Jump to content

Search the Community

Showing results for tags 'udemy'.

More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


    • LINUX
    • ORACLE
    • GNS3

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start





Website URL







Found 32 results

  1. **The CompTIA CSA+ certification acronym has changed to the CompTIA CySA+ as of January 2018. The exam content and objectives remain the same.** ** Taught by a Best Selling IT Certification Instructor ** This course provides everything you need in order to study for the CompTIA Cybersecurity Analyst+ (CySA+) (CS0-001) exam, including downloadable PDFs of every lecture, 12 quizzes to check your knowledge as you progress through the videos, and a full-length practice exam to test your knowledge before test day! Taught by an expert in information technology and cybersecurity with over 20 years of experience, this course is a fun way to learn what you need to know to pass the CompTIA Cybersecurity Analyst+ (CySA+) (CS0-001) exam or to better prepare yourself to serve on your organization's cyber defense team. The CompTIA CySA+ (Cybersecurity Analyst+) (CS0-001) certification is a vendor-neutral certification that validates your knowledge and ability to conduct intermediate-level cyber security skills. This certification was released in February 2017 by CompTIA to fill a gap between the entry-level CompTIA Security+ exam (for those with about 1 year in the field) and the advanced-level CompTIA Advanced Security Practitioner (for those with at least 5 years in the field). The CompTIA CySA+ exam is focused on the technical, hands-on details of the cybersecurity field, including not only cyber threats, secure network architecture, and risk management, but also the ability to perform log analysis, configuration assessments, and more. This CySA+ (CS0-001) course is designed for IT Security analysts, vulnerability analysts, threat intelligence analysts, or anyone who is trying to get a better understanding of the concepts involved in conducting cybersecurity analysis, to include threat management, vulnerability management, cyber incident response, security architecture, and the toolsets associated with these cybersecurity efforts. To help you practice for the CompTIA CySA+ (CS0-001) exam, this course even comes with a realistic practice exam containing 85 multiple-choice questions spread across the four domains tested by the CompTIA CySA+ (CS0-001) certification exam! This course provides full coverage of the four domains of the CySA+ exam: 27%: Threat Management 26%: Vulnerability Management 23%: Cyber Incident Response 24%: Security Architecture and Tool Sets Part 1 [hide][Hidden Content]] Part 2 [hide][Hidden Content]]
  2. Udemy – CCNA R&S 2019 (200-125) By Hexa CCIE Khawar Butt. Thanks to the original up-loader bvn63. Enjoy the google drive link. Mod note (mavis): Link removed. Share without password.
  3. Udemy (TrainerTests) | h264, 1280x720 | 3h 08mn | 1.34 GB Created by: Rick Crisci [Hidden Content]
  4. Hi Guys can anyone help me with this Udemy course Securing Networks with Cisco Umbrella Protecting networks and users while the IT paradigm shifts and threat sophistication increases MOVED TOPIC Topic is moved to proper section. REQ prefix added Kindly open topic in appropriate section with suitable prefix.
  5. I found this on Internet and thought to share it with lovely community here [hide][Hidden Content]]
  6. Udemy The Complete VMware vSphere 6.5: Beginner to Advanced-part 2/2 12h 30mn | 8.02 GB | Created by: Fettah Ben [Hidden Content]
  7. Hi all can somebody share these valuable videos Trainer Profile on UDEMY - [Hidden Content] Thanks & Regards, CCIE619
  8. AWS Certified Cloud Practitioner Ultimate Exam Training 2020 This Ultimate Exam Training for the AWS Certified Cloud Practitioner is packed with comprehensive video lessons, hands-on labs, practice exams, quizzes, exam-crams and detailed training notes/cheat sheets! If you are new Amazon Web Services / Cloud Computing and looking to confidently pass your AWS Cloud Practitioner Certification Exam first time - then this bestselling ALL-IN-ONE AWS training course is for you! HOW THIS COURSE IS DIFFERENT We have closely aligned this course with the official AWS Certified Cloud Practitioner exam guide and structured the course so that you can study at a pace that suits you best. We start with some basic background to get everyone up to speed on what cloud computing is and its benefits, before progressing through each knowledge domain. We are big believers in using practical exercises to improve memory retention and contextualize knowledge, so we have included many (optional) hands-on guided labs for those who have the time and desire to build a practical skillset. With this ALL-IN-ONE Udemy AWS cloud practitioner training, you'll be ready to pass the AWS Cloud Practitioner exam first time. Download Part 1 [hide][Hidden Content]] Part 2 [hide][Hidden Content]] Part 3 [hide][Hidden Content]]
  9. Hi, Can anyone share Complete Python 3 Ethical Hacking Course: Zero To Mastery from Aleksa Tamburkovski? Link:[Hidden Content] Thanks
  10. Password if need sanet.st or SAnet.ST | Only 30 days Direct link , No mirror on Trainbit folder , So Hurry up for download Udemy Mastering Cloud Security on Microsoft AZURE, Udemy Azure Cloud Administrator Certification- AZ 103, Udemy Azure Architect Design (AZ-301- 1.85 GB), Udemy AZ-900 Microsoft Azure Fundamentals Certification (skillshare), Udemy AZ-300 Azure Architecture Technologies Exam Prep 2020, Skylines Academy Microsoft Azure Architect Technologies , Skylines Academy Microsoft AZ900 Certification Course , Skylines Academy AZ_301 CERTIFICATION AZURE ARCHITECT DESIGN (2019) , Skylines Academy AZ_300 CERTIFICATION COURSE AZURE ARCHITECT TECHNOLOGIES, Pluralsight Securing Microsoft Azure Networks , Pluralsight Securing Microsoft Azure Data Access Endpoints, Packt Architecting for High Availability on Azure , INE Azure Identity Management for Administrators [Hidden Content]
  11. Grab it before its too late and gone! [hide][Hidden Content]]
  12. SDN, NFV, Whitebox switching and OpenFlow Intro 2017 Updates ( 16 hours left) Created by David Bombal "English Subtitles" 11.5 Hours (Instead of $9.99) [Hidden Content] Use this code to get it FREE : DBSDNMAY Requirements This is an introduction - no preexisting knowledge is required. What you'll learn Differentiate between the different versions of SDN. Explain Northbound and Southbound interfaces. Learn about Facebook switches (yes really!) #Udemy #OpenFlow #SDN #Networking #Cybersecurity #DavidBombal #Cybecourses
  13. The Complete Splunk Enterprise Certified Admin Course 2020 Description LEARN SPLUNK, GET THE SPLUNK ENTERPRISE CERTIFIED ADMIN CREDENTIAL Hey everyone! You know me, I'm the most popular Splunk instructor here on Udemy. You've perhaps taken my Complete Splunk Beginner's Course, and you've been waiting for a course that's structured to help you earn the Splunk Enterprise Certified Admin certification. Look no further! This is the first—and most comprehensive—course that covers Splunk 8.x, which was just released! A recent student said "Thanks for making this course, it was very useful. I did the exam and got the Admin cert." - Gustavs In this class, we will cover everything on the exam blueprint in a fun and engaging way. We will provide you with the tools you need to pass the exam and get certified, including: Demos Exercises Quizzes Homework Whether you've inherited a Splunk environment, are building one from scratch, or are simply curious about Splunk, this course was designed specifically for you! We'll cover it all, from installing Splunk for the first time to architecting advanced distributed Splunk environments for large enterprises. We'll talk about search head clustering, heavy forwarders, indexer clustering, configuration files, authentication (yes, even with LDAP), and much more. Who this course is for: Anyone who has inherited a Splunk environment and wants to rock it! Anyone who wants to get the Splunk Enterprise Certified Admin credential Anyone who has been tasked with deploying a Splunk environment Anyone who is getting started in data analytics and wants to learn one of the most popular tools Data analysts and engineers Data scientists Security professionals Anyone who wants to make a lot of money by boosting their resume with Splunk knowledge and experience Anyone who is curious about Splunk Download Part 1 [hide][Hidden Content]] Part 2 [hide][Hidden Content]]
  14. Cisco CCNA 200-301 Full Course For Networking Basics *Great hands-on configuration labs* *Learn networking basics* *Covers ALL Cisco CCNA Topics* *Pass The Exam Easily !* What you’ll learn You will learn about networking basics, switching, routing, IPv4 and IPv6. You will be ready to pass Cisco CCNA 200-301 certification exam after finishing the course. Cisco CCNA 200-301 Full Course For Networking Basics Requirements This CCNA course is for all levels of students so there are no prerequisites Description This CCNA course will help you to improve yourself about networking basics, switching & routing technologies, IPv4 and IPv6. If you are a beginner for networking technologies, our CCNA certification program is great for you! You will get the certification easily with this CCNA course and begin your career in networking industry. Networkel’s CCNA course , which is prepared by a Cisco Networking Academy Instructor , covers ALL topics that you need to prepare for the 200-301 (New CCNA) certification exam. You can see the full list of the topics at the curriculum. Six main sections of the training are : 1- Network Fundamentals 2- Routing And Switching Essentials 3- Scaling Networks 4- Connecting Networks 5- Security Fundamentals 6- Network Automation and Programmability You can watch our CCNA course videos from anywhere you want with any device such as laptop, tablet, mobile phone etc. ! If you don’t understand about a topic in the lesson, you can easily rewind the video and watch that part again and again. WHAT ARE THE REQUIREMENTS FOR CCNA COURSE ? You don’t need to know anything about networking, Networkel’s training will teach you every topic from zero. For lab sections, you need to install Packet Tracer or GNS3 to your computer. WHAT I WILL GET FROM THIS COURSE ? You will learn about networking basics , IPv4, IPv6, switching and routing and that means you will be ready for certification exam ! CCNA certification is an excellent step to start a career in networking industry. WHO IS THE TARGET GROUP ? Everybody who wants to prepare for CCNA 200-301 (New CCNA) exam Anyone who needs to build a cereer in networking industry Students that currently in college or university Subscribe now and build your future with us ! Who this course is for: Everybody who wants to prepare for CCNA 200-301 (New CCNA) exam Anyone who needs to build a cereer in networking industry Students that currently in college or university Course information : 4.5 (1,441 ratings) | 12,068 students enrolled | Created by Networkel Inc. Last updated 1/2020 | English | English [Auto-generated] Expand all 83 lectures | 18.5 hours Course Link : [Hidden Content] Download [hide][Hidden Content]]
  15. Free Udemy Courses just for today..!!! Learn to Secure website traffic using HTTPS by installing a FREE Let's Encrypt SSL Certificate! Enroll yourself quickly.. [Hidden Content] Thank you. Hope you like the content.
  16. Hi all, badly needing this course. [Hidden Content] Thank you very much guys.
  17. Palo Alto Firewalls Configuration By Example - PCNSE Prep udemy.com/palofirewalls/learn/v4/overview PaloAlto firewalls are true Next Generation firewalls built from the ground up to address legacy firewalls issues. It is the first firewall platform to make decisions based on applications not just ports and protocols. The PCNSE exam requires deep understanding of the topics. Exam dumps is not the way to go. You need to practice the concepts and be clear on how to configure this feature rich firewall platform. You need to study the concepts. This class guide you through the configuration of different features and how to practice on AWS and Unetlab. This class covers many topics required for PCNSE7 or PCNSE8 and new topics are added frequently. This course dives deeper into Palo Alto firewalls policies and network configuration to give the students a clear understanding on several topics. Topics covered include Security Policies configuration, SSL Decryption, Routing configuration, IPsec configuration, IPv6 configuration, High Availability configuration, QoS and other real world configuration examples. This is an original upload by me, no mirrors please I request you stick with upw.io Direct link download: [hide][Hidden Content]]
  18. RFID Programming and Security Master Class [Hidden Content]
  19. [uDEMY] SOC Analyst Cyber Security Intrusion Training from Scratch: 1. Module 1 Basic of Networks 2. Module 2 Foundation of BitBytes in Packets 3. Module 3 Internet Layer & Transport Layer 4. Module 4 UDP & ICMP Protocol 5. Module 5 Protcols & Ports 6. Module 6 UseCases 7. Module 7 Windows & Linux 8. Module 8 System Hacking 9. Module 9 UseCases 10. Module 10 Web Application 11. Module 11 Web Application Attack 12. Module 12 UseCases 13. Module 13 Antivirus Working, Types & UseCase 14. Module 14 IDS - Working, Detection & Evasion 15. Module 15 Firewall Working, Types & Reporting 16. Module 16 Attacking Phases 17. SIEM Solution [Hidden Content] MOVED TOPIC Topic is moved to proper section. Open topic in appropriate section with suitable prefix.
  20. Hi All, One of my friend recommended this course on Udemy. i find it really worth taking. Also found this link coupon link somewhere on the internet. Only for 9$ [Hidden Content] Hope you will find it useful. Thanks, Yogesh
  21. Udemy - Information Security Primer In this course you will learn to secure a network, weather it's Enterprise or SOHO. The course in based on over my 20 years hands on experience in IT, as a security analyst and network engineer. Learn the 12 most important steps in securing you network, making sure you cover all the basics, but not wasting time on activities that contribute little. Step 1- Write a Security Policy Step 2 - Educate End Users & IT Staff Step 3 - Implement Physical Security Step 4 - Implement Perimeter Security Step 5 - Use Good Password Management Step 6 - Eliminate Unnecessary Services Step 7 - Implement Good Patch Management Step 8 - Implement AntiVirus Measures Step 9 - Implement Access Control Step 10 - Secure Data in Transit Step 11 - IDS & IPS Step 12 - Backup Your Data Following a lecture on each of the steps, I provide 10 Live Demos to reinforce the lecturesFull details What are the requirements? Some knowledge of IT basics is helpful, but not necessary What am I going to get from this course? Over 25 lectures and 2 hours of content! Gain a solid background in computer network security Learn how to secure a large or small computer network using the 12 Step method What is the target audience? Anyone that needs to secure a network, including IT Engineer / Security Analyst, manager with limited technical knowledge, or the owner of a SOHO Fast Resume Links [hide][Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content]]
  22. Download and please seed [hide][Hidden Content]]
  23. CCIE Routing & Switching Version 5 Self paced VoD series Over 416 lectures and 80.5 hours of content! CCIE Routing & Switching Version 5.0 - Layer 2 ---- View Content Over 69 lectures and 13 hours of content! Section 1: Introduction to CCIE Routing & Switching CCIE exam information Exam Contents-Rack details Section 2: VLAN and Trunks Basic LAN Switching VLAN Introduction Static VLAN Dynamic VLAN Trunking LAB: Trunking Extended/ Voice VLAN Intervlan routing (Using separate Gateways) Intervlan routing (using Router Subinterfaces) Intervlan routing (Using Multi Layer Switch) Section 3: VlanTrunking Protocol (VTP) VTP Introduction LAB: Verifying VTP modes - requirement LAB: VTP Configuration VTP Pruning Manual Pruning/ Prune Eligible List VTP Version 3 VTP version 3 lab-Verify VLAN VTP version 3 lab-verify MSTP-Private VLAN Native VLAN Section 4: Spanning-tree Protocol Understanding STP Process 1 Understanding STP Process - Continuation Hierachial Campus LAN Model Selecting Root Bridge Tuning STP ( port-Priority/Cost/timers) Section 5: Advance STP EtherChannel/PortChannel (link Aggregation) Spanning-Tree Portfast Spanning-Tree BPDU Guard/Filter LAB: Verify BPDU Guard Spanning-tree Root Guard LoopGuard UDLD Errdisable Recovery Section 6: Flavours of STP UplinkFast-BackboneFast Rapid Spanning-tree Protocol LAB: Verifying RSTP Per Vlan STP (PVST+) Multiple Spanning Tree ( MSTP) Lab: Verify MSTP Tuning MSTP (port-priority/Cost) Section 7: Layer 2 Technologies PPP authentication -PAP-CHAP Verify PAP-CHAP Authentication PPP Multilink Ethernet WAN Networks ( Metro Ethernet) PPPoE - Theory-basic Configuration PPPoE -advance DHCP configuration Section 8: Logical Vs Physical Toplogy Default Physical Topology Logical Topology : Via single switch Logical Topology : Via Multiple switches Logical Topology : Using Sub-interfaces Logical Topology : Mock Lab Topology- Sub-interfaces Logical Topology : Mock Lab Topology -SVI and Layer 3 switch interfaces Logical Topology : Mock Lab Topology- Mock interfaces Logical Topology : Mock Lab Topology - using all Sub-interfaces Section 9: Switch Port Analyser( SPAN/RSPAN/ERSPAN) SPAN/RSPAN Introduction SPAN Configuration : example RSPAN Configuration : example 1 RSPAN Configuration : Example 2 ERSPAN SPAN ( Restrictions & Conditions) Section 10: Troubleshooting Cisco Discovery Protocol Link layer Discovery Protocol Troubleshooting LAN connectivity11 - physical connectivity Troubleshooting LAN connectivity11 - Duplex-AutoMDIX Troubleshooting VLAN Troubleshooting Trunking LAB : Troubleshooting Trunk Links CCIE Routing & Switching Version 5.0 - IGP Over 108 lectures and 21 hours of content! Section 1: Routing Basics Building Routing table Floating static-default routing Floating static-default routing - Continued Section 2: Default Routes in IGP Advertising Default route Default Route Advertisement-RIPV2 Default Route Advertisement- OSPF Default Route Advertisement- EIGRP Section 3: Redistribution-IPV4 Redistribution-Introduction EIGRP- RIP-Redistribution OSPF RIP Redistribution OSPF EIGRP Redistribution Redistribution -Mocklab Section 4: IPV6 basics IPV6- Introduction IPv6 Addressing IPV6 Address types IPV6 Static Addressing Stateless AddressAutoConfiguration-SLAAC IPv6 EUI-64 Format IPV6 Layer 2 Options Section 5: IPV6 routing Static-Default Routing RIPng OSPFv3 EIGRP-IPv6 Section 6: IPV6 Redistribution IPV6 RIPng -RIPng Redistribution OSPFv3- RIPng Redistribution EIGRP6- OSPFv3 Redistribution Section 7: Summarization-IPV4 Summarization-Introduction Types of Summarization Calculating Summary mask- Shortcut EIGRP-RIPv2 Summarization LAB OSPF Summarization LAB Section 8: IPV6 Summarization RIPng Summarization EIGRP6 Summarization OSFv3 Summarization Section 9: EIGRP Classic LAB Verify Eigrp process EIGRP Metric Feasible Distance-Advertise Distance Feasible Condition Section 10: EIGRP Optimization EIGRP Loadbalancing-Equal cost EIGRP Loadbalancing-Unequal cost EIGRP Stuck-in-Active EIGRP Stub EIGRP Summarization-Leakmap Section 11: EIGRP name Mode EIGRP Name Mode EIGRP Name Mode- Routing-IPv4-v6 EIGRP Name Mode-Authentication EIGRP Wide Metric Section 12: OPSF basics OSPF-Introduction OSPF Process-Stage 1-5 OSPF Process-Stage6-7 LAB-Verify Basic OSPF Process Concept of Areas in OSPF LAB-Multi-Area OSPF Section 13: OSPF Advance OSPF Virtual-link LAB : OSPF virtual links OSPF network Types- DR-BDR - Part 1 OSPF network Types- DR-BDR - Part 2 LAB-OSPF Broadcast Multi-access network - DR-BDR OSPF LSA Types Section 14: OSPF Stubs OSPF Stubs-Introduction LAB-OSPF Stubs OSPF Totally stub LAB-OSPF Totally Stub Not-so-stubby Area LAB-Not-so-stubby Area Totally Not-so-Stubby Area Quick Review Section 15: OSPF Enhancements OSPFv3 Address-family support OSPF Graceful Shutdown OSPF TTL security OSPFv2 Authentication Enhancements Section 16: Routing Protocol Authentication IPv4-v6 Routing Protocol Authentication RIPv2-Authentication EIGRP-Authentication OSPF-Authentication LAB-OSPF-Inteface-based-Authentication OSPF Area-based-Authentication OSPF Virtual link-Authentication OSPF Virtual link-Authentication OSPFv3 Authentication Section 17: ISIS Basics ISIS Introduction- Levels Types ISIS Adjacency - L1-L2 ISIS NSAP Addressing ISIS Configuration- IPv4-v6 ISIS Configuration-IPv4-v6 -LAB Section 18: ISIS Advance Tuning ISIS Levels Tuning ISIS levels-Continue Designated Intermediate System- DIS ISIS Metric ISIS Authentication Section 19: Route Filtering Options Introduction to Route Filtering Passive Interface LAB-Verify Passive interface Distribution-List LAB-Distribution List IP Prefix-Lists LAB-Verify Prefix-list LAB-Verify Prefix-list-Continued Section 20: Route Filtering Options Introduction to Route Filtering Passive Interface LAB-Verify Passive interface Distribution-List LAB-Distribution List IP Prefix-Lists LAB-Verify Prefix-list LAB-Verify Prefix-list-Continued Section 21: Route-maps Route-Maps-Introduction LAB-Route-maps LAB-Route-maps-Continued Route-filtering using Route-maps Section 22: Policy Based Routing Policy Based Routing PBR based on Source PBR based on destination PBR based on Services PBR based on Packet size CCIE Routing & Switching Version 5.0 - BGP Over 64 lectures and 14 hours of content! Section 1: BGP Introduction When BGP is more Appropriate BGP options connecting to Internet Section 2: BGP Neighbors understanding BGP neighbors IBGP neighbors -LAB BGP Split Horizon Rule IBGP neighbors using loopbacks -LAB IBGP neighbors using Loopback-LAB-Continuation Section 3: Advance BGP neighbor options BGP authentication Peer Groups Route Reflectors Section 4: External BGP Basic EBGP configuration Using nexthopself EBGP using loopback -EBGPmultihop BGP synchronization Rule Section 5: BGP Attributes Understanding BGP attributes ASpath-origin-nexthop weight & local preference Section 6: Weight and Local Preference Path Manipulation using weight path manipulation using Weight -continued weight using route maps-LAB understanding IN OUT using Local preference Local Preference with Route-maps BGP path selection process Clear IPBGP sessions Section 7: AS-path prepend & MED AS-Path Preprend AS-Path Preprend-Continued Multi Exit Discriminator Using MED Using MED-Continued Section 8: BGP Summarization BGP summarization BGP summarization using As-set-Example 1 BGP summarization As-set-Example -2 BGP summarization suppress-map BGP summarization un-suppress-map Section 9: BGP Route Filtering Why do we need BGP filtering BGP filtering using ACL BGP filtering using IP Prefix-list BGP filtering using Route-maps BGP Regular expressions BGP regular expressions - Continued BGP AS-PATH filters BGP AS-PATH filters-Continued Section 10: BGP Communities BGP communities -Introduction BGP communities types BGP well communities BGP well communities- continued BGP communities-user defined BGP communities User Defined - Continued Section 11: BGP Advance Options BGP Confederations BGP Confederations -LAB BGP Dampening BGP Dampening-LAB Route reflector Cluster Route reflector Cluster - LAB remove private-AS BGP neighbor local-AS (No-Prepend) BGP neighbor local-AS( Replace AS and Dual As) Section 12: IPV6 BGP IPv6 BGP introduction IPV6 IBGP- EBGP Configuration IPV6 PeerGroups and Route Reflectors IPV6 EBGP Multihop IPV6 BGP path Manipulation CCIE Routing & Switching Version 5.0 - VPN Over 62 lectures and 11 hours of content! Section 1: VPN introduction Introduction to VPN Networks VPN models overview VPN models -Advantages and Disadvantages Cisco express forwarding MPLS VPN overview Section 2: MPLS Label Distribution Protocol MPLS introduction MPLS labels and MPLS stacks sharing Label information MPLS LDP configuration MPLS LDP configuration - Continued MPLS label forwarding Penultimate hop popping MPLS LDP troubleshooting Section 3: MPLS layer 3 VPN MPLS Layer3 VPN Steps to Configure MPLS Layer3 VPN VRF- Route Distinguisher-Route Target VRF Configuration MPLS L3 VPN Support for Static-Default Routing VPNV4 Peering between PE to PE routers VPNv4 Redistribution under VRF Section 4: MPLS L3 VPN support for RIP-EIGRP-OSPF MPLS L3 VPN for RIPv2 MPLS L3 VPN for EIGRP MPLS L3 VPN for OSPF MPLS L3 VPN for OSPF-Continued Section 5: MPLS L3 VPN Advance Routing MPLS OSPF Superbackbone Understanding OSPF Domain-ID Verify OSPF Domain-ID Purpose of OSPF Sham-Link LAB- Verify OSPF sham-link MPLS L3 VPN - EBGP MPLS L3 VPN - EBGP-continued Section 6: MPLS L3 VPN Advance Options Overlapping VPNs Overlapping VPNs- Continued Overlapping VPN- Advance Layer 2 MPLS VPN- Overview IPV6 support - MPLS MPLS Traffic Engineering- overview Inter AS VPN overview Section 7: MPLS L3 VPN Troubleshooting MPLS L3 VPN- Troubleshooting MPLS L3 VPN- Troubleshooting-Continued Section 8: GRE -Generic Routing encapsulation VPN over Internet Generic Routing encapsulation Default Lab setup LAB- GRE point to point Configuration LAB- GRE point to point Configuration Advance Drawbacks of GRE Section 9: DMVPN-Dynamic Multipoint VPN Dynamic Multipoint VPN DMVPN phases DMVPN phase-1 Static NHRP DMVPN Phase-1 Dynamic NHRP DMVPN Phase-2 Static NHRP DMVPN phase-2 Dynamic NHRP Section 10: Routing protocols over DMVPN DMVPN Phase-1 routing using RIPv2 DMVPN Phase-1 routing using EIGRP DMVPN Phase-1 routing using OSPF DMVPN phase-2 RIPv2 Routing DMVPN phase-2 OSPF Routing Section 11: IPsec VPN IPsec VPN Introduction IPsec Mode-Protocols IPsec process-Overview IPsec- IKE phase 1 IPsec- IKE phase 2 CCIE Routing & Switching Version 5.0 - Security Over 37 Lectures and 7.5 hours of content Section 1: Access-Control-List ACL Introduction Standard ACL1 Standard ACL-Continued ACL Rules Extended ACL –Configuration Extended ACL –Verification Section 2: Access-Control-List- Advance Named ACL Routing Protocols and ACL Time based ACL IPv6 ACL Section 3: 003 Device Access security Login authentication Login Password enhancements IOS reselient Configuration External Authentication using AAA External sever based Authentication –LAB privilege levels Privilege levels- Advance Role based Access Control Section 4: 004 layer 2 Security layer 2 security-Introduction Mac flooding attack-Port security MAC spoofing- Port security LAB-port-security DHCP spoofing attack- DHCP snooping LAB-DHCP snooping IP spoofing attack - IP source Guard LAB- IP source Guard Arp spoofing- DAI LAB Dynamic ARP inspection Storm control Private VLAN private vlan-Configuration Vlan ACL Vlan ACL Configuration Section 5: 005 IPV6 First Hop Security IPV6 Layer 2 Options IPv6 First hop security-Introduction IPv6 RA GuardLAB: Verify BPDU Guard DHCPv6 Guard CCIE Routing & Switching Version 5.0 - IP Multicating Over 25 Lectures and 4.5 hours of content. Section 1: IP multicasting- Introduction Multicasting-Introduction Multicast-Benefits How Multicast works Multicast IP Range Section 2: IGMP - PIM protocols IGMP Protocol and Versions Protocol independent Multicast PIM Modes -Trees Dense mode - Configuration RPF check _ loop prevention Section 3: PIM Sparse Mode- RP PIM sparse-mode Operation Sparse-Mode Configuration Static RP Auto-RP Auto-RP Configuration Auto-RP Redundancy Auto-RP Load Sharing PIM-Bootstrap Router Section 4: Advance PIM Bi-Directional PIM Bi-Directional PIM Configuration Source Specific Multicast SSM Configuration Anycast RP and MSDP Anycast-MSDP Configuration Section 5: Layer 2 Multicast Layer 2 Multicast 25 IGMP Snooping CCIE Routing & Switching Version 5.0 - IP Services - Qos Over 35 Lectures and 6 hours of content Section 1: DHCPv4-DHCPv6 DHCP-Overview Router as DHCP server DHCP Relay Agent DHCPv6 Configuration DHCPv6 Relay Agent Section 2: First Hop Redundancy protocols First Hop Redundancy _ introduction FHRP protocols differences HSRP lab – Basic HSRP lab - Advance Options HSRP load sharing using Multiple groups VRRP- Lab GLBP – lab GLBP - Track and load balancing Section 3: More IP services Logging on Cisco Routers Network Time Protocol IP Service Level Agreement IP SLA Configuration example Section 4: Qos - Introduction Qos- Introduction Qos Mechanisms Qos Models Qos - MQC configuration Section 5:Qos-Classification & Marking classification and marking layer 2 - 3 marking Classification and marking configuration Section 6: Qos-Congestion Management- Queueing Queing basics Legacy QueueingMeachanisms Weighted fair Queueing CBWFQ LLQ Section 7: Qos-Congestion Avoidance Congestion Avoidance- Introduction WRED-CBWRED CBWRED-configuration Section 8: Qos-Congestion Avoidance Traffic Policing and Shaping Located: CCIE Routing & Switching Version 5.0 - Security - [Hidden Content] CCIE Routing & Switching Version 5.0 - BGP - [Hidden Content] CCIE Routing & Switching Version 5.0 - IGP - [Hidden Content] In need of MEGA link for: Udemy - CCIE Routing & Switching Version 5.0 - IP-Multicasting CCIE Routing & Switching Version 5.0 - VPN CCIE Routing & Switching Version 5.0 - Layer-2 CCIE Routing & Switching Version 5.0 - QOS Thanks
  • Create New...