  • EIGRP 14: Applying The Feasibility Condition
  • EIGRP 15: Feasibility, Variance, and Administrative Distance
  • EIGRP 16: The Perils Of Autosummarization
  • EIGRP 17: Passive Interfaces
  • EIGRP 18: The Metric Weights
  • EIGRP 19: "You Say Goodbye, And I Say Hello..."
  • EIGRP 20: Route Summarization With EIGRP
  • EIGRP 21: The Null0 Interface and the AD5
  • EIGRP 22: Bandwidth Review / Intro To Delay

CCNA 200-125 (ICND2): OSPF, EIGRP, and RIP For IPv6

  • OSPF v3 1: Comparison Shopping
  • OSPF v3 2: Broadcast Segment Build
  • OSPF v3 3: Point-to-Point Link Build
  • OSPF v3 4: NBMA Build
  • OSPF v3 5: More NBMA Build
  • OSPF v3 6: Stub and Total Stub Areas
  • OSPF v3 7: Broadcast Segments, V3 Group Joins
  • OSPF v3 8: EIGRP for IPv6 Lab Work
  • OSPF v3 9: RIP for IPv6 Lab
  • OSPF v3 120: Pop Quiz Answer

CCNA 200-125 (ICND2): First-Hop Redundancy Protocols

  • FHRP 1: Success Fundamentals, Intro To HSRP
  • FHRP 2: HSRP Lab Begins
  • FHRP 3: HSRP Theory vs. Real-World Deployments
  • FHRP 4: Changing The HSRP Active Router
  • FHRP 5: HSRP Oddities and Error Messages
  • FHRP 6: Load Balancing With HSRP
  • FHRP 7: HSRP Versions
  • FHRP 8: Adding A Third Router To HSRP
  • FHRP 9: VRRP Theory and Lab

CCNA 200-125, ICND 2: PTP WANs, VPNs, and GRE

  • PTP 1: Setting Up The Lab / Intro To HDLC
  • PTP 2: PAP vs. CHAP
  • PTP 3: CHAP Lab (All Is Well)
  • PTP 4: CHAP LAB (Wrong Password)
  • PTP 5: CHAP Lab (Wrong or Missing Username)
  • PTP 6: PAP Labs
  • PTP 7: Intro To Multilink / Multiple Authentication
  • PTP 8: Intro To VPNs And GRE
  • PTP 9: GRE Tunnel Build 1 Begins
  • PTP 10: GRE Tunnel Build 1 Concludes
  • PTP 11: GRE Tunnel Build 2 Begins
  • PTP 12: Recursive Routing / GRE Tunnel Build 2 Continues
  • PTP 13: GRE Tunnel Troubleshooting Checklist
  • PTP 14: Why Lease Lines?
  • PTP 15: The CSU / DSU and DTE / DCE Cables
  • PTP 16: PPPoE Lab
  • PTP 17: PPPoE Review
  • PTP 18: Introduction To DMVPN
  • PTP 19: Bonus! Configuring A Frame Relay Switch, Pt. 1
  • PTP 20: Configuring A Frame Relay Switch, Pt. 2

CCNA 200-125 (ICND2): Fun With L3 Switches

  • L3 Switching 1: Router-On-A-Stick Theory
  • L3 Switching 2: ROAS Verification and Troubleshooting
  • L3 Switching 3: Switched Virtual Interfaces
  • L3 Switching 4: Routed Ports Lab Begins
  • L3 Switching 5: Routed Ports and Routing Protocols
  • L3 Switching 6: Layer 3 Etherchannel Build Begins
  • L3 Switching 7: Layer 3 EC Verification and Troubleshooting

CCNA 200-125 (ICND2): Intro To QoS

  • QoS 1: FIFO and WFQ
  • QoS 2: Tail Drop and Global Synchronization
  • QoS 3: LLQ and Round Robin
  • QOS 4: IntServ and DiffServ
  • QoS 5: Trust Boundaries

CCNA 200-125 (ICND2): Network Monitoring

  • Monitor 1: SNMP Basics
  • Monitor 2: SNMP Demo
  • Monitor 3: Intro To SLA
  • Monitor 4: SLA Lab
  • Monitor 5: SPAN Begins
  • Monitor 6: Local SPAN Lab
  • Monitor 7: Deleting SPAN Sessions / Remote SPAN
  • Monitor 8: Remote SPAN Lab / Port Restrictions

CCNA 200-125 (ICND2): Cloud Computing Intro

  • Cloud 1: Intro To Cloud Computing
  • Cloud 2: Intro To APIC And APIC-EM
  • Cloud 3: APIC-EM Lab Begins (Discovery)
  • Cloud 4: APIC-EM Lab Continues

CCNA 200-125 (ICND2): IPv6 ACLs

  • ACL 1: The Rules
  • ACL 2: Standard ACL Build Lab
  • ACL 3: Good Pings, Bad Pings
  • ACL 4: Troubleshooting
  • ACL 5: Extended IPv6 Pings
  • ACL 6:Extended ACLs / Telnet Lab
  • ACL 7: Telnet Lab Continues
  • ACL 8: Implicit Permits and ACLs

CCNA 200-125 (ICND2): Intro To...

  • Metro Ethernet
  • MPLS, Part 1
  • MPLS, Part 2
  • MPLS VPN
  • Switch Stacking
  • The Cisco Switching Model
  • Chassis Aggregation
  • AAA Fundamentals
  • TACACS+ Server Config
  • RADIUS Server Config
  • "AAA Authentication Login" Logic
  • AAA Authentication Lab
  • AAA Authorization and Accounting
  • Dot1x Port-Based Authentication Theory
  • Dot1x Port-Based Authentication Labs
  • Telnet Review / "Transport Input All"
  • SSH Versions and Key Creation Lab

BGP

  • Before You Start The BGP Section....
  • 1: Intro To BGP
  • 2: External BGP Peerings
  • 3: iBGP Peering and Loopback Interfaces
  • 4: eBGP Peering with Loopback Interfaces
  • 5: Advertising Routes with "Network"
  • 6: The "Origin" and "Next-Hop" Attributes
  • 7: The Best Path Selection Process
  • 8: Next-Hop Addresses
  • 9: The Next-Hop Address Rule
  • 10: The Multi-Exit Discriminator
  • BGP 11: Local Pref -- All, Or Nothing At All
  • BGP 12: Local Preferences -- Changing One, But Not All
  • 13: The Weight Attribute
  • 14: More Weight Work
  • 15: Route Summarization
  • 16: Synch Rules and the Full Mesh
  • 17: Route Reflectors
  • 18: Prefix Lists -- The Beginning
  • 19: More Prefix List Work
  • 20: A Few Final Tips


Instructors

Mr Chris Bryant

Mr Chris Bryant
Instructor
Udemy

Trending Courses

Popular Courses

Popular Platforms

Learn more about the Courses

Download the Careers360 App on your Android phone

Regular exam updates, QnA, Predictors, College Applications & E-books now on your Mobile

Careers360 App
150M+ Students
30,000+ Colleges
500+ Exams
1500+ E-books