Log in
Log inBook a demo
1645 results
Sort by
INTERACTIVE
Cisco IP Switched Networks (CCNP Switch), Part 4 of 7: Inter VLAN-Routing
LearnNow Online
1 hr 29 mins
Premium
Course description This courses discusses the variety of ways to do inter-VLAN routing. It talks about broadcast domains and how to focus on routing traffic between different VLANs and beyond with both routers and multi-layer switches. Each LearnNowOnline training course is made up of Modules (typically an hour in length). Within each module there are Topics (typically 15-30 minutes each) and Subtopics (typically 2-5 minutes each). There is a Post Exam for each Module that must be passed with a score of 70% or higher to successfully and fully complete the course. Prerequisites This is part 4 of the series. Meet the expert Kenneth Mayer As a certified Microsoft Instructor, Ken has focused his career on various security aspects of computer and network technology since the early 1980s. He has offered a wide variety of IT training and high level consulting projects for Fortune 500 companies globally. Through the course of his extensive career, he has taught a full line of Microsoft, CompTIA, Cisco, and other high level IT Security curricula.   Video Runtime 69 Minutes Time to complete 89 Minutes   Course Outline Inter-VLAN Routing VLAN Routing (28:45) Introduction (00:12) Router on a Stick (07:51) Demo: Build a Network (04:49) Demo: Sub-Interfaces (04:34) Demo: Add a Host (05:38) Demo: Router on a Stick (05:31) Summary (00:08) External Routing (13:01) Introduction (00:08) Pros and Cons of an External Router (01:34) Using an MLS (03:41) SVI eNotes (05:49) Layer 2 to Layer 3 (01:39) Summary (00:08) Switch Virtual Interface (27:50) Introduction (00:08) Demo: Build a Network (05:36) Demo: Add Addresses (03:53) Demo: Create VLAN Interfaces (05:47) Demo: SVI Routing (04:37) L3 Switch Interface eNotes (04:03) Requirements for an SVI (01:36) EtherChannel on L3 (01:58) Summary (00:08)
INTERACTIVE
Digital Security Awareness, Part 1 of 4: Introduction
LearnNow Online
1 hr 28 mins
Premium
Course description This course will explore types of security threats, both digital and physical. It will start off with an overview, look at types of threats and also social engineering. Each LearnNowOnline training course is made up of Modules (typically an hour in length). Within each module there are Topics (typically 15-30 minutes each) and Subtopics (typically 2-5 minutes each). There is a Post Exam for each Module that must be passed with a score of 70% or higher to successfully and fully complete the course. Prerequisites There are no prerequisites. Meet the expert Kenneth Mayer As a certified Microsoft Instructor, Ken has focused his career on various security aspects of computer and network technology since the early 1980s. He has offered a wide variety of IT training and high level consulting projects for Fortune 500 companies globally. Through the course of his extensive career, he has taught a full line of Microsoft, CompTIA, Cisco, and other high level IT Security curricula.   Video Runtime 68 Minutes Time to complete 88 Minutes   Course Outline Introduction Overview (12:42) Introduction (00:10) Overview (00:22) Security Domains (03:37) What Is Security? (01:34) Are You at Risk? (02:18) So What About You? (01:10) Course Goals (00:34) What Will We Cover? (00:46) Social Engineering (01:58) Summary (00:08) Types of Threats (25:52) Introduction (00:08) Introduction (03:25) Your Internet (05:34) Yourself (03:54) Social Engineering (03:00) Your Email (02:53) Wardriving (02:20) Your Files (04:26) Summary (00:08) Social Engineering (29:44) Introduction (00:08) What Is Social Engineering? (10:28) Social Engineering Defense (03:30) Manipulation (05:38) Why Social Engineering Works (07:32) Personal Precautions (02:18) Summary (00:08)
INTERACTIVE
Cyber Security Awareness Basics, Part 1 of 2: Overview and Threats
LearnNow Online
1 hr 19 mins
Premium
Course description This course will explore types of security threats, both digital and physical. It will start off with an overview, look at types of threats, social engineering and identity theft. Each LearnNowOnline training course is made up of Modules (typically an hour in length). Within each module there are Topics (typically 15-30 minutes each) and Subtopics (typically 2-5 minutes each). There is a Post Exam for each Module that must be passed with a score of 70% or higher to successfully and fully complete the course. Prerequisites There are no prerequisites Meet the expert Kenneth Mayer As a certified Microsoft Instructor, Ken has focused his career on various security aspects of computer and network technology since the early 1980s. He has offered a wide variety of IT training and high level consulting projects for Fortune 500 companies globally. Through the course of his extensive career, he has taught a full line of Microsoft, CompTIA, Cisco, and other high level IT Security curricula.   Video Runtime 59 Minutes Time to complete 79 Minutes   Course Outline Social Engineering and Identity Theft Overview (04:11) Introduction (00:10) What Is Security (01:35) Are You at Risk? (02:17) Summary (00:08) Types of Threats (09:16) Introduction (00:08) Introduction (03:25) Your Internet (05:34) Summary (00:08) Social Engineering (10:43) Introduction (00:08) What Is Social Engineering? (01:04) How Social Engineering Is Done (09:22) Summary (00:08) Social Engineering Defense (05:53) Introduction (00:08) Manipulation (05:36) Summary (00:08) Social Engineering Precautions (10:08) Introduction (00:08) Why Social Engineering Works (07:33) Personal Precautions (02:18) Summary (00:08) Identify Theft (11:49) Introduction (00:08) What Is Identity Theft? (01:42) Other Possibilities (00:59) How Does It Happen? (02:56) More Identity Theft Methods (05:54) Summary (00:08) Identify Theft Defense (07:28) Introduction (00:08) How to Defend Yourself (02:30) How to Defend Yourself (Cont.) (04:03) Online Credit Card Use (00:37) Summary (00:08)
INTERACTIVE
Digital Security Awareness, Part 2 of 4: Data
LearnNow Online
1 hr 27 mins
Premium
Course description This course will explore types of security threats, both digital and physical, It will cover identity theft, data classification: sharing, privileges, and risk management. Each LearnNowOnline training course is made up of Modules (typically an hour in length). Within each module there are Topics (typically 15-30 minutes each) and Subtopics (typically 2-5 minutes each). There is a Post Exam for each Module that must be passed with a score of 70% or higher to successfully and fully complete the course. Prerequisites There are no prerequisites. Meet the expert Kenneth Mayer As a certified Microsoft Instructor, Ken has focused his career on various security aspects of computer and network technology since the early 1980s. He has offered a wide variety of IT training and high level consulting projects for Fortune 500 companies globally. Through the course of his extensive career, he has taught a full line of Microsoft, CompTIA, Cisco, and other high level IT Security curricula.   Video Runtime 67 Minutes Time to complete 87 Minutes   Course Outline Data Classification Identify Theft (27:51) Introduction (00:10) What Is Identity Theft? (01:42) Other Possibilities (00:59) How Does It Happen? (02:56) More Identity Theft Methods (05:54) How to Defend Yourself (Cont.) (06:34) Online Credit Card Use (00:38) What Criminals Do with Your Information (01:51) Other Things Criminals Do (01:17) What Criminals Do with Your Information (Cont.) (01:09) How to Know if You're a Victim (00:39) Actions to Take if You Are a Victim (01:24) Fraud Alerts (01:46) Contact Information (00:38) Summary (00:08) Data Classification Part 1 (22:22) Introduction (00:08) Policies for Data Sharing (04:32) Privilege Creep (05:29) How to Classify (01:35) Information Value (03:31) How to Classify (Cont.) (01:36) Evaluate and Divide (01:15) How to Classify (Cont. Again) (02:45) Structured and Unstructured Data (01:19) Summary (00:08) Data Classification Part 2 (17:24) Introduction (00:08) Data Classification (04:11) What Could Happen? (01:54) What Type of Policies? (04:44) Destroying Data (02:56) How to Destroy Data (03:21) Summary (00:08)
INTERACTIVE
Digital Security Awareness, Part 3 of 4: Protection
LearnNow Online
2 hrs 2 mins
Premium
Course description This course will explore types of security threats, both digital and physical. It starts with protecting digital information and then types of malware such as viruses, worms, trojans and phishing. It will finish with Storage and Backups. Each LearnNowOnline training course is made up of Modules (typically an hour in length). Within each module there are Topics (typically 15-30 minutes each) and Subtopics (typically 2-5 minutes each). There is a Post Exam for each Module that must be passed with a score of 70% or higher to successfully and fully complete the course. Prerequisites There are no prerequisites. Meet the expert Kenneth Mayer As a certified Microsoft Instructor, Ken has focused his career on various security aspects of computer and network technology since the early 1980s. He has offered a wide variety of IT training and high level consulting projects for Fortune 500 companies globally. Through the course of his extensive career, he has taught a full line of Microsoft, CompTIA, Cisco, and other high level IT Security curricula.   Video Runtime 102 Minutes Time to complete 122 Minutes   Course Outline Protection and Malware Protecting Digital Information Part 1 (30:06) Introduction (00:10) Protecting Digital Information (02:14) Types of Backups (05:24) Backup Strategies (04:25) What to Backup (02:27) Store Backups (02:07) Where to Store Backups (02:26) How to Perform Backups (02:21) Demo: Backup Windows (04:23) Virtualization Solutions (03:55) Summary (00:08) Protecting Digital Information Part 2 (28:06) Introduction (00:08) Commonly-Used Programs (01:37) Backup Management Practices (03:21) Passwords (04:51) Demo: Hash Cracking (05:22) Password Management (04:48) Password Management (Cont.) (01:55) Length and Complexity (01:12) Password Management (Cont. Again) (01:30) AAA (03:08) Summary (00:08) Malware Part 1 (25:51) Introduction (00:08) Introduction (00:35) Basic Definitions (07:04) What to Look for (05:41) How You Can Get Infected (03:42) Software Detection (08:31) Summary (00:08) Malware Part 2 (18:55) Introduction (00:08) Hardware Detection (02:16) Cloud Detection (03:32) Know the Extensions (03:23) Demo: Understanding File Extensions (06:37) What to Install (02:48) Summary (00:08)
INTERACTIVE
Cisco IP Switched Networks (CCNP Switch), Part 1 of 7: Network Design
LearnNow Online
1 hr 46 mins
Premium
Course description This course focuses on the theory and hierarchical models of design. It discusses how the choices in communications can improve future growth and scalability as well as how switches forward packets, and MAC addresses on Ethernet networks. Each LearnNowOnline training course is made up of Modules (typically an hour in length). Within each module there are Topics (typically 15-30 minutes each) and Subtopics (typically 2-5 minutes each). There is a Post Exam for each Module that must be passed with a score of 70% or higher to successfully and fully complete the course. Prerequisites This is part 1 in the series. Meet the expert Kenneth Mayer As a certified Microsoft Instructor, Ken has focused his career on various security aspects of computer and network technology since the early 1980s. He has offered a wide variety of IT training and high level consulting projects for Fortune 500 companies globally. Through the course of his extensive career, he has taught a full line of Microsoft, CompTIA, Cisco, and other high level IT Security curricula.   Video Runtime 86 Minutes Time to complete 106 Minutes   Course Outline Network Design Network Design (27:39) Introduction (00:12) Hierarchical Design (09:12) Access Layer (04:57) Distribution Layer (05:59) Core Layer (02:42) Collapsed Core Option (02:31) Collapsed Core (01:56) Summary (00:08) Switch Types (26:34) Introduction (00:08) Types of Switches (04:23) Routed vs. Switched Architecture (02:54) Layer 2 Switching (04:33) Other Switchng Tables (02:24) Multilayer Switching at the Access Layer (01:54) How the Frame is Re-written at L3 (07:22) Cisco Distributed Hardware Model (02:44) Summary (00:08) Switching Methods (32:22) Introduction (00:08) Introduction (03:03) Switching Methods eNotes (07:54) Route Caching (01:09) Topology-Based Switching (01:46) What Is SDM (01:36) The New CDP (02:00) Turn LLDP on (03:14) What Power Options You Have (02:17) What Can You Power and PoE (02:50) PoE eNotes (03:39) PoE Negotiation (00:52) Enabling PoE (00:40) Summary (00:59) Summary (00:08)
INTERACTIVE
Interconnecting Cisco Networking Devices (CCNA), Part 3 of 5: Multi-Area Networks
LearnNow Online
2 hrs 16 mins
Premium
Course description The Interconnecting Cisco Networking Devices Part 2 (ICND2) is the exam associated with the Cisco Certified Network Associate certification.This course talks about implementing OSPF in multiple areas. It also talks about what to look for in misconfiguration as well as using OSPF version 3 to support IPv6 Each LearnNowOnline training course is made up of Modules (typically an hour in length). Within each module there are Topics (typically 15-30 minutes each) and Subtopics (typically 2-5 minutes each). There is a Post Exam for each Module that must be passed with a score of 70% or higher to successfully and fully complete the course. Prerequisites This is part 3 of the series. Meet the expert Kenneth Mayer As a certified Microsoft Instructor, Ken has focused his career on various security aspects of computer and network technology since the early 1980s. He has offered a wide variety of IT training and high level consulting projects for Fortune 500 companies globally. Through the course of his extensive career, he has taught a full line of Microsoft, CompTIA, Cisco, and other high level IT Security curricula.   Video Runtime 116 Minutes Time to complete 136 Minutes   Course Outline OSPF OSPF Overview (33:01) Introduction (00:12) OSPF (00:46) Data Stored in a Link-State Protocol (03:11) Metric (03:06) OSPF Adjacencies (02:27) Establishing OSPF Neighbor Adjacencies (02:15) Building the Link-State Database (03:25) What Are OSPF Areas (06:18) OSPF Router Types (01:51) LSAs (01:44) Basic LSA Types (06:16) Summary (01:17) Summary (00:08) Multiarea OSPF Implementation (12:52) Introduction (00:06) Multiarea OSPF Planning (02:31) Multiarea OSPF Configuration Continued (03:46) Multiarea OSPF Configuration Continued (01:25) Verify Multiarea OSPF (02:08) Verify Multiarea OSPF Continued (02:01) Summary (00:44) Summary (00:08) Troubleshooting Multiearea OSPF (20:36) Introduction (00:08) OSPF Neighbor States (01:49) OSPF Neighbor States Continued (02:28) Troubleshooting OSPF (05:03) OSPF Neighbor Problems (01:38) OSPF Neighbor Problems Continued (02:08) OSPG Area (01:01) Enabling Interfaces for OSPF (00:44) Passive State (01:03) HQ Advertisement (01:10) Other Routing Protocols (02:24) Summary (00:47) Summary (00:08) OSPF Demo (50:02) Introduction (00:21) Demo: Finding a Route (04:59) Demo: Advertising the Interface (03:22) Demo: Optimal Route (03:45) Demo: Adjacencies (04:58) Demo: IPv6 Network Addresses (03:41) Demo: IPv6 Network Addresses Continued (06:02) Demo: IPv6 Gateways and OSPF (04:53) Demo: IPv6 OSPF Continued (06:02) Demo: OSPF Neighbors (02:39) OSPF v3 (02:42) Configuring OSPFv3 (02:38) Verfiy OSPFv3 (01:44) Verify OSPFv3 Continued (01:04) Summary (00:58) Summary (00:08)
INTERACTIVE
Cyber Security Awareness Basics, Part 2 of 2: Protection and Malware
LearnNow Online
1 hr 41 mins
Premium
Course description This course will explore types of security threats, both digital and physical. It starts with protecting digital information and then discusses types of malware such as viruses, worms, trojans and phishing as well as software detection and finishes with file extensions. Each LearnNowOnline training course is made up of Modules (typically an hour in length). Within each module there are Topics (typically 15-30 minutes each) and Subtopics (typically 2-5 minutes each). There is a Post Exam for each Module that must be passed with a score of 70% or higher to successfully and fully complete the course. Prerequisites There are no prerequisites Meet the expert Kenneth Mayer As a certified Microsoft Instructor, Ken has focused his career on various security aspects of computer and network technology since the early 1980s. He has offered a wide variety of IT training and high level consulting projects for Fortune 500 companies globally. Through the course of his extensive career, he has taught a full line of Microsoft, CompTIA, Cisco, and other high level IT Security curricula.   Video Runtime 81 Minutes Time to complete 101 Minutes   Course Outline Malware Identify Theft Actions (09:03) Introduction (00:08) What Criminals Do with Your Information (01:51) Other Things Criminals Do (01:17) What Criminals Do with Your Information (Cont.) (01:09) How to Know if You're a Victim (00:39) Actions to Take if You Are a Victim (01:24) Fraud Alerts (01:46) Contact Information (00:38) Summary (00:08) Protecting Digital Information (05:09) Introduction (00:10) Passwords (02:07) Hashing (02:43) Summary (00:08) Password Management (09:43) Introduction (00:08) Password Management (04:49) Password Management (Cont.) (01:56) Length and Complexity (02:41) Summary (00:08) Malware Definitions (07:55) Introduction (00:08) Introduction (00:35) Basic Definitions (07:03) Summary (00:08) Malware Infections (21:04) Introduction (00:08) What to Look For (01:35) What to Look for (04:05) How can you get Infected (06:42) Summary (08:32) Malware Detection (18:40) Introduction (00:08) Software Detection (04:07) Personal Firewalls (04:24) Summary (10:00) File Extensions (10:16) Introduction (00:08) Know the Extensions (03:23) Demo: Understanding File Extensions (06:36) Summary (00:08)
Start your free Premium trialTry GO1 Premium free for 14 days. Easy signup, no commitment and, most importantly, instant access to 1000's of courses.
INTERACTIVE
Cisco IP Switched Networks (CCNP Switch), Part 3 of 7: Spanning Tree
LearnNow Online
2 hrs 55 mins
Premium
Course description This course discusses the options of spanning tree and what is happening when switches talk to each other to create a loop free topology. Each LearnNowOnline training course is made up of Modules (typically an hour in length). Within each module there are Topics (typically 15-30 minutes each) and Subtopics (typically 2-5 minutes each). There is a Post Exam for each Module that must be passed with a score of 70% or higher to successfully and fully complete the course. Prerequisites This is part 3 in the series. Meet the expert Kenneth Mayer As a certified Microsoft Instructor, Ken has focused his career on various security aspects of computer and network technology since the early 1980s. He has offered a wide variety of IT training and high level consulting projects for Fortune 500 companies globally. Through the course of his extensive career, he has taught a full line of Microsoft, CompTIA, Cisco, and other high level IT Security curricula.   Video Runtime 135 Minutes Time to complete 175 Minutes   Course Outline Spanning Tree Protocol Spanning Tree (17:49) Introduction (00:12) Types of STP (06:31) STP Operation eNotes (05:56) BPDU eNotes (05:01) Summary (00:08) Root Bridge (27:31) Introduction (00:08) BPDU Types (01:10) Electing the Root Bridge (08:06) Root Bridge eNotes (12:20) STP Transition States (05:37) Summary (00:08) PVST (24:37) Introduction (00:08) PVST (05:47) Demo: Per-VLAN Spanning Tree (05:04) Demo: VTP and Trunking (05:53) Demo: Change Root Bridge (04:55) Influencing the Root Bridge Election (02:40) Summary (00:08) STP Options Cost and Priority (24:40) Introduction (00:08) Changing Cost and Priority eNotes (05:26) Manipulate a Path (00:49) Demo: Cost and Priority (04:10) Convergence Time (01:07) RSTP Port States (04:47) Change of Port States (03:30) Running RSTP (03:12) Spanning Tree Security Overview (01:20) Summary (00:08) UplinkFast (20:59) Introduction (00:08) UplinkFast eNotes (02:01) BackboneFast eNotes (03:39) Configure UplinkFast and BackboneFast (01:03) PortFast and BPDU Guard eNotes (03:15) BPDU Filter (02:13) Root Guard (02:39) Demo: PortFast (05:48) Summary (00:08) Unidirectional Problems (19:49) Introduction (00:08) Unidirectional Problems eNotes (03:45) Loop Guard (03:06) Hardware Failure (01:20) Flex Links (01:11) Flex Links eNotes (01:03) Multiple Spanning Tree (01:48) MST Design eNotes (04:09) Internal Spanning Trees (00:48) MST and STP (01:05) Summary (01:13) Summary (00:08)
INTERACTIVE
Cisco IP Switched Networks (CCNP Switch), Part 5 of 7: Advanced Switch Config Options
LearnNow Online
2 hrs 36 mins
Premium
Course description This course discusses advanced configuration options with topics like NTP and SLA. Each LearnNowOnline training course is made up of Modules (typically an hour in length). Within each module there are Topics (typically 15-30 minutes each) and Subtopics (typically 2-5 minutes each). There is a Post Exam for each Module that must be passed with a score of 70% or higher to successfully and fully complete the course. Prerequisites This is part 5 of the series. Meet the expert Kenneth Mayer As a certified Microsoft Instructor, Ken has focused his career on various security aspects of computer and network technology since the early 1980s. He has offered a wide variety of IT training and high level consulting projects for Fortune 500 companies globally. Through the course of his extensive career, he has taught a full line of Microsoft, CompTIA, Cisco, and other high level IT Security curricula.   Video Runtime 116 Minutes Time to complete 156 Minutes   Course Outline NTP and SNMP Set Switch Time (26:24) Introduction (00:12) Time Setting (01:45) Demo: Manually Set Time (02:35) NTP (01:06) NTP Continued (02:12) NTP Modes (02:37) Example Setup eNotes (01:29) Demo: NTP Settings (07:22) Hierarchy Options of NTP (01:42) Demo: Secure NTP (05:10) Summary (00:08) NTP and SNMP (33:51) Introduction (00:08) NTP Versions (02:39) SNTP (02:22) Overview of SNMP (06:06) Versions of SNMP (05:14) SNMP Best Practices (04:00) Steps to Configure SNMPv3 (03:08) Demo: SNMP (03:07) Demo: SNMP Groups (06:54) Summary (00:08) SLA, SPAN, and StackWise SLA (21:46) Introduction (00:08) IP SLA (01:31) Get IOS IP SLA Diagram eNotes (04:02) IP SLA Source/Responder (01:02) SLA eNotes (06:45) Demo: IP SLA (04:08) Demo: Run IP SLA Test (03:59) Summary (00:08) SLA Responders (19:59) Introduction (00:08) SLA Operation with Responder eNotes (05:14) Responder Time Stamps (02:17) Demo: SLA Responder (07:40) SPAN (01:04) Terminology (01:33) Remote SPAN (01:05) Simple Steps to Configure SPAN (00:47) Summary (00:08) StackWise (14:05) Introduction (00:08) RSPAN (01:13) StackWise (02:22) StackWise eNotes (02:40) Benefits of StackWise (00:41) Switch Supervisors (02:08) Supervisor Redundancy Modes (02:46) VSS (01:56) Summary (00:08)
INTERACTIVE
Cisco IP Switched Networks (CCNP Switch), Part 6 of 7: L3 First Hop Redundancy Protocol
LearnNow Online
1 hr 45 mins
Premium
Course description Communications protocols help traffic rout more efficiently all lumped into an acronym of FHRP -- First hop redundancy protocol. Each LearnNowOnline training course is made up of Modules (typically an hour in length). Within each module there are Topics (typically 15-30 minutes each) and Subtopics (typically 2-5 minutes each). There is a Post Exam for each Module that must be passed with a score of 70% or higher to successfully and fully complete the course. Prerequisites This is part 6 of the series. Meet the expert Kenneth Mayer As a certified Microsoft Instructor, Ken has focused his career on various security aspects of computer and network technology since the early 1980s. He has offered a wide variety of IT training and high level consulting projects for Fortune 500 companies globally. Through the course of his extensive career, he has taught a full line of Microsoft, CompTIA, Cisco, and other high level IT Security curricula.   Video Runtime 85 Minutes Time to complete 105 Minutes   Course Outline Redundancy FHRP and HSRP (32:42) Introduction (00:12) The Need for FHRP eNotes (02:12) Example of FHRP eNotes (02:13) HSRP Toplogy eNotes (02:57) Configuration of HSRP eNotes (07:43) Demo: HSRP (06:24) Demo: Set up Router 2 (04:29) Demo: Pre-empt (06:20) Summary (00:08) HSRP Continued (24:28) Introduction (00:08) What Is HSRP Pre-empt (03:50) HSRP Transition Steps (01:46) HSRP State Transitions (01:40) STP and HSRP (01:18) Can You Load Share (02:12) Interface Tracking (04:23) Tracking Objects eNotes (02:22) Demo: HSRP Failover and Tracking (05:12) Object Tracking Goals (01:24) Summary (00:08) Timers and VRRP (28:00) Introduction (00:08) HSRP Timers (02:09) HSRP Versions (02:16) VRRP (01:35) VRRP eNotes (01:44) Demo: Configure VRRP (04:18) Demo: Using VRRP (04:08) Minor Changes (00:40) VRRP Authentication and Tracking (01:31) Summary (01:34) GLBP (02:12) GLBP Election (00:31) Overview of GLBP eNotes (04:36) Summary (00:22) Summary (00:08)
INTERACTIVE
Cisco IP Switched Networks (CCNP Switch), Part 7 of 7: Security
LearnNow Online
1 hr 59 mins
Premium
Course descriptionThis courses discusses the importance of layer 2 security to the integrity of your network. Topics include: best practices, rogue devices, port security and ARP Spoofing.Each LearnNowOnline training course is made up of Modules (typically an hour in length). Within each module there are Topics (typically 15-30 minutes each) and Subtopics (typically 2-5 minutes each). There is a Post Exam for each Module that must be passed with a score of 70% or higher to successfully and fully complete the course.This is part 7 in the series.Kenneth MayerAs a certified Microsoft Instructor, Ken has focused his career on various security aspects of computer and network technology since the early 1980s. He has offered a wide variety of IT training and high level consulting projects for Fortune 500 companies globally. Through the course of his extensive career, he has taught a full line of Microsoft, CompTIA, Cisco, and other high level IT Security curricula.Video Runtime99 MinutesTime to complete119 MinutesCourse OutlineSecuritySecurity Best Practices (21:13)Introduction (00:12)OSI Layers Security (01:39)Layer 2 Security (02:39)Best Practices (09:50)Best Practices Continued (02:30)Rogue Devices (02:23)Layer 2 Attacks (01:48)Summary (00:08)Port Security (32:45)Introduction (00:08)MAC Flooding eNotes (02:22)Port Security eNotes (01:54)Demo: Create Network (05:41)Demo: Port Security (05:21)Port Errors (03:00)Port-Based ACL (02:09)Storm Control (02:56)Demo: Storm Control (02:18)AAA Framework (02:06)Authentication (03:02)RADIUS and TACACS (01:35)Summary (00:08)RADIUS and TACACS (22:16)Introduction (00:08)RADIUS and TACACS+ (03:27)RADIUS and TACACS+ eNotes (02:57)Demo: AAA Configuration Options (04:36)Demo: AAA Groups (03:42)Limitations (01:19)Physical Security (01:26)802.1x (00:59)802.1x eNotes (01:40)802.1x Configuration (01:49)Summary (00:08)DHCP Spoofing (23:39)Introduction (00:08)DHCP Spoofing Attacks eNotes (03:12)Cisco DHCP Spoofing eNotes (01:42)IP Source Guard (01:33)ARP Spoofing eNotes (03:43)DAI (01:20)Dynamic Trunking Protocol (01:02)VLAN Hopping (02:59)VACLs (01:35)Why PVLANs eNotes (04:47)Isolated Ports (00:51)Protected Ports (00:34)Summary (00:08)
INTERACTIVE
Certified Information Security Manager CISM, Part 2 of 4: Risk Management
LearnNow Online
2 hrs 56 mins
Premium
Course description This course covers processes that deal with risk management and establishing a process for information asset classification, systematic risk assessment, business impact assessments, threat and vulnerability evaluations, identify and evaluate information security controls, lifecycle process and finally reporting changes in information. This course is part of a series covering the ISACA Certified Information Security Manager (CISM). Each LearnNowOnline training course is made up of Modules (typically an hour in length). Within each module there are Topics (typically 15-30 minutes each) and Subtopics (typically 2-5 minutes each). There is a Post Exam for each Module that must be passed with a score of 70% or higher to successfully and fully complete the course. Prerequisites This is part 2 of the series Meet the expert Kenneth Mayer As a certified Microsoft Instructor, Ken has focused his career on various security aspects of computer and network technology since the early 1980s. He has offered a wide variety of IT training and high level consulting projects for Fortune 500 companies globally. Through the course of his extensive career, he has taught a full line of Microsoft, CompTIA, Cisco, and other high level IT Security curricula.   Video Runtime 136 Minutes Time to complete 176 Minutes   Course Outline Risk Overview and concepts Risk Management Overview (14:52) Introduction (01:58) Risk Management Overview (07:07) Importance of Risk Management (02:15) Risk Management Outcomes (03:22) Summary (00:08) Information Security Risk Management (15:36) Introduction (04:16) Information Security Risk Management (03:07) Scope and Charter (05:13) Roles and Responsibilities (02:51) Summary (00:08) Information Security Management Concepts (07:10) Introduction (00:23) Information Security Management Concepts (03:33) Network Equipment (03:06) Summary (00:08) Risk Management Framework (16:55) Introduction (02:10) Risk Management Framework (02:00) The External Environment (03:54) Risk Management Context (03:09) Gap Analysis (04:09) Risk Analysis (01:22) Summary (00:08) Assessment, Controls and Objectives Risk Assessment (39:17) Introduction (01:20) Risk Assessment (06:44) Other Risk Assessment Approaches (03:07) Identification of Risks (07:28) Risk (03:27) Risk Analysis (08:35) Evaluation of Risks (08:25) Summary (00:08) Controls and Countermeasures (22:40) Introduction (00:26) Controls and Countermeasures (08:21) Information Resource Valuation (06:42) Determining Classification (05:58) Impact Continued (01:03) Summary (00:08) Recovery Point Objectives (20:14) Introduction (00:51) Recovery Point Objectives (06:17) Third-Party Service Providers (07:57) Project Management (02:57) Risk Monitoring and Communication (02:03) Summary (00:08)
INTERACTIVE
Certified Information Security Manager CISM, Part 4 of 4: Incident Management
LearnNow Online
5 hrs 9 mins
Premium
Course description This course talks about different parts of incident management, overview, organization, resources, ways of measuring it, procedures, current state of incident response capability, and how to develop an incident response plan. You will also learn how to coordinate with disaster recovery and responsibility and discovery plans and testing. It wraps up with a post incident activities investigation. This course is part of a series covering the ISACA Certified Information Security Manager (CISM). Each LearnNowOnline training course is made up of Modules (typically an hour in length). Within each module there are Topics (typically 15-30 minutes each) and Subtopics (typically 2-5 minutes each). There is a Post Exam for each Module that must be passed with a score of 70% or higher to successfully and fully complete the course. Prerequisites This is part 4 in the series Meet the expert Kenneth Mayer As a certified Microsoft Instructor, Ken has focused his career on various security aspects of computer and network technology since the early 1980s. He has offered a wide variety of IT training and high level consulting projects for Fortune 500 companies globally. Through the course of his extensive career, he has taught a full line of Microsoft, CompTIA, Cisco, and other high level IT Security curricula.   Video Runtime 249 Minutes Time to complete 309 Minutes   Course Outline Introduction to Incident Management Incident Management Overview (28:43) Introduction (00:53) Introduction to Incident Management (03:09) Incident Management Overview (03:44) Types of Events (02:43) Types of Events Continued (03:21) Goals of Incident Management (04:45) BCP and DRP (06:31) Goals of Incident Management Continued (03:25) Summary (00:08) Incident Response Procedures (29:28) Introduction (00:24) Introduction to Incident Response Planning (03:40) Importance of Incident Management (08:01) Outcomes of Incident Management (03:51) Incident Management (01:34) Concepts (03:44) Concepts Continued (01:35) Incident Response (01:34) Incident Management Systems (04:54) Summary (00:08) Incident Management Organization and Resources Incident Management Organization (18:54) Introduction (00:21) Introduction to Incident Management Organization (02:59) Incident Management Organization (02:30) Responsibilities (03:44) Responsibilities Continued (02:58) Defining Security Incidents (05:10) Senior Management Commitment (01:01) Summary (00:08) Incident Management Resources (36:18) Introduction (00:26) Policies and Standards (00:37) Incident Response Technology Concepts (11:11) Personnel (03:11) Roles and Responsibilities (08:24) Skills (08:09) Awareness and Education (01:21) Audits (02:48) Summary (00:08) Incident Management Objectives (13:58) Introduction (00:18) Defining Objectives (00:48) The Desired State (03:29) Strategic Alignment (06:42) Other Concerns (02:31) Summary (00:08) Incident Management Metrics and Indicators (13:03) Introduction (01:06) Defined Responsibilities (03:01) Management Metrics and Monitoring (01:35) Metrics and Minitoring Continued (02:48) Other Things to Monitor (04:23) Summary (00:08) Current State of Response Capability (11:15) Introduction (00:12) Threats (04:39) Vulnerabilities (06:15) Summary (00:08) Incident Response Plan Developing an Incident Response Plan (31:44) Introduction (00:45) Elements of an Incident Response Plan (08:21) Gap Analysis (03:04) BIA (05:05) BIA Continued (02:48) Escalation Process for Effective IM (02:45) Identifying Security Incidents (01:27) Incident Management and Response Teams (02:10) Organizing, Training, and Equipping Response Staff (01:55) Incident Notification Process (00:55) Incident Management Plan Challenges (02:17) Summary (00:08) Recovery Options (30:02) Introduction (01:33) Goals of Recovery Operations (04:00) Mobile Sites (05:37) Choosing a Site Selection (01:18) Recovery Plan (03:58) Incident Management Response Teams (02:10) Network Service High Availability (04:16) Storage High Availability (04:01) Risk Transference (01:27) BCP and DRP (01:28) Summary (00:08) Testing Response and Recovery Plans (10:26) Introduction (02:18) Periodic Testing (01:17) Testing IT Infrastructure (02:05) Analyze Test Results (03:39) Measuring the Test Results (00:56) Summary (00:08) Executing the Plan (25:38) Introduction (01:57) Updating the Plan (01:16) Intrusion Detection Policies (01:38) Who to Notify About an Incident (01:52) Recovery Operations (01:52) Other Operations (01:57) Forensic Investigation (03:04) Hacker/Penetration Methodology (05:40) Hacker/Penetration Methodology Continued (06:08) Summary (00:08)
INTERACTIVE
Cisco CCNP Implementing Cisco IP Routing , Part 4 of 4: Branch Office and IPv6
LearnNow Online
2 hrs 18 mins
Premium
Course descriptionImplementing Cisco IP Routing is a qualifying exam for the Cisco Certified Network Professional CCNP®. This course discusses Branch Office connectivity and mobile connectivity. It then covers everything you will need to know about IPv6 including: basic addresses, usage, routing, and tunnelingEach LearnNowOnline training course is made up of Modules (typically an hour in length). Within each module there are Topics (typically 15-30 minutes each) and Subtopics (typically 2-5 minutes each). There is a Post Exam for each Module that must be passed with a score of 70% or higher to successfully and fully complete the course.This is part 4 in the series.Kenneth MayerAs a certified Microsoft Instructor, Ken has focused his career on various security aspects of computer and network technology since the early 1980s. He has offered a wide variety of IT training and high level consulting projects for Fortune 500 companies globally. Through the course of his extensive career, he has taught a full line of Microsoft, CompTIA, Cisco, and other high level IT Security curricula.Carlo TannouryCarlo has worked in the computer technologies industry since the mid-90s. He is also a certified member of Microsoft, Cisco, ISACA, PMI, CompTIA, IIC, and EC-Council. He has designed and customized courses for private and public sectors, including college curriculums, and has worked as a lead consultant engineer in corporate Cyber security and Information Assurance training since 2001.Video Runtime98 MinutesTime to complete138 MinutesCourse OutlineBranch Offices and Mobile WorkersBranch Office Implementation (23:08)Introduction (00:10)Branch Office Challenges (02:31)Branch Office Design Considerations (01:42)The Thin Branch (00:32)Broadband Technology Deployment (01:26)Wireless Broadband and Municipal Broadband (00:43)WiMAX and Broadband Types (02:01)Verify PPPoA and Configure a NAT Pool (01:23)Bind the ACL and NAT Pool (00:44)Configure Static NAT and Identify NAT Interfaces (01:03)Create a Tunnel Interface (01:56)Demo: Static NATing (04:41)Demo: Static NATing Continued (04:02)Summary (00:08)Mobile Worker Implementations (03:30)Introduction (00:05)Mobile Worker Connectivity (01:24)Business-Ready Mobile User Solution (00:48)Business-Ready VPN Components (01:04)Summary (00:08)Routing Traffic to Mobile Workers (02:00)Introduction (00:05)Easy VPN Server (00:40)Routing Services for VPN Subnets (00:20)Proxy ARP and Remote User Connections (00:46)Summary (00:08)IPv6Introducing IPv6 (06:38)Introduction (00:03)IPv6 Introduction (00:49)IPv6 Features and MTU Discovery (02:17)New IPv6 Features (01:10)IPv6 Address Specifics (00:42)Abbreviating IPv6 Addresses (01:27)Summary (00:08)Verify IPv6 Unicast Addresses (05:51)Introduction (00:05)Enable IPv6 Routing (00:41)Enable CEF for IPv6 (00:48)IPv6 on an Interface and Ethernet EUI-64 (01:23)Enable IP Unnumbered and Stateless Auto-Config (01:19)Neighbor Detection Parameter and Neighbor Routers (01:25)Summary (00:08)IPv6 and Static Routing (05:02)Introduction (00:04)IPv6 Routing (00:52)Static Routing and Configuring IPv6 Static Routes (00:58)Static Route Types and RIPng (02:09)Enable and Config IPv6 RIP Process on an Interface (00:49)Summary (00:08)Configure OSPFv3 (28:42)Introduction (00:05)IPv6 Protocol Implementation and OSPFv3 (01:31)Link-Local Addresses and Multiple OSPFv3 Instances (00:54)Security and SA Types for IPv6 (00:57)OSPFv3 Routing Process Parameters and Router ID (01:08)Enable an OSPFv3 Instance and Specify Packet Cost (00:52)Change OSPF Priority and Define Stub Areas (00:59)Routes at Area Boundary and Trigger SPF Recalc (00:48)Demo: Enable OSPFv3 (04:56)Demo: Configure Branch Routers (05:36)Demo: Troubleshooting (04:33)Demo: Troubleshooting Continued (06:10)Summary (00:08)EIGRP for IPv6 (20:33)Introduction (00:05)EIGRP for IPv6 (00:53)Routing Parameters and Define Router ID (00:50)Enable EIGRP for IPv6 and Identify Stub Router (00:35)Summary Aggregate Address (00:34)Demo: Configure EIGRP (05:06)Demo: Configure Branch Routers and Headquarters (05:19)Demo: Passive Interface (04:33)Demo: Troubleshooting (02:26)Summary (00:08)Multiprotocol BGP (02:59)Introduction (00:05)Multiprotocol BGP (00:37)BGP Router ID, Peers, and Routing Sessions (01:02)Identify Peers and Configure Routing Sessions (00:37)Identify Peers and Apply a Route Map (00:29)Summary (00:08)
INTERACTIVE
Interconnecting Cisco Networking Devices (CCNA), Part 5 of 5: Network Device Management
LearnNow Online
4 hrs 46 mins
Premium
Course description The Interconnecting Cisco Networking Devices Part 2 (ICND2) is the exam associated with the Cisco Certified Network Associate certification. The last part in this series covers network device management and protocols. IT will cover SNMP, syslog services, NetFlow and how routers work at the hardware level. It will finish with Cisco devices for small or medium sized environments. Each LearnNowOnline training course is made up of Modules (typically an hour in length). Within each module there are Topics (typically 15-30 minutes each) and Subtopics (typically 2-5 minutes each). There is a Post Exam for each Module that must be passed with a score of 70% or higher to successfully and fully complete the course. Prerequisites This is part 5 of the series Meet the expert Kenneth Mayer As a certified Microsoft Instructor, Ken has focused his career on various security aspects of computer and network technology since the early 1980s. He has offered a wide variety of IT training and high level consulting projects for Fortune 500 companies globally. Through the course of his extensive career, he has taught a full line of Microsoft, CompTIA, Cisco, and other high level IT Security curricula.   Video Runtime 246 Minutes Time to complete 286 Minutes   Course Outline Cisco Devices Configure Device Support for Network Protocols (26:10) Introduction (00:12) Overview (02:01) SNMP Versions (02:08) Obtaining Data from an SNMP Agent (00:51) Obtaining Data from an SNMP Agent Continued (01:54) SNMP Configuration (03:42) Syslog Format (03:30) Syslog Configuration (00:48) NetFlow Overview (01:28) NetFlow Overview Continued (01:25) NetFlow Components (00:47) Flow (01:21) NetFlow Architecture (02:12) Demo: Configuring NetFlow (00:36) Configuring NetFlow Continued (02:19) Summary (00:41) Summary (00:08) Managing Cisco Devices (41:41) Introduction (00:11) Internal Components of a Router (04:47) What does ROM Do (01:08) Router Bootup Sequence (01:35) Configuration Register (00:58) Changing the Configuration Register (01:25) How the IOS Is Found (02:24) IOS Loading (00:37) IOS Loading Continued (00:56) Loading the IOS Configuration File (00:54) Loading the IOS Configuration File Continued (00:40) Cisco IOS Integrated File System (01:59) Viewing the Integrated System (01:08) Managing IOS Images (00:56) Reading the IOS Filename (01:43) Backing up the Image (01:14) Backing up the Image Continued (01:52) Upgrading the IOS (01:14) Upgrading the IOS Continued (02:22) Copy Command Result (02:31) Managing Device Configuration Files (01:19) Managing Device Configuration Files Continued (01:52) Recovering the Enable Password/Secret (04:47) Recovering the Enable Password/Secret Continued (01:47) Summary (01:03) Summary (00:08) Licensing and Superlab Licensing Demo (49:28) Introduction (00:13) Demo: Router Logs (05:27) Demo: Severity Levels (03:41) Demo: Router Secrets (06:02) Demo: Changing a Router Secret (04:10) Demo: Remove Configurations (03:51) Licensing Intro (00:13) Demo: Basic Configuration (05:16) Demo: Create Sub-Interfaces (04:57) Demo: Trunking (07:48) Overview of Licensing (02:57) Overview of Licensing Continued (03:45) Verifying the Licenses (00:56) Summary (00:08) Licensing and Superlab Demo Part 1 (52:11) Introduction (00:13) Installing a Permanent License (01:00) Installing an Evaluation License (02:09) Back up the License (00:51) Uninstalling the License (01:13) Password Recovery (01:58) Recovery (01:45) Config-Register (01:56) Config-Register Continued (05:32) Universal Images (01:14) Demo: Create Channel Groups (05:48) Demo: Channel Group Verifications (05:17) Demo: Multiple Hosts Per Port (03:58) Demo: DHCP Service (05:32) Demo: Prepare for IPv6 Addresses (04:33) Demo: Assign IPv6 Addresses (03:49) Demo: IPv6 Neighbors (05:07) Summary (00:08) Superlab Demo Part 2 (43:16) Introduction (00:13) Demo: Configure Serial Links (05:31) Demo: Encapsulation (05:00) Demo: Frame Relay for Links (05:13) Demo: NAT (05:12) Demo: IP Translations (04:32) Demo: Routing Protocols (05:38) Demo: OSPF Interface (05:41) Demo: (06:03) Summary (00:08) Superlab Demo Part 3 (33:54) Introduction (00:13) Demo: EIGRP (05:16) Demo: EIGRP Continued (04:48) Demo: IPv6 Neighbors (06:21) Demo: Control Server Access (04:41) Demo: Access List (05:41) Demo: Troubleshoot Access List (03:04) Demo: Per-VLAN Spanning Tree (03:38) Summary (00:08)
INTERACTIVE
Interconnecting Cisco Networking Devices (CCNA), Part 2 of 5: Troubleshoot Connectivity
LearnNow Online
3 hrs 6 mins
Premium
Course description The Interconnecting Cisco Networking Devices Part 2 (ICND2) is the exam associated with the Cisco Certified Network Associate certification. This course is about how to troubleshoot basic connectivity problems. IT will cover the OSI layer of physical connectivity, paths taken and traffic expectations as well as routing protocols. Could a connectivity problem be incorrect host information or name resolution? Perhaps it's a DNS issue or a misconfigured Access Control List. This course discusses way of find out just what could be happening, which ways traffic an be blocked and what corrections can be taken to resolve it. Each LearnNowOnline training course is made up of Modules (typically an hour in length). Within each module there are Topics (typically 15-30 minutes each) and Subtopics (typically 2-5 minutes each). There is a Post Exam for each Module that must be passed with a score of 70% or higher to successfully and fully complete the course. Prerequisites This is part 2 of the series Meet the expert Kenneth Mayer As a certified Microsoft Instructor, Ken has focused his career on various security aspects of computer and network technology since the early 1980s. He has offered a wide variety of IT training and high level consulting projects for Fortune 500 companies globally. Through the course of his extensive career, he has taught a full line of Microsoft, CompTIA, Cisco, and other high level IT Security curricula.   Video Runtime 146 Minutes Time to complete 186 Minutes   Course Outline Troubleshooting Connectivity Troubleshoot IPv4 Connectivity (42:36) Introduction (01:07) Troubleshooting End-to-End (00:44) Troubleshooting End-to-End Continued (01:08) Verify End-to-End Connectivity (00:17) Verify End-to-End Connectivity Continued (02:06) Ping (02:49) Traceroute (03:51) Ping and Traceroute on Switches (01:59) Telnet (01:28) PC Host-Based ARP (01:10) Show MAC Address Table (00:55) End-to-End Connectivity (00:33) Path Verification (03:45) Speed Mismatch (02:27) Using Show Interface (01:33) What Is the Current Desired Path (01:20) Codes to Know (01:59) Default Gateway Problems (00:51) Default Gateway Problems Continued (03:09) DNS Issues (00:33) DNS Issues Continued (01:37) Resolution Mapping with Ping (01:09) ACL Issues (01:04) ACL Issues Continued (02:03) Correct the ACL (01:06) Permitting Telnet (01:31) Summary (00:08) Troubleshoot IPv6 Connectivity (20:08) Introduction (00:18) IPv6 Address Types (02:11) Private Addresses (01:43) IPv6 Address Types Continued (03:12) How to Troubleshoot IPv6 Connectivity (00:48) Physical Connectivity (00:26) Verify End-to-End Connectivity (00:41) Verify End-to-End Connectivity Continued (00:14) Using Telnet (01:11) Show Neighbor (01:46) Show IPv6 Neighbors (00:18) Identifying the Path (01:10) Default Gatway Problems (01:07) DNS Problems (00:38) DNS Problems Continued (00:36) ACL Problems (01:00) ACL Problems Continued (00:54) Summary (01:39) Summary (00:08) EIGRP Implmenting EIGRP (34:35) Introduction (00:10) Routing by Rumor (06:39) Administrative Distance (02:34) EIGRP Features (03:22) EIGRP Path Selection (04:23) EIGRP Path Selection Continued (03:29) The EIGRP Metric (03:29) The EIGRP Metric Continued (00:55) Configuring EIGRP (01:38) Verify Neighbors (02:33) Verify EIGRP (00:44) Verify EIGRP Continued (01:52) EIGRP Load Balancing (01:42) Summary (00:49) Summary (00:08) Implmenting EIGRP for IPv6 (35:01) Introduction (00:17) Demo: Troubleshooting EIGRP (06:38) Demo: OSPF (04:30) EIGRP for IPv6 (00:16) Demo: EIGRP for IPv6 (06:01) Demo: EIGRP Routes (02:50) Demo: Headquarters and Peers (05:03) Supporting Multiple Protocols (02:07) EIGRP Commands for Configuration (02:06) EIGRP Commands for Configuration Continued (02:09) Verify Interface and Neighbors (00:47) Verify the Toplogy Table (01:30) Summary (00:32) Summary (00:08) Troubleshooting EIGRP (13:44) Introduction (00:12) EIGRP Troubleshooting Components (01:36) Troubleshooting EIGRP Neighbors (00:56) Troubleshooting EIGRP Neighbors Continued (00:44) EIGRP AS Mismatch (01:35) Serial Interfaces on the Link (01:47) Passive Interfaces (00:48) EIGRP Routing Table Troubleshooting (00:38) EIGRP Routing Table Troubleshooting Continued (03:44) Summary (01:31) Summary (00:08)
INTERACTIVE
Interconnecting Cisco Networking Devices (CCNA), Part 1 of 5: Scalable Networks
LearnNow Online
3 hrs 37 mins
Premium
Course description The Interconnecting Cisco Networking Devices Part 2 (ICND2) is the exam associated with the Cisco Certified Network Associate certification. This course starts with making sure you understand how VLAN's work. Next, it covers layer 2 networking as well as redundant paths and spanning trees It finishes up by looking at redundancy at layer 3 with routers as well as HSRP and gateway load balancing. Each LearnNowOnline training course is made up of Modules (typically an hour in length). Within each module there are Topics (typically 15-30 minutes each) and Subtopics (typically 2-5 minutes each). There is a Post Exam for each Module that must be passed with a score of 70% or higher to successfully and fully complete the course. Prerequisites This is part 1 in the series. Meet the expert Kenneth Mayer As a certified Microsoft Instructor, Ken has focused his career on various security aspects of computer and network technology since the early 1980s. He has offered a wide variety of IT training and high level consulting projects for Fortune 500 companies globally. Through the course of his extensive career, he has taught a full line of Microsoft, CompTIA, Cisco, and other high level IT Security curricula.   Video Runtime 177 Minutes Time to complete 217 Minutes   Course Outline Redundant Switched Topologies Troubleshoot VLAN Connectivity (24:45) Introduction (00:11) Overview of VLANs (01:52) How to create a VLAN (04:05) How to create a VLAN Continued (01:32) What Is a Trunk (02:08) How to Configure a Trunk (02:02) How to Configure a Trunk Continued (01:53) DTP (02:30) VLAN Troubleshooting (02:49) Destination MAC Addresses and VLANs (00:40) VLAN Troubleshooting Continued (00:36) Troubleshooting Trunks (02:14) Troubleshooting Trunks Continued (00:58) Summary (01:01) Summary (00:08) Building Redundant Switched Topologies (40:06) Introduction (00:17) Problems with Redundant Topologies (04:11) How Spanning-Tree Works (04:26) How Spanning-Tree Works Continued (07:21) STP Problems (04:59) PVST+ (01:23) PVST+ Continued (01:46) Changing the Bridge ID (03:13) Reviewing the STP Topology (01:23) Reviewing the STP Topology Continued (02:57) What if STP Fails Continued (00:00) What if STP Fails? (01:54) PortFast and BPDU Guard (03:19) PortFast and BPDU Guard Continued (01:25) Summary (01:18) Summary (00:08) Improve Redundant Switched Topologies (17:10) Introduction (00:10) What Is EtherChannel (01:50) EtherChannel Protocols (02:52) EtherChannel Protocols Continued (01:11) PAgP (01:28) LACP (01:08) How to Configue EtherChannel (01:19) How to Configure EtherChannel Continued (02:51) Verify EtherChannel (00:44) Verify EtherChannel Continued (02:02) Summary (01:22) Summary (00:08) Layer 3 Redundancy Spanning Tree and Trunking Demo (45:04) Introduction (00:09) Demo: Spanning Tree (04:16) Demo: show span (05:04) Demo: Influencing Traffic (06:14) Demo: Portfast (04:01) Demo: EtherChannel (06:12) Demo: Add Port Channels (05:21) Layer 3 Redundancy (00:08) Demo: Trunking (05:21) Demo: VTP (03:01) Demo: VTP Continued (05:04) Summary (00:08) Understanding Layer 3 Redundancy (50:12) Introduction (00:08) Why Have Default Gateway Redundancy (01:47) Default Gateway Redundancy (01:35) Default Gateway Redundancy Continued (01:19) FHRP (02:46) HSRP (02:38) HSRP Continued (04:11) HSRP Failover (03:21) HSRP Configuration (01:32) The HSRP Protocol (01:28) Show Standby (02:03) Active and Standby Routers (02:07) HSRP Track Interface (01:33) HSRP Load Balancing (01:28) Gateway Load Balancing Protocol (03:40) QoS (04:22) QoS Continued (02:32) QoS Configuration (01:46) QoS Options (02:17) Marking (02:18) Queuing Methods (02:25) Congestion Avoidance (00:55) Summary (01:42) Summary (00:08)
INTERACTIVE
Certified Information Security Manager CISM, Part 1 of 4: Governance
LearnNow Online
4 hrs 48 mins
Premium
Course description The goal of this domain is to give an overview of what it takes in planning, development, implementation and management to meet objectives in alignment with business goals. Topics covered include: Information Security concepts, metrics, resources, constraints and a plan to implement them. This course is part of a series covering the ISACA Certified Information Security Manager (CISM). Each LearnNowOnline training course is made up of Modules (typically an hour in length). Within each module there are Topics (typically 15-30 minutes each) and Subtopics (typically 2-5 minutes each). There is a Post Exam for each Module that must be passed with a score of 70% or higher to successfully and fully complete the course. Prerequisites none Meet the expert Kenneth Mayer As a certified Microsoft Instructor, Ken has focused his career on various security aspects of computer and network technology since the early 1980s. He has offered a wide variety of IT training and high level consulting projects for Fortune 500 companies globally. Through the course of his extensive career, he has taught a full line of Microsoft, CompTIA, Cisco, and other high level IT Security curricula.   Video Runtime 228 Minutes Time to complete 288 Minutes   Course Outline Overview and Concepts Overview (24:07) Introduction (01:18) Overview (02:00) Security Governance Overview (02:54) Topdown Support (00:30) Importance of Security Governance (01:18) Benefits of Good Management (06:54) Strategic Alignment (01:26) Risk Management (02:45) Value Delivery (01:27) Outcomes of Governance (01:54) Security Integration (01:28) Summary (00:08) Information Security Governance (23:42) Introduction (00:32) Information Security Governance (01:31) Goals and Objectives Continued (03:02) Roles of Senior Management (05:21) Business Model for Info Sec (00:46) Business Model for Info Sec Continued (06:04) Dyanmic Interconnections (03:29) Dynamic Interconnections Continued (02:46) Summary (00:08) Information Security Concepts (19:44) Introduction (03:28) Information Security Concepts (02:58) More Concepts (03:25) Concepts and Tech Continued (03:31) Variety of Technologies (06:12) Summary (00:08) Information Security Manager (09:28) Introduction (00:36) Information Security Manager (01:48) Senior Management Commitment (03:40) Management Alignment (00:53) Establish Reporting and Communication (02:20) Summary (00:08) Scope and Strategy Scope of Governance (09:39) Introduction (01:56) Scope of Governance (02:24) Assurance Process Integration (02:32) Governance and Third Parties (02:38) Summary (00:08) Governance Metrics (23:13) Introduction (00:58) Governance Metrics (01:38) Metrics (01:44) Effective Security Metrics (02:53) Effective Metrics Continued (00:42) Security Implementation Metrics (05:22) Risk Management (03:44) Performance Management (06:00) Summary (00:08) Information Security Strategy (36:36) Introduction (00:08) Information Security Strategy (06:41) Common Pitfalls (02:17) Objectives of Info Sec Strategy (01:36) What Is the Goal (06:37) Business Case Development (03:22) Business Case Objectives (05:50) Capability Maturity Model (03:01) Architecural Approaches (02:02) Risk Objectives (04:50) Summary (00:08) State of Security (05:55) Introduction (00:47) State of Security (03:48) Business Impact Analysis (01:11) Summary (00:08) Development, Constraints and Plan Information Security Development (09:46) Introduction (00:31) Information Security Development (01:51) The Roadmap (04:29) Strategy Resources and Constraints (02:45) Summary (00:08) Strategy Resources (40:17) Introduction (00:33) Strategy Resources (06:48) Enterprise Information Security Architecture (07:16) Personnel (07:27) Audits (04:04) Threat Assessment (04:03) Risk Assessment (02:21) Insurance (07:33) Summary (00:08) Strategy Constraints (06:47) Introduction (00:24) Strategy Constraints (04:39) The Security Strategy (01:35) Summary (00:08) Plan to Implement (19:12) Introduction (01:15) Plan to Implement (05:29) Policy Development (06:03) Action Plan Metrics (03:04) General Metrics (02:25) Objectives for CMM4 (00:46) Summary (00:08)
Find training fasterLooking for project management or sales training? Or a face-to-face first aid course? Your GO1 Training Assistant can help you find and book the right training for you – at the best price.
Content image