41. | - IP Routing in the LAN
- By
Wendell Odom
- Feb 13, 2020
In this sample chapter from CCNA 200-301 Official Cert Guide, Volume 1, Wendell Odom discusses the configuration and verification steps related to three methods of routing between VLANs with three major sections: VLAN Routing with Router 802.1Q Trunks, VLAN Routing with Layer 3 Switch SVIs, and VLAN Routing with Layer 3 Switch Routed Ports.
|
42. | - Intent-Based Networking
- By
Pieter-Jan Nefkens
- Feb 12, 2020
In this sample chapter from Transforming Campus Networks to Intent-Based Networking (IBN), you will learn how IBN is a viewpoint or perspective of an implemented network using Cisco DNA’s requirements, design functions, and abstraction levels.
|
43. | - Introduction to Controller-Based Networking
- By
Wendell Odom
- Feb 12, 2020
In this sample chapter from CCNA 200-301 Official Cert Guide, Volume 2, you will be introduced to the basic concepts of data and control planes, explore product examples of network programmability using controllers, and compare the benefits of traditional networking with the benefits of controller-based networking.
|
44. | - Advanced STP Tuning
- By
Bradley Edgeworth, Jason Gooley, David Hucaby, Ramiro Garza Rios
- Feb 11, 2020
In this sample chapter from CCNP and CCIE Enterprise Core ENCOR 350-401 Official Cert Guide, you will review techniques for configuring a switch to be guaranteed as the root bridge or as a backup root bridge for a Layer 2 topology.
|
45. | - Route Summarization
- By
Scott Empson
- Feb 11, 2020
In this sample chapter from CCNA 200-301 Portable Command Guide, 5th Edition, you will explore route summarization and requirements.
|
46. | - Introduction to Personal Computer Hardware
- By
Cisco Networking Academy
- Jan 30, 2020
In this sample chapter from IT Essentials Course Booklet, 7th Edition, by Cisco Networking Academy, you will be introduced to the components that make up a computer, including connectors, power supplies, storage drives, and more.
|
47. | - Introduction to Personal Computer Hardware
- By
Cisco Networking Academy, Allan Johnson
- Jan 30, 2020
In this sample chapter from the Cisco Networking Academy IT Essentials Labs and Study Guide Version 7, you will review the definition of a computer, safety guidelines, computer components, and the process for disassembling a computer.
|
48. | - VoIP Protocols: SIP and H.323
- By
Kyzer Davis, Paul Giralt, Patrick Kinane, Gonzalo Salgueiro
- Nov 20, 2019
In this sample chapter from CCNP Collaboration Call Control and Mobility CLACCM 300-815 Official Cert Guide, you will review the function components of Session Initial Protocol (SIP), exam Session Description Protocol (SDP) fundamentals, and examine the H.323 communication protocol.
|
49. | - Sharing the Context
- By
Chad Mitchell, Jamie Sanbower, Vivek Santuka, Aaron Woland
- Jul 9, 2019
In this sample chapter from Integrated Security Technologies and Solutions - Volume II: Cisco Security Solutions for Network Access Control, Segmentation, Context Sharing, Secure Connectivity and Virtualization, you will learn about the many different ways of sharing context out of Cisco Identify Services Engine (ISE) to other security solutions, about Rapid Threat Containment, and about the Platform Exchange Grid (pxGrid). Because ISE is positioned to know exactly who and what is on the network at any given time, as well as assign different levels of access and context assignments with security group tags, it is the perfect security tool to be at the center of a security ecosystem.
|
50. | - CSR 1000V Software Architecture
- By
Arvind Durai, Stephen Lynn, Amit Srivastava
- Jan 16, 2019
In this sample chapter from Virtual Routing in the Cloud, explore the software and data plane design of the CSR 1000V, a virtualized software router that runs the IOS XE operating system.
|
51. | - IoT and Security Standards and Best Practices
- By
Rik Irons-Mclean, Anthony Sabella, Marcelo Yannuzzi
- Jan 14, 2019
In this sample chapter from Orchestrating and Automating Security for the Internet of Things: Delivering Advanced Security Capabilities from Edge to Cloud for IoT, the author team raises awareness of what should be considered when planning to secure an IoT system and highlights some of the more robust standards and best practices used today that can help.
|
52. | - Infrastructure Security and Segmentation
- By
Mason Harris, Jamie Sanbower, Vivek Santuka, Aaron Woland
- Jan 11, 2019
In this sample chapter from Integrated Security Technologies and Solutions - Volume I: Cisco Security Solutions for Advanced Threat Protection with Next Generation Firewall, Intrusion Prevention, AMP, and Content Security, you will review security of the three planes of network infrastructure, the importance of segmenting traffic and methods for doing so, and the benefits of NetFlow.
|
53. | - Linux Operating System
- By
Cisco Networking Academy
- Jan 10, 2019
In this sample chapter from CCNA Cybersecurity Operations Companion Guide and the Cisco Networking Academy, learn how to perform basic Linux operations as well as administrative and security-related tasks.
|
54. | - Multicast Design Solutions
- By
Ray Blair, Arvind Durai, Josh Loveless
- Jan 10, 2019
In this sample chapter from IP Multicast, Volume II: Advanced Multicast Concepts and Large-Scale Multicast Design, you will examine several archetypical network design models and best practices for multicast deployments.
|
55. | - Cybersecurity and the Security Operations Center
- By
Cisco Networking Academy
- Jan 9, 2019
In this sample chapter from CCNA Cybersecurity Operations Companion Guide and the Cisco Networking Academy, you will learn about the who, what, and why of cyberattacks—plus review available resources to prepare for a career in cybersecurity operations.
|
56. | - External Routing with ACI
- By
Frank Dagenhardt, Bill Dufresne, Jose Moreno
- Jan 9, 2019
In this sample chapter from Deploying ACI: The complete guide to planning, configuring, and managing Application Centric Infrastructure, learn how to enable Layer 3 communication and integrate with routing protocols you may already be using in your environment.
|
57. | - NX-OS Troubleshooting Tools
- By
Brad Edgeworth, Richard Furr, Vinit Jain
- Jan 8, 2019
In this sample chapter from Troubleshooting Cisco Nexus Switches and NX-OS, you will review the various tools available on the Nexus platform that can help in troubleshooting and day-to-day operation.
|
58. | - Responding to a Breach
- By
Aamir Lakhani, Joseph Muniz
- Jan 8, 2019
In this sample chapter from Investigating the Cyber Breach: The Digital Forensics Guide for the Network Engineer, you will explore the basic concepts for proper incident response procedure to understand why organizations commonly fail at the process when responding to a breach. The authors also share techniques used by organizations that have a successful incident response plan and provide an overview of industry-proven components required to build an incident response process within your organization.
|
59. | - FTD on ASA 5500-X Series Hardware
- Jul 3, 2018
In this sample chapter from Cisco Firepower Threat Defense (FTD): Configuration and Troubleshooting Best Practices for the Next-Generation Firewall, Next-Generation Intrusion Prevention System, and Advanced Malware Protection, review the steps required to reimage and troubleshoot any Cisco ASA 5500-X Series hardware.
|
60. | - Service Design and Building the IT Service Portfolio
- Apr 6, 2018
In this sample chapter from IT as a Service (ITaaS) Framework, The: Transform to an End-to-End Services Organization and Operate IT like a Competitive Business, examine the purpose, goals, and value potential of a Service portfolio. You’ll also explore how to design specific elements of the Service portfolio and review various guidelines, best practices, and lessons learned for the successful design of IT Services across the enterprise.
|