首页 磁力链接怎么用

CBT Nuggets - Cisco Certification Training 200-301 Cisco CCNA

文件类型 收录时间 最后活跃 资源热度 文件大小 文件数量
其他 2021-2-1 08:25 2024-12-21 15:58 338 15.02 GB 415
二维码链接
CBT Nuggets - Cisco Certification Training 200-301 Cisco CCNA的二维码
种子下载(838888不存储任何种子文件)
种子下载线路1(迅雷)--推荐
种子下载线路2(比特彗星)
种子下载线路3(torcache)
3条线路均为国内外知名下载网站种子链接,内容跟本站无关!
文件列表
  1. 1-Introduction to CCNA (200-301) with Jeremy/1. Introduction to CCNA (200-301) with Jeremy.ts10.81MB
  2. 10-Discern Copper and Fiber Optic Network Cable Characteristics/1. Introduction Connect Networks with Copper and Fiber Optic Cable.ts3.77MB
  3. 10-Discern Copper and Fiber Optic Network Cable Characteristics/2. Copper Cable.ts41.09MB
  4. 10-Discern Copper and Fiber Optic Network Cable Characteristics/3. Two Styles of Fiber.ts31.06MB
  5. 10-Discern Copper and Fiber Optic Network Cable Characteristics/4. Fiber Port Types.ts42.47MB
  6. 10-Discern Copper and Fiber Optic Network Cable Characteristics/5. Part 1 Connecting the CCNA Lab.ts37.54MB
  7. 11-Connect and Navigate Cisco Internetwork Operating System (IOS)/1. Introduction to Connect and Navigate Cisco Internetwork Operating System (IOS).ts6.81MB
  8. 11-Connect and Navigate Cisco Internetwork Operating System (IOS)/10. Review of Connect and Navigate Cisco Internetwork Operating System (IOS).ts23.28MB
  9. 11-Connect and Navigate Cisco Internetwork Operating System (IOS)/2. Methods of Managing Cisco Devices.ts41.4MB
  10. 11-Connect and Navigate Cisco Internetwork Operating System (IOS)/3. Configuring a Console Connection in Windows.ts33.58MB
  11. 11-Connect and Navigate Cisco Internetwork Operating System (IOS)/4. Configuring a Console Connection in MacOS.ts27.45MB
  12. 11-Connect and Navigate Cisco Internetwork Operating System (IOS)/5. Answering the Epic Post-Boot Question.ts38.83MB
  13. 11-Connect and Navigate Cisco Internetwork Operating System (IOS)/6. Using Cisco IOS Navigation Commands.ts53.13MB
  14. 11-Connect and Navigate Cisco Internetwork Operating System (IOS)/7. Modes that Made Cisco Famous.ts50.83MB
  15. 11-Connect and Navigate Cisco Internetwork Operating System (IOS)/8. Interface Connections and Numbering.ts27.59MB
  16. 11-Connect and Navigate Cisco Internetwork Operating System (IOS)/9. Preparing for the Initial Configuration.ts109.21MB
  17. 12-Create a Base Configuration for Cisco Devices/1. Introduction to Create a Base Configuration for Cisco Devices.ts6.1MB
  18. 12-Create a Base Configuration for Cisco Devices/2. Configuring Device Identification (Hostname and Banner).ts37.72MB
  19. 12-Create a Base Configuration for Cisco Devices/3. Configuring Foundation Security and Passwords (Console, VTY, Enable Sec).ts67.2MB
  20. 12-Create a Base Configuration for Cisco Devices/4. Configuring IP Addresses and Enabling Interfaces.ts44.03MB
  21. 12-Create a Base Configuration for Cisco Devices/5. Initial Tuning and Configuration Management.ts64.57MB
  22. 12-Create a Base Configuration for Cisco Devices/6. Telnet and SSH Implementation.ts71.21MB
  23. 12-Create a Base Configuration for Cisco Devices/7. Ensuring Proper Base Configurations.ts169.61MB
  24. 12-Create a Base Configuration for Cisco Devices/8. Review of Create a Base Configuration for Cisco Devices.ts22.29MB
  25. 13-Create a Base Configuration for Cisco Devices Hands-On Lab/1. Introduction to Your Virtual Hands-on Labs.ts4.05MB
  26. 13-Create a Base Configuration for Cisco Devices Hands-On Lab/2. Basic IOS Navigation Lab.ts67.14MB
  27. 13-Create a Base Configuration for Cisco Devices Hands-On Lab/3. Hostnames and MOTD Banners Lab.ts33.25MB
  28. 13-Create a Base Configuration for Cisco Devices Hands-On Lab/4. Configuring and Verifying Interfaces and IP Addresses Lab.ts45.36MB
  29. 13-Create a Base Configuration for Cisco Devices Hands-On Lab/5. Configure DNS and Router Interfaces.ts48.26MB
  30. 13-Create a Base Configuration for Cisco Devices Hands-On Lab/6. Cisco Router and Switch CLI Review Lab.ts18.38MB
  31. 13-Create a Base Configuration for Cisco Devices Hands-On Lab/7. Review of Hands-On Lab.ts15.51MB
  32. 14-Wireshark Fundamentals Capturing, Viewing, and Filtering Data/1. Introducing Wireshark Fundamentals.ts3.41MB
  33. 14-Wireshark Fundamentals Capturing, Viewing, and Filtering Data/2. Performing an Initial Capture.ts45.49MB
  34. 14-Wireshark Fundamentals Capturing, Viewing, and Filtering Data/3. The OSI Model in Wireshark.ts51.66MB
  35. 14-Wireshark Fundamentals Capturing, Viewing, and Filtering Data/4. Learning from Idle Network Data.ts50.17MB
  36. 14-Wireshark Fundamentals Capturing, Viewing, and Filtering Data/5. Practical Wireshark ARP.ts27.37MB
  37. 14-Wireshark Fundamentals Capturing, Viewing, and Filtering Data/6. Practical Wireshark Rogue DHCP.ts37.88MB
  38. 14-Wireshark Fundamentals Capturing, Viewing, and Filtering Data/7. Practical Wireshark DNS.ts32.67MB
  39. 14-Wireshark Fundamentals Capturing, Viewing, and Filtering Data/8. Practical Wireshark Telnet.ts23.02MB
  40. 14-Wireshark Fundamentals Capturing, Viewing, and Filtering Data/9. Reviewing Wireshark Fundamentals.ts22.7MB
  41. 15-Describe and Analyze TCP and UDP Communication/1. Introduction to Describe and Analyze TCP and UDP Communication.ts4.11MB
  42. 15-Describe and Analyze TCP and UDP Communication/2. How TCP Starts a Session.ts70.91MB
  43. 15-Describe and Analyze TCP and UDP Communication/3. How TCP Sends Data (TCP Windowing).ts42.22MB
  44. 15-Describe and Analyze TCP and UDP Communication/4. How TCP Ends a Session.ts40.14MB
  45. 15-Describe and Analyze TCP and UDP Communication/5. How UDP Communicates.ts48.23MB
  46. 15-Describe and Analyze TCP and UDP Communication/6. Review of Describe and Analyze TCP and UDP Communication.ts22.71MB
  47. 16-Configure Windows, MAC, or Linux for Network Access/1. Introduction to Configure Windows, MAC, or Linux for Network Access.ts5.84MB
  48. 16-Configure Windows, MAC, or Linux for Network Access/2. Configuring and Testing Windows Network Access.ts45.94MB
  49. 16-Configure Windows, MAC, or Linux for Network Access/3. Configuring and Testing MacOS Network Access.ts29.64MB
  50. 16-Configure Windows, MAC, or Linux for Network Access/4. Configuring and Testing Ubuntu Linux Network Access.ts66.84MB
  51. 16-Configure Windows, MAC, or Linux for Network Access/5. Review of Configure Windows, MAC, or Linux for Network Access.ts9.86MB
  52. 17-Describe Network Switch Functions and How to Locate Network Devices/2. Connecting Devices to a Switch.ts31.72MB
  53. 17-Describe Network Switch Functions and How to Locate Network Devices/3. Switches Learning MAC Addresses.ts54.8MB
  54. 17-Describe Network Switch Functions and How to Locate Network Devices/4. Viewing and Filtering MAC Address Tables.ts37.12MB
  55. 17-Describe Network Switch Functions and How to Locate Network Devices/5. Locating Devices on a Network Switch.ts78.92MB
  56. 17-Describe Network Switch Functions and How to Locate Network Devices/6. Locating Devices Lab.ts35.43MB
  57. 17-Describe Network Switch Functions and How to Locate Network Devices/7. Review of Describe Network Switch Functions and How to Locate Network Devices.ts13.32MB
  58. 18-Diagnose Interface Status, Errors, and Cabling Issues on a Cisco Switch/2. Common Copper and Fiber Physical Issues.ts55.23MB
  59. 18-Diagnose Interface Status, Errors, and Cabling Issues on a Cisco Switch/3. The Quick Way to See Interface Status.ts30.3MB
  60. 18-Diagnose Interface Status, Errors, and Cabling Issues on a Cisco Switch/4. Examining Speed and Duplex Mismatches.ts40.58MB
  61. 18-Diagnose Interface Status, Errors, and Cabling Issues on a Cisco Switch/5. Deep-Dive Into Interface Counters.ts98.06MB
  62. 19-Describe Power over Ethernet (PoE) Capabilities and Standards/1. Introduction to Describe Power over Ethernet (PoE) Capabilities and Standards.ts5.06MB
  63. 19-Describe Power over Ethernet (PoE) Capabilities and Standards/2. How Power over Ethernet (PoE) Works.ts44.8MB
  64. 19-Describe Power over Ethernet (PoE) Capabilities and Standards/3. Exploring PoE Standards.ts42.68MB
  65. 19-Describe Power over Ethernet (PoE) Capabilities and Standards/4. PoE in Action on a Cisco Switch.ts26.9MB
  66. 19-Describe Power over Ethernet (PoE) Capabilities and Standards/5. Review of Describe Power over Ethernet (PoE) Capabilities and Standards.ts13.87MB
  67. 2-Introduction to CCNA (200-301) with Keith/1. Introduction to CCNA (200-301) with Keith.ts39.6MB
  68. 20-Explain IP Addressing and Subnetting Concepts/1. Introduction to Explain IP Addressing and Subnetting Concepts.ts4.7MB
  69. 20-Explain IP Addressing and Subnetting Concepts/2. The Classes of Addresses from A to E.ts58.81MB
  70. 20-Explain IP Addressing and Subnetting Concepts/3. The Fundamentals of IP, Mask, and Gateway.ts63.54MB
  71. 20-Explain IP Addressing and Subnetting Concepts/4. Public and Private Address Ranges.ts80.92MB
  72. 20-Explain IP Addressing and Subnetting Concepts/5. Network Designs that Require Subnetting.ts49.84MB
  73. 20-Explain IP Addressing and Subnetting Concepts/6. Review of Explain IP Addressing and Subnetting Concepts.ts13.76MB
  74. 21-Convert Decimal to Binary and Back/1. Introduction to Converting from Decimal to Binary and Back.ts3.35MB
  75. 21-Convert Decimal to Binary and Back/2. Process of Binary Conversion.ts45.45MB
  76. 21-Convert Decimal to Binary and Back/3. Practicing Decimal to Binary.ts35.87MB
  77. 21-Convert Decimal to Binary and Back/4. Practicing Binary to Decimal.ts18.29MB
  78. 22-Perform Subnetting Based on Network Requirements/1. Introduction to Perform Subnetting Based on Network Requirements.ts3.93MB
  79. 22-Perform Subnetting Based on Network Requirements/2. Subnetting Class C Networks Based on Network Requirements.ts89.72MB
  80. 22-Perform Subnetting Based on Network Requirements/3. Subnetting Class B Networks Based on Network Requirements.ts70.05MB
  81. 22-Perform Subnetting Based on Network Requirements/4. Subnetting Class A Networks Based on Network Requirements.ts45.9MB
  82. 22-Perform Subnetting Based on Network Requirements/5. Troublesome Networks.ts31.01MB
  83. 22-Perform Subnetting Based on Network Requirements/6. Review of Perform Subnetting Based on Network Requirements.ts58.2MB
  84. 23-Perform Subnetting Based on Host Requirements/1. Introduction to Perform Subnetting Based on Host Requirements.ts3.6MB
  85. 23-Perform Subnetting Based on Host Requirements/2. Subnetting Class C Networks Based on Host Requirements.ts35.73MB
  86. 23-Perform Subnetting Based on Host Requirements/3. Subnetting Class B Networks Based on Host Requirements.ts19.25MB
  87. 23-Perform Subnetting Based on Host Requirements/4. Subnetting Class A Networks Based on Host Requirements.ts37.64MB
  88. 23-Perform Subnetting Based on Host Requirements/5. Troublesome Hosts.ts30.03MB
  89. 23-Perform Subnetting Based on Host Requirements/6. Additional Examples of Subnetting Based on Host Requirements.ts52.17MB
  90. 24-Reverse Engineering Subnets and Using VLSM/1. Introduction to Reverse Engineering Subnets and VLSM.ts4.98MB
  91. 24-Reverse Engineering Subnets and Using VLSM/2. Doing Subnetting Backwards.ts32.12MB
  92. 24-Reverse Engineering Subnets and Using VLSM/3. Practical Reverse Engineering Examples.ts60.04MB
  93. 24-Reverse Engineering Subnets and Using VLSM/4. What is VLSM.ts66.76MB
  94. 24-Reverse Engineering Subnets and Using VLSM/5. VLSM Scenario.ts104.39MB
  95. 25-Describe IPv6 Core Addressing Concepts/1. Introduction to Describe IPv6 Core Addressing Concepts.ts4.79MB
  96. 25-Describe IPv6 Core Addressing Concepts/2. Comparing IPv4 and IPv6.ts43.35MB
  97. 25-Describe IPv6 Core Addressing Concepts/3. Binary, Decimal, and Hex.ts57.37MB
  98. 25-Describe IPv6 Core Addressing Concepts/4. Making IPv6 Addresses Shorter.ts35.13MB
  99. 25-Describe IPv6 Core Addressing Concepts/5. Types of IPv6 Addresses.ts95.56MB
  100. 25-Describe IPv6 Core Addressing Concepts/6. Designing IPv6 Addressing.ts58.17MB
  101. 25-Describe IPv6 Core Addressing Concepts/7. Configuring IPv6 Addressing.ts48.92MB
  102. 25-Describe IPv6 Core Addressing Concepts/8. Configure IPv6 Addressing Lab.ts34.57MB
  103. 25-Describe IPv6 Core Addressing Concepts/9. Review of Describe IPv6 Core Addressing Concepts.ts27.42MB
  104. 26-Design a Basic Wireless Network/1. Introduction to Describe Wireless Frequency and Design Fundamentals.ts5.35MB
  105. 26-Design a Basic Wireless Network/2. What is a Wireless Signal.ts73.19MB
  106. 26-Design a Basic Wireless Network/3. Battle of the Bands.ts61.95MB
  107. 26-Design a Basic Wireless Network/4. Basic and Extended SSIDs and WAP Placement.ts57.22MB
  108. 26-Design a Basic Wireless Network/5. Review of Describe Wireless Frequency and Design Fundamentals.ts24.91MB
  109. 27-Explain VLANs and Configure VLANs on a Single Switch/1. Introduction to Explain VLAN Concepts and Configure VLANs on a Single Switch.ts4.57MB
  110. 27-Explain VLANs and Configure VLANs on a Single Switch/2. How VLANs Changed the World.ts67.41MB
  111. 27-Explain VLANs and Configure VLANs on a Single Switch/3. Routing Between VLANs.ts56.11MB
  112. 27-Explain VLANs and Configure VLANs on a Single Switch/4. Configuring VLANs on a Single Switch.ts102.04MB
  113. 27-Explain VLANs and Configure VLANs on a Single Switch/5. Configuring a Router on a Stick.ts90.16MB
  114. 27-Explain VLANs and Configure VLANs on a Single Switch/6. Configuring VLANs on a Single Switch Lab.ts60.26MB
  115. 27-Explain VLANs and Configure VLANs on a Single Switch/7. Review of Explain VLAN Concepts and Configure VLANs on a Single Switch.ts17.03MB
  116. 28-Configure Trunking Between Switches, WAPs, and Servers/1. Introduction to Configure Trunking Between Switches, WAPs, Servers.ts4.62MB
  117. 28-Configure Trunking Between Switches, WAPs, and Servers/10. Review of Configure Trunking Between Switches, WAPs, Servers, and More.ts32.97MB
  118. 28-Configure Trunking Between Switches, WAPs, and Servers/2. Understanding DTP and the Native VLAN.ts83.81MB
  119. 28-Configure Trunking Between Switches, WAPs, and Servers/3. Configuring Trunks the Right Way.ts39.97MB
  120. 28-Configure Trunking Between Switches, WAPs, and Servers/4. Weird and Wacky World of VTP.ts39.95MB
  121. 28-Configure Trunking Between Switches, WAPs, and Servers/5. Configuring VTP.ts55.6MB
  122. 28-Configure Trunking Between Switches, WAPs, and Servers/6. Limiting or Adding VLANs to Trunks.ts37.65MB
  123. 28-Configure Trunking Between Switches, WAPs, and Servers/7. Connecting Trunks to Servers, WAPs, and More.ts60.3MB
  124. 28-Configure Trunking Between Switches, WAPs, and Servers/8. Deploying VLSM in a VLAN Network.ts80.21MB
  125. 28-Configure Trunking Between Switches, WAPs, and Servers/9. Configuring VLANs, Trunking, and Routing Lab.ts104.1MB
  126. 29-Create a Network Diagram with Cisco CDP and LLDP/1. Introduction to Create a Network Diagram with Cisco CDP and LLDP.ts5.19MB
  127. 29-Create a Network Diagram with Cisco CDP and LLDP/2. What is CDP and LLDP.ts32.79MB
  128. 29-Create a Network Diagram with Cisco CDP and LLDP/3. Configuring and Tuning CDP and LLDP.ts44.04MB
  129. 29-Create a Network Diagram with Cisco CDP and LLDP/4. Creating a Network Diagram using CDP and LLDP.ts36.24MB
  130. 29-Create a Network Diagram with Cisco CDP and LLDP/5. Creating a Network Diagram with CDP Lab.ts25.22MB
  131. 29-Create a Network Diagram with Cisco CDP and LLDP/6. Review of Create a Network Diagram with Cisco CDP and LLDP.ts13.13MB
  132. 3-Introduction to CCNA (200-301) with NetworkChuck/Introduction to CCNA (200-301) with NetworkChuck.ts9.61MB
  133. 30-Design and Configure a Rapid Spanning Tree Protocol (STP) Network/1. Introduction to Design and Configure a Rapid Spanning Tree Protocol (STP) Network.ts4.71MB
  134. 30-Design and Configure a Rapid Spanning Tree Protocol (STP) Network/2. What Does STP Do.ts61.08MB
  135. 30-Design and Configure a Rapid Spanning Tree Protocol (STP) Network/3. Understanding STP Standards.ts46.67MB
  136. 30-Design and Configure a Rapid Spanning Tree Protocol (STP) Network/4. How the Root Bridge is Elected.ts71.87MB
  137. 30-Design and Configure a Rapid Spanning Tree Protocol (STP) Network/5. How to Determine Your STP Topology.ts104.97MB
  138. 30-Design and Configure a Rapid Spanning Tree Protocol (STP) Network/6. Configuring Basic STP and Verifying Results.ts67.28MB
  139. 30-Design and Configure a Rapid Spanning Tree Protocol (STP) Network/7. Identifying and Configuring STP Ports and Root Bridge Lab.ts78.61MB
  140. 30-Design and Configure a Rapid Spanning Tree Protocol (STP) Network/8. Review of Design and Configure a Rapid Spanning Tree Protocol (STP) Network.ts26.61MB
  141. 31-Increase Network Capacity Using EtherChannel/1. Introduction to Increase Network Capacity Using EtherChannel.ts5.93MB
  142. 31-Increase Network Capacity Using EtherChannel/2. What is EtherChannel.ts60.37MB
  143. 31-Increase Network Capacity Using EtherChannel/3. Configuring and Verifying EtherChannel.ts105.24MB
  144. 31-Increase Network Capacity Using EtherChannel/4. Modifying EtherChannel Load Distribution.ts47.33MB
  145. 31-Increase Network Capacity Using EtherChannel/5. Review of Increase Network Capacity Using EtherChannel.ts14.11MB
  146. 32-Configure a Basic Cisco Wireless Network using the WLC GUI/1. Introduction to Configure a Basic Cisco Wireless Network using the WLC GUI.ts5.22MB
  147. 32-Configure a Basic Cisco Wireless Network using the WLC GUI/2. Cisco WLC Puzzle Pieces.ts42.94MB
  148. 32-Configure a Basic Cisco Wireless Network using the WLC GUI/3. Accessing a Cisco WLC for the First Time.ts45.24MB
  149. 32-Configure a Basic Cisco Wireless Network using the WLC GUI/4. Base Level WLC Configuration.ts72.4MB
  150. 32-Configure a Basic Cisco Wireless Network using the WLC GUI/5. Review of Configure a Basic Cisco Wireless Network using the WLC GUI.ts14.58MB
  151. 33-Explain End-To-End IP Communications/1. Introducing End-To-End IP Communications.ts15.61MB
  152. 33-Explain End-To-End IP Communications/2. TCPIP Protocol Stack Review.ts41.09MB
  153. 33-Explain End-To-End IP Communications/3. Routers and Multilayer Switches.ts37.45MB
  154. 33-Explain End-To-End IP Communications/4. Predicting the Correct L2 and L3 Addresses.ts57.14MB
  155. 33-Explain End-To-End IP Communications/5. Logical and Physical Topologies Lab.ts44.43MB
  156. 33-Explain End-To-End IP Communications/6. Identifying and Correcting a Layer 2 Path.ts48.47MB
  157. 33-Explain End-To-End IP Communications/7. Topology and Lab Strategy.ts22.61MB
  158. 33-Explain End-To-End IP Communications/8. Reviewing End-To-End IP Communications.ts5.08MB
  159. 34-Configure and Verify Cisco IPv4 Static Routes/1. Introducing IPv4 Static Routing.ts4.81MB
  160. 34-Configure and Verify Cisco IPv4 Static Routes/10. Static Routes using an Outbound Interface.ts37.32MB
  161. 34-Configure and Verify Cisco IPv4 Static Routes/11. IPv4 Static Routes Review.ts43.7MB
  162. 34-Configure and Verify Cisco IPv4 Static Routes/12. IPv4 Static Route Case Study and Lab.ts61.97MB
  163. 34-Configure and Verify Cisco IPv4 Static Routes/13. Review of Configure and Verify Cisco IPv4 Static Routes.ts57.52MB
  164. 34-Configure and Verify Cisco IPv4 Static Routes/2. How a Router Learns IP Routes.ts32.84MB
  165. 34-Configure and Verify Cisco IPv4 Static Routes/3. Adding Directly Connected IPv4 Routes.ts58.54MB
  166. 34-Configure and Verify Cisco IPv4 Static Routes/4. Planning Static Network Routes.ts52.25MB
  167. 34-Configure and Verify Cisco IPv4 Static Routes/5. Configuring Static IPv4 Network Routes.ts56.13MB
  168. 34-Configure and Verify Cisco IPv4 Static Routes/6. Adding Static Host Routes.ts46.17MB
  169. 34-Configure and Verify Cisco IPv4 Static Routes/7. Implementing Static Default Routes.ts33.54MB
  170. 34-Configure and Verify Cisco IPv4 Static Routes/8. Floating Static Routes Overview.ts41.29MB
  171. 34-Configure and Verify Cisco IPv4 Static Routes/9. Configuring and Verifying Static Floating Routes.ts51.96MB
  172. 35-Configure and Verify Cisco IPv6 Static Routes/1. Introducing IPv6 Static Routes.ts6.19MB
  173. 35-Configure and Verify Cisco IPv6 Static Routes/2. IPv6 Static Route Lab Topology.ts24.05MB
  174. 35-Configure and Verify Cisco IPv6 Static Routes/3. Adding IPv6 Directly Connected Routes.ts60.32MB
  175. 35-Configure and Verify Cisco IPv6 Static Routes/4. Planning Static IPv6 Network and Default Routes.ts34.53MB
  176. 35-Configure and Verify Cisco IPv6 Static Routes/5. Configuring Static IPv6 Default and Network Routes.ts49.64MB
  177. 35-Configure and Verify Cisco IPv6 Static Routes/6. Floating Static IPv6 Host Routes.ts51.33MB
  178. 35-Configure and Verify Cisco IPv6 Static Routes/7. IPv6 Static Routes Review.ts28.34MB
  179. 35-Configure and Verify Cisco IPv6 Static Routes/8. IPv6 Static Route Case Study and Lab.ts70.92MB
  180. 35-Configure and Verify Cisco IPv6 Static Routes/9. Review of Configure and Verify Cisco IPv6 Static Routes.ts12.36MB
  181. 36-Describe Cisco Dynamic IPv4 Routing with OSPF/1. Introducing OSPF Concepts.ts3.19MB
  182. 36-Describe Cisco Dynamic IPv4 Routing with OSPF/10. Verifying OSPF Adjacencies.ts40.02MB
  183. 36-Describe Cisco Dynamic IPv4 Routing with OSPF/11. OSPF LSAs and DRs.ts30.98MB
  184. 36-Describe Cisco Dynamic IPv4 Routing with OSPF/12. OSPF and Point-to-Point Networks.ts23.29MB
  185. 36-Describe Cisco Dynamic IPv4 Routing with OSPF/13. Review of Describe Cisco Dynamic IPv4 Routing with OSPF.ts28.19MB
  186. 36-Describe Cisco Dynamic IPv4 Routing with OSPF/14. OSPF Concepts Wrap-Up.ts3.04MB
  187. 36-Describe Cisco Dynamic IPv4 Routing with OSPF/2. Dynamic vs. Static Routing.ts52.32MB
  188. 36-Describe Cisco Dynamic IPv4 Routing with OSPF/3. OSPF Path Cost.ts43.78MB
  189. 36-Describe Cisco Dynamic IPv4 Routing with OSPF/4. OSPF Router ID (RID).ts38.31MB
  190. 36-Describe Cisco Dynamic IPv4 Routing with OSPF/5. OSPF Areas.ts28.49MB
  191. 36-Describe Cisco Dynamic IPv4 Routing with OSPF/6. Wildcard Masks and Network Statements.ts36.47MB
  192. 36-Describe Cisco Dynamic IPv4 Routing with OSPF/7. OSPF Wildcards on Clean Octet Boundaries.ts46.8MB
  193. 36-Describe Cisco Dynamic IPv4 Routing with OSPF/8. OSPF Wildcards for Subnets.ts51.7MB
  194. 36-Describe Cisco Dynamic IPv4 Routing with OSPF/9. DR and BDRs on Broadcast Networks.ts36.21MB
  195. 37-Implement Cisco Dynamic IPv4 Routing with OSPF/1. Introduction to Implement Cisco Dynamic IPv4 Routing with OSPF.ts3.84MB
  196. 37-Implement Cisco Dynamic IPv4 Routing with OSPF/10. Real World OSPF Case Study and Lab.ts110.65MB
  197. 37-Implement Cisco Dynamic IPv4 Routing with OSPF/11. Review of Implement Cisco Dynamic IPv4 Routing with OSPF.ts11.3MB
  198. 37-Implement Cisco Dynamic IPv4 Routing with OSPF/2. Lab Topology Introduction.ts18.92MB
  199. 37-Implement Cisco Dynamic IPv4 Routing with OSPF/3. Implementing Loopbacks for OSPF.ts48.81MB
  200. 37-Implement Cisco Dynamic IPv4 Routing with OSPF/4. Implementing OSPF with Exact Network Statements.ts23.46MB
  201. 37-Implement Cisco Dynamic IPv4 Routing with OSPF/5. Adding more OSPF Routers.ts38.02MB
  202. 37-Implement Cisco Dynamic IPv4 Routing with OSPF/6. OSPF Link Cost Calculation.ts53.49MB
  203. 37-Implement Cisco Dynamic IPv4 Routing with OSPF/7. OSPF Neighbor Adjacencies.ts42.88MB
  204. 37-Implement Cisco Dynamic IPv4 Routing with OSPF/8. Default Routes in OSPF Overview.ts23.05MB
  205. 37-Implement Cisco Dynamic IPv4 Routing with OSPF/9. Implementing a Default Route in OSPF.ts38.51MB
  206. 38-Interpret and Describe a Cisco IP Routing Table/1. Introduction to Interpret and Describe a Cisco IP Routing Table.ts4.05MB
  207. 38-Interpret and Describe a Cisco IP Routing Table/2. Routing Protocol Codes.ts21.77MB
  208. 38-Interpret and Describe a Cisco IP Routing Table/3. Network Prefix and Mask.ts21.95MB
  209. 38-Interpret and Describe a Cisco IP Routing Table/4. Next Hop.ts30.51MB
  210. 38-Interpret and Describe a Cisco IP Routing Table/5. Administrative Distance (AD).ts39.65MB
  211. 38-Interpret and Describe a Cisco IP Routing Table/6. The Routing Table Metric.ts22.4MB
  212. 38-Interpret and Describe a Cisco IP Routing Table/7. Gateway of Last Resort.ts26.14MB
  213. 38-Interpret and Describe a Cisco IP Routing Table/8. Using a Routing Table in a Production Network.ts63.9MB
  214. 38-Interpret and Describe a Cisco IP Routing Table/9. Review of Interpret and Describe a Cisco IP Routing Table.ts31.16MB
  215. 39-Predict a Cisco Router’s IP Forwarding Decisions/1. Introduction to Predict a Cisco Router’s IP Forwarding Decisions.ts3.45MB
  216. 39-Predict a Cisco Router’s IP Forwarding Decisions/10. Review of Predict a Cisco Router’s IP Forwarding Decisions.ts25.12MB
  217. 39-Predict a Cisco Router’s IP Forwarding Decisions/2. Winning Routes of a Router's Table (Concepts).ts24.35MB
  218. 39-Predict a Cisco Router’s IP Forwarding Decisions/3. Preferring a Better Route Due to AD Lab.ts36.44MB
  219. 39-Predict a Cisco Router’s IP Forwarding Decisions/4. Choosing a Route Based on the Metric or Cost.ts28.93MB
  220. 39-Predict a Cisco Router’s IP Forwarding Decisions/5. Concepts of Using the Longest Match in the Routing Table.ts15.8MB
  221. 39-Predict a Cisco Router’s IP Forwarding Decisions/6. Longest Match Routing Lab.ts51.94MB
  222. 39-Predict a Cisco Router’s IP Forwarding Decisions/7. Identifying Which Routes Include a Specific IP.ts62.01MB
  223. 39-Predict a Cisco Router’s IP Forwarding Decisions/8. Route or Drop The Prediction Game.ts62.86MB
  224. 39-Predict a Cisco Router’s IP Forwarding Decisions/9. Case Study and Lab Predicting the Router's Decisions.ts69.8MB
  225. 4-Build a Physical Cisco Lab Environment/1. Introduction to Build a Physical Cisco Lab Environment.ts8.3MB
  226. 4-Build a Physical Cisco Lab Environment/2. Why Use a Physical Lab.ts43.02MB
  227. 4-Build a Physical Cisco Lab Environment/3. Understanding Common Switch Models.ts35.51MB
  228. 4-Build a Physical Cisco Lab Environment/4. Understanding Common Router Models.ts29.16MB
  229. 4-Build a Physical Cisco Lab Environment/5. Understanding Device Memory Requirements.ts29.56MB
  230. 4-Build a Physical Cisco Lab Environment/6. Understanding Common Modules.ts61.79MB
  231. 4-Build a Physical Cisco Lab Environment/7. Performing Password Recovery.ts65.51MB
  232. 4-Build a Physical Cisco Lab Environment/8. Building a CCNA Lab Environment.ts57.9MB
  233. 40-Configure and Verify Cisco’s Router on a Stick/1. Introducing a Router on a Stick.ts4.14MB
  234. 40-Configure and Verify Cisco’s Router on a Stick/2. Router on a Stick Concepts.ts30.72MB
  235. 40-Configure and Verify Cisco’s Router on a Stick/3. Implementing Router on a Stick.ts48.53MB
  236. 40-Configure and Verify Cisco’s Router on a Stick/4. Using Router on a Stick in Production.ts54.07MB
  237. 40-Configure and Verify Cisco’s Router on a Stick/5. Review of Configure and Verify Cisco’s Router on a Stick.ts12.35MB
  238. 41-Troubleshoot an IP Network/1. Introducing the Troubleshooting Labs.ts3.2MB
  239. 41-Troubleshoot an IP Network/2. Troubleshooting Tips.ts21.77MB
  240. 41-Troubleshoot an IP Network/3. Troubleshooting Topology.ts18.16MB
  241. 41-Troubleshoot an IP Network/4. Trouble Ticket 1 with Guest Jeff Kish.ts85.76MB
  242. 41-Troubleshoot an IP Network/5. Trouble Ticket 2 with Guest Knox Hutchinson.ts56.88MB
  243. 41-Troubleshoot an IP Network/6. Trouble Ticket 3 with Guest Bart Castle.ts73.61MB
  244. 41-Troubleshoot an IP Network/7. Trouble Ticket 4 with Keith Barker.ts60.03MB
  245. 42-Cisco NAT Concepts and Base Configurations Static and Overload/1. Introducing Cisco NAT Concepts and Base Configurations.ts4.04MB
  246. 42-Cisco NAT Concepts and Base Configurations Static and Overload/2. Using Different NAT Strategies.ts102.57MB
  247. 42-Cisco NAT Concepts and Base Configurations Static and Overload/3. Defining NAT Terminology.ts46.13MB
  248. 42-Cisco NAT Concepts and Base Configurations Static and Overload/4. Configuring NAT Overload.ts121.91MB
  249. 42-Cisco NAT Concepts and Base Configurations Static and Overload/5. Configuring Static NAT.ts88.3MB
  250. 42-Cisco NAT Concepts and Base Configurations Static and Overload/6. Configuring and Verifying Cisco NAT Lab.ts68.68MB
  251. 42-Cisco NAT Concepts and Base Configurations Static and Overload/7. Reviewing Cisco NAT Concepts and Base Configurations.ts29.31MB
  252. 43-Configure and Verify Cisco NTP/1. Introduction to Configure and Verify Cisco NTP.ts3.83MB
  253. 43-Configure and Verify Cisco NTP/2. What is NTP.ts30.24MB
  254. 43-Configure and Verify Cisco NTP/3. Configuring an NTP Client.ts30.41MB
  255. 43-Configure and Verify Cisco NTP/4. Configuring an NTP Server.ts30.65MB
  256. 43-Configure and Verify Cisco NTP/5. Review of Configure and Verify Cisco NTP.ts13.27MB
  257. 44-Configure DHCP Server and Relay Functions/1. Introduction to Configure DHCP Server and Relay Functions.ts5.01MB
  258. 44-Configure DHCP Server and Relay Functions/2. DHCP Server, Client, and Relay.ts51.47MB
  259. 44-Configure DHCP Server and Relay Functions/3. Configuring a Cisco DHCP Server.ts75.81MB
  260. 44-Configure DHCP Server and Relay Functions/4. Configuring DHCP Relay in a Cisco Network.ts47.56MB
  261. 44-Configure DHCP Server and Relay Functions/5. DHCP Lab.ts33.17MB
  262. 44-Configure DHCP Server and Relay Functions/6. Review of Configure DHCP Server and Relay Functions.ts16.44MB
  263. 45-Explain Common Network Services SNMP, Syslog, QoS, and TFTP-FTP/1. Introducing Common Network Services.ts4.88MB
  264. 45-Explain Common Network Services SNMP, Syslog, QoS, and TFTP-FTP/2. SNMP.ts80.58MB
  265. 45-Explain Common Network Services SNMP, Syslog, QoS, and TFTP-FTP/3. Syslog.ts42.8MB
  266. 45-Explain Common Network Services SNMP, Syslog, QoS, and TFTP-FTP/4. QoS.ts80.5MB
  267. 45-Explain Common Network Services SNMP, Syslog, QoS, and TFTP-FTP/5. TFTP-FTP.ts28.78MB
  268. 45-Explain Common Network Services SNMP, Syslog, QoS, and TFTP-FTP/6. Reviewing Common Network Services.ts17.13MB
  269. 46-Define Key Concepts Regarding Network Security/1. Introduction to Define Key Concepts Regarding Network Security.ts2.3MB
  270. 46-Define Key Concepts Regarding Network Security/2. Security Overview and CIA.ts16.77MB
  271. 46-Define Key Concepts Regarding Network Security/3. Vulnerabilities.ts24.34MB
  272. 46-Define Key Concepts Regarding Network Security/4. Exploits.ts31.69MB
  273. 46-Define Key Concepts Regarding Network Security/5. Threats and Risk.ts18.38MB
  274. 46-Define Key Concepts Regarding Network Security/6. Mitigation Techniques and.ts37.64MB
  275. 46-Define Key Concepts Regarding Network Security/7. Review of Define Key Concepts Regarding Network Security.ts12.76MB
  276. 47-Describe Security Program Elements/1. Introducing Security Program Elements.ts1.54MB
  277. 47-Describe Security Program Elements/2. Polices as Part of a Security Program.ts20.3MB
  278. 47-Describe Security Program Elements/3. User Awareness and Training.ts19.5MB
  279. 47-Describe Security Program Elements/4. Physical Controls and Review.ts23.89MB
  280. 48-Describe Elements of Secure Password Policies/1. Introduction to Describe Elements of Secure Password Policies.ts3.85MB
  281. 48-Describe Elements of Secure Password Policies/2. Password Policies.ts29.79MB
  282. 48-Describe Elements of Secure Password Policies/3. Password Managers.ts26.36MB
  283. 48-Describe Elements of Secure Password Policies/4. Multi-Factor Authentication (MFA).ts43.41MB
  284. 48-Describe Elements of Secure Password Policies/5. Review of Describe Elements of Secure Password Policies.ts16.21MB
  285. 49-Configure Cisco Device Access Control Using Local Passwords/1. Introducing Local Passwords.ts3.76MB
  286. 49-Configure Cisco Device Access Control Using Local Passwords/2. Default Behavior for Console Access.ts35.83MB
  287. 49-Configure Cisco Device Access Control Using Local Passwords/3. Default Behavior for Aux Access.ts39.84MB
  288. 49-Configure Cisco Device Access Control Using Local Passwords/4. Passwords for VTY Login.ts39.04MB
  289. 49-Configure Cisco Device Access Control Using Local Passwords/5. Storing Local Passwords.ts28.34MB
  290. 49-Configure Cisco Device Access Control Using Local Passwords/6. Type 9 Local Passwords.ts12.24MB
  291. 49-Configure Cisco Device Access Control Using Local Passwords/7. Local Usernames and Passwords.ts24.39MB
  292. 49-Configure Cisco Device Access Control Using Local Passwords/8. Configure Cisco Device Access Control Using Local Passwords Review.ts16.61MB
  293. 5-6 Set Up Packet Tracer for Hands-On Cisco Practice/1. Why You'll Benefit from Packet Tracer.ts19.56MB
  294. 5-6 Set Up Packet Tracer for Hands-On Cisco Practice/2. Getting and Installing Packet Tracer.ts11.27MB
  295. 5-6 Set Up Packet Tracer for Hands-On Cisco Practice/3. Configuring Your First PT Network.ts68.88MB
  296. 5-6 Set Up Packet Tracer for Hands-On Cisco Practice/4. Getting Physical.ts16.78MB
  297. 5-6 Set Up Packet Tracer for Hands-On Cisco Practice/5. Visualizing Network Traffic with Simple PDUs.ts60.79MB
  298. 5-6 Set Up Packet Tracer for Hands-On Cisco Practice/6. Visualizing Network Traffic with Complex PDUs.ts44.3MB
  299. 5-6 Set Up Packet Tracer for Hands-On Cisco Practice/7. Replicating a Physical Rack.ts45.95MB
  300. 5-6 Set Up Packet Tracer for Hands-On Cisco Practice/8. Using Packet Tracer on your Tablet.ts21.96MB
  301. 5-6 Set Up Packet Tracer for Hands-On Cisco Practice/9. Final Challenge and Review.ts48.65MB
  302. 50-Summarize and Differentiate AAA Concepts/1. Introducing AAA.ts3.56MB
  303. 50-Summarize and Differentiate AAA Concepts/2. AAA Overview.ts30.29MB
  304. 50-Summarize and Differentiate AAA Concepts/3. Building Blocks of AAA.ts29.07MB
  305. 50-Summarize and Differentiate AAA Concepts/4. AAA New-Model Framework.ts25.35MB
  306. 50-Summarize and Differentiate AAA Concepts/5. Commands to Implement AAA.ts24.79MB
  307. 50-Summarize and Differentiate AAA Concepts/6. Implementing and Verifying AAA.ts60.31MB
  308. 50-Summarize and Differentiate AAA Concepts/7. Summarize and Differentiate AAA Concepts Review.ts20.25MB
  309. 51-Apply and Verify Cisco Access Control Lists/1. Introducing Access Control Lists (ACLs) for Packet Filtering.ts3.76MB
  310. 51-Apply and Verify Cisco Access Control Lists/10. Using Named Extended ACLs.ts59.67MB
  311. 51-Apply and Verify Cisco Access Control Lists/11. ACL Production Case Study and Lab.ts60.97MB
  312. 51-Apply and Verify Cisco Access Control Lists/12. Review of Apply and Verify Cisco Access Control Lists.ts18.77MB
  313. 51-Apply and Verify Cisco Access Control Lists/2. ACL Concepts.ts30.47MB
  314. 51-Apply and Verify Cisco Access Control Lists/3. Standard ACLs Concepts.ts29.61MB
  315. 51-Apply and Verify Cisco Access Control Lists/4. Standard ACLs Lab.ts43.87MB
  316. 51-Apply and Verify Cisco Access Control Lists/5. Wildcard Masks Concepts.ts23.2MB
  317. 51-Apply and Verify Cisco Access Control Lists/6. Wildcard Masks Lab.ts22.69MB
  318. 51-Apply and Verify Cisco Access Control Lists/7. Wildcard Masks for Subnets Lab.ts31.03MB
  319. 51-Apply and Verify Cisco Access Control Lists/8. Extended ACLs Concepts.ts21.99MB
  320. 51-Apply and Verify Cisco Access Control Lists/9. Extended ACLs Lab.ts45.83MB
  321. 52-Configure and Verify Cisco Port Security/1. Introducing Port Security.ts4.53MB
  322. 52-Configure and Verify Cisco Port Security/2. Understanding Port Security and Why we Need It.ts31.22MB
  323. 52-Configure and Verify Cisco Port Security/3. Port Security Defaults.ts18.7MB
  324. 52-Configure and Verify Cisco Port Security/4. Implementing Port Security on Layer 2 Interface.ts30.33MB
  325. 52-Configure and Verify Cisco Port Security/5. Customizing Port Security.ts43.36MB
  326. 52-Configure and Verify Cisco Port Security/6. Configuring Auto Errdisable Recovery.ts33.92MB
  327. 52-Configure and Verify Cisco Port Security/7. Applying Port Security Skills in Production.ts26.45MB
  328. 52-Configure and Verify Cisco Port Security/8. Review of Configure and Verify Cisco Port Security.ts11.69MB
  329. 53-Configure and Verify Cisco DHCP Snooping/1. Introducing DHCP Snooping.ts4.33MB
  330. 53-Configure and Verify Cisco DHCP Snooping/2. Why is DHCP Snooping Needed.ts20.61MB
  331. 53-Configure and Verify Cisco DHCP Snooping/3. The Recipe for DHCP Snooping.ts26.66MB
  332. 53-Configure and Verify Cisco DHCP Snooping/4. Building and Implementing DHCP Snooping in PT.ts52.79MB
  333. 53-Configure and Verify Cisco DHCP Snooping/5. Adding Source Guard to a Switch.ts25.21MB
  334. 53-Configure and Verify Cisco DHCP Snooping/6. Applying DHCP Snooping in Production.ts56.13MB
  335. 53-Configure and Verify Cisco DHCP Snooping/7. Review of Configure and Verify Cisco DHCP Snooping.ts13.4MB
  336. 54-Configure and Verify Cisco Dynamic ARP Inspection/1. Introducing Dynamic ARP Inspection (DAI).ts2.88MB
  337. 54-Configure and Verify Cisco Dynamic ARP Inspection/2. Why is DAI Needed.ts16.23MB
  338. 54-Configure and Verify Cisco Dynamic ARP Inspection/3. The Recipe and Commands for DAI.ts17.82MB
  339. 54-Configure and Verify Cisco Dynamic ARP Inspection/4. Implementing DAI.ts22.44MB
  340. 54-Configure and Verify Cisco Dynamic ARP Inspection/5. ARP Access Lists for Non-DHCP Devices.ts30.21MB
  341. 54-Configure and Verify Cisco Dynamic ARP Inspection/6. Additional DAI Options and Features.ts30.28MB
  342. 54-Configure and Verify Cisco Dynamic ARP Inspection/7. Applying DAI to the Production Network.ts27.58MB
  343. 54-Configure and Verify Cisco Dynamic ARP Inspection/8. Review of Configure and Verify Cisco Dynamic ARP Inspection.ts9.96MB
  344. 55-Describe Remote Access and Site-to-Site VPNs/1. Introducing VPNs.ts2.76MB
  345. 55-Describe Remote Access and Site-to-Site VPNs/2. Virtual Private Network (VPN) Overview.ts22.54MB
  346. 55-Describe Remote Access and Site-to-Site VPNs/3. Building Blocks for Cryptography.ts37.26MB
  347. 55-Describe Remote Access and Site-to-Site VPNs/4. Site-To-Site VPN Concepts.ts28.28MB
  348. 55-Describe Remote Access and Site-to-Site VPNs/5. Verifying Site-To-Site Encryption Lab.ts43.72MB
  349. 55-Describe Remote Access and Site-to-Site VPNs/6. Remote-Access VPN Concepts.ts30.58MB
  350. 55-Describe Remote Access and Site-to-Site VPNs/7. Remote-Access VPN Client Examples.ts36.86MB
  351. 55-Describe Remote Access and Site-to-Site VPNs/8. Review of Describe Remote Access and Site-To-Site VPNs.ts13.68MB
  352. 56-Describe, Configure, and Verify Wireless Security protocols/1. Introduction to Describe, Configure, and Verify Wireless Security protocols.ts4.05MB
  353. 56-Describe, Configure, and Verify Wireless Security protocols/2. Wireless Security Protocol Options.ts29.39MB
  354. 56-Describe, Configure, and Verify Wireless Security protocols/3. Options for Controlling Wi-Fi Networks.ts21.2MB
  355. 56-Describe, Configure, and Verify Wireless Security protocols/4. Implementing WPA2 PSK on a SOHO Network.ts28.99MB
  356. 56-Describe, Configure, and Verify Wireless Security protocols/5. Planning WPA2 on a Controller-Based Wi-Fi Network.ts18.78MB
  357. 56-Describe, Configure, and Verify Wireless Security protocols/6. Implementing WPA2 on a Controller-based Wi-Fi Network.ts63.75MB
  358. 56-Describe, Configure, and Verify Wireless Security protocols/7. Review of Describe, Configure, and Verify Wireless Security Protocols.ts12.68MB
  359. 57-What is Network Automation/1. Introducing Network Automation.ts3.76MB
  360. 57-What is Network Automation/2. What is Network Automation.ts24.02MB
  361. 57-What is Network Automation/3. Automating Network Device Deployment.ts54.99MB
  362. 57-What is Network Automation/4. Automating Network Device Backup, Monitoring, and Data Collection.ts46.88MB
  363. 57-What is Network Automation/5. Automating Network Troubleshooting Lab.ts37.75MB
  364. 57-What is Network Automation/6. Let's Keep Automating.ts4.08MB
  365. 58-Use REST APIs and JSON/1. You are a Network Developer.ts5.98MB
  366. 58-Use REST APIs and JSON/10. REST API Lab.ts39.25MB
  367. 58-Use REST APIs and JSON/11. Becoming a Network Developer.ts6.36MB
  368. 58-Use REST APIs and JSON/2. API vs. SNMP vs. CLI.ts47.01MB
  369. 58-Use REST APIs and JSON/3. What is a REST API.ts33.26MB
  370. 58-Use REST APIs and JSON/4. Navigating a REST API.ts40.23MB
  371. 58-Use REST APIs and JSON/5. HTTP Verbs.ts55.41MB
  372. 58-Use REST APIs and JSON/6. Programming 101 Data.ts66.39MB
  373. 58-Use REST APIs and JSON/7. Programming Playground Lab.ts28.9MB
  374. 58-Use REST APIs and JSON/8. JSON, YAML, or XML.ts31.03MB
  375. 58-Use REST APIs and JSON/9. Interpreting JSON.ts53.9MB
  376. 59-Controller-Based Networking/1. Forget Everything You Know About Networking.ts8.05MB
  377. 59-Controller-Based Networking/10. DNA Center Lab.ts55.13MB
  378. 59-Controller-Based Networking/11. Controller-Based Networks Review.ts7.3MB
  379. 59-Controller-Based Networking/2. Reviewing the Planes.ts27.25MB
  380. 59-Controller-Based Networking/3. What is Controller-Based Networking.ts47.13MB
  381. 59-Controller-Based Networking/4. Why do we Need an SDN Controller.ts30.51MB
  382. 59-Controller-Based Networking/5. SDN Architectures.ts43.96MB
  383. 59-Controller-Based Networking/6. Automating the Data Center with ACI.ts34.8MB
  384. 59-Controller-Based Networking/7. Magic of Software-Defined Access.ts75.04MB
  385. 59-Controller-Based Networking/8. DNA Center Overview.ts75.47MB
  386. 59-Controller-Based Networking/9. Using Postman with the DNA Center REST API.ts51.49MB
  387. 60-Network Automation Tools Ansible, Puppet, and Chef/1. Introducing Ansible, Puppet, and Chef.ts5.03MB
  388. 60-Network Automation Tools Ansible, Puppet, and Chef/2. Configuration Managament with DevOps Tools.ts51.22MB
  389. 60-Network Automation Tools Ansible, Puppet, and Chef/3. Ansible.ts61.56MB
  390. 60-Network Automation Tools Ansible, Puppet, and Chef/4. Puppet.ts39.55MB
  391. 60-Network Automation Tools Ansible, Puppet, and Chef/5. Chef.ts25.03MB
  392. 60-Network Automation Tools Ansible, Puppet, and Chef/6. Summing it All Up.ts37.09MB
  393. 7-Describe Network Functions and Equipment/1. Introduction to Describe Network Functions and Equipment.ts5.47MB
  394. 7-Describe Network Functions and Equipment/2. Primary Switch Functions.ts45.91MB
  395. 7-Describe Network Functions and Equipment/3. Primary Wireless Access Point Functions.ts40.61MB
  396. 7-Describe Network Functions and Equipment/4. Primary Router Functions.ts46.91MB
  397. 7-Describe Network Functions and Equipment/5. Assembling the Network Pieces.ts46.44MB
  398. 7-Describe Network Functions and Equipment/6. Review of Describe Network Functions and Equipment.ts33.58MB
  399. 8-Explain Network Communication Using the OSI and TCP-IP Model/1. Introduction to Explain Network Communication with the OSI Model.ts4.53MB
  400. 8-Explain Network Communication Using the OSI and TCP-IP Model/2. Why We Have Two Models.ts20.36MB
  401. 8-Explain Network Communication Using the OSI and TCP-IP Model/3. Application Layers.ts27.71MB
  402. 8-Explain Network Communication Using the OSI and TCP-IP Model/4. Transport Layer.ts48.47MB
  403. 8-Explain Network Communication Using the OSI and TCP-IP Model/5. Network Layer.ts24.65MB
  404. 8-Explain Network Communication Using the OSI and TCP-IP Model/6. Data Link and Physical Layer.ts43.4MB
  405. 8-Explain Network Communication Using the OSI and TCP-IP Model/7. Describing Network Communication Using the OSI and TCPIP Models.ts68.07MB
  406. 8-Explain Network Communication Using the OSI and TCP-IP Model/8. Review of Explain Network Communication with the OSI Model.ts28.33MB
  407. 9-Describe Common Network Architectures/1. Introduction to Describe Common Network Architectures.ts3.36MB
  408. 9-Describe Common Network Architectures/2. Two-Tier Architecture.ts49.44MB
  409. 9-Describe Common Network Architectures/3. Three-Tier Architecture.ts25.44MB
  410. 9-Describe Common Network Architectures/4. Spine-Leaf Architecture.ts49.1MB
  411. 9-Describe Common Network Architectures/5. WAN Architecture.ts56.17MB
  412. 9-Describe Common Network Architectures/6. SOHO Architecture.ts37.5MB
  413. 9-Describe Common Network Architectures/7. On-Premise vs. Cloud Architecture.ts22.27MB
  414. 9-Describe Common Network Architectures/8. Building a Network Architecture.ts59.69MB
  415. 9-Describe Common Network Architectures/9. Review of Describe Common Network Architectures.ts31.72MB
友情提示
不会用的朋友看这里 把磁力链接复制到离线下载,或者bt下载软件里即可下载文件,或者直接复制迅雷链接到迅雷里下载! 亲,你造吗?将网页分享给您的基友,下载的人越多速度越快哦!

违规内容投诉邮箱:[email protected]

概述 838888磁力搜索是一个磁力链接搜索引擎,是学术研究的副产品,用于解决资源过度分散的问题 它通过BitTorrent协议加入DHT网络,实时的自动采集数据,仅存储文件的标题、大小、文件列表、文件标识符(磁力链接)等基础信息 838888磁力搜索不下载任何真实资源,无法判断资源的合法性及真实性,使用838888磁力搜索服务的用户需自行鉴别内容的真伪 838888磁力搜索不上传任何资源,不提供Tracker服务,不提供种子文件的下载,这意味着838888磁力搜索 838888磁力搜索是一个完全合法的系统