Live Chat
Monday - Friday 8am - 6pm EST Chat Now
Contact Us
Monday - Friday 8am - 8pm EST 1-800-268-7737 Other Contact Options
Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Resource Library

Filter By

Brands

Show Filters
Result Filters:

176 Results Found

Results per page: 10 40 80

2009 IT Skills and Salary Report

Special Report | Feb. 24, 2009

The results are in from the 2nd Annual Global Knowledge and TechRepublic IT salary survey. With over 14,150 responses, our 2009 report is one of the industry's most relevant and revealing IT salary surveys. Our 2009 salary search revealed an average increase of 10% nationally over our 2008 salary study. Learn the top paying salaries for IT jobs based on state, industry, certification, and more.

Telepresence Bandwidth Requirements

Article | June 08, 2009

Telepresence is a set of technologies that allow video conferencing in such a way that the user feels as if they are actually at the remote site. Cisco sells a variety of platforms in the telepresence space supporting up to three 65” high definition video displays,...

Calculating VoIP Bandwidth

Article | July 08, 2009

When integrating a Voice over IP (VoIP) system into an existing network it is very important to have a good understanding of how much bandwidth is utilized for each call on the network. For most people, just starting out the bandwidth calculations can be a very daunt...

Static Routing

Article | July 14, 2009

You may have noticed that it’s the dynamic routing protocols that get all the glory. Since I like rooting (routing?) for the underdog, let’s talk about static routes! As you may recall, a router has three methods for learning a route. A route can appear in the routi...

FTP vs. TFTP

Article | July 15, 2009

Recently we've been comparing using Telnet with Secure Shell protocol to allow remote access to a device such as a router or switch. Now, we're going to compare File Transfer Protocol (FTP) and Trivial File Transfer protocol (TFTP) for a Cisco router or switch. These...

Basics of Understanding RIP

Article | July 30, 2009

RIP is a protocol that is used for routing IP networks. It was designed in the early 1980’s for communication between gateways (computers with two NIC’s). It is the oldest routing protocol used by the network industry and is considered by many to be inefficient or bo...

Understanding RIP v2

Article | Aug. 05, 2009

So far, in our discussion of Router Information Protocol (RIP), we’ve discussed the basics and also verified and reviewed RIP version1. We stated that RIP version 1 is a classful routing protocol that used FLSM and sent it routing updates without the subnet mask.  In...

Call Admission Control

Article | Aug. 20, 2009

Call Admission Control (CAC) is often times included as part of the same topic as Quality of Service (QoS), when in actuality CAC is a separate and complete topic itself. QoS is defined as traffic engineering on a packet switched network. This definition means movin...

Network Layer Utilities: End-to-End Data Delivery

Article | Aug. 22, 2009

Find out which OSI layer is concerned with reliable end-to-end delivery of data - and more. Get answers to your OSI reference model and network layer questions here.

Address Resolution Protocol (ARP)

Article | Aug. 28, 2009

When sending data end-to-end through a network, routers are used in internetworking to create a virtual network from one device to another, either locally or globally. Routers are configured to operate with most common network protocols. That means they know the form...

CUCM Call Throttling

Article | Sep. 08, 2009

Cisco Unified Communications Manager (CUCM) includes a feature called "call throttling" that denies new call attempts when the system is in a state that may lead to delayed dial tone. The Real Time Monitoring Tool (RTMT) will generate a code yellow alert when call t...

QoS Part 4 – QoS Mechanisms

Article | Nov. 12, 2009

In the previous discussion on QoS, the uses of Per-Hop Behaviors DiffServ to mark packets were identified and discussed in detail. Today’s post will identify the mechanisms to implement QoS. The five main categories of tools used to implement QoS are as follows. Cl...

Cisco IP Phone Audio Codecs

Article | Nov. 23, 2009

Cisco IP phones support a variety of different audio codecs. In this post, I will explain some of the differences and explain which versions of CUCM and the Cisco IP phones support the various audio codecs. Audio codecs are responsible for sampling human speech (a s...

“nat-control” versus “no nat-control”

Article | Nov. 24, 2009

ASA and PIX software version 7.0 introduced the configuration command nat-control which didn’t exist in previous versions of code. Although training course material for both the SNAF (Securing Networks with ASA Fundamentals) and SNAA (Securing Networks with ASA Advan...

VPN Connection Process

Article | Jan. 05, 2010

There are some common misconceptions on the part of some of my students as to how VPN sessions are established from either a remote location or remote user to the ASA firewall. In particular, a “gray area” seems to be when the attributes from the tunnel group are app...

Trunk Groups - Why bother?

Article | Jan. 08, 2010

One aspect of Unified Communications is this concept of trunk groups.  I will discuss what they are, what benefit they can provide and how to configure them for Cisco gateways. First of all the official definition of a trunk group is “A group of trunks serving the s...

Trunk Groups with Digital Ports

Article | Jan. 13, 2010

Last blog we looked at how we can use Trunk groups to ease the configuration of dial-peers and digit manipulation using analog FXO ports for an E911 solution. Now let’s take a look on how it can be used for T-1 CAS configurations and ISDN channel selection. The firs...

Routing Protocols Overview

Article | Jan. 15, 2010

Internet Protocol (IP) routing protocols have one primary goal: to fill the IP routing table with the current best routes it can find. The goal is simple, but the process and options can be complicated. Routing protocols define various ways that routers chat among th...

The Importance of a UPS

Article | Jan. 25, 2010

In light of the recent tragic events in Haiti, it might be a good time to review some of the requirements for a well designed Uninterruptible Power Source (UPS) to be included in all of our critical network installations. As a CCNA, we are called upon to help maintai...

Solving the Mysteries of Subnetting

White Paper | Feb. 11, 2010

Subnetting is a complicated topic that has confused students for a very long time. However, subnetting is an important topic for many different certifications with various vendors, including Cisco. In the real world environment, people are used to just punching in the numbers in many of the free subnet calculators that are readily available on the internet. For exam purposes, you still have to do this in a very fast manner since many exams are time-based and you don't have the luxury of spending those precious minutes on any single question. This Cisco training whitepaper will solve some of those age-old and complicated subnetting puzzles.

AnyConnect Syslog Troubleshooting

Article | Feb. 15, 2010

I recently was presented with the challenge of logging ALL of the pertinent connection, disconnection, and termination messages associated with the Cisco SSL AnyConnect client without overwhelming the syslog capture display with extraneous messages. This blog will br...

Where Did That 169.254.x.x IP Address Come From?

Article | March 22, 2010

In my last post, we learned that the Dynamic Host Configuration Protocol (DHCP) is a computer networking protocol used by hosts, identified as DHCP clients, to retrieve IP address assignments and other configuration information. DHCP uses a client-server architectur...

VoIP Networks and One Way Audio

Article | March 30, 2010

There are many interesting new issues that seem to have come with the addition of voice and video to the data network. Most of the engineers that are now working on VoIP networks come from either a pure data network background or a traditional phone system background...

QOS Bandwidth vs Bandwidth Remaining

Article | April 14, 2010

Learn how to calculate QOS Bandwidth Percent vs Bandwidth Remaining Percent using a Cisco-defined formula. Read on for answers and examples from the experts at Global Knowledge!

Allow or Disallow All IPSec Traffic through the Firewall?

Article | June 02, 2010

The subject of this week’s post was actually prompted by a question from a former colleague.  Soon after the PIX Firewall added support for IPSec Virtual Private Networks, a command was added to the command-line, sysopt connection permit-ipsec. This command was subse...

Using ASDM with Minimum User Privileges

Article | July 30, 2010

Occasionally as I'm teaching a Cisco training class, I get an idea for a blog post and it happened again this week. The Securing Networks with ASA Fundamentals curriculum is mostly based on the Adaptive Security Device Manager (ASDM). While the class describes the us...

Time of Day Call Routing

Article | Aug. 17, 2010

I recently came across an opportunity to use a relatively new feature in Cisco Unified Communications Manager (CUCM). Suppose you are the telecom administrator at a community hospital. During business hours, the Facilities Department is staffed and team members simpl...

ASA Service Policies with Priority and Policing

Article | Nov. 03, 2010

As is sometimes the case, the idea for this article originated with a student question I received during one of the Securing Networks with ASA Fundamentals classes I have taught this summer. The course material mentions a simple scenario whereby IP Telephony traffic...

ASDM Demo Mode Tour

Article | Nov. 17, 2010

As is frequently the case these days, I get a brainstorm for an article during a Cisco Security training class I conduct. This summer I taught the Securing Networks with ASA Fundamentals class, which concentrates heavily on the Adaptive Security Device Manager (ASDM)...

Implementing Dynamic DNS on Cisco IOS Router and ASA

Article | Dec. 09, 2010

When the hostname.domainname associated with my Small Office Home Office (SOHO) failed to update after a power outage, and a new DHCP-assigned external address was assigned to my router, I was reminded of the need for Dynamic DNS. This article will explore the implem...

The History Behind EIGRP

Article | Feb. 16, 2011

Interior Gateway Routing Protocol (IGRP) was a Cisco-proprietary Distance-Vector (D-V) classful routing protocol - basically an improved version of RIPv1. Like other D-V protocols, each IGRP router periodically flooded its routing table, but it differed from RIP in two ways. First, RIP’s advertisement interval was thirty seconds but IGRP’s was ninety seconds, which allowed IGRP to scale to larger networks than RIP. Second, RIP used a simple hop count metric, but IGRP’s more sophisticated metric was based on minimum path bandwidth and total path delay, with options to include link reliability and interface loading.

The shun Command on the PIX/ASA

Article | March 24, 2011

One command that had a fairly long history first with the PIX Firewall and now the ASA is the shun command. In this post we’ll examine this command’s history, why it’s useful, and its new-found resurgence in threat detection implementation.

2011 IT Skills and Salary Report

Special Report | April 04, 2011

For the fourth year in a row, Global Knowledge and TechRepublic have partnered to create a comprehensive IT salary survey. With over 12,000 responses, the 2011 report has turned out to be one of this year's most relevant and revealing salary surveys in the industry. Below is our complete list of Salaries by Popular Certifications and Salaries by State.

How to Successfully Migrate from IPv4 to IPv6

Webinar – Recorded | April 20, 2011

In this webinar, you will examine the need for IPv6 and whether it's possible to survive on IPv6 alone. You will learn ways to phase in IPv6 and how to successfully migrate to IPv6.

Datagram Transport Layer Service - DTLS

Article | May 25, 2011

This week’s post highlights some of the features and implementation specifics regarding the Datagram Transport Layer Service (DTLS) protocol used in Virtual Private Networks with the Cisco AnyConnect® SSL client. I’ll provide some background as well as some screenshots and supported CLI commands.

Routing Decisions: Best Path Selection

Article | June 23, 2011

According to the OSI layer concept, routing, or best path selection, takes place on Layer 3 and is based on the logical address. In this post, we want to discuss some of the points in that statement.

Routing Decisions: Best Path Selection

Article | June 23, 2011

According to the OSI layer concept, routing, or best path selection, takes place on Layer 3 and is based on the logical address. In this post, we want to discuss some of the points in that statement.

ACUCW1 or ACUCW2 - Which Course is Right for You?

Video | July 21, 2011

Global Knowledge Course Director and Lab Topology Architect Joey DeWiele, a specialist in Unified Communications, explains the difference between our Cisco Unified Communications courses - ACUCW1 & ACUCW2.

Private VLANs: Advanced Switching Tips and Tricks

Webinar – Recorded | Oct. 10, 2011

In this hour-long webinar, Global Knowledge instructor John Barnes will guide you through implementing Cisco private VLANs. He will review VLANs and 802.1q, and he will discuss private VLAN fundamentals and operation, covering primary VLANs and secondary VLANs. He will cover VLAN mapping and discuss using private VLANs between multiple switches. He will also provide a use case example.

Overview of GSS Functionality

Article | Oct. 13, 2011

The Global Site Selector (GSS) leverages the Domain Name System (DNS) to provide clients with reliable and efficient content services. Domain to IP address mapping is performed with consideration for availability, location, and load of content servers. Using the GSS in combination with Cisco’s Content Services Switch (CSS), Cisco’s Catalyst 6000 Content Switching Module (CSM), or Cisco’s Application Control Engine (ACE) allows users to create Global Server Load Balancing (GSLB) networks.