Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Cisco CCNA 200-301 Complete Course
CCNA CCNP CCIE – Learning Roadmap
Cracking the Code Interview Insights and Exam Preparation for Cisco Certifications (12:58)
Mastering Networking A Comprehensive CCNA, CCNP, CCIE Learning Roadmap (14:45)
Hands-On LearningL The Crucial Role of Virtual Labs in CCNP and CCIE Studies (16:08)
CCIE Aspirations A Step-by-Step Guide to CCIE Preparation and Success (13:44)
Cisco Certifications
004 SOHO-Wide Networks (4:57)
001 What is Network (1:55)
Workbooks - Images Download Links
Network Devices
Network Switch (2:09)
Wireless Access Point (1:17)
Routers (2:12)
Firewall (6:39)
VOIP Devices (4:19)
Broadband Wirleess Routers (6:35)
Cisco Certifications
About Cisco (1:29)
Cisco Certification Tracks (12:37)
Cisco Certification Updates (11:15)
CCNP Certifications (0:54)
CCIE Certifications (1:55)
Cisco Certification Migration Options (5:55)
Certification Programs - CCT-CCNA (6:10)
CCNA200-301 Contents (1:46)
TCP-IP Addressing
What is TCP-IP ? (5:38)
TCP-IP Addressing (4:23)
IPV4 address (4:15)
Assigning IPv4 address to a Windows 10 Host (2:23)
Range Of IPv4 Address (1:55)
IPv4 Address - Classification (6:20)
Unicast-Multicast-Broadcast (4:44)
Network -Host portions (9:53)
RUles to Assign IP Ranges - CLass ABC (11:23)
Number of Host Addresses – Class A,B,C (3:12)
Netwrork Address (7:39)
Broadcast Address (3:44)
Subnet Mask (5:51)
IP Addressing - Advance
Verify IP address (2:58)
Ping Command (9:43)
Ping Messages (11:03)
Reserved Addresses - Loopback (5:16)
PRivate - Public IP (14:29)
Private-Public IP Range (5:51)
IANA- IP address Space (8:53)
Subnetting
Subnetting (7:13)
FLSM - VLSM (4:25)
What we do in Subnetting (4:47)
FLSM - Examples
FLSM - C Class - REQ-40 Hosts (13:05)
FLSM- C class- REQ - 30 Hosts (5:23)
FLSM- C class- REQ - 100 Hosts (3:57)
Understanding Subnets (14:05)
B Clsss - REQ- 1000 Hosts (11:38)
B Clsss - REQ- 4000 Hosts (4:37)
A Clsss - REQ- 32000 Hosts (11:37)
FLSM more Examples (0:35)
Slash Notation - Value (9:30)
VLSM Examples
VLSM - Overview (5:45)
VLSM- C class (12:46)
VLSM- -Class - Shortcut (7:56)
VLSM- B -class (11:17)
VLSM - A - CLass (9:56)
VLSM more Examples (0:30)
VLSM Design Scenarios
VLSM Design Example-1 (12:12)
VLSM Design Example 2 (2:48)
VLSM- FLSM Design Example (8:46)
Subnetting Quetions
Subnetting Quetions - 1 (9:38)
Subnetting Quetions - 2 (4:34)
Subnetting Quetions - 3 (3:51)
Subnetting Quetions - 4 (4:24)
Practice Quetions (0:39)
Sample Subnetting Exam Quetions (9:33)
Basic Switching
001 Local Area Network (3:09)
002Ethernet (6:51)
003 SOHO LANs (8:01)
004 Enterprise LAN (5:10)
005 Transmission Media - UTP cables (13:31)
006 Fiber Cables - Wireless (2:22)
007 Basic LAN Setup (9:36)
008 Address Resolution Protocol - ARP (6:30)
Cisco Packet Traer Software (13:20)
Cisco Switches - Basic Configuration
Console Connection (7:51)
User Mode - Privilege Mode (15:15)
Global Config Mode (7:17)
Console Passwords (6:47)
Telnet Access (15:48)
Enable Password - saving configurations (9:14)
Virtual LAN (VLAN)
What is Broadcast Domain (7:43)
What is VLAN (13:50)
VLAN Types (13:25)
VLAN Ranges (2:33)
Creating VLANs (5:22)
VLANs- Assigning Ports (12:04)
VLAN-Design (6:59)
Voice VLAN (9:27)
Management VLAN (8:47)
New Lecture
VLAN Trunking
VLANs- Multiple Switches (6:43)
Trunk Links (4:06)
Access- Trunk LInks (5:24)
802.3 Ethernet Frame Format (10:08)
Frame Tragging - on Trunk Links (12:09)
Trunking Protocols - ISL-DOT1Q (4:33)
Trunk Link - Configuration (10:24)
Inter-VLAN Routing
Forward Packets between VLANs (3:49)
VLAN Routing - Methods (1:35)
VLAN Routing- Physical Gateways (5:57)
VLAN Routing -Physical Gateway - Configuration (12:12)
VLAN Routing Physical Gateway- Limitations (1:45)
VLAN Routing - Sub-interfaces (4:08)
VLAN Routing - Subinterfaces - Configuration - PART 1 (10:00)
VLANRouting- Subinterfaces -PART 2 (15:59)
- VLAN Routing SubInterfaces - Advantages - Disadvantages (4:36)
VLAN Routing – SVI – L3 Switch (7:53)
SVI- Configurations (10:20)
SVI - Multiple Switches (14:52)
L3 Routed Ports (7:25)
Spanning Tree Protocol (STP)
Bridging loops with Redundant links (10:33)
Bridging Loops - STP (5:52)
How STP Works (2:49)
Selecting Root Bridge (9:55)
Root Bridge - Verification (4:19)
Root Port Selection- PART 1 (11:45)
Root Port Selection- PART 2 (11:19)
008 Selecting Designated Ports (16:46)
STP Till now - Review (7:11)
STP Terminology
Root Port -VS- Designated Ports (4:41)
STP – Hello BPDUs (2:41)
STP Convergence (13:08)
STP Timers (3:08)
STP Interfaces States (5:09)
STP Optimization
Etherchannel - Port Channel (16:24)
Spanning Tree PortFast (7:10)
Rapid Spanning Tree Protocol - RSTP
Default STP Convergence (13:08)
Rapid Spanning Tree Protocol - RSTP (9:54)
RSTP Port Roles (17:57)
RSTP BPDUs (2:26)
WAN Connectivity
WAN Connectivity (12:49)
Rules to Assign IP address (7:55)
IP Addresss Configuration (24:35)
Troubleshooting Connectivity (10:43)
WAN protocols HDLC PPP (8:27)
PPP Authentication (15:39)
Static -Default Routing
Routing- Introduction (6:31)
Static Routing (5:58)
Static Routing Lab (14:28)
Static Routing- 3 Routers (16:06)
Default Routing (13:52)
Verify Default Routing (11:08)
Building Routing table (6:39)
Routing Table Lookup (9:16)
Whst is Default Routing (18:40)
Default Routing - Configuration Example (13:11)
Floating Default Routing (11:26)
Open Shortest Path First - OSPF
Knowledge - Prerequisite (2:01)
OSPF - Overview (6:12)
OSPF - How it Works (3:28)
OSPF – Becoming Neighbors (11:04)
Router-ID (12:40)
OSPF - LSDB- Database (5:18)
Exchanging the LSDB (6:26)
Synchornize LSDB- Best Route (4:57)
Maintaining Neighbors - LSDB (7:35)
OSPF -Tables (2:31)
OSPF Configuration - Single Area
OSPF Configuration Syntax (8:15)
OSPF - Wild Card Mask (9:14)
OSPF Single Area - Pre-Requiste (2:30)
OSPF Single Area-Configuration (6:59)
OSPF - Advertisement Example (4:07)
OSPF - Single Area- Verification (8:52)
OSPF Metric - COST
Calculate Best Routes - OSPF (5:48)
OSPF Metric Cost (5:59)
Changing Interface Bandwidth (5:49)
Default Reference BW- LImitiations (1:25)
Manual Cost (3:49)
Auto-Cost Reference BW (6:04)
OSPF Multiple Areas
OSPF Single Area - Limitations (7:13)
MUltiple Areas (7:05)
OSPF Multi-Ares -Design Rules (14:31)
Multi-Area - Configurations (5:05)
LAB - Mutl-Area- Configuration (11:51)
OSPFv2 Interface SubCommands (9:33)
OSPF Network Types
OSPF Network Types (7:29)
OSPF Broadcast Networks- DR-BDR (9:40)
DR-BDR - ELections (9:12)
OSPF DR-BDR - Lab (12:48)
OSPF Point to Point LInks (8:52)
IPv6
IPV6- Introduction (8:46)
IPv6 Addressing (6:35)
IPV6 Address types (17:09)
IPV6 Static Addressing (10:43)
IPv6 Static-Default Routing (13:21)
OSPFv3 (13:43)
First Hop Redundancy Protocols (FHRP)
First Hop Redundancy - FHRP Overview (16:22)
FHRP Protocols - HSRP - VRRP -GLBP (10:09)
Access Control Lists- ACL
Access Control Lists (12:02)
ACL Types (2:38)
Standard - Extended ACL (9:34)
ACL Logic- How Match Rules (8:38)
Standard ACL
Standard ACL lab - PreRequisite (6:03)
Standard ACL Lab (4:42)
ACL - Wild Card Mask (11:21)
ACL Statements- Things to Know (8:45)
STandard ACL - Configuration (10:54)
Apply ACL - Select Right Interface (10:17)
Standard ACL- IN- OUT (10:45)
Standard ACL - Verification (6:22)
Standard ACL- Wrong Direction (5:32)
Standard ACL - Practice Examples (8:03)
STandard ACL- Find IP-Ranges (10:32)
Extended ACL
017 Extended ACL- Lab Pre-REquisite (8:23)
024 Extended ACl - Examples (13:23)
020 Extended ACL- Things to Know (8:31)
022 Extended ACL-Apply - Verify (13:13)
018 Extended ACL - Config Example (1:49)
021 Extended ACL- Syntax (11:00)
022 Extended ACL- Configuration (10:30)
016 Extended ACL (3:59)
019 Similarities- Extended - Standard ACL (3:27)
Named ACL
Named ACLs (10:42)
Named ACL- Syntax (5:35)
Named Standard ACL - Configuration (2:04)
Editing Named ACLs (8:55)
Named Extended ACL - Configuration (1:24)
Network Address Translation -NAT
NAT- What we Cover (0:51)
Why do we need NAT (6:33)
What is NAT (7:55)
NAT Types (11:39)
NAT - Lab Setup (15:19)
Static NAT - LAB (11:48)
Dynamic NAT- LAB (10:11)
PAT- LAB (11:01)
PAT with Exit Interface (7:42)
Network Security Concepts
Network Security Terminology (6:07)
Goals of Network Security (9:30)
Understanding Threat Types -Mitigation (8:55)
Assets - Classification of Assets (6:15)
Classify CounterMeasures (3:56)
Classify Vulnerabilities (2:27)
Network Security - Design Principles (10:24)
Threat Defense Technologies
What is Firewall (7:42)
Next Generation Firewalls (5:30)
AAA- Network Security (10:37)
Virtual Private Networks (4:12)
Intrusion Prention System - IPS (4:22)
Cisco Traffic Telemetry methods (3:38)
AAA - Authentication-Authorization-Accounting
AAA- Network Security (10:37)
AAA - Components (3:50)
AAA - External Servers (3:19)
AAA - Protocols -TACACS- RADIUS (7:35)
AAA - Cisco Authentication Servers (3:51)
AAA Authentication - Device Access (2:54)
Authentication - Local Database (9:54)
LAB- Authentication - TACACS (11:34)
Layer 2 Security
Switch Security - Overview (2:09)
Disable Unused Ports (1:27)
MAC Flooding Attack - Port Security (11:57)
MAC Spoofing Attack - Port Security (7:26)
Port Security - Configuration (11:03)
What is Native VLAN (8:10)
CDP Overview (17:42)
LLDP Overview (2:34)
CDP-LLDP- Vulnerabilities - Mitigation (2:12)
DHCP Spoofing Attack- DHCP Snooping (8:13)
DHCP Snooping - Configuration (16:06)
DHCP Starvation Attack - Mitigation (1:50)
ARP Spoofing Attack - DAI (12:18)
Dynamic ARP Inspection - Configuration (11:35)
Cisco Telemetry Services
Cisco Traffic Telemetry methods (3:38)
Inband vs OutBand (7:02)
Remote Access - Telnet (5:55)
Remote Access - SSH (9:18)
DHCP-Overview (7:05)
Router as DHCP server (10:59)
Device-Network Events Logging (9:39)
Syslog - Terminal Logging (6:48)
Network Time Protocol (7:01)
NTP -Stratum Value (3:40)
LAB - NTP - Configuration (8:45)
Quality of Service (QoS)
Quality of Service (QoS) - Overview (10:39)
Quality of Service (QoS) - Mechanisms (6:47)
What is Network Mangement
What is Network Management (8:04)
Past-Present Methods of Network Management - PART 1 (13:54)
Past-Present Methods of Network Management - PART 2 (7:08)
SNMP - SImple Network Management Protocol (18:05)
What is Network Automation ?
Challenges - Traditional Management (11:12)
Network Automation- Goals (15:39)
Types of Network Automation (6:19)
What can be Automated- PART 1 (11:59)
What can be Automated - PART 2 (8:33)
Impact of Network Automation (8:19)
SDN- Software Defined Networking - SDN Controllers
Automation Origination Points (8:20)
SDN- Software Defined Networking (14:30)
SDN Controllers (8:43)
Networks Managed by SDN Controllers (12:56)
SDN-Control - Mangement - Data Planes
Identify Network Device Planes (2:44)
Identify Network Device Planes (1:40)
Data Plane (6:09)
Control Plane (3:27)
Management Plane (2:31)
SDN- mangement Plane (7:07)
SDN - Control Plane- Data Plane (5:58)
SDN Models - Architecture
SDN - Imperative Model (4:50)
SDN - Declarative Model (7:25)
SDN-Network Design Requirements (8:40)
Underlay Networks (7:18)
Overlay Networks (6:40)
SDN Fabric (6:05)
Application Programming Interface - API
API - Application Programming Interface (11:17)
API - Types (4:05)
API - with SDN Networks (8:43)
NorthBound API (8:49)
SounthBOund API (7:56)
Cisco Devnet - SandBox
Cisco DEVNET (4:39)
DevNET Certifications (4:40)
DevNET SandBox (6:13)
Sandbox LABS (8:03)
Sandabox Lab Access-Reservations (3:19)
Cisco DNA Center
DNA Center Appliance (4:06)
Cisco DNA Center (15:57)
DNA Center- What can do - PART 1 (11:28)
DNA Center- What can do - PART 2 (13:05)
Web Service API - REST API
Web Service API (7:52)
Web Service API - Commonly Used (7:43)
REST API (8:14)
Network Automation Tools
Config MGMT Tools (6:24)
Config MGMT Tools - Capabilities (8:53)
Config-MGMT tools - Similarities (5:53)
Master - Agent (5:30)
Agent based- Agent less (6:57)
Push-Pull Model (10:19)
Configuration Files (5:29)
PUPPET Config Management Tool
PUPPET-Tool (2:51)
Puppet Master-Agent-Database (3:28)
Puppet-Manifest (4:51)
Puppet-Module-Forge (5:57)
Puppet Agent-Agrentless (3:07)
Puppet- PULL Model Steps (4:06)
CHEF Config Management Tool
CHEF- Config MGMT Tool (6:10)
CHEF-Terminology (7:29)
ANSIBLE Config MGMT Tool
ANSIBLE-Tool (7:38)
ANSIBLE-Control Station (3:10)
029 ANSIBLE -PLayBook-Inventory (5:09)
030 ANISBLE - Templates-Variables (6:31)
JSON DATA Encoding
API Data Formats (7:43)
JSON Overview (7:33)
JSON Data Types (6:40)
JSON Syntax Rules (2:48)
JSON Data Interpretation (6:52)
Wireless- WLAN Foundations
Wired vs Wireless NetworksW (13:26)
Types of Wireless Networks (8:32)
WLAN Devices - AP-WLC (6:18)
Ad-HOC vs Infrastructure Mode (6:11)
Service Sets - SSID-BSS-ESS
SSID-Service Set Identifier (3:06)
Service Sets - Types (4:11)
Independent Basic Service Set - IBSS (1:47)
Basic Service Set -BSS (4:01)
Extended Service Set- ESS (4:27)
Distribution System (5:28)
Radio Freqeuncy-WLAN Standards
Wireless Signal Basics (8:43)
Frequency - Ranges (5:30)
IEEE- 802 Standards (4:02)
802.11 - Wireless LAN Standards (4:29)
802.11 - a - b - g (5:36)
802.11 n (3:07)
802.11 ac (5:30)
802.11 ax (2:53)
Wireless Architecture - WLC Deployments
Wireless Architectures (4:51)
Autonomous AP - Architecture (10:10)
Autonomous AP - Challenges (9:31)
Split-MAC Architecture- Lightweight AP (13:16)
LAP-WLC Binding (4:50)
CAPWAP Tunnels (6:41)
CAPWAP Messages (3:13)
WLC Deployments Methods (12:31)
WAN Technologies
Leased Lines (11:55)
Metro-Ethernet- WAN (7:32)
VPN-Introduction (5:09)
Virtual Private Network (8:12)
VPN Types (3:49)
VPN over Internet (4:37)
Generic Routing Encapsulation (7:33)
Default Lab setup (6:34)
LAB- GRE point to point Configuration (7:11)
Drawbacks of GRE (4:38)
DMVPN - Introduction (7:15)
Dynamic Multipoint VPN (14:36)
DMVPN-Protocols (4:07)
Multi Protocol label Switching (10:39)
IPsec VPN Introduction (9:17)
CCNA - 200-301 - Exam Information
CCNA 200-301 Exam Content (1:01)
CCNA Exam (6:00)
Cisco Certification Status (2:42)
Exam Prepare PLAN (8:30)
Exam Questions Types (7:43)
TCP-IP Addressing - Subnetting Questions
IP addressing Question 1 (1:43)
IP addressing Question 2 (0:53)
IPv6 addressing Question 1 (2:57)
IPv6 addressing Question 2 (6:17)
IPv6 addressing Question 3 (2:29)
IPv6 addressing Question 4 (2:24)
Subnetting Question 1 (4:23)
Subnetting Question 2 (4:31)
Subnetting Question 3 (2:50)
Subnetting Question 4 (1:58)
Subnetting Question 5 (2:27)
Subnetting Question 6 (2:08)
Switching Practice Questions
Subnetting Question 1 (3:26)
Switching Question 1 (2:11)
Ethernet Question (1:13)
Subnetting VLANs Quetion (6:31)
Collision and broadcast domain - Question (1:20)
018 Basic Switching Question (1:47)
STP Question 1 (0:49)
Inter VLAN Routing Question (1:23)
STP Question 2 (5:46)
Routing Questions
Routing Question 4 (1:57)
Routing Question 2 (4:40)
Routing Question 3 (2:13)
Routing Question 1 (2:12)
Routing Question 6 (2:23)
Routing Question 5 (1:35)
Routing Question 7 (12:54)
Routing Question 8 (0:57)
Routing Question 9 (1:50)
ACL - NAT _IP SERVICES - Sample Questions
Wireless Question (2:39)
QoS Question (3:10)
Basic Commands Question (1:22)
Logging Question (2:15)
Security - Question (1:40)
ACL - Question (0:58)
ACL Question 2 (4:32)
GRE - Question (3:50)
TCP - UDP Question (3:29)
PPP - Question (2:59)
Exam Simulation Scenarios
NAT Simulation Lab (9:48)
SWITCHING Simulation Lab (10:36)
EIGRP Simulation Lab (16:21)
Basic IP Configuration - Simulation Lab (9:10)
50 IPv6 OSPF Simulation Lab (7:52)
51 ACL Simulation Lab (10:06)
Understanding Threat Types -Mitigation
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock