Course Overview A survey in the Uk shows that the total number of skills required for a single job has increased by 10% year-over-year since 2017. Furthermore, one in three skills in an average 2017 job posting are already obsolete. Due to ongoing business disruption and rapidly evolving needs, emerging skills gaps have accelerated due to the COVID-19 pandemic. And to help you bridge that gap, Course Cloud has prepared this comprehensive Cisco BGP Training online course. Cisco BGP Training covers a collection of necessary skills required to help you achieve your goals. In addition, our industry professionals will guide you through the process of establishing a solid foundation in Cisco BGP Training. The Cisco BGP Training course is broken down into manageable sections, each of which will provide you with a new level of expertise. Our exclusive training in Cisco BGP Training will equip you with the skills required to set yourself up for career success. The Cisco BGP Training provides internationally accepted certification upon successful completion. This certificate will add value to your resume and let you stand out among your peers. So enrol now and work your way towards becoming a highly sought-after professional at Cisco BGP Training.
Course Overview The comprehensive Fundamentals of Aftermarket Technologies has been designed by industry experts to provide learners with everything they need to enhance their skills and knowledge in their chosen area of study. Enrol on the Fundamentals of Aftermarket Technologies today, and learn from the very best the industry has to offer! This best selling Fundamentals of Aftermarket Technologies has been developed by industry professionals and has already been completed by hundreds of satisfied students. This in-depth Fundamentals of Aftermarket Technologies is suitable for anyone who wants to build their professional skill set and improve their expert knowledge. The Fundamentals of Aftermarket Technologies is CPD-accredited, so you can be confident you're completing a quality training course will boost your CV and enhance your career potential. The Fundamentals of Aftermarket Technologies is made up of several information-packed modules which break down each topic into bite-sized chunks to ensure you understand and retain everything you learn. After successfully completing the Fundamentals of Aftermarket Technologies, you will be awarded a certificate of completion as proof of your new skills. If you are looking to pursue a new career and want to build your professional skills to excel in your chosen field, the certificate of completion from the Fundamentals of Aftermarket Technologies will help you stand out from the crowd. You can also validate your certification on our website. We know that you are busy and that time is precious, so we have designed the Fundamentals of Aftermarket Technologies to be completed at your own pace, whether that's part-time or full-time. Get full course access upon registration and access the course materials from anywhere in the world, at any time, from any internet-enabled device. Our experienced tutors are here to support you through the entire learning process and answer any queries you may have via email.
Overview With the ever-increasing demand for Computer Maintenance in personal & professional settings, this online training aims at educating, nurturing, and upskilling individuals to stay ahead of the curve - whatever their level of expertise in Computer Maintenance may be. Learning about Computer Maintenance or keeping up to date on it can be confusing at times, and maybe even daunting! But that's not the case with this course from Compete High. We understand the different requirements coming with a wide variety of demographics looking to get skilled in Computer Maintenance . That's why we've developed this online training in a way that caters to learners with different goals in mind. The course materials are prepared with consultation from the experts of this field and all the information on Computer Maintenance is kept up to date on a regular basis so that learners don't get left behind on the current trends/updates. The self-paced online learning methodology by compete high in this Computer Maintenance course helps you learn whenever or however you wish, keeping in mind the busy schedule or possible inconveniences that come with physical classes. The easy-to-grasp, bite-sized lessons are proven to be most effective in memorising and learning the lessons by heart. On top of that, you have the opportunity to receive a certificate after successfully completing the course! Instead of searching for hours, enrol right away on this Computer Maintenance course from Compete High and accelerate your career in the right path with expert-outlined lessons and a guarantee of success in the long run. Who is this course for? While we refrain from discouraging anyone wanting to do this Computer Maintenance course or impose any sort of restrictions on doing this online training, people meeting any of the following criteria will benefit the most from it: Anyone looking for the basics of Computer Maintenance , Jobseekers in the relevant domains, Anyone with a ground knowledge/intermediate expertise in Computer Maintenance , Anyone looking for a certificate of completion on doing an online training on this topic, Students of Computer Maintenance , or anyone with an academic knowledge gap to bridge, Anyone with a general interest/curiosity Career Path This Computer Maintenance course smoothens the way up your career ladder with all the relevant information, skills, and online certificate of achievements. After successfully completing the course, you can expect to move one significant step closer to achieving your professional goals - whether it's securing that job you desire, getting the promotion you deserve, or setting up that business of your dreams. Course Curriculum Computer Maintenance Module 01 - Introduction to Computers Module 01 - Introduction to Computers 00:00 Computer Maintenance Module 02 - Structure of Computers Module 02 - Structure of Computers 00:00 Computer Maintenance Module 03 - Hardware Module 03 - Hardware 00:00 Computer Maintenance Module 04 - Software and Interface Module 04 - Software and Interface 00:00 Computer Maintenance Module 05 - Viruses and Computer Maintenance Module 05 - Viruses and Computer Maintenance 00:00 Computer Maintenance Module 06 - Internet and IT Module 06 - Internet and IT 00:00 Computer Maintenance Module 07 - Cyber Security Module 07 - Cyber Security 00:00
Want to know the secrets to network hacking? Do you dream of becoming the ultimate script kiddie? If you want to become an ethical hacker, this advanced computer hacking course will teach you how to break into computer systems and networks to gain access to Wi-Fi passwords and much more. This network hacking course will train you how to identify and exploit weaknesses in computer systems and networks, helping you to outsmart computer security and gain unauthorized access to a computer's system. You'll learn essential password cracking techniques and how to create Trojan horse viruses and other malicious codes. You'll also familiarise with hacking operating systems and different types of attacks. Additionally, you'll be trained on how to run attacks on HTTPS websites and write your own Python scripts to implement custom MITM attacks. This advanced network hacking course is ideal for students who are already familiar with the basics of network hacking. Topics include captive portals, WEP cracking, WPA/WPA2 cracking, evil twin attacks and post-connection attacks, What you'll learn Learn how to write custom scripts to gather important hacking information Discover the secrets of how to unlock WPS on routers, even if they're locked Understand how wireless phishing works and how to create fake captive portals Uncover the names of hidden networks and discover how to connect to them Learn how to replace downloaded files from a network with trojans Discover how to create trojans and combine any file in any format with an evil file Familiarise with common types of cybersecurity attacks and hacking techniques Understand how to exploit the WPS feature and hack Wi-Fi passwords Requirements Computer with a minimum of 4GB ram/memory Operating System: Windows / OS X / Linux Finished the networks section of my general ethical hacking course OR Finished my network hacking course. For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course). Who this course is for: People who want to take their network hacking skills to the next level. People who want to have a better understanding of the subject and enhance their skills. People who want to be able to run attacks manually & write their own MITM scripts. Introduction Teaser - Hacking a Windows 10 Computer & Accessing Their Webcam FREE 00:07:00 Course Overview FREE 00:05:00 Back To Basics/Pre-Connection Attacks Pre-connection Attacks Overview 00:02:00 Spoofing Mac Address Manually 00:03:00 Targeting 5 GHz Networks 00:07:00 Deauthenticating a Client From Protected WiFi Networks 00:07:00 Deauthenticating Multiple Clients From Protected WiFi Networks 00:08:00 Deauthenticating All Clients From Protected WiFi Network 00:06:00 Gaining Access Gaining Access Overview 00:02:00 Discovering Names of Hidden Networks 00:08:00 Connecting To Hidden Networks 00:05:00 Bypassing Mac Filtering (Blacklists & Whitelists) 00:09:00 Cracking SKA WEP Network 00:09:00 Securing Systems From The Above Attacks 00:03:00 Gaining Access - Captive Portals Sniffing Captive Portal Login Information In Monitor Mode 00:10:00 Sniffing Captive Portal Login Information Using ARP Spoofing 00:09:00 Creating a Fake Captive Portal - Introduction 00:04:00 Creating Login Page - Cloning a Login Page 00:07:00 Creating Login Page - Fixing Relative Links 00:07:00 Creating Login Page - Adding Form Tag 00:08:00 Creating Login Page - Adding Submit Button 00:07:00 Preparing Computer To Run Fake Captive Portal 00:08:00 Starting The Fake Captive Portal 00:12:00 Redirecting Requests To Captive Portal Login Page 00:12:00 Generating Fake SSL Certificate 00:06:00 Enabling SSL/HTTPS On Webserver 00:08:00 Sniffing & Analysing Login Credentials 00:06:00 Gaining Access - WPA/WPA2 Cracking - Exploiting WPS Exploiting WPS - Introduction 00:02:00 Bypassing 'Failed to associate' Issue 00:08:00 Bypassing 0x3 and 0x4 Errors 00:08:00 WPS Lock - What Is It & How To Bypass It 00:07:00 Unlocking WPS 00:09:00 Gaining Access - WPA/WPA2 Cracking - Advanced Wordlist Attack Advanced Wordlist Attacks - Introduction 00:02:00 Saving Aircrack-ng Cracking Progress 00:10:00 Using Huge Wordlists With Aircrack-ng Without Wasting Storage 00:08:00 Saving Cracking Progress When Using Huge Wordlists Without Wasting Storage 00:10:00 Cracking WPA/WPA2 Much Faster Using GPU - Part 1 00:07:00 Cracking WPA/WPA2 Much Faster Using GPU - Part 2 00:11:00 Gaining Access - WPA/WPA Cracking - Evil Twin Attack What is It & How it Works 00:07:00 Installing Needed Software 00:08:00 Stealing WPA/WPA2 Key Using Evil Twin Attack Without Guessing 00:10:00 Debugging & Fixing Login Interface 00:12:00 Gaining Access - WPA/WPA2 Cracking - WPA/WPA2 Enterprise What is WPA/WPA2 Enterprise & How it Works 00:05:00 How To Hack WPA/WPA2 Enterprise 00:07:00 Stealing Login Credentials 00:08:00 Cracking Login Credentials 00:07:00 Securing Systems From The Above Gaining Access Attacks 00:05:00 Post Connection Attacks Post Connection Attacks Overview 00:04:00 Ettercap - Basic Overview 00:07:00 Ettercap - ARP Spoofing & Sniffing Sensitive Data Such As Usernames & Passwords 00:10:00 Setting Up SSLstrip Manually To Bypass HTTPS & Sniff Data From HTTPS Websites 00:13:00 Automatically ARP Poisoning New Clients 00:07:00 DNS Spoofing Using Ettercap 00:06:00 Bypassing Router-Side Security & Poisoning Target Without Triggering Alarms 00:09:00 Post Connection Attacks - Analysing Data Flows & Running Custom Attacks MITMproxy - What is It & How To Install It 00:04:00 Using MITMproxy In Explicit Mode 00:07:00 Analysing (Filtering & Highlighting) Flows 00:05:00 Intercepting Network Flows 00:05:00 Modifying Responses & Injecting Javascript Manually 00:09:00 Intercepting & Modifying Responses In Transparent Mode 00:08:00 Editing Responses & Injecting BeEF's Code On The Fly 00:09:00 Editing Responses Automatically Based On Regex 00:09:00 Stealing Login Info Using Fake Login Promo 00:07:00 [Bonus] - Hacking Windows 10 Using A Fake Update 00:05:00 Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks What Do Mean By MITM Scripts? 00:06:00 Capturing & Printing Requests/Responses 00:09:00 Filtering Flows & Extracting Useful Data 00:09:00 Using Conditions To Execute Code On Useful Flows 00:10:00 Generating Custom HTTP Responses 00:09:00 Testing Script Locally 00:09:00 Generating Trojans - Installing The Trojan Factory 00:06:00 Generating Trojans - Converting Any File (eg: mage) To a Trojan 00:10:00 Testing Script On Remote Computer To Replace Downloads With a Generic Trojan 00:07:00 Executing Bash Commands & Calling Trojan Factory From Our Script 00:09:00 Using Variables & More Complex Conditions 00:09:00 Converting Downloads To Trojans On The Fly 00:10:00 Configuring The Trojan Factory's MITMproxy Script 00:08:00 Using The Trojan Factory MITMproxy Script 00:08:00 Post-Connection Attacks - Doing All Of The Above On HTTPS Websites Bypassing HTTPS With MITMproxy 00:06:00 Replacing Downloads From HTTPS 00:05:00 Injecting Data (Javascript, HTML elements ...etc) In HTTPS Websites 00:06:00 Securing Systems From The Above Post Connection Attacks 00:06:00
Register on the Cisco ASA Firewall Training today and build the experience, skills and knowledge you need to enhance your professional development and work towards your dream job. Study this course through online learning and take the first steps towards a long-term career. The course consists of a number of easy to digest, in-depth modules, designed to provide you with a detailed, expert level of knowledge. Learn through a mixture of instructional video lessons and online study materials. Receive online tutor support as you study the course, to ensure you are supported every step of the way. Get an e-certificate as proof of your course completion. The Cisco ASA Firewall Training is incredibly great value and allows you to study at your own pace. Access the course modules from any internet-enabled device, including computers, tablet, and smartphones. The course is designed to increase your employability and equip you with everything you need to be a success. Enrol on the now and start learning instantly! What You Get With The Cisco ASA Firewall Training Receive a e-certificate upon successful completion of the course Get taught by experienced, professional instructors Study at a time and pace that suits your learning style Get instant feedback on assessments 24/7 help and advice via email or live chat Get full tutor support on weekdays (Monday to Friday) Course Design The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of Video lessons Online study materials Certification Upon successful completion of the course, you will be able to obtain your course completion e-certificate free of cost. Print copy by post is also available at an additional cost of £9.99 and PDF Certificate at £4.99. Who Is This Course For: The course is ideal for those who already work in this sector or are an aspiring professional. This course is designed to enhance your expertise and boost your CV. Learn key skills and gain a professional qualification to prove your newly-acquired knowledge. Requirements: The online training is open to all students and has no formal entry requirements. To study the Cisco ASA Firewall Training, all your need is a passion for learning, a good understanding of English, numeracy, and IT skills. You must also be over the age of 16. Course Content Cisco ASA Firewall Training Lecture-1: Common Network Security Terms. 00:17:00 Lecture-2: Confidentiality, Integrity, Availability. 00:26:00 Lecture-3: Security Concepts & Terms. 00:38:00 Lecture-4: Introduction to Firewall Technologies. 00:28:00 Lecture-5: About Cisco ASA Firewall. 00:12:00 Lecture-6: Install Cisco ASAv Firewall in GNS3. 00:13:00 Lecture-6: Install Cisco ASAv Firewall in GNS3. 00:13:00 Lecture-8: Install Cisco ASAv Firewall on EVE-NG. 00:10:00 Lecture-9: Install Cisco ASAv Firewall on VMWare Workstation. 00:06:00 Lecture-10: Cisco ASA Firewall Basic Configuration Commands. 00:50:00 Lecture-11: Device Management Cisco ASA Console. 00:10:00 Lecture-12: Device Management Cisco ASA Telnet. 00:23:00 Lecture-13: Device Management Cisco ASA SSH. 00:21:00 Lecture-14: Device Management Cisco ASA ASDM. 00:32:00 Lecture-15: Device Management Cisco ASA TFTP. 00:21:00 Lecture-16: Device Management Cisco ASA FTP. 00:11:00 Lecture-17: Security Levels and Zoning in Cisco ASA. 00:40:00 Lecture-18: Introduction to Routing & Static Routing. 00:34:00 Lecture-19: Network Route Configuration in Cisco ASA. 00:09:00 Lecture-20: Host Route Configuration in Cisco ASA. 00:10:00 Lecture-21: Default Route Configuration in Cisco ASA. 00:26:00 Lecture-22: Floating Static Route Configuration in ASA. 00:37:00 Lecture-23: IP SLA (Service Level Agreement) in ASA. 00:29:00 Lecture-24: Dynamic Routing Protocol RIP version 2. 00:28:00 Lecture-25: Dynamic Routing Protocol EIGRP Configuration. 00:15:00 Lecture-26: Dynamic Routing Protocol OSPF Configuration. 00:38:00 Lecture-27: Routing Protocols Redistribution. 00:25:00 Lecture-28: Implement Access Control Lists in ASA. 00:36:00 Lecture-29: Configure & Verify Extended ACLs in ASA. 01:23:00 Lecture-30: Configure & Verify Infrastructure ACLs. 00:18:00 Lecture-31: Configure & Verify Time-Based ACLs. 00:22:00 Lecture-32: Configure & Verify Standard ACLs. 00:33:00 Lecture-33: Configure & Verify Object Groups ACLs. 00:42:00 Lecture-34: Configure & Verify DHCP Server in ASA. 00:42:00 Lecture-35: Configure & Verify DHCP Relay in ASA. 00:16:00 Lecture-36: Introduction & Theory of NAT and PAT ASA. 00:23:00 Lecture-37: Creating Lab Topology for NAT & PAT. 00:25:00 Lecture-38: Static NAT in Cisco ASA. 00:35:00 Lecture-39: Static PAT in Cisco ASA. 00:25:00 Lecture-40: Dynamic NAT in Cisco ASA. 00:26:00 Lecture-41: Dynamic PAT in Cisco ASA. 00:16:00 Lecture-42: Identity NAT in Cisco ASA. 00:23:00 Lecture-43: Policy NAT in Cisco ASA. 00:16:00 Lecture-44: Modular Policy Framework (MPF). 01:02:00 Lecture-45: Transparent Firewall. 00:34:00 Lecture-46: ASDM Walk-through. 01:17:00 Lecture-47: Security Contexts (Multi-Contexts). 00:50:00 Lecture-48: Redundancy, HA, Active/Standby Failover. 00:58:00 Lecture-49: Packet Capture in Cisco ASA Firewall. 00:44:00 Lecture-50: Packet Tracer in Cisco ASA Firewall. 00:18:00 Lecture-51: Syslog Logging in Cisco ASA Firewall. 00:45:00 Lecture-52: Introduction and Concept of Cryptography & Terminologies. 00:25:00 Lecture-53: Introduction & Concept of Symmetric & Asymmetric Encryption. 00:05:00 Lecture-54: Introduction and Concept of Cryptography Hash (SHA, MD5). 00:04:00 Lecture-55: Introduction and Concept of Virtual Private Network VPN. 00:46:00 Lecture-56: Introduction and Concept of IPSec Protocols Features. 00:43:00 Lecture-57: Introduction and Concept of Diffie-Hellman (DH). 00:51:00 Lecture-58: Introduction and Concept of SSL/TLS and Handshake. 00:34:00 Lecture-59: Introduction and Concept of IKE, Versions & Modes. 00:21:00 Lecture-60: Internet Key Exchange IKE Phase 1 two Modes Lab. 00:12:00 Lecture-61: Configure and Verify NAT-T (Traversal) on Routers. 00:26:00 Lecture-62: Configure and Verify Client-Based Remote-Access VPN Lab. 00:28:00 Frequently Asked Questions Are there any prerequisites for taking the course? There are no specific prerequisites for this course, nor are there any formal entry requirements. All you need is an internet connection, a good understanding of English and a passion for learning for this course. Can I access the course at any time, or is there a set schedule? You have the flexibility to access the course at any time that suits your schedule. Our courses are self-paced, allowing you to study at your own pace and convenience. How long will I have access to the course? For this course, you will have access to the course materials for 1 year only. This means you can review the content as often as you like within the year, even after you've completed the course. However, if you buy Lifetime Access for the course, you will be able to access the course for a lifetime. Is there a certificate of completion provided after completing the course? Yes, upon successfully completing the course, you will receive a certificate of completion. This certificate can be a valuable addition to your professional portfolio and can be shared on your various social networks. Can I switch courses or get a refund if I'm not satisfied with the course? We want you to have a positive learning experience. If you're not satisfied with the course, you can request a course transfer or refund within 14 days of the initial purchase. How do I track my progress in the course? Our platform provides tracking tools and progress indicators for each course. You can monitor your progress, completed lessons, and assessments through your learner dashboard for the course. What if I have technical issues or difficulties with the course? If you encounter technical issues or content-related difficulties with the course, our support team is available to assist you. You can reach out to them for prompt resolution.
Description Troubleshooting and Maintaining Cisco IP Switched Networks is a qualifying exam for the Cisco Certified Network Professional CCNP, certification. This Cisco CCNP Troubleshoot and Maintain Cisco IP Switched Networks (TSHOOT) v2.0 Training will help you to be certified successfully with all the important knowledge and skills necessary to (1) plan and perform regular maintenance on complex enterprise routed and switched networks and (2) use technology-based practices and a systematic ITIL-compliant approach to perform network troubleshooting. This Cisco CCNP Troubleshoot and Maintain Cisco IP Switched Networks (TSHOOT) v2.0 Training designed for you, if you are a network engineer with at least one year of professional work experience. You will learn to plan and perform regular maintenance on complex enterprise routed and switched networks and use technology-based practices and a systematic ITIL-compliant approach to perform network troubleshooting. At the end of the course, you will get increased skill level and developed as set of best practices based on your own. Assessment & Certification To achieve a formal qualification, you are required to book an official exam separately with the relevant awarding bodies. However, you will be able to order a course completion CPD Certificate by paying an additional fee. Hardcopy Certificate by post - £19 Soft copy PDF via email - £10 Requirements Our Cisco CCNP Troubleshoot and Maintain Cisco IP Switched Networks (TSHOOT) v2.0 Training is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Planning Maintenance for Complex Networks Planning Maintenance for Complex Networks FREE 00:14:00 Network Maintenance Tools, Applications, and Resources 00:32:00 Troubleshooting Processes for Complex Enterprise Networks Troubleshooting Processes for Complex Enterprise Networks 00:09:00 Implementing Troubleshooting Procedures 01:15:00 Using Maintenance and Troubleshooting Tools and Applications Using Maintenance and Troubleshooting Tools and Applications 00:12:00 Collecting Real-time Information Using Cisco IOS debug Commands 00:10:00 Gathering Information with SNMP 00:15:00 Maintaining and Troubleshooting Campus Switched Solutions Maintaining and Troubleshooting Campus Switched Solutions Troubleshooting Tools and Applications 00:12:00 Spanning Tree Failures 00:12:00 Troubleshooting Multi-layer Switches 00:43:00 Maintaining and Troubleshooting Routing Solutions Maintaining and Troubleshooting Routing Solutions 00:25:00 OSPF Review Network Areas and LSAs 00:27:00 OSPF to EIGRP Redistribution Troubleshooting Process 00:32:00 Troubleshooting Addressing Services Troubleshooting Addressing Services 00:24:00 DHCP Overview Client-Server Communication 00:23:00 IPv6 Troubleshooting - show Commands 00:40:00 Troubleshooting Network Performance Issues Troubleshooting Network Performance Issues 00:25:00 AutoQoS Troubleshooting Example 00:24:00 Spanning-Tree Issues 00:44:00 Troubleshooting Converged Networks Troubleshooting Converged Networks 00:16:00 Section 2 Overview 00:16:00 Section 3 Overview 00:26:00 Maintaining and Troubleshooting Network Security Implementations Maintaining and Troubleshooting Network Security Implementations 00:13:00 IOS SPI Example 00:14:00 BORW TSHOOT Example 2 Crypto Map ACL Error 00:10:00 Review and Preparation for Troubleshooting Complex Enterprise Network Review and Preparation for Troubleshooting Complex Enterprise Networks 00:09:00 Section 2 Overview 00:46:00 Mock Exam Mock Exam- Cisco CCNP Troubleshoot and Maintain Cisco IP Switched Networks (TSHOOT) v2.0 Training 00:20:00 Final Exam Final Exam- Cisco CCNP Troubleshoot and Maintain Cisco IP Switched Networks (TSHOOT) v2.0 Training 00:20:00 Order Your Certificate and Transcript Order Your Certificates and Transcripts 00:00:00
Description The Implementing Cisco IP Routing is a qualifying exam for the Cisco Certified Network Professional CCNP, Cisco Certified Internetwork Professional CCIP, and Cisco Certified Design Professional CCDP certifications. This Cisco CCNP Implementing Cisco IP Switched Networks (Switch) v2.0 Training will help you to be certified successfully with all the important knowledge and skills necessary to use advanced IP addressing and routing in implementing scalable and secure Cisco ISR routers connected to LANs and WANs. The exam also covers configuration of secure routing solutions to support branch offices and mobile workers. This is an advanced course on Cisco routing configuration for both IPv4 and IPv6. In this course you will gain the knowledge to configure and optimize a routing domain using OSPF, EIGRP, BGP, PBR, IP SLA and configure redistribution when needed. It also includes the configuration of highly secure routing solutions to support branch offices and mobile workers. Assessment & Certification To achieve a formal qualification, you are required to book an official exam separately with the relevant awarding bodies. However, you will be able to order a course completion CPD Certificate by paying an additional fee. Hardcopy Certificate by post - £19 Soft copy PDF via email - £10 Requirements Our Cisco CCNP Implementing Cisco IP Switched Networks (Switch) v2.0 Training is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Network Design Network Design FREE 00:27:00 Collapsed Core Option 00:30:00 Switching Methods 00:31:00 CAN CAN 00:12:00 Basics of VLANs 00:19:00 Trunking 00:17:00 Creating a Trunk 00:12:00 Voice VLANs 00:21:00 Configuring a Voice VLAN 00:09:00 VTP Versions 00:17:00 Examining VTP 00:11:00 Other DHCP Configurations 00:15:00 Configuring DHCP 00:11:00 DHCP Use 00:11:00 Configure Stateless DHCP 00:20:00 What Must Match 00:06:00 Configure EtherChannel 00:05:00 Load Balancing EtherChannel 00:02:00 Spanning Tree Spanning Tree 00:31:00 Root Bridge (eNotes) 00:23:00 Verify PVST 00:16:00 Influencing the Root Bridge Election 00:28:00 STP Path Manipulation 00:04:00 UplinkFast 00:28:00 PortFast and BPDU Guard 00:06:00 Inter-VLAN Routing Inter VLAN Routing 00:08:00 Router on a Stick 00:19:00 Pros and Cons of an External Router 00:12:00 SVI 00:20:00 L3 Switch Interface (eNotes) 00:07:00 Advanced Switch Configuration Options Advanced Switch Configuration Options 00:16:00 Setting the Clock Manually 00:02:00 Configure NTP 00:07:00 Securing NTP 00:05:00 Overview of SNMP 00:18:00 Configure SNMPv3 00:10:00 What is Cisco IP SLA 00:21:00 SLA Configuration 00:08:00 Configuring SLA Responder 00:07:00 Introducing SPAN 00:18:00 L3 FHRP L3 FHRP 00:15:00 Configuring HSRP 00:17:00 What is HSRP Pre empt 00:23:00 Configuring Tracking 00:05:00 What is VRRP 00:15:00 Configuring VRRP 00:08:00 Security Security 00:25:00 Port Security 00:11:00 Port Errorst 00:21:00 Storm Control 00:02:00 Configuring TACACSRADIUS 00:08:00 Limitations of Both 00:30:00 Order Your Certificate and Transcript Order Your Certificates and Transcripts 00:00:00
Description The Implementing Cisco IP Routing is a qualifying exam for the Cisco Certified Network Professional CCNP, Cisco Certified Internetwork Professional CCIP, and Cisco Certified Design Professional CCDP certifications. This Cisco CCNP Implementing Cisco IP Routing (Route) v2.0 Training will help you to be certified Successfully with all the important knowledge and skills necessary to use advanced IP addressing and routing in implementing scalable and secure Cisco ISR routers connected to LANs and WANs. The exam also covers configuration of secure routing solutions to support branch offices and mobile workers. This is an advanced course on Cisco routing configuration for both IPv4 and IPv6. In this course, you will gain the knowledge to configure and optimize a routing domain using OSPF, EIGRP, BGP, PBR, IP SLA and configure redistribution when needed. It also includes the configuration of highly secure routing solutions to support branch offices and mobile workers. Assessment & Certification To achieve a formal qualification, you are required to book an official exam separately with the relevant awarding bodies. However, you will be able to order a course completion CPD Certificate by paying an additional fee. Hardcopy Certificate by post - £19 Soft copy PDF via email - £10 Requirements Our Cisco CCNP Implementing Cisco IP Routing (Route) v2.0 Training is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Routing Services Complex Enterprise Network Frameworks, Architectures, and Models FREE 00:15:00 Creating, Documenting, and Executing an Implementation Plan 00:09:00 Overview of IP Routing 00:12:00 RIPNG 00:26:00 Configuring the Enhanced Interior Gateway Routing Protocol Understanding EIGRP Terminology and Operation 00:14:00 Planning EIGRP Routing Implementations 00:03:00 Configuring and Verifying EIGRP 00:03:00 Enable EIGRP Routing 00:01:00 Define EIGRP Networks 00:03:00 Define Bandwidth on Interfaces 00:01:00 Enable and Disable EIGRP Automatic Summarization 00:01:00 Passive Interface 00:02:00 IP Default Network 00:03:00 Configure a Router to Advertise a Default Route as the Gateway 00:02:00 Example of the IP Route Next Hop Command 00:01:00 Example of the IP Route Quad Zero Command 00:01:00 Summarization in Discontiguous Networks 00:01:00 Configuring and Verifying EIGRP in an Enterprise WAN 00:03:00 Disabling Automatic Summarization 00:01:00 Frame Relay Using Dynamic Mapping 00:03:00 EIGRP over Layer 3 MPLS VPNs 00:02:00 EIGRP over Layer 2 MPLS VPNs 00:04:00 Configuring and Verifying EIGRP Authentication 00:04:00 Configure Authentication Mode for EIGRP 00:02:00 Configure the Key Chain 00:01:00 Optimizing EIGRP Implementations 00:05:00 Enable Authentication to use the Key Chain 00:01:00 EIGRP 00:21:00 Configuring the Open Shortest Path First Protocol Understanding OSPF Terminology and Operation 00:20:00 OSPF Packets 00:11:00 Planning OSPF Routing Implementations 00:06:00 Basic OSPF Verification and Configuration 00:09:00 Configuring Single Area OSPF 00:02:00 Configuring Multi Area OSPF 00:01:00 EIGRP over Layer 3 MPLS VPNs 00:02:00 OSPF Network Types 00:11:00 Assigning Router Priority 00:02:00 Override the Default Interface Cost 00:01:00 Configure a Key for Simple Authentication 00:01:00 Configure the MD5 Key-ID and Key 00:02:00 Verifying Simple Password Authentication 00:01:00 OSPF 00:19:00 Manipulating Routing Updates Assessing Network Routing Performance Issues 00:05:00 Using Multiple Routing Protocols on a Network 00:09:00 Redistribution Supports All Routing Protocols 00:01:00 Implementing Route Redistribution 00:07:00 Redistribute Routes into RIP 00:03:00 Redistribute Routes into OSPF 00:04:00 Default Metric for Routing Protocols 00:02:00 Redistributing Routes into EIGRP 00:05:00 Applying Metric Values for EIGRP 00:03:00 Modifying the Administrative Distance for all Routing Protocols 00:06:00 Changing OSPF AD 00:15:00 Controlling Routing Update Traffic 00:11:00 Route Map 00:10:00 Using Distribute Lists and Filter Incoming Routing Updates 00:03:00 Defining a Filter for Outgoing Routing Commands 00:02:00 Distribute List In or Out and Examples 00:06:00 Distribute Lists to Avoid Route Feedback 00:05:00 Fallbacks of Distribute Lists 00:01:00 Using Prefix Lists 00:02:00 Implementing Path Control Understanding Path Control 00:05:00 Similarities of ACLs and Prefix Lists 00:01:00 Implementing Path Control using Offset-Lists 00:02:00 Configuring a Prefix List 00:04:00 Implementing Path Control Using Offset-Lists 00:03:00 Verify Offset-Lists 00:01:00 Implementing Path Control using IOS IP SLAs 00:10:00 Cisco IOS IP SLAs 00:01:00 IP SLAs Applications 00:01:00 Operations - Responders and Sources 00:01:00 IP SLAs Operations 00:01:00 Steps to Deploying IP SLAs 00:01:00 IP SLA - ICMP ECHO and ICMP ECHO Sub Commands 00:04:00 IP SLA Schedules 00:05:00 Define Tracking Objects to Track the State of IP SLAs Operations 00:02:00 Configuring Track Delay 00:01:00 Configure a Static Route for IP SLAs Tracking 00:03:00 Verify IP SLAs using Method 1 00:02:00 Verify IP SLAs using Method 2 00:02:00 Implement Path Control using Policy-Based Routing 00:09:00 Implement Path Control using Policy-Based Routing 00:01:00 Configure PBR 00:01:00 Logical PBR Operation 00:01:00 Route-Map Commands for PBR 00:03:00 Match Statements and Conditions 00:03:00 Match Commands Used in PBR 00:01:00 Specify Criteria to be Matched using Prefix Lists of ACLs 00:01:00 Specify Criteria to be Matched by Packet Length 00:01:00 Modify Matching Conditions using Set Statements 00:01:00 Set Conditions 00:03:00 Set Commands used in PBR 00:02:00 Specify the Next Hop IP Address for Matching Packets 00:01:00 Specify Interfaces Through which Packets Can be Routed 00:01:00 Specify a List of Default Next-Hop IP Addresses 00:02:00 Specify a List of Default Interfaces 00:02:00 Mark Packets Using the IP ToS Field 00:02:00 Set the 3 IP Precedence Bits in the IP Packet Header 00:01:00 Set IP Precedence Parameters 00:02:00 Identify a Route Map to Use for Policy Routing on an Interface 00:01:00 Various Methods to Verify PBR 00:02:00 Advanced Path Control Tools 00:02:00 Implementing a Border Gateway Protocol Solution for ISP Connectivity BGP Terminology, Concepts, and Operation 00:20:00 EGP and IGP 00:01:00 AS 00:02:00 IANA 00:01:00 RIRs 00:02:00 AS Numbers 00:03:00 Facts about BGP 00:03:00 BGP Neighbors 00:03:00 BGP Operational Overview 00:02:00 BGP Use between ASs 00:01:00 BGP and IGPs 00:01:00 Connecting Enterprise Networks to Internet Service Providers 00:02:00 Configuring BGP 00:12:00 Questions for Deploying Routing and Connection 00:02:00 Public IP Address Space 00:02:00 Configure Static Routes 00:02:00 Configure the Default Local Preference 00:01:00 Define BGP as the IP Routing Protocol 00:03:00 Router BGP Command Parameters 00:01:00 Identify Peer Router to Establish a BGP Session 00:02:00 Create a Peer Group 00:02:00 Assign Neighbors as Part of the Peer Group 00:02:00 Disable an Existing BGP Neighbor or Peer Group Relationship 00:02:00 Establish the IBGP Session Using a Loopback Interface 00:02:00 IBGP Source IP 00:03:00 Increase the TTL for EBGP Connections 00:03:00 Configure the Router as the Next Hop for a BGP Speaking Peer 00:02:00 Verifying and Troubleshooting BGP 00:01:00 Basic BGP Path Manipulation Using Route Maps 00:05:00 Filtering BGP Routing Updates 00:02:00 Implementing Routing Facilities for Branch Offices and Mobile Workers Planning the Branch Office Implementations 00:15:00 NAT 00:09:00 Planning for Mobile Worker Implementations 00:03:00 Routing Traffic to the Mobile Worker 00:02:00 Implementing IPv6 in the Enterprise Network Introducing IPv6 00:07:00 Configuring and Verifying IPv6 Unicast Addresses 00:06:00 Routing IPv6 Traffic 00:01:00 Configuring Static Routing 00:04:00 Configuring OSPFv3 00:07:00 OSPFv3 00:22:00 Configuring EIGRP for IPv6 00:03:00 EIGRP for IPv6 00:18:00 Multiprotocol BGP (MP-BGP) 00:03:00 Mock Exam Mock Exam- Cisco CCNP Implementing Cisco IP Routing (Route) v2.0 Training 00:20:00 Final Exam Final Exam- Cisco CCNP Implementing Cisco IP Routing (Route) v2.0 Training 00:20:00 Order Your Certificate and Transcript Order Your Certificates and Transcripts 00:00:00
Description: This Certified Wireless Network Administrator (CWNA) - Complete Video Course covers the functions and features of Certified Wireless Network Administrator. You will learn the fundamentals of RF, components and measurements of RF as well as WLAN topologies. You will learn about Wi-Fi access, MAC and WLAN architectures, troubleshooting and security. You will also learn how to navigate site survey tools, high throughput, BYOD and more. This certification is the foundation-level enterprise Wi-Fi certification for the CWNP Program. Achieving it sets your wireless career on a firm foundation, ensuring you have the skills to successfully survey, install, and administer enterprise Wi-Fi networks. So, if you have an understanding of the fundamentals of wireless technology. And interested to know how WLAN work and how it's managed day-to-day. And if you have the ability to install, configure and troubleshoot and maintain wireless networks within small business or Enterprise deployments. Then this course is perfect for you. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? Certified Wireless Network Administrator (CWNA) - Complete Video Course is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our Certified Wireless Network Administrator (CWNA) - Complete Video Course is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Overview of Wireless Communications Overview of Wireless Communications FREE 00:23:00 Communication Fundamentals 00:15:00 Fundamentals of RF Fundamentals of RF 00:07:00 Characteristics of RF 00:17:00 RF Behaviors 00:17:00 Components and Measurements of RF Components and Measurements of RF 00:19:00 dB Mathematics 00:18:00 Math Examples (eNotes) 00:20:00 Noise Floor 00:07:00 RF Signal and Antenna Concepts RF Signal and Antenna Concepts 00:13:00 Antenna Types 00:15:00 Beamforming 00:09:00 IEEE 802.11 IEEE 802.11 00:15:00 802.11i 00:10:00 Spread Spectrum Technologies Course Overview Direct Sequence Spread Spectrum (Part 1) 00:22:00 Direct Sequence Spread Spectrum (Part 2) 00:21:00 WLAN Topologies WLAN Topologies 00:10:00 Distribution Service 00:08:00 Mesh BSS 00:15:00 Wi-Fi Access Wi-Fi Access 00:14:00 Interframe Space (IFS) 00:13:00 MAC Architecture MAC Architecture 00:18:00 Beacon Frames 00:11:00 WLAN Architecture WLAN Architecture 00:17:00 WLAN Controller 00:11:00 WLAN Deployment WLAN Deployment 00:10:00 Network Extension to Remote Areas 00:13:00 Troubleshooting Troubleshooting 00:18:00 802.11 Coverage Considerations 00:17:00 Capacity vs. Coverage 00:19:00 Security Security 00:22:00 Robust Security 00:24:00 Types of Wireless Attacks Types of Wireless Attacks 00:30:00 Intrusion Monitoring 00:08:00 Fundamentals of Site Surveys Fundamentals of Site Surveys 00:16:00 Site Survey Tools Site Survey Tools 00:05:00 Site Survey 00:15:00 PoE PoE 00:09:00 Midspan 00:08:00 High Throughput (HT) High Throughput (HT) 00:11:00 Spatial Multiplexing (SM) 00:12:00 Very High Throughput (HT) Very High Throughput (VHT) 00:18:00 BYOD BYOD 00:19:00 Over the Air Management 00:10:00 Mock Exam Mock Exam- Certified Wireless Network Administrator (CWNA) - Complete Video Course 00:20:00 Final Exam Final Exam- Certified Wireless Network Administrator (CWNA) - Complete Video Course 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00