Cisco
Introducing Cisco Data Center Networking (640-911)
016
CBT Nuggets Производитель: Год выпуска: 2014 Продолжительность: 12:11:00 Тип материала: Видеоурок Язык: Английский Стоимость: 1999 рублей Описание: This Cisco video training with trainer Anthony Sequeira covers Data Center networking technologies, including topics such as network layer addressing, LAN switching, routing, and more. Related area of expertise: Cisco Data Center Recommended skills: Familiarity with the Windows or MAC operating system Ability to use the Internet and its related functions such as web browsing and email
Кто знает, тот успешен
Cisco
Cisco CCNA 640-875 SPNGN1
028
CBT Nuggets Производитель: Год выпуска: 2014 Продолжительность: 14:35:53 Тип материала: Видеоурок Язык: Русский Стоимость: 1999 рублей Описание: This Cisco video training course with Jeremy Cioara covers networking concepts that are crucial to service provider architecture, including the OSI Model, switch and router functionality, IOS, network services, and more. Related area of expertise: Cisco Service Provider Recommended skills: Basic computer skills Basic understanding of network functionality
Кто знает, тот успешен
CentOS
CentOS System Administrator Prep with Shawn Powers (2014)
014
[caption id="attachment_1345" align="alignright" width="300"]RedHat RedHat[/caption] Производитель: Год выпуска: 2014 Продолжительность: 12:11:00 Тип материала: Видеоурок Язык: Английский Стоимость: 1999 рублей Описание: This CentOS course with trainer Shawn Powers is designed to prepare a new Linux system administrator for certification and general skills. Recommended skills: A conceptual understanding of what Linux is, ideally with minimal hands-on exposure to a Linux installation of some sort. Recommended equipment: Virtualization software capable of snapshots (VMware, VirtualBox, etc) Related certification: LPIC-1 Related Job Functions: System Administrator Network Administrator Computer Technician CentOS is the freely downloadable version of Linux created from the source code of a popular commercial distribution. This course not only prepares a person for entry level system administration itself, but is designed to cover the topics required for certification on the commercial distribution. [wpspoiler name="Подробное описание" ] 1. Intro (00:01:32) There are quite a few Linux-related courses at CBT Nuggets, and each focuses on a specific aspect of system administration. This course teaches you the nuances of being a CentOS System Administrator, and prepares you for certification on related distributions. 2. What Makes CentOS Unique? (00:10:59) At its core, Linux is a kernel. Different distributions have drastically different ways of implementing that kernel, however, so learning the ropes about several different systems is highly beneficial for a system administrator. In this Nugget, we learn some of the unique qualities of CentOS. 3. Manipulating Text I/O (00:35:53) In this Nugget, we cover STDIN, STDOUT, STDERR, and how to redirect them. Once that is mastered, we learn how to use grep with regular expressions to peel out specific data from text files. Finally, we combine I/O redirection with grep and regex for amazingly powerful and flexible data analyzation. 4. Access Remote Systems (00:26:59) SSH is the defacto standard method for connecting to a remote server via command line. VNC is a graphical way to do the same. In this Nugget, we will connect to remote servers, as multiple users, in order to understand connecting in a multi-user environment. We also learn to secure the infamously insecure VNC protocol using SSH. 5. Archiving, and Compressing and Chmod'ing, Oh My! (00:33:14) Archiving and compressing are usually done together, but in CentOS they can be done separately if desired. In this Nugget, we learn how to create compressed and non-compressed archive files using zip, gzip, bzip2, tar, and star. We also learn how to change file permissions with chmod in order to protect our files from snooping users. 6. Manipulating Files, Directories, and Links (00:19:36) Linux and Unix users often take for granted the rather cryptic commands for manipulating files and folders on the command line. In this Nugget, we learn which tools are appropriate for each, and we learn the difference between hard links and symbolic links. 7. How to Read the Manual, CentOS Style (00:23:05) While we could certainly fill our brains with every bit of knowledge available on Linux applications, that would leave very little room for important things like baseball stats and comic book trivia. Today we learn about the plethora of documentation that comes built right in to your CentOS machine and how to access it. 8. Reboots & Runlevels (00:16:36) Most of us know it's not best practice to jerk the power cable out of the wall to shut down your computer. In this Nugget, we learn the correct way to shutdown and reboot a system, plus how to manually change run levels, and boot into single user mode. 9. Renicing and Killing Rogue Processes (00:28:58) Sometimes a particular program will get stuck in a loop and use all your CPU cycles, or a memory leak might cause an application to eat all of your system RAM. In this Nugget, we learn how to identify those pesky problems and kill them off, or at least change their priority. 10. Network Services and Their Log Files (00:24:46) Starting and restarting network services is a fairly straightforward task. In this Nugget, we learn to manipulate the startup scripts, and also where to find log information to aid in troubleshooting services when they fail. 11. Partitions & Logical Volumes (00:31:10) In this Nugget, we learn to configure hard drive partitions. We also learn about LVM (Logical Volume Manager), and how to create and manage hard drive partitions into logical volumes. 12. Filesystems & Mounting Them (00:30:26) Partitioning hard drives is important, but without a file system written to those partitions, they're fairly useless. In this Nugget, we learn about creating filesystems, mounting filesystems, and how to work with encrypted filesystems and partitions. 13. Auto-mounting Local, Network, and Encrypted Filesystems (00:18:27) Mounting and dismounting is an important skill, but manually managing filesystems on servers if far from a good use of time. In this Nugget, we learn to automatically mount various types of filesystems during the boot process. 14. Chmod'ing, Chown'ing, and Chgrp'ing, Oh My (00:24:16) Files permissions and ownership are concepts that are fairly consistent across operating systems. Just because the concepts are the same, tough, doesn't mean the procedures are intuitive. In this Nugget, we learn the Linux way to deal with file permissions and ownership. 15. Special Permissions - SetUID, SetGID, and Sticky Bits (00:32:17) Once the read/write/execute concepts with Linux file permissions are understood, it's time to move on to the more complicated possibilities. We learn all about SUID, SGID, and Sticky Bits in this Nugget. If that sounds confusing, you're in the right place! 16. Managing ACL's (00:19:08) Sometimes, Linux's elegantly simple permissions system isn't enough. When you need more fine-tuned access to files, CentOS supports Access Control Lists, or ACL's. In this Nugget, we learn how to assign them and manage them. 17. Local Users & Groups (00:23:19) In the modern networking environment, most user authentication and account management is done via LDAP or Active Directory. As a CentOS administrator, however, you need to be able to manipulate the local users and groups because of service accounts and local administrator accounts. 18. Configuring the Network (00:15:19) By default, CentOS uses DHCP to automatically configure the network address, hostname, and DNS servers. There are some cases which require those to be configured manually, and in this Nugget, we learn how to perform that task. 19. Kickstart Your Install (00:20:54) Installing Linux isn't terribly difficult, by this time we've done it a few times. But what if we need to install a dozen servers? Or a hundred? CentOS provides a very simple and very elegant system for automating the installation process. In this Nugget, we learn to use the kickstart system and install a system without user interaction. Look Mom, no hands! 20. Hosting Virtual Machines (00:11:00) Most datacenters, and even small server rooms, are running virtualization software to best utilize hardware resources. CentOS includes the ability to host VM guests just like the commercial virtualization vendors. In this Nugget, we learn how simple setting up CentOS as a VM host can be! 21. Package Management (00:25:42) CentOS utilizes the powerful RPM package management system, along with several ways to install and remove packages. Whether you want to use the convenient GUI interface or the powerful commandline option, CentOS makes it easy to install packages and keep your system updated. 22. Setting up Web & FTP Services (00:14:38) Like most other distributions, CentOS uses Apache for its default web server. Unlike many distros, the naming conventions are a bit confusing. In this Nugget, we set up a web server and FTP server using the default configurations that come with CentOS. 23. Cron & Time Services (00:21:25) Cron is one of those tools that system administrators can't live without. From scheduling maintenance tasks to emailing reminders, cron is the perfect scheduling tool. Any scheduling tool is only as good as the clock it uses, however, so any Nugget about cron has to address NTP (network time protocol) as well. Any time is the perfect time for a Nugget about time, so how about right now! 24. Configuring the System Firewall (00:10:28) CentOS, like pretty much every Linux distribution, uses iptables for its underlying firewall system. It's possible to manipulate the system firewall with commandline tools, but CentOS also includes a nice front end to manage the iptables rules. 25. SELinux - What Is It? (00:21:39) Security Enhanced Linux, or SELinux, takes file permissions and ACLs to the next level. Truth be told, most system administrators get frustrated with SELinux, but in this Nugget we explore its virtues, and see how to activate it. 26. SELinux - Configuration and Troubleshooting (00:14:55) In this final Nugget, we learn the basics of configuring SELinux. We also discover how to diagnose and troubleshoot common policy violations. [/wpspoiler]
Кто знает, тот успешен
Cisco
CCNA Security 640-554 Video Boot Camp With Chris Bryant
014
CBT Nuggets Производитель: Год выпуска: 2014 Продолжительность: 12:11:00 Тип материала: Видеоурок Язык: Английский Стоимость: 1999 рублей Описание: упакованы в лабораториях с помощью Cisco Configuration Professional, Cisco IOS Firewall, и многое другое, вы будете готовы к работе для достижения успеха в комнате для исследований и реальный мир после того, как вы принять этот курс CCNA Security учебный курс! [wpspoiler name="Подробное описание" ] 01 - Cisco Password Review, Lab, and Real-World Password Discussion 02 - Cisco Password Configuration and Encryption Lab 03 - Network Time Protocol Discussion 04 - NTP Lab With CCP 05 - CCNA Security Video Exam - NTP 06 - Telnet and SSH Discussion 07 - Telnet Lab 08 - SSH Lab 09 - SNMP 10 - Logging and Timestamps Discussion and Command-Line Lab 11 - Logging CCP Lab 12 - Views Discussion, Lab Begins 13 - Conclusion of 'Views' Lab 14 - TCP Intercept 15 - CISCO IOS Resilient Configuration Discussion and Lab 16 - CISCO IOS Resilient Configuration Video Practice Exam 17 - VLAN Review, VLAN Hopping 18 - Lab - Disabling DTP On Live Trunks 19 - BPDU Guard Discussion and Lab 20 - Root Guard Discussion and Lab 21 - Port Security Discussion 22 - Port Security Lab 23 - DHCP Snooping Discussion and Lab 24 - Dynamic ARP Inspection Discussion 25 - Dynamic ARP Inspection Lab 26 - CCP Introduction, Prerequisites, and Discussion 27 - CCP Walkthrough 28 - CCP User Profiles Lab 29 - CCP Template Creation Lab 30 - CCP Security Audit and One-Step Lockdown Lab 31 - Bonus Lab - Autosecure 32 - CCP Wrapup and Real-World Word of Warning 33 - AAA Fundamentals, Authentication Discussion 34 - RADIUS VS TACACS 35 - Method Lists Discussion and Walkthrough 36 - AAA Lab - Don't Lock Yourself Out 37 - AAA Lab - Banners and Prompts 38 - Configuring AAA with CCP (And Bonus CCP Section) 39 - ACL Fundamentals 40 - Standard and Extended ACLS 41 - Named ACLS 42 - Filterinng VTY Line Traffic with ACLS 43 - Where To Put ACLS In Your Network 44 - Blocking Pings With ACLS 45 - Sequence Number Introduction 46 - Sequence Numbers In Action 47 - Creating ACLS with CISCO Configuration Professional 48 - Removing ACLS with CISCO Configuration Professional 49 - Time-Based ACLS 50 - Intro to IPS and IDS 51 - Anomaly and Reputation Signatures, Risk Ratings Intro 52 - CCP Lab - Installing SDEE, IPS Wizard, and Signatures 53 - Editing SDF Signatures 54 - The Monitor Window 55 - Second Verse, Not Same as the First 56 - CISCO IPS Risk Ratings Explained PDF 57 - What Are VPNS 58 - Intro to Cryptographic Algorithms 59 - RSA and DES Discussion 60 - The RSA Process and the Certificate Authority 61 - An Illustrated Look at Digital Signatures 62 - More Certificate Authority 63 - Intro to SCEP and OCSP 64 - Introduction to IP SEC 65 - IPSEC Security Agreements and More 66 - Site-to-Site VPN Lab 67 - SSL Client Discussion 68 - SSL Wizards Walkthrough 69 - Cryptography Warning 70 - Intro to Firewalls and Best Practices 71 - Stateless and Stateful Firewalls 72 - Intro to CISCO Zone-Based Firewalls 73 - IP Addresses for Firewall Wizard Labs 74 - Basic Firewall Wizard Lab Starts 75 - Basic Firewall Lab Concludes 76 - Advanced Firewall Wizard Lab Begins 77 - Advanced Firewall Wizard Lab Concludes 78 - Examining Class Maps, Policy Maps, and Service Policies 79 - NAT And PAT Refresher and Config With CCP 80 - ASA Theory and Fundamentals 81 - ASDM Tour 82 - ASDM Firewall Defaults and Configs 83 - Security Policy Starters 84 - Risk Analysis and Management 85 - The Cisco NFP Theorem 86 - IP Version 6 Fundamentals and Best Practices [/wpspoiler]
Кто знает, тот успешен
Windows Server 2012R2-2016
Microsoft Windows Server 2012 R2 70-410
019
CBT Nuggets Производитель: Год выпуска: 2014 Продолжительность: 19:05:32 Тип материала: Видеоурок Язык: Русский Стоимость: 1999 рублей Описание: This Windows Server 2012 R2 video training course with James Conrad covers the latest version of Microsoft’s popular technology, including installing and configuring servers, IPv4, and more. Related area of expertise: Microsoft Server 2012 Recommended skills: Familiarity with previous versions of Windows Server Experience working in an enterprise environment Recommended equipment: Windows Server 2012 Related certifications: MCSA: Windows Server 2012 R2 MCSE: Server Infrastructure MCSE: Desktop Infrastructure MCSE: Private Cloud MCSE: Messaging MCSE: Communication MCSE: SharePoint Related job functions: IT professionals Are you ready for Windows Server 2012 R2? You will be after watching this training course by James Conrad. Get familiar with Windows Server 2012 R2 and prepare for the new 70-410 exam, part of the MCSA. Server 2012 is Microsoft's best release to date, and this course highlights new features and improvements. Topics covered in this course include: Installing and configuring Windows Server 2012 R2; managing Active Directory Domain Services objects; automating Active Directory Domain Services administration; implementing networking services; implementing local storage; implementing file and print services; implementing group policy; and implementing server virtualization with Hyper-V. Windows Server admins will love learning about the new features of Server 2012 R2, including the new tools that will help make Windows Server installations more compact, efficient, and secure. New or future admins will get familiar with the essentials to keep systems running and feature-rich, including the tips that are usually known only to experienced admins! [wpspoiler name="Подробное описание" ] 1. Course Introduction (00:07:17) Welcome to Microsoft Windows Server 2012/R2 70-410: Installing and Configuring Server 2012/R2. In this Nugget, James introduces you to all the new features of Windows Server 2012/R2 and provides a road map of the course. 2. Installing and Configuring Servers (00:41:49) In this Nugget, you will learn how to install and configure servers, including how to plan for a server installation; plan for server roles; plan for a server upgrade; install Server Core; and migrate roles from previous versions of Windows Server. You also will learn some basic PowerShell commands. 3. Modifying Your Installation (00:33:10) This Nugget covers how to optimize resource utilization by using Features on Demand. You'll also learn how to configure a Server Core; add and remove features in offline images; deploy roles on remote servers; convert Server Core to/from full GUI; and perform a minimal server install. 4. Configuring Server Core (00:21:32) Learn how to configure a Server Core. Although much of the configuration will be addressed in separate Nuggets via PowerShell cmdlets throughout the course, here we will focus primarily on setting up basic items from the command line using Netsh to change IP address, DNS server address, default gateway, and firewall settings. We also will use the Net User and Net Group commands to add new users and add the users to groups. You also will see how to connect a remote core or computer to a local console such as Computer Management. 5. Configure Servers for Remote Management (00:20:33) In this Nugget, you will learn how to configure WinRM; configure servers for day-to-day management tasks; configure multi-server management; configure Windows Firewall; and manage non-domain joined servers. 6. Introduction to Active Directory and Basic Installation (00:41:47) James teaches you basic concepts of Active Directory and many of its features and advantages in this Nugget. You'll learn the difference between a domain, tree, forest, federation, forest trust, and a manual trust. You also will learn how to install a domain controller, create single user accounts, organizational units, and join a computer to the domain. 7. Active Directory: Managing Accounts (00:42:29) In this Nugget, you will learn to create, copy, configure, and delete users and computers; configure templates; configure user rights; use offline domain join (djoin.exe); and manage inactive and disabled accounts. Several tasks will be accomplished using the new Active Directory Administrative Center (ADAM). 8. Deploy Active Directory IaaS (00:41:30) In this Nugget, you will learn how to deploy Active Directory infrastructure as a service (IaaS) in Windows Azure. This includes understanding the difference between Azure's existing Active Directory, password synchronization, and an actual installation of your own domain controller in an Azure virtual machine. You also will see an introduction to how to configure Azure network properties and virtual machines. 9. Active Directory Domain Controller Installation (01:02:54) This Nugget continues the discussion of installing domain controllers, and adds methods such as using PowerShell to install new forests or additional domains. You also will learn how to create IFM (Install from Media) data to install a domain controller without depending on a slow WAN link. You will learn how to demote a domain controller from the UI or PowerShell. Upgrading a Windows Server 2008 domain controller is likely to be a common task and you will see how to do this successfully. You also will see where SRV records are kept and learn the importance of them, as well as how to automatically recreate them. Although we've discussed the global catalog, trusts, and federations previously, more detail is provided here. Finally, we'll look at some new features of Active Directory. 10. Active Directory: Automating User Accounts (00:33:19) We'll learn to automate the creation of Active Directory accounts and perform bulk Active Directory operations using tools such as LDIFDE, CSVDE, DSADD, DSMOD, DSGET, DSQUERY, and DSRM. You also will learn a basic PowerShell script that you can use with a comma separated value file (CSV) to bulk import user accounts. 11. Active Directory: Computer Accounts, Groups Part 1 (00:45:24) In this Nugget, we will create and manage Active Directory groups, configure group nesting; convert groups including security, distribution, universal, domain local, and domain global; and create, configure, and delete groups. 12. Active Directory: Groups Part 2, Organizational Units, Delegation (00:36:39) In this Nugget, we continue our discussion of security groups. You will learn to manage group membership using Group Policy; delegate the creation and management of Active Directory objects; manage default Active Directory containers; and create, copy, configure, and delete groups and OUs. In addition, you will learn how to use redirusr and redircmp to change default user and computer locations. 13. Group Policy: Essentials and Multiple Local (00:27:53) It's time to learn the basics of group policy. Then, we'll focus on local group policy and see a few demonstrations of how it works. In addition, you will see how multiple local group policy work to make exceptions for administrators, non-administrators, and specific accounts. 14. Group Policy: Central Store and Refresh (00:27:13) Learn more about how policies apply, including when user policy and computer policy refreshes; how to manually refresh using gpupdate; PowerShell cmdlet invoke-gpupdate; and refreshing an entire OU. You also will learn about the importance of the PolicyDefinitions folder and the Central Store. 15. Group Policy: Scope of Management, Preferences, Starter GPO (00:38:18) In this Nugget, you will learn about the scope of management of a GPO (also known as order of inheritance). You also will learn the difference between policy and a preference. Finally, you will learn what a starter GPO is and how to use it. 16. Group Policy: Security and Templates (00:39:41) Group Police continues in this Nugget, where you will learn to configure Security Options settings; configure Security templates; configure Audit Policy; configure User Account Control (UAC); work with Security Configuration and Analysis; and Security Templates snap-ins. 17. Group Policy: Rule and Application Enforcement (00:25:50) In this Nugget, you will learn to configure rule enforcement; configure Applocker rules; and configure Software Restriction Policies. 18. Group Policy: Windows Firewall (00:34:49) This final Group Policy Nugget shows you how to configure rules for multiple profiles using Group Policy; configure connection security rules; configure Windows Firewall to allow or deny applications, scopes, ports, and users; configure authenticated firewall exceptions; and import and export settings. 19. IPv4 (00:53:57) In this Nugget, you will learn to configure IP address options, subnetting, and supernetting. You also will learn important IPv4 essentials such as Class A, Class B, and Class C address ranges and default subnet masks, private IP address ranges, and Automatic Private IP Addresses (APIPA). 20. IPv6 (00:45:53) We did IPv4 in the previous Nugget, so it must be time for IPv6! In this Nugget, you will learn the IPv6 addressing scheme, learn the various IPv6 address types, configure interoperability between IPv4 and IPv6, and configure ISATAP; configure Teredo. 21. DHCP (00:58:43) This Nugget is chock-full of DHCP. We'll install a DHCP server; create and configure scopes; configure a DHCP reservation; configure DHCP options; configure client and server for PXE boot; configure DHCP relay agent; authorize DHCP server; backup and restore the DHCP database; reconcile the DHCP database, and configure both hot standby and load sharing mode failover methods. 22. DNS (00:50:31) In this Nugget, we configure Active Directory integration of primary zones; configure primary and secondary zones; perform zone transfers; configure additional DNS servers for a specific zone; configure forwarders; configure Root Hints; manage DNS cache; create A and PTR resource records; and work with the nslookup tool. 23. Desired State Configuration (00:31:39) In this Nugget, you will learn how to use Desired State Configuration and leverage PowerShell and new cmdlets available in R2 and Windows 8.1. These cmdlets can be used to configure virtually every aspect of a Windows computer, including services, features, roles, files, registry settings, and much more. Also, problems with configuration drift in which a server's state changes can be quickly and regularly be brought back into line with Desired State Configuration. 24. Configuring Hyper-V (00:45:24) In this virtualization-based Nugget, we'll look at the benefits of virtualization and the requirements for running Hyper-V. You will learn to: Create and configure virtual machine settings; configure dynamic memory; configure smart paging; configure Resource Metering; configure guest integration services; create and configure virtual machine storage; create VHDs and VHDX; configure differencing drives; modify VHDs; configure pass-through disks; manage snapshots; implement a virtual Fibre Channel adapter; create and configure virtual networks; implement Hyper-V network virtualization; configure Hyper-V virtual switches; optimize network performance; configure MAC addresses; configure network isolation; and configure synthetic and legacy virtual network adapters. 25. Hyper-V in R2 (00:30:09) In this Nugget, you will learn how to Create and configure Generation 1 and 2 virtual machines; configure and use extended session mode; configure storage quality of service (QoS); and configure NIC teaming in virtual machines. 26. Configuring Local Storage (00:45:00) In this Nugget, you will learn: FAT, FAT32, NTFS, and Resilient file systems (ReFS); configure basic and dynamic disks; striped set; RAID-0, RAID-1 Mirroring, and RAID-5 Stripe set with Parity; configure MBR and GPT disks; manage volumes; create and mount virtual hard disks (VHDs); configure storage pools and disk pools; and design storage spaces. 27. Storage Spaces Using Enclosures (00:25:56) In this Nugget, you will learn how to use Storage Spaces and enclosures. This enables you to use JBOD disks populated with HDD and SSD drives to configure two storage tiers for fast and slow storage. 28. Share and NTFS Permissions (00:30:20) In this Nugget, you will learn how to: Create and configure shares; configure share permissions; configure NTFS permissions; configure access-based enumeration (ABE); learn the order of inheritance; calculate effective permissions; and remove and apply inheritance permissions. 29. Additional Storage Features (00:38:11) Offline files, quotas, and Volume Shadow Copy Service are vital additional storage features. In this Nugget, you will learn how to configure offline files; configure Volume Shadow Copy Service (VSS); and configure NTFS quotas. 30. Work Folders (00:35:52) In this Nugget, you will learn how to use Work Folders to provide user files to the user regardless of what type of PC or device they use. Work Folders synchronizes and keeps the files up-to-date, even on non-domain joined devices. 31. Configuring Printers (00:31:50) We wrap up the course with a Nugget on configuring print services. We'll discuss the benefits of network printers, plus you will learn all about printer configuration, including the Easy Print print driver; Enterprise Print Management; drivers; printer pooling; print priorities; and printer permission. We'll also cover how to manage drivers and forms. [/wpspoiler]
Кто знает, тот успешен
Без рубрики
Microsoft Exchange Server 2013 70-342
013
[caption id="attachment_1010" align="alignright" width="230"]MS Exchange MS Exchange[/caption] Производитель: Год выпуска: 2014 Продолжительность: 12:11:00 Тип материала: Видеоурок Язык: Английский Стоимость: 1999 рублей Описание: This Microsoft video training course with Jason Helmick covers the planning and design of Exchange Server 2013. Related areas of expertise: Messaging/Communications Recommended skills: Experience with basic networking technology Experience with Windows Server administration Experience with Windows Client administration Microsoft Exchange Server 2013 70-341 Recommended equipment: A computer with virtualization software 2-4 virtual machines running Server 2012 R2 Related certifications: MCSE: Messaging Related job functions: Messaging engineer Exchange administrator Anyone working with messaging compliance Microsoft Exchange Server 2013 is the leading messaging server in the industry. If you're upgrading to Exchange 2013 or already have it on-premises, then you will want to get the latest information on planning and configuring everything from high availability to compliance and security. This is an extension to the Microsoft Exchange Server 2013 70-341 course, and covers greater detail in areas of planning and design for your growing messaging environment. [wpspoiler name="Подробное описание" ] 1. Intro to Microsoft Exchange Server 2013 (00:13:42) Prepare your virtualized environment so you can work with me as we deep dive into the design and planning of Exchange 2013! 2. The Exchange Management Tools (00:43:47) Knowing what tools you have available and how best to use them is the first step in advancing your skills with Microsoft Exchange 2013. You might think you already know everything you need, but don't miss this video, you might be surprised at the tips and tricks that will help manage Exchange in any situation. 3. Getting Started with High Availability and Site Resilience (00:42:34) Providing a reliable service, regardless if it's email or another mission critical application, requires a lot of planning. Start here and gain the knowledge you need to make Exchange always available to your users regardless if you have one or multiple sites. 4. High Availability and Site Resilience for CAS (00:45:20) All of your clients, from phone to Outlook, connect to the CAS role. If it's not available, then no one gets email. In this Nugget, you will load balance the CAS both in a single site, and across multiple sites. 5. High Availability and Site Resilience for DAG (00:56:58) Database availability groups are the cornerstone of resilience in an Exchange environment. In this Nugget, you will build a DAG for a single site, and add additional site resilience through multiple sites, lagged database copies, and a third-site Witness. 6. Planning for Virtualization - 1 (00:35:16) Many companies are moving towards private clouds and virtualization. Why should your messaging environment be any different? Get started learning the pros and cons of virtualizing Exchange 2013. 7. Planning for Virtualization - 2 (00:34:37) Dig into the nuts and bolts of your Exchange 2013 virtualization planning by learning the technical requirements for your hypervisor and performance tips to make Exchange sing! 8. Planning for Virtualization - 3 (00:22:15) Go beyond the capacity planning basics and get started with the Exchange 2013 Server Role Requirements Calculator. 9. Planning Transport Security (00:53:22) Identifying and planning for message compliance has never been an easy task, but there is hope. Start by identifying your corporate compliance needs, then implement those needs quickly and easily! 10. Planning Transport Security - ADRMS (00:46:38) Did you know that you could protect individual email messages from being printed, saved or forwarded? Part of your transport security plan might include increasing your Information Rights Management using Active Directory Rights Management Services (ADRMS). 11. Planning an Archive (00:42:53) Don't force your users to export their email to a .PST. Let them do an in-place archive so they can still easily search and retrieve their email. It's an affordable strategy you should not miss. 12. Planning for Retention (00:39:33) Deciding how long to maintain, archive, or delete email is a crucial part to Messaging Records Management. Take your compliance policies and put them into effect using retention tags and policies! 13. Planning for Security - RBAC (00:35:56) Role-based Access Control is the perfect way to control administrative security, but the concept and implementation can be confusing. Exchange 2013 makes the implementation much easier than ever before! 14. Planning for Security - Split Permissions (00:23:12) Exchange administrators also have the ability to create and modify Active Directory objects, which is very useful in day-to-day management. Not every company wants this crossover between management teams, and in Exchange 2013 you can control and split those permissions. 15. Planning for Auditing (00:40:58) Many admins think the Exchange 2013 audit logging is for Big Brother and compliance, but the truth is they are missing one of the best documentation and troubleshooting tools. 16. eDiscovery and Hold (00:28:26) There is more to data loss prevention then just preventing leakage. You need to be able to search and hold onto emails that might be needed for an investigation or other legal discovery. 17. Overview of Unified Messaging (00:34:26) Need to know where to get started integrating your phone system with Exchange but have never even heard of Unified Messaging? Dive into this overview to help you get started in the right direction! 18. Upgrading to Exchange 2013 (00:48:53) Don't be afraid - you are capable of performing your upgrade to Exchange 2013. Here's how to accomplish the goal! 19. Overview of Exchange Online (00:31:59) Thinking of moving your on-premises Exchange to the cloud? You should be - with the cost and management savings, it might just be what your business needs. [/wpspoiler]
Кто знает, тот успешен
Cisco
Cisco Virtual Internet Routing Lab (VIRL)
144
CBT Nuggets Производитель: Год выпуска: 2014 Продолжительность: 03:08:16 Тип материала: Видеоурок Язык: Английский Стоимость: 1999 рублей Описание: Cisco VIRL (Virtual Internet Routing Lab) is the personal edition of Cisco Modeling Labs. VIRL’s designed to provide students and network engineers with a platform to emulate various Cisco operating systems including IOS, IOS XR, and NX-OS in an easy to use GUI. Recommended skills: Familiarity with Cisco IOS and various computer operating systems Use of the internet and its related tools such as Telnet, WWW, and email Recommended equipment: Host system must be able to access the internet periodically Four CPU cores and 8GB of DRAM. More resources allows for larger simulations Intel VT-x / EPT or AMD-V / RVI virtualization extensions present and enabled in the BIOS 50GB of free disk space for installation VM Maestro User Interface client requires Java JRE 6+ to be installed VMware Fusion Pro v5.02 or later (including v6.x or v7.x) or VMware Workstation v8.04 or later (including v9.x and 10.x) or VMware Player v5.02 or later*** (including v6.x) or ESXi 5.1 / 5.5 using the vSphere Client: ESXi 5.1U2 (Build 1483097) or ESXi 5.5U1 (Build 1623387)**** Related certifications: Cisco Certified Network Associate (CCNA) Cisco Certified Network Professional (CCNP) Cisco Certified Internetwork Expert (CCIE) Cisco Certified Design Expert (CCDE) Related job functions: Systems admin Network admin Network operations analyst Network technician Network design expert Cisco VIRL is making a huge buzz in the industry. In this course, you will learn its critical features and how to use the product. Whether you are evaluating VIRL for your studies or network analysis, or you already have the product and want to ensure you can utilize it, this course will provide what you need. [wpspoiler name="Подробное описание" ] 1. What is VIRL? (00:05:35) Not sure exactly what Cisco VIRL is, and what it can do for you? Then this Nugget is a must. 2. Emulators vs. Simulators (00:04:52) Is there a difference? Yes, yes, there is. 3. VIRL Versions (00:04:15) What are the various versions of VIRL and how do they differ? 4. VIRL Requirements (00:07:13) What hardware and software do we need in place to install and run VIRL? Find out in this Nugget! 5. Installing VIRL (00:17:54) This Nugget details and demonstrates the installation of Cisco VIRL. 6. Validating the VIRL Installation (00:02:37) Did the install process go smoothly? Are you ready to successfully use VIRL? Find out how to verify all of this in this Nugget. 7. VMware ESXi Installation (00:38:05) In this Nugget, Scott Morris demonstrates his installation of VIRL on ESXi in a VMware vSphere environment. 8. Installing VM Maestro (00:10:40) The GUI for controlling Cisco VIRL is called VM Maestro. In this Nugget, you learn how to install and troubleshoot this installation. 9. Touring VM Maestro (00:08:31) There are lots of panes to be found in the VM Maestro GUI. What do they all mean? Learn all that, and watch a basic workflow example in this critical Nugget. 10. Creating a New Project and Topology (00:08:34) In this Nugget, watch Anthony demonstrate how simple it is to create a working topology in VIRL. 11. Using Your Own Telnet Client (00:03:52) In this Nugget, Anthony demonstrates how to use your own Telnet and SSH client with the VIRL simulator. This is a must if your plan on using VIRL to practice key router configurations. 12. Performing a Non-Disruptive Upgrade (00:10:56) Great news! Cisco will be updating VIRL to fix bugs and add features. In this Nugget, watch as Anthony walks you through version verification and a non-disruptive upgrade of VIRL and the VM Maestro client. 13. Practicing with Unconfigured Devices (00:06:03) In this Nugget, Anthony demonstrates how simple it is to practice with nonconfigured devices in VIRL. 14. Creating a Simple Preconfigured Simulation (00:09:45) In this Nugget, watch as Anthony creates and customizes a dual stack EIGRP-connected simple topology. 15. Creating More Complex Topologies (00:07:20) VIRL is excellent at helping you pre build more complex configurations. 16. Using Visualizations (00:04:41) VIRL is great at building diagrams of your configurations! 17. Exploring the NX-OS (00:10:20) Yes, you can experiment with basic NX-OS features. This Nugget walks you through this. 18. Working with Device Configurations (00:09:16) In this Nugget, Anthony Sequeira demonstrates how to export configurations, modify them on the fly, and import them into VIRL. 19. Using Sites and Servers (00:05:28) In this Nugget, Anthony Sequeira trains you how to use sites in VIRL in order to make larger topologies more logical and hierarchical. This Nugget also shows how to implement servers in your simulations. 20. Connecting to External Networks (00:08:27) Want your simulation to reach out to the local host machine and beyond? This Nugget is for you. 21. More Information (00:03:52) Looking for more information on Cisco VIRL? Like breaking news or exciting new features? Check out this video, and ultimately, Anthony's blog at ajsnetworking.com - here you get just the important latest stuff, and can get your VIRL questions answered quickly. [/wpspoiler]
Кто знает, тот успешен
Cisco
Cisco CCNP Routing and Switching 300-101 Route
012
CBT Nuggets Производитель: Год выпуска: 2014 Продолжительность: 08:12:56 Тип материала: Видеоурок Язык: Русский Стоимость: 1999 рублей Описание: This Cisco video training course with Jeremy Cioara covers the material needed for the 300-101 Cisco ROUTE exam with real-world experience and gobs of technical content packed together in one. Recommended skills: Basic understanding of concepts taught in ICND1/ICND2 Recommended equipment: GNS3 v1.x Cisco IOS image (12.x or 15x) supported by GNS3 Optional: Cisco VIRL, live gear (three 2621XM routers are ideal) or simulators/emulators supporting the technology in the lab may be used instead of GNS3 v1.x. Related certifications: Cisco CCNP Routing and Switching Cisco CCIE Routing and Switching Related job functions: Network technician Network engineer The worldwide network landscape is continually changing with new technologies being introduced continually. The new revision of the Cisco ROUTE exam is the most information packed addition to the CCNP curriculum experienced to date! By the time you're done watching, you'll be ready to configure routing protocols at a master level; grasp the big-picture of worldwide Cisco network design; fill in plenty of “knowledge gaps” left by the CCNA on routing protocols; and confidently sit for the 300-101 exam. [wpspoiler name="Подробное описание" ] 1. Welcome: Course Overview and Cisco Certification (00:13:37) If you've just opened the Cisco ROUTE course, start here! In this opening Nugget, Jeremy walks through the Cisco Certification programs (answering many common questions) and gives you the tools you need to maximize your experience as you progress through the course. 2. Intro: Technology Connecting Offices (00:23:26) A route is only as good as the two OSI layers below it! In this Nugget, Jeremy discusses the multiple ways to connect offices in the modern world (MetroEthernet, MPLS, Packet switching, DMVPN, etc...) which lays the foundation for the routes you will build in the rest of the course. 3. Intro: A Focus on GRE and DMVPN (00:32:57) GRE and DMVPN represents a "gap" in knowledge for most network engineers; many have heard the terms but never fully understood the concept. In this Nugget, Jeremy does a masterful job of cramming together concept and configuration in one action-packed adventure. 4. Intro: Routing Protocol Choices (00:11:44) It's time to transition from the physical topology connections into the logical routing world! In this Nugget, Jeremy reviews the "big picture" of routing and covers the high-level view of the four protocols we will discuss in this course: RIP, EIGRP, OSPF, and BGP. 5. Intro: IPv6 Review and RIPng (00:25:48) Reviewing IPv6 is similar to smashing your face on a grassy hill?!? Yes, this will make sense once you watch this Nugget. In here, you'll review IPv6 addressing types, communication types, and configuration (with a little RIPng thrown in for fun!). 6. EIGRP: Overview, Communication, and Neighbors (00:27:50) If EIGRP was a sports car... we would drive it! Join Jeremy in this Nugget as he explores the intricacies of the EIGRP protocol. You will learn the advantages of EIGRP over other protocols, the terminology (feasible successor, active routes, etc...), the neighbor relationship process, and the EIGRP metric calculation (K-Value formula)! 7. EIGRP: Base Configuration (00:09:34) In this Nugget, Jeremy configures a basic, 3-site EIGRP network discussing the best practices around the "network" and "auto-summary" commands. 8. EIGRP: Summary Routes (00:09:35) In this Nugget, Jeremy walks through the quickest way to do summarization (backing out binary digits on a subnet mask) and implements it in an existing EIGRP-based network. 9. EIGRP: Security (00:12:06) By default, EIGRP is the friendliest routing protocol in town, forming neighbor relationships with anyone speaking the same "autonomous system language." In this Nugget, Jeremy walks through the addition of security to the EIGRP process through passive interfaces and authentication. 10. EIGRP: L2 and L3 MPLS Design (00:08:19) MPLS has replaced Frame Relay as the "darling of the industry" connection type. In this Nugget, Jeremy discusses the best practice design for implementing EIGRP over a L2 or L3 MPLS architecture. 11. EIGRP: Frame Relay Design (00:12:24) Yes, Frame Relay IS still around! In this Nugget, Jeremy does a masterful job of reviewing Frame Relay at "ninja-speed," and then dives into the considerations for running EIGRP over Frame Relay. 12. EIGRP: Frame Relay Point-to-Point Configuration (00:11:14) Join Jeremy in a fast-paced Nugget demonstrating the configuration of EIGRP over Frame Relay using a point-to-point design. 13. EIGRP: Frame Relay Multipoint Configuration (00:12:09) Join Jeremy in a fast-paced Nugget demonstrating the configuration of EIGRP over Frame Relay using a multipoint design. 14. EIGRP: Stub Routing (00:08:17) Everyone say it with me! Stub, stub, and stub. Yes, it's an odd word to say, but it is a key feature to controlling EIGRP query messages! In this Nugget, Jeremy unpacks the EIGRP Stub feature concepts and configuration. 15. EIGRP: Load Balancing (00:05:58) Load balancing is pretty awesome, but with EIGRP, it gets even better! EIGRP is the only routing protocol that allows you to implement unequal cost load balancing, which Jeremy demonstrates quite well in this Nugget. 16. EIGRP: IPv6 Configuration (00:06:02) Is there anything easier than setting up EIGRP for IPv4? Yes, setting it up for IPv6! In this Nugget, Jeremy walks through just how simple EIGRP can be. 17. EIGRP: Named Configuration (00:05:55) It's the new "IOS-XR-like" flavor of EIGRP configuration: EIGRP Named Configuration! Join Jeremy as he reviews the changes from classic EIGRP. 18. OSPF: Understanding Core OSPF Design (00:08:38) OSPF design is all based around the concept of "areas," key dividing points in your network. In this Nugget, Jeremy weaves through a description of multi-area configurations, area border routers (ABRs), autonomous system boundary routers (ASBRs), and virtual links. 19. OSPF: OSPF Neighbor Relationships - The Nitty Gritty (00:10:47) Understanding the "how" behind OSPF neighbor relationships is an element that separates the average and excellent network engineers. In this Nugget, Jeremy discusses the process (and potential breakdowns) behind the OSPF neighbor relationship. 20. OSPF: DR/BDR Relationships, Neighbor States, and SPF Algorithm (00:18:34) Get ready to have the "puzzle pieces come together" as Jeremy hits some of the core principles of OSPF operation: DR/BDR election, Neighbor communication and states, and SPF Algorithm (how OSPF generates a routing table). 21. OSPF: Implementing Summarization on ABRs and ASBRs (00:12:16) In OSPF, summarization capabilities are restricted to two specific router types: ABR and ASBR. In this Nugget, Jeremy demonstrates how to implement summarization on each one. 22. OSPF: Special Area Types (00:14:09) Stub? Totally stubby? Not-so-stubby? Are these really technical terms? Indeed they are! Join Jeremy through a whirlwind of concept and configuration as you learn the OSPF special area types. 23. OSPF: Virtual Links (00:06:31) Save the Hi-Chew Candy Corporation! In this Nugget, Jeremy walks through the concept and configuration of OSPF Virtual Links to bring Hi-Chew Australia into the fold. 24. OSPF: Configuring OSPFv3 (00:07:07) How do you configure OSPFv3 for IPv6? Does it support the same features? Is Jeremy getting old? The answers to all this and more are found in this Nugget! 25. Redistribution: Understanding Route Redistribution Concepts (00:11:22) Route redistribution can be awesome, but it can also blow up your network (which is why this is NOT a CCNA-level concept!). In this Nugget, Jeremy walks through the "what and why" behind route redistribution, and also addresses key filtering concepts such as prefix lists, route tagging, and adjusting the administrative distance. 26. Redistribution: Configuring Basic Redistribution (00:08:38) The Nugget title says it all: Jeremy performs a two-way redistribution between RIP and OSPF while at the same time making us very hungry for ham, steak, and eggs. 27. Redistribution: Filtering with Distribution Lists (00:08:21) Filtering routes during redistribution could save your network from a vicious routing loop. In this Nugget, Jeremy demonstrates how to combine the power of Access Control Lists (ACLs) with Distribution Lists to filter redistributed routes. 28. Redistribution: Prefix List Concepts (00:09:52) Prefix Lists are an alternative to using ACLs for filtering routes (used primarily with BGP). In this Nugget, you will learn prefix list concepts (they're a little weird at first) by working through multiple examples with Jeremy. 29. Redistribution: Route-map Concepts and Filtering (00:14:30) How are the Stay Puft Marshmallow Man and route maps similar? We guarantee this Nugget is the only place on the internet where you'll find the answer to that question. In this Nugget, you'll learn the basic concepts and syntax behind route-maps — and watch a demonstration of using route-maps to filter redistributed networks! 30. Redistribution: Configuring Redistribution with Prefix Lists (00:07:36) Prefix lists offer you the flexibility to match routes using a range of subnet masks rather than wildcard masking limitations of ACLs. In this Nugget, Jeremy walks through a very practical concept review and application of prefix lists in route filtering. 31. Path Control: Policy-Based Routing (00:14:36) You heard it here first: Policy-based Routing (PBR) is the No. 1 most powerful way you can influence traffic going through your Cisco router! In this Nugget, Jeremy walks through a practical illustration and demonstration of PBR for two clients choosing an exit ISP. 32. Path Control: Using IP SLA (00:16:09) In order to trigger the process of finding alternate routes, a router depends on link failure. However, with newer internet connections, those link failures may be difficult to detect. Never fear, IP SLA to the rescue! In this Nugget, Jeremy breaks down IP SLA concepts and walks through a fantastic configuration of configuring ISP redundancy with IP SLA. 33. BGP: Understanding Internet Connection Options (00:18:17) BGP is not for everyone. Actually, most people in the world should NOT run BGP! In this Nugget, Jeremy walks through the "typical" internet connections compared to BGP connections, reasons why you should or should not use BGP, and the key facts to know about BGP. 34. BGP: Understanding BGP Neighbor Relationships (00:22:53) Understanding the neighbor relationship process for ANY protocol is extremely valuable for the initial configuration and troubleshooting purposes. In this Nugget, Jeremy discusses the BGP neighbor formation process and messages and performs a configuration of BGP between two uplink service providers. 35. BGP: Understanding Key BGP Attributes (00:12:25) BGP attaches characteristics or "attributes" to each of its advertised routes which governs the reachability and quality of the route during the BGP route selection process. In this Nugget, Jeremy unpacks the mandatory and discretionary well-known attributes and explores the BGP route selection process. 36. Miscellaneous Protocols: Understanding and Configuring SNMPv3 (00:11:33) Minimize your distractions with this Nugget because it moves FAST (no double-speed required)! In this Nugget, Jeremy walks through the concepts and configuration of SNMPv3 on a Cisco router (even bringing in an SNMP management tool to demonstrate the monitoring capabilities). 37. Miscellaneous Protocols: Understanding and Configuring PPPoE (00:08:55) Ethernet is typically an "all access" medium. If you can plug into it, you're good! So what does a DSL carrier do when they have hundreds of subscribers plugging into their shared copper connections running the ethernet protocol? Add PPPoE-based authentication, of course! In this Nugget, Jeremy unpacks PPPoE concepts and presents a configuration snippet sure to move you in the right direction. 38. Miscellaneous Protocols: Cisco Easy Virtual Networking (EVN) (00:12:52) We have come to the mystical "Easy" Virtual Networking which claims to quickly and easily isolate your internal network environment... but is it really so easy? Join Jeremy as he unpacks this Cisco topic to explore the goal of EVN and take a look under the hood. [/wpspoiler]
Кто знает, тот успешен
Windows 8/8.1
Microsoft MCSA Windows 8.1 70-688
013
CBT Nuggets Производитель: Год выпуска: 2014 Продолжительность: 05:49:08 Тип материала: Видеоурок Язык: Английский Стоимость: 1999 рублей Описание: This Microsoft Windows 8.1 course with Anthony Sequeira builds upon the Configuring Windows 8.1 70-687 course, and dives much deeper into critical areas of support for this new desktop OS. Related area of expertise: Desktop Support Recommended skills: Familiarity with Windows operating system environment Familiarity with Command Prompt tools and utilities Familiarity with Internet programs and protocols Recommended equipment: Windows Server 2012 R2 Evaluation Windows 8.1 Enterprise Evaluation Related certifications: MCSA: Windows 8 Solutions Associate Related job functions: Systems admin Network admin Network operations analyst Network technician Windows 8.1 brings amazing new features to the user desktop experience. It also brings new challenges to the network administrator or technician. While the focus in this course is on real-world success with Windows 8.1, this course also ensures students are ready for the challenging 70-688 exam from Microsoft. For those interested in the exam, you will note that the first Nugget and the last Nugget of the course detail the exam specifically. Built to follow the exam blueprint from Microsoft, this course covers that material and goes much farther, providing power tips, pop quizzes, and tales from the trenches for even more excitement. [wpspoiler name="Подробное описание" ] 1. Course Introduction (00:06:21) Find out what this course covers, learn some tips for achieving your certification from Microsoft in this area, and discover cool features of this course in this brief introduction. 2. Support Operating System Installation (00:42:28) This action-packed Nugget covers such critical topics as supporting Windows To Go installations, managing boot settings, managing desktop images, and customizing installations through the use of Windows PE. 3. Support Desktop Apps (00:41:27) Desktop apps are still the life blood of the Windows 8.1 appeal. This Nugget tears into this subject and covers many topics including desktop app compatibility using Application Compatibility Toolkit (ACT), desktop application co-existence using Hyper-V, RemoteApp, and App-V; installation and configuration of User Experience Virtualization (UE-V); and the deployment of desktop apps using Windows Intune. 4. Support Windows Store and Cloud Apps (00:21:35) Desktop apps are not the only concern in Windows 8.1. This Nugget builds upon the previous Nugget, and attacks subjects such as installing and managing software by using Office 365 and Windows Store apps; sideloading apps by using Windows Intune; sideloading apps into online and offline images; deep linking apps by using Windows Intune; and integrating a Microsoft account using personalization settings and Trusted PC. 5. Support Network Connectivity (00:34:06) In this Nugget, we examine support for IPv4 and IPv6 including transition technologies; name resolution including Peer Name Resolution Protocol (PNRP) and Domain Name System Security Extensions (DNSSECs); wireless networks and connections; and network security including Windows Firewall and IP security. 6. Support Remote Access (00:20:52) This topic just gets more and more important to organizations every passing year. In this Nugget, we examine Remote Access support including Virtual private network (VPNs) and Connection Manager Administration Kit (CMAK); Remote Desktop Protocol (RDP) including Remote Desktop Services Gateway access; DirectAccess; remote administration; and Network Access Protection (NAP). 7. Support Authentication and Authorization (00:23:26) This Nugget explores multi-factor authentication including certificates, virtual smart cards, picture passwords, and biometrics; and workgroup versus domain, homegroup, computer, and user authentication including secure channel, account policies, credential caching, and Credential Manager. Finally, this Nugget also explores local accounts versus Microsoft accounts, and the Workplace Join feature. 8. Support Data Storage (00:19:52) Data storage is a hugely important topic for any admin. This Nugget details Distributed File System (DFS) clients including caching settings, and storage spaces including capacity and fault tolerance. This Nugget also explores optimizing data access by using BranchCache. Finally, this Nugget details OneDrive. 9. Support Data Security (00:35:03) This Nugget details support of the Encrypting File System (EFS), including Data Recovery Agent; access to removable media; and BitLocker and BitLocker To Go, including Data Recovery Agent and Microsoft BitLocker Administration and Monitoring (MBAM). This Nugget also reviews items like shares permissions, NTFS permissions, and DAC. 10. Support OS and Hardware (00:27:34) This Nugget features many important topics. Here, we resolve hardware and device issues, including STOP errors and Reliability Monitor, as well as optimize performance by using Windows Performance Toolkit (WPT), including Xperf.exe, Xbootmgr.exe, XperfView.exe, and Windows Performance Recorder (WPR). This Nugget also explores monitoring performance by using Data Collector Sets, Task Manager, and Resource Monitor; monitoring and managing printers, including NFC Tap-to-Pair and printer sharing; and remediating startup issues by using the Diagnostics and Recovery Toolkit (DaRT). 11. Support Mobile Devices (00:23:20) Mobile devices are the rage in IT. This Nugget details support for mobile device policies, including security policies, remote access, and remote wipe. The Nugget also details support for mobile access and data synchronization, including Work Folders and Sync Center; supporting broadband connectivity, including broadband tethering and metered networks; and supporting Mobile Device Management by using Windows Intune, including Windows RT, Windows Phone 8, iOS, and Android. 12. Support Client Compliance (00:23:41) In this Nugget, support for managing updates by using Windows Update and Windows Intune, including non-Microsoft updates is fully explored. Also, managing client security, using Windows Defender, Windows Intune Endpoint Protection, or Microsoft System Center 2012 Endpoint Protection, is detailed. Finally, managing Internet Explorer 11 security; supporting Group Policy application, including Resultant Set of Policy (RSoP), policy processing; and Group Policy caching is detailed. 13. Manage Clients by Using Windows Intune (00:14:00) In this Nugget, we cover managing user and computer groups; configuring monitoring and alerts; and managing policies and remote computers. 14. Your 70-688 Exam (00:15:23) This Nugget provides valuable guidance on the specifics of the 70-688 exam. Be sure to view this Nugget if you plan on taking this certification exam from Microsoft. [/wpspoiler]
Кто знает, тот успешен
Cisco
Cisco CCNP Security 300-209 SIMOS
023
CBT Nuggets Производитель: Год выпуска: 2014 Продолжительность: 09:13:56 Тип материала: Видеоурок Язык: Английский Стоимость: 1999 рублей Описание: This Implementing Cisco Secure Mobility Solutions (SIMOS) (300-209) course provides training on how to configure and implement a variety of Virtual Private Network (VPN) solutions on the Cisco ASA firewall and Cisco IOS software platforms. Topics include IKEv2, DMVPN, FlexVPN, GETVPN, and troubleshooting. Related area of expertise: Cisco security Recommended skills: CCNA Route/Switch and CCNA Security certification (or equivalent knowledge and skills) Knowledge of Microsoft Windows CCNA Security is a pre-requisite for the CCNP Security certification Recommended equipment: IOS that supports DMVPN, GETVPN and FlexVPN IOS and ASA that support IKEv2 Related certifications: CCNP Security. This course (SIMOS exam # 300-209) is part of the curriculum in the Cisco Certified Network Professional Security (CCNP© Security) certification Related job functions: Network Analyst Network Engineer Network Technician Network Designer Security Analyst Security Auditor Penetration Tester Security Architect Technical Manager In this course, you will learn how to implement and manage VPNs on Cisco routers and ASA firewalls. As part of your studies regarding VPNs, the course will include recommendations of specific videos from the CCNP Security VPN2.0 course. Viewing these additional videos are required for preparation for the new 300-209 certification [wpspoiler name="Подробное описание" ] 1. Welcome and Overview (00:06:36) In this Nugget, Keith discusses the prerequisites that enable you to get the most from this course, and shares some tips for you to get the most out of this VPN-focused course. 2. Naked DMVPN (00:43:40) Dynamic Multipoint VPNs (DMVPNs) are a great way to set up full-mesh connectivity with manually setting up n(n-1)/2 static tunnels. In this Nugget, Keith talks with you about the core pieces that make up DMVPNs, including Next Hop Resolution Protocol (NHRP), multipoint GRE tunnel interfaces, dynamic routing protocols, and more. Configuration and verification also is included in this video. Adding IPsec to the DMVPN is covered in the next Nugget. This video maps to "Secure Communications," "Troubleshooting, Monitoring, and Reporting Tools," and "Secure Communications Architectures" sections of Cisco's blueprint for Implementing Cisco Secure Mobility Solutions (SIMOS, 300-209). 3. Protected DMVPN (00:32:17) IPsec can be added to the DMVPN topology (and usually is) to provide encryption, authentication, and data integrity services for the packets traveling between the mGRE interfaces on the DMVPN routers. This Nugget presumes the viewer has viewed the previous Nugget in this course, "Naked DMVPN," and has a basic CCNA Security-level understanding of IKEv1 (IKEv1 and other cryptographic fundamentals can be reviewed in the CCNA Security course, specifically the videos "Cryptography Essesntials" and "IPsec Site to Site VPNs", which are part of the CCNA Security course). This video maps to "Secure Communications," "Troubleshooting, Monitoring, and Reporting Tools," and "Secure Communications Architectures" sections of Cisco's blueprint for Implementing Cisco Secure Mobility Solutions (SIMOS, 300-209). 4. TShoot DMVPN (00:37:23) "What could go wrong?" These are the famous last words of the technician who didn't learn to identify and correct problems that can cause a DMVPN network to fail. In this Nugget, you join Keith to diagnose, troubleshoot and correct multiple problems in an existing DMVPN network. This video maps to the "Secure Communications," "Troubleshooting, Monitoring, and Reporting Tools," and "Secure Communications Architectures" sections of Cisco's blueprint for Implementing Cisco Secure Mobility Solutions (SIMOS, 300-209). 5. IKE Call Admission Control (00:25:17) A brute force IKE attack, or even a malfunctioning system making multiple requests, can place a heavy load on the router, which may result in a Denial of Service (DoS) attack. In this Nugget, Keith chats about how IKE Call Admission Control (CAC) can be used to limit the number of IKE sessions that can be negotiated and set up on the router. This video maps to the "Secure Communications," "Troubleshooting, Monitoring, and Reporting Tools," and "Secure Communications Architectures" sections of Cisco's blueprint for Implementing Cisco Secure Mobility Solutions (SIMOS, 300-209). 6. VTI Site2Site VPNs (00:25:24) Virtual Tunnel Interfaces (VTIs) are a simpler method of creating IPsec Site to Site tunnels (compared to traditional Crypto Maps), and VTIs offer the benefit of placing specific policies to either encrypted or clear-text traffic that is going through an interface. This Nugget discusses VTIs, and then demonstrates the configuration and verification of a VTI based static Site-to-Site VPN. This video maps to the "Secure Communications" and "Secure Communications Architectures" sections of Cisco's blueprint for Implementing Cisco Secure Mobility Solutions (SIMOS, 300-209). 7. Dynamic VTI Hub (00:23:54) Using a Dynamic Virtual Tunnel Interface (DVTI), we can avoid the manual creation of multiple tunnel interfaces on the hub, but instead create a virtual template, and have the router automagically use that template to create individual virtual access interfaces on demand for IPsec sessions between it and the remote routers. This video maps to the "Secure Communications," and "Secure Communications Architectures" sections of Cisco's blueprint for Implementing Cisco Secure Mobility Solutions (SIMOS, 300-209). 8. FlexVPN Site2Site (00:37:49) IKEv2 and the new methods of configuring the tunnels might take a bit of getting used to. In this Nugget, Keith helps ease that process by talking with you about the components of IKEv2 including policy, proposal, profile, and key ring. A demonstration of implementing IKEv2 on Cisco IOS is included as well. This video maps to the "Secure Communications," "Troubleshooting, Monitoring, and Reporting Tools," and "Secure Communications Architectures" sections of Cisco's blueprint for Implementing Cisco Secure Mobility Solutions (SIMOS, 300-209). 9. FlexVPN DVTI (00:09:12) This Nugget explains some of the benefits of IKEv2, and demonstrates the conversion from a fixed tunnel interface to a virtual access interface using a virtual template and IKEv2. This video maps to the "Secure Communications," and "Secure Communications Architectures" sections of Cisco's blueprint for Implementing Cisco Secure Mobility Solutions (SIMOS, 300-209). 10. FlexVPN Smart Defaults (00:25:56) Smart defaults can be used to save configuration time, and may be customized for your needs. In this Nugget, Keith demonstrates the defaults for (and customization of) the IKEv2 proposal, IPsec transform-set and IPsec profile. This video maps to the "Secure Communications," "Troubleshooting, Monitoring, and Reporting Tools," and "Secure Communications Architectures" sections of Cisco's blueprint for Implementing Cisco Secure Mobility Solutions (SIMOS, 300-209). 11. Certificate Install (00:29:19) In this Nugget, Keith walks you through configuring an IOS router as a Certificate Authority (CA), as well as other routers becoming CA clients that will authenticate and enroll with the CA (using Simple Certificate Enrollment Protocol, SCEP) — in preparation for using their certificates as part of rsa-sig authentication. This video maps to the "Secure Communications", and "Secure Communications Architectures" sections of Cisco's blueprint for Implementing Cisco Secure Mobility Solutions (SIMOS, 300-209). 12. RSA-Sig IKEv2 Authentication (00:19:41) Using digital certificates, peers who have a a common trusted CA, can authenticate and use the peer's cert and public key to verify the peer's digital signatures for the authentication of the IKEv2 tunnel. In this Nugget, Keith demonstrates this IKEv2 implementation. Supporting files are contained in the NuggeLab download associated with this course. This video maps to the "Secure Communications," "Troubleshooting, Monitoring, and Reporting Tools," and "Secure Communications Architectures" sections of Cisco's blueprint for Implementing Cisco Secure Mobility Solutions (SIMOS, 300-209). 13. DVTI IKEv2 Hub and Spoke RSA-Sig (00:16:56) This Nugget demonstrates how to implement and verify the following: Dynamic Virtual Tunnel Interface (DVTI) on the Hub, Static Tunnel Interfaces on the Spokes, and IKEv2 with RSA-Sig for authentication. Configuration files, including the full final configs, are in the NuggetLab files associated with this course. This video maps to the "Secure Communications," and "Secure Communications Architectures" sections of Cisco's blueprint for Implementing Cisco Secure Mobility Solutions (SIMOS, 300-209). 14. IKEv2 Pushing Policy (00:12:51) Adding network authorization and AAA can allows us to push policy down to VPN peers. This is implemented by creating a new (or modifying the default) IKEv2 authorization policy, and including that IKEv2 authorization policy in the IKEv2 profile. This video maps to the "Secure Communications," and "Secure Communications Architectures" sections of Cisco's blueprint for Implementing Cisco Secure Mobility Solutions (SIMOS, 300-209). 15. FlexVPN Clients (00:30:41) Setting up a spoke as a FlexVPN "Client" allows opportunities for additional features including multiple peers for fault tolerance, and the pushing of networks based on the IKEv2 authorization policy configured. In this Nugget, Keith walks you through reconfiguring the spoke routers to be FlexVPN clients. The use of the IKEv2 authorization profile also is demonstrated to advertise routes between the FlexVPN client and server. This video maps to the "Secure Communications," and "Secure Communications Architectures" sections of Cisco's blueprint for Implementing Cisco Secure Mobility Solutions (SIMOS, 300-209). 16. Spoke 2 Spoke FlexVPN (00:32:59) FlexVPN borrows the Next Hop Resolution Protocol (NHRP) from DMVPN to allow a hub and spoke topology to dynamically build spoke to spoke tunnels. The NuggetLab files contain all the configuration commands used in this video, along with the final working configuration for all four routers. This video maps to the "Secure Communications," and "Secure Communications Architectures" sections of Cisco's blueprint for Implementing Cisco Secure Mobility Solutions (SIMOS, 300-209). 17. FlexVPN Troubleshooting (00:20:18) In this Nugget, Keith walks you through a troubleshooting scenario, leveraging show commands and pings to isolate the problems in a FlexVPN network. This video maps to the "Troubleshooting, Monitoring, and Reporting Tools" section of Cisco's blueprint for Implementing Cisco Secure Mobility Solutions (SIMOS, 300-209). 18. GETVPN (00:50:45) Group Encrypted Transport VPN (GETVPN) overcomes the delays often associated with creating a spoke-to-spoke tunnel, as there are no formal IPsec tunnels created between group members. In this Nugget, Keith explains and then demonstrates the implementation and verification of GETVPN. This video maps to the "Secure Communications," "Troubleshooting, Monitoring, and Reporting Tools," and "Secure Communications Architectures" sections of Cisco's blueprint for Implementing Cisco Secure Mobility Solutions (SIMOS, 300-209). 19. ASA 2 IOS IKEv2 (Site-to-Site IPsec VPN) (00:23:15) In this Nugget, Keith explains and demonstrates the configuration on the ASA to support both IKEv1 and IKEv2 site-to-site tunnels, as well as configuring a peer IOS router. The router demonstration includes IKEv1 first, with the verification commands to confirm it is working, and then IKEv2 and verification once again that it is working. This video maps to the "Secure Communications," "Troubleshooting, Monitoring, and Reporting Tools," and "Secure Communications Architectures" sections of Cisco's blueprint for Implementing Cisco Secure Mobility Solutions (SIMOS, 300-209). 20. Verify and TShoot IPsec (00:07:29) In this Nugget, Keith demonstrates where to look inside ASDM to verify or configure the IPsec Site-to-Site configuration implemented from the CLI in the previous video. Note: The following three videos are from the CCNP Security VPN v2.0 course, and it's recommended that you watch them before watching the next Nugget in this course. ASA VPN Options Site to Site IPsec VPNs Troubleshooting IPsec Site-to-Site VPNs This video along with the 3 assigned videos map to the "Secure Communications," "Troubleshooting, Monitoring, and Reporting Tools," and "Secure Communications Architectures" sections of Cisco's blueprint for Implementing Cisco Secure Mobility Solutions (SIMOS, 300-209). 21. RA VPNs (00:12:17) Remote Access (RA) VPNs play a critical role in secure mobility solutions. In this Nugget, Keith refers to some IOS VPN server documentation that may be useful for administrators of IOS based RA VPNs. This video includes an assignment of watching the following videos from the CCNP Security VPNv2.0 course: VPN Profiles and Policies; Implementing Clientless SSL VPNs; AnyConnect SSL VPNs; Smart Tunnels and Plugins; AAA VPN Authentication; Troubleshooting Clientless SSL VPNs; Troubleshooting AnyConnect Client SSL VPNs; Cisco Secure Desktop and DAP; High Availability VPNs; and VPN Pieces and Parts. These videos from the CCNP Security VPN v2.0 course are relevant for real-world experience, as well as the SIMOS 300-209 certification exam from Cisco. The list of assigned videos from this lesson also can be found in the NuggetLab files as a document named "Video Assignment.txt." This video, along with the assigned videos, maps to the "Secure Communications," "Troubleshooting, Monitoring, and Reporting Tools," and "Secure Communications Architectures" sections of Cisco's blueprint for Implementing Cisco Secure Mobility Solutions (SIMOS, 300-209). 22. AnyConnect Client Profile (00:14:24) Whoever thought an XML file could be so powerful? In this Nugget, Keith demonstrates how to modify an AnyConnect Client Profile (the .xml file) on the ASA, and have that profile be automatically downloaded to AnyConnect Clients when they connect. This is an effective way to modify the AnyConnect client profile of remote systems using the ASA as a central distribution point. This video maps to the "Secure Communications," "Troubleshooting," and "Secure Communications Architectures" sections of Cisco's blueprint for Implementing Cisco Secure Mobility Solutions (SIMOS, 300-209). 23. Closing Thoughts (00:15:33) In this Nugget, Keith shares some tips for continued growth and success, along with some troubleshooting strategies. This video maps to the "Secure Communications" and "Troubleshooting," sections of Cisco's blueprint for Implementing Cisco Secure Mobility Solutions (SIMOS, 300-209). [/wpspoiler]
Кто знает, тот успешен