17 Results Found
This webinar is examining the process of how to best prepare for the Cisco Certified Network Professional in Enterprise skill set. We will look at the process to become certified including which exams to take; look at the available resources for study, including the blueprint for the exams and courses that are applicable. We will look at why someone might want to get certified as a CCNP Enterprise. We will also examine the process to maintain the certification. View slide deck>>
This Webinar will focus on addressing the issues of an unsecure data center network and how to address the security concerns with Cisco ACI. The key components of how to create an ACI whitelist will be covered. View slide deck>>
This webinar will focus on addressing the issues of an unsecure campus network and how to address the insecurity with ISE. We then will look at how Cisco ISE can add security to devices beyond initial connectivity. View the slide deck>>
This webinar focuses on addressing the issues of an unsecure campus network and how to address the insecurity with 802.1X. We then will look at how Cisco ISE can centralize campus access with 802.1X. View the slide deck>>
For organizations getting started with RHEL, Red Hat Training has developed a series of courses to develop the skills needed for basic administration and configuration of Red Hat Enterprise Linux. These courses introduce key command line concepts and enterprise-level tools, laying the foundation for the rapid deployment of Red Hat Enterprise Linux. The curriculum also introduces the basic administration skills needed for resolving configuration issues and integrating Red Hat Enterprise Linux systems with other existing environments. View the slide deck>>
This webinar will look at Border Gateway Protocol and explore why we have the protocol; how its involved and how it works. We will look at how and where BGP is used in today’s networks and Internet. We will look at the basics of configuring it and some not so basic configurations.
Find out what changes have been made and how you now have multiple paths to success with the help of Cisco Certification 2020! The new set of certification exams launched on 24th February. It provides a common language for software developers and networkers to bring the two together. The certification programme will also open-up a brand new horizon of job roles and skill sets that are already starting to emerge. Announced at last year’s Cisco Live event in San Diego, the new DevNet certifications aim to help professionals combine infrastructure expertise with programming to take advantage of the possibilities of intent-based networking. Changes to the Cisco certification programme also include new training and certifications in five key technology tracks. In the traditional Cisco network programme, the certifications range from the associate level to the expert level. The new certification involves a DevNet Associate, a DevNet Professional and soon there will also be a DevNet Expert certification. In this one hour webinar, John Berry discusses what’s new in Cisco Certification, what the professional of the future should look like and how to prepare technology professionals for new roles as a network automation developer.
Network switching skills are fundamental to administering and maintaining computer networking. This webinar reviews fundamental networking skills from a Cisco perspective. Technical professionals looking to take the next step into Cisco specific networking technologies will benefit from this information. View the slide deck>
In this live excerpt from Supporting and Troubleshooting Windows 10 (M10982), Windows 10 expert and Microsoft Certified instructor, John Panagakos, will lead you through one of the most popular modules in this course.
As cybersecurity threats continue to be a top concern facing organizations today, the Information Technology (IT) Governance team must stay abreast in assuring that the organization is protected. The IT Governance team must continually evaluate the risks to the organization and put in place Processes, Procedures and Technologies to protect the assets of the organization.