Autoplay
Autocomplete
Previous Lesson
Complete and Continue
CCNP ROUTE 300-101 Video Boot Camp With Chris Bryant
Routing Fundamentals
The Case Of TCP v. UDP, Part I (12:54)
The Case Of TCP v. UDP, Part II (8:59)
PPP -- Over Ethernet And Otherwise (10:20)
Rip-Roarin' Routing Review (Really!) (4:48)
EIGRP Fundamentals
EIGRP 1: Adjacencies and Successors (9:48)
EIGRP 2: Building An NBMA Network (13:36)
EIGRP 3: In Search Of... Our Missing Subnets (5:59)
EIGRP 4: Successors and Feasible Successors (8:57)
EIGRP 5: Promoting A Feasible Successor (3:43)
EIGRP 6: The Variance Command (10:31)
EIGRP 7: DUAL And Its Impact On Active And Passive Routes (4:37)
Advanced EIGRP
Adv EIGRP 1: Packet Types and Timers (8:45)
Adv EIGRP 2: Hello Timers (7:24)
Adv EIGRP 3: "Show IP EIGRP Neighbor" -- And Distances! (4:56)
Adv EIGRP 4: Feasible, Reported, and Advertised Distance (10:28)
Adv EIGRP 5: FD, AD, And Variance (6:40)
Adv EIGRP 6: Admin Distances -- Default And Otherwise (11:24)
Adv EIGRP 7: Autosummarization (11:35)
Adv EIGRP 8: Manual Route Summarization (10:24)
Adv EIGRP 9: The AD 5, Plus Stub Routing Theory (5:53)
Adv EIGRP 9A: Bonus Lab! Advanced Stub Routing (3:32)
Adv EIGRP 10: Passive Interfaces (8:16)
Adv EIGRP 11: The Metric Weights (6:08)
Adv EIGRP 12: Know Thy Interface Types (9:38)
Adv EIGRP 13: Propagating Static Default Routes (3:55)
Adv EIGRP 14: The IP Default-Network Command (8:11)
Adv. EIGRP 15: Neighbor Authentication
The Fundamentals Of OSPF Success
OSPF Fund 1: Link State Protocol Operation (10:34)
OSPF Fund 2: The DR And BDR (11:39)
OSPF Fund 3: DR For Life (Or Not) (7:07)
OSPF Fund 4: The Network Begins! (Building An Ethernet Segment (6:41)
OSPF Fund 5: Building An NBMA Network (10:48)
OSPF Fund 6: Building A Point-To-Point Network (8:02)
OSPF Fund 7: The Missing Subnets (And Virtual LInks) (14:35)
OSPF Fund 8: One Big Area Zero? (5:23)
OSPF Fund 9: Interface Cost and Reference Bandwidths (9:03)
OSPF Fund 10: The "Bandwidth" Command And Interface Cost (9:17)
OSPF Fund 11: A Little Confirmation (3:59)
OSPF Fund 12: Four Routers Walk Into A Network... (8:04)
OSPF Advanced Concepts
Prologue: Route and LSA Type Review (8:58)
1 -- Introduction to Redistribution and Stub Areas (10:18)
2 - Stub Total Stub Configuration and Verification (8:14)
3 - NSSA Configuration (11:19)
4 - E1 E2 N1 N2 Routes (6:59)
5 - Route Redistribution (11:19)
6 - Intro to And Config of Simple Text Authentication (8:01)
7 - MD5 Authentication in Action (3:36)
Route Redistribution And Manipulating Routes
NEW - 1 - Fundamentals of Route Redistribution (6:39)
NEW - 2 - OSPF2RIP Route Redistribution (9:39)
NEW - 3 - Troubleshooting Route Distribution Plus Extended Pings (7:04)
NEW - 4 - Suboptimal Routing (9:32)
NEW - 5 - Changing AD for an Elite Protocol (6:18)
NEW - 6 - Changing AD Depending on Source (8:00)
NEW - 7 - Changing AD Based on OSPF Route Type (4:06)
NEW - 8 - Redistributing EIGRP and Tweaking Its AD (10:08)
NEW - 9 - Using Distribute Lists with OSPF (6:58)
NEW - 10 - Distribute Lists Filtering EIGRP Routes (4:34)
NEW - 11 - Distribute Lists and EIGRP Redistribution (8:28)
NEW - 12 - Multiple Distribute Lists (4:10)
NEW - 13 - Writing and Verifying a Route Map (10:06)
NEW - 14 - Applying and Verifying a Route Map to Redistribution (7:39)
NEW - 15 - Fun with Tagging Part 1 (11:20)
NEW - 16 - Finish Fun with Tagging (3:22)
NEW - 17 - Policy Routing Theory and Practice (12:45)
NEW - 18 - Finish Policy Routing Lab (4:10)
19 -- Local Policy Routing: Theory And Application (8:15)
IP Version 6
1 - IPv6 Fundamentals and Compression (12:24)
2 - EUI64 Interface Identifiers (10:03)
3 - Autoconfiguration (11:21)
4 - Building OSPFv3 Broadcast Segment (14:18)
5: Adding Loopbacks to OSPFv3 Network (2:32)
6 - Adding Point-to-Point Network and Area 14 (5:06)
7 - Configuring an OSPF NBMA Segment (5:57)
8 - Route Redistribution, Stubs, and Total Stubs (8:20)
9 - Configuring EIGRP on IPv6 (7:28)
10 - Configuring RIPng (8:14)
11 - Troubleshooting OSPFv3 Configs (7:58)
12 - Migration Strategies (10:11)
Virtual Private Networks
VPN 1 - The Dreaded Yet Necessary Theory (8:21)
VPN 2 - IKE Phase 1 in Action (6:58)
VPN 3 - Configuring IP Sec SAs (4:27)
VPN 4 - Lab Conculsion (13:24)
VPN 5 - A Dash of DMVPN (8:27)
VPN 6 -- VRF Lab, Part 1 (9:06)
VPN 7: VRF Lab, Part 2 (4:21)
VPN 8: VRF Lab, Part 3 (7:29)
VPN 9: VRF Lab, Part 4 (0:47)
Securing Our Network
1 - Standard and Extended ACLs (10:25)
2 - Any Host and Dollar Signs (5:32)
3 - Extended ACL Lab (6:30)
4 - Named ACL Lab (4:00)
5 - Time Based ACL Lab (9:36)
6 - Passwords Review and Telnet Labs (8:46)
7 - Username Password Database Telnet Lab (6:33)
8 - Secure Shell and SNMP (14:00)
9 - The Network Time Protocol (11:35)
10 - NTP Server / Client Lab (10:15)
10A - NTP Broadcast Lab (7:22)
11 - Unicast RPF (10:51)
12 - The IP Helper Address (5:37)
13 - Using And Filtering "Debug IP Packet" (12:35)
14 - Spotting (Possible) Memory Issues (4:26)
15 - Core Dumps (3:08)
BGP
1 - Intro Remarks (6:18)
2 - External BGP Peerings (11:39)
3 - Internal Peerings and Loopback Interfaces (8:16)
4 - External Peerings and Loopback Interfaces (6:33)
5 - Using The "Network" Command (11:03)
6 - The Origin and Next-Hop Attributes (10:07)
7 - The BGP Best Path Selection (7:56)
8 - Next-Hop Addresses (6:50)
9 - The Next-Hop Address Rule (3:32)
10 - The Multi-Exit Discriminator (MED) (11:33)
11 -- Local Preference: All... Or Nothing At All
12 -- Local Preference: Changing One But Not All
13 -- The Weight Attribute
14 -- More Weight Work!
15 -- Route Summarization
16 -- Synch Rules And BGP Full Meshes (8:48)
17 -- Route Reflectors: Why And How
18 -- Prefix Lists: The Beginning (11:11)
19 -- Prefix Lists Continue
20 -- A Few Final BGP Tips (8:20)
NAT And PAT
NAT 1: Static NAT (10:06)
NAT 2: Dynamic NAT (10:25)
NAT 3: Port Address Translation (6:37)
Your Free CCNA Security Course Starts Here!
Intro 1: Citizen CIA (9:09)
Intro 2: Introduction To SIEM (7:55)
Intro 3: SIEM Continues (5:58)
Intro 4: Recon Attacks and Phishing (10:10)
Intro 5: Social Engineering and Spear Phishing (10:31)
Intro 6: Privilege Escalation (8:24)
Intro 7: More Escalation! (5:56)
Intro 8: DoS and DDoS Attacks (12:43)
Intro 9: Advanced Persistent Threats (5:41)
CCNA Security 210-260, Section 2
Attack 1: Man-In-The-Middle Attacks (8:11)
Attack 2: ARP Poisoning and Dynamic ARP Inspection (11:27)
Attack 3: DAI Commands (7:10)
Attack 4: MAC Spoofing and CAM Table Overflows (10:42)
Attack 5: Port Security Fundamentals (10:47)
Attack 6: Port Security Dynamic Address Learning (5:56)
Attack 7: Port Security Shutdown and Recovery (7:37)
Attack 8: Port Security and Automatic Port Re-Enabling (10:16)
Attack 9: Port Security Static Address Aging (7:26)
Attack 10: Port Security Dynamic Address Aging (5:12)
Attack 11: Refresh Your VLAN Knowledge Here! (11:23)
Attack 12: Private VLAN Theory (6:31)
Attack 13: Private VLAN Labs (11:53)
Attack 14: OSPF Authentication Fundamentals (10:12)
Attack 15: OSPF Clear-Text Authentication (8:50)
Attack 16: OSPF MD5 Authentication (8:36)
Attack 17: Root Guard (10:00)
Attack 18: BPDU Guard and Loop Guard (10:07)
Attack 19: VLAN ACLs, Part 1 (8:51)
Attack 20: VLAN ACLs, Part 2 (7:39)
Attack 21: Stoppin' VLAN Hoppin' (9:44)
Attack 22: DHCP Snooping Fundamentals (6:36)
Attack 23: DHCP Snooping Address Renewal Lab (10:28)
Attack 24: DHCP Snooping First-Time Address Acquisition (6:23)
Attack 25: IPSG Theory and Lab 1 Begins (9:20)
Attack 26: IPSG Lab Continues (6:31)
Attack 27: IPSG Lab (Static Mappings, No DHCP) (7:43)
Attack 28: Segue To The Next Section (0:55)
CCNA Security 210-260: Privilege Levels
Levels 1: The First Default (10:51)
Levels 2: The Other Defaults (9:14)
Levels 3: Intro To Custom Levels (10:05)
Levels 4: Adding Interfaces and Commands To Custom Views (8:06)
Levels 5: The Autocommand and One-Time Passwords (9:56)
Levels 6: Privilege Levels and "Show Run" (7:52)
Levels 7: The Role-Based CLI (10:53)
Levels 8: More Role-Based CLI (6:10)
Levels 9: Superviews! (10:31)
Levels 10: Applying The Views, Part 1 (11:37)
Levels 11: Applying The Views, Part 2 (4:21)
Levels 12: Intro To Lawful Intercept (9:21)
Levels 13: Resilient Config Labs Begin (9:58)
Levels 14: More Resilient Config Labs! (4:23)
Levels 15: Resilient Config Test (10:52)
Levels 16: Resilient Image Test (5:54)
CCNA Security 210-260: VPNs
VPN 1: Site-to-Site VPN Intro (8:13)
VPN 2: The Two Phases Of ISAKMP (7:04)
VPN 3: Writing The ISAKMP Policy, Part 1 (10:06)
VPN 4: Writing The ISAKMP Policy, Part 2 (6:42)
VPN 5; Finishing The ISAKMP Policy, Adding The Keys (4:12)
VPN 6: Writing The Transform Sets (9:50)
VPN 6A: Defining Interesting Traffic (9:15)
VPN 7: Writing The Crypto Map (8:39)
VPN 8: Testing and Troubleshooting (9:08)
VPN 9: Crypto Map This n' That (7:23)
VPN 10: Debugging a Tunnel Build (5:10)
VPN 11: Diffie-Hellman Details (5:30)
VPN 12: ASDM and VPNs, Part 1 (8:25)
VPN 13: ASDM and VPNs, Part 2 (7:34)
VPN 14: ASDM and VPNs, Part 3 (2:57)
CCNA Security 210-260: Firewalls
Firewall 1: So What's A Firewall, Anyway? (9:38)
Firewall 2: Stateless and Stateful Filtering (7:58)
Firewall 3: Proxy Firewalls (8:11)
Firewall 4: Personal Firewalls (6:48)
Firewall 5: Zone Pairs (9:42)
Firewall 6: DMZ Intro (5:16)
Firewall 7: Firewall Lab IP Addresses (1:05)
Firewall 8: CCP Basic Firewall Wizard Lab (15:10)
Attack 25: IPSG Theory and Lab 1 Begins
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock