Ccnp Tshoot 300-135 2019 Video Boot Camp With Chris Bryant

Posted By: ELK1nG

Ccnp Tshoot 300-135 2019 Video Boot Camp With Chris Bryant
Last updated 10/2017
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 4.41 GB | Duration: 27h 6m

Pass The CCNP TSHOOT Exam With Chris Bryant – AND Prepare For Real-World Network Troubleshooting Success!

What you'll learn

Requirements

Description

This course is fully updated for the latest version of the CCNP TSHOOT exam (300-135). I've been preparing CCNP candidates for success since 2005 with my no-nonsense lectures using REAL Cisco switches and routers - no simulators here - and now I'm going to do the same for you.No prepackaged slides here - you'll see lab after lab on REAL Cisco switches and routers, all designed to teach you the finer points of advanced Cisco switching and prepare you for success in the exam room and real-world networking.From STP to BGP, from complex OSPF configurations to multicasting,  and everything in between  it's all here - and there's a forum right here on this site where you can ask me questions.  Your access to this online course is unlimited - you can watch the videos as often as you like and for as long as it takes for you to pass!  Let's get started!                                    Chris Bryant                                  CCIE #12933                                    "The Computer Certification Bulldog" 

Overview

Section 1: CCNP TSHOOT 300-135: Switching And EC Fundamentals

Lecture 1 Switching 1: Checking The Fundamentals

Lecture 2 Switching 2: Port Security Fundamentals

Lecture 3 Switching 3: Port Security Static Addressing Lab

Lecture 4 Switching 4: Port Security With Multiple Secure Addresses

Lecture 5 Switching 5: The Errdisable Recovery Feature (… or IS it?)

Lecture 6 Switching 6: Speaking Of Trunking

Lecture 7 Switching 7: More Trunking!

Lecture 8 Switching 8: Etherchannel Fundamentals

Lecture 9 Switching 9: Things That Don't Play Well With Etherchannels

Lecture 10 Switching 10: Etherchannel Negotiation Protocols

Section 2: CCNP TSHOOT 300-135: Advanced Switching Options

Lecture 11 Adv 1: Section Intro

Lecture 12 Adv 2: Portfast

Lecture 13 Adv 3: Uplinkfast

Lecture 14 Adv 4: Backbonefast

Lecture 15 Adv 5: Root Guard

Lecture 16 Adv 6: BPDU Guard

Lecture 17 Adv 7: BPDU Filter and Root Guard

Lecture 18 Adv 8: UDLD

Lecture 19 Adv 9: RSTP Theory

Lecture 20 Adv 10: RSTP Synch & Compatibility

Lecture 21 Adv. 11: CSP MST PVST

Lecture 22 Adv 12: SDM Intro

Lecture 23 Adv 13: SDM Lecture

Section 3: CCNP TSHOOT 300-135: Analyzing And Troubleshooting OSPF

Lecture 24 OSPF 1: The Fundamentals

Lecture 25 OSPF 2: Fun With Hello And Dead Timers

Lecture 26 OSPF 3: Network Masking and Point-To-Point Links

Lecture 27 OSPF 4: NBMA Configuration And Troubleshooting

Lecture 28 OSPF 5: Virtual Links - Yea Or Nay?

Lecture 29 OSPF 6: Virtual Links – Building And Troubleshooting

Lecture 30 OSPF 7: Authentication Labs Begin

Lecture 31 OSPF 8: Password Authentication Mismatch Debugging And T-Shooting

Lecture 32 OSPF 9: Spotting And Fixing Authentication Type Mismatches

Lecture 33 OSPF 10: Area Authentication And Interface-Level Authentication

Lecture 34 OSPF 11: Virtual Links and Authentication

Lecture 35 OSPF 12: Passive and Non-Passive Interfaces

Lecture 36 OSPF 13: The MTU

Lecture 37 OSPF 14: Stub Areas And RIDs

Section 4: CCNP TSHOOT 300-135: EIGRP

Lecture 38 EIGRP 1: The "network" and "frame map (?)" Commands

Lecture 39 EIGRP 2: Masks, Timers, and Flapping Links

Lecture 40 EIGRP 3: K-Values and Passive Interfaces

Lecture 41 EIGRP 4: More Passive Interfaces

Lecture 42 EIGRP 5: Load Balancing, Traceroutes, and Pings

Lecture 43 EIGRP 6: Splitting Your Horizons

Lecture 44 EIGRP 7: Creating Subinterfaces From Not-Quite-Scratch

Lecture 45 EIGRP 8: Conclusion of Subinterface Creation Lab

Section 5: CCNP TSHOOT 300-115: Route Redistribution

Lecture 46 Redistribution 1: To AutoRedistribute (Or Not)

Lecture 47 Redistribution 2: EIGRP > RIP

Lecture 48 Redistribution 3: Testing And T-Shooting With Pings And Traces

Lecture 49 Redistribution 4: RIP and EIGRP

Lecture 50 Redistribution 5: OSPF

Lecture 51 Redistribution 6: Fine-Tuning With Route Maps (Part 1)

Lecture 52 Redistribution 7: Fine-Tuning With Route Maps (Part 2)

Section 6: TSHOOT 300-115: The Hot Standby Routing Protocol

Lecture 53 HSRP 1: The Fundamentals

Lecture 54 HSRP 2: Preemption And Testing

Lecture 55 HSRP 3: Interface Tracking Lab Begins

Lecture 56 HSRP 4: Interface Tracking Lab Concludes

Lecture 57 HSRP 5: Route Tracking Lab Begins

Lecture 58 HSRP 6: Route Tracking Lab Ends

Section 7: CCNP TSHOOT 300-115: Access Lists

Lecture 59 ACL 1: A Refresher

Lecture 60 ACL 2: Named ACLs And Placement

Lecture 61 ACL 3: Line Order, Placement, And…Notepad?

Lecture 62 ACL 4: NAT Lab Begins

Lecture 63 ACL 5: NAT Lab Concludes

Lecture 64 ACL 6: Time Range Time!

Lecture 65 ACL 7: More Time Ranges

Lecture 66 ACL 8: The Network Time Protocol

Lecture 67 ACL 9: NTP Authentication

Section 8: CCNP TSHOOT 300-115: BGP

Lecture 68 BGP 1: A Note For TSHOOT Students

Lecture 69 BGP 1A: Intro Remarks

Lecture 70 BGP 2: External BGP Peering

Lecture 71 BGP 3: iBGP Peering And Loopback Interfaces

Lecture 72 BGP 4: eBGP Peering And Loopback Interfaces

Lecture 73 BGP 5: Advertising Routes With The "Network" Command

Lecture 74 BGP 6: The Origin and Next-Hop Attributes

Lecture 75 BGP 7: BGP Best-Path Selection Process

Lecture 76 BGP 8: The Mystery Of The Next-Hop Address

Lecture 77 BGP 9: Mystery… SOLVED!

Lecture 78 BGP 10: The Multi-Exit Discrimator (MED)

Lecture 79 BGP 11: Local Preference: All Or Nothing At All

Lecture 80 BGP 12: Local Preference: Changing One, But Not All

Lecture 81 BGP 13: Carry That Weight (Attribute)

Lecture 82 BGP 14: More Weight

Lecture 83 BGP 15: Route Summarization and Advertisements

Lecture 84 BGP 16: Synch Rules and the Full Mesh

Lecture 85 BGP 17: The Why and How of Route Reflectors

Lecture 86 BGP 18: Prefix Lists, Part I

Lecture 87 BGP 19: Prefix Lists, Part II

Lecture 88 BGP 20: Success Tips

Section 9: TSHOOT 300-135: VPNs And VRF Lite

Lecture 89 VPN Intro For TSHOOT Students

Lecture 90 VPN 1: The Dreaded But Necessary Theory

Lecture 91 VPN 2: IKE Phase 1 In Action

Lecture 92 VPN 3: Configuring IPSec SAs

Lecture 93 VPN 4: IPSec SA Lab Continues

Lecture 94 VPN 5: A Dash Of DMVPN

Lecture 95 VPN 6: VRF Lab Begins

Lecture 96 VPN 7: VRF Lab Continues

Lecture 97 VPN 8 VRF Lab Concludes

Lecture 98 VPN 9: The Conclusion!

Section 10: Your Free CCNA Security 210-260 Course Begins Here!

Lecture 99 Intro 1: Citizen C.I.A.

Lecture 100 Intro 2: Introduction To SIEM

Lecture 101 Intro 3: SIEM Continues

Lecture 102 Intro 4: Recon Attacks and Phishing

Lecture 103 Intro 5: Social Engineering and Spear Phishing

Lecture 104 Intro 6: Privilege Escalation

Lecture 105 Intro 7: More Escalation!

Lecture 106 Intro 8: DoS and DDoS Attacks

Lecture 107 Intro 9: Advanced Persistent Threats

Section 11: CCNA Security 210-260, Section 2

Lecture 108 Attack 1: Man-In-The-Middle Attacks

Lecture 109 Attack 2: ARP Poisoning and Dynamic ARP Inspection

Lecture 110 Attack 3: DAI Commands

Lecture 111 Attack 4: MAC Spoofing and CAM Table Overflows

Lecture 112 Attack 5: Port Security Fundamentals

Lecture 113 Attack 6: Port Security Dynamic Address Learning

Lecture 114 Attack 7: Port Security Shutdown and Recovery

Lecture 115 Attack 8: Port Security and Automatic Port Reenabling

Lecture 116 Attack 9: Port Security Static Address Aging

Lecture 117 Attack 10: Port Security Dynamic Address Aging

Lecture 118 Attack 11: Refresh Your VLAN Knowledge Here!

Lecture 119 Attack 12: Private VLAN Theory

Lecture 120 Attack 13: Private VLAN Labs

Lecture 121 Attack 14: OSPF Authentication Fundamentals

Lecture 122 Attack 15: OSPF Clear-Text Authentication

Lecture 123 Attack 16: OSPF MD5 Authentication

Lecture 124 Attack 17: Root Guard

Lecture 125 Attack 18: BPDU Guard and Loop Guard

Lecture 126 Attack 19: VLAN ACL Lab, Part 1

Lecture 127 Attack 20: VLAN ACL Lab, Part 2

Lecture 128 Attack 21, VLAN Hopping

Lecture 129 Attack 22: DHCP Snooping Facts

Lecture 130 Attack 23: DHCP Snooping Address Renewal

Lecture 131 Attack 24: DHCP Snooping – 1st Time Address Acquisition Lab

Lecture 132 Attack 25: IPSG Theory & Lab 1 Begins

Lecture 133 Attack 26: IPSG Lab 1 Continues

Lecture 134 Attack 27: IPSG Lab 2 (Static Mappings, No DHCP)

Lecture 135 Attack 28: Segue To The Next Section

Section 12: CCNA Security 210-260: Privilege Levels

Lecture 136 Levels 1: The First Default

Lecture 137 Levels 2: The Other Defaults

Lecture 138 Levels 3: Intro To Custom Levels

Lecture 139 Levels 4: Custom Level Lab Continues (Configure and Interface Modes)

Lecture 140 Levels 5: The Autocommand and One-Time Password Options

Lecture 141 Levels 6: Privilege Levels and "Show Run"

Lecture 142 Levels 7: Role-Based CLI Begins

Lecture 143 Levels 8: Role-Based CLI Continues

Lecture 144 Levels 9: Superviews!

Lecture 145 Levels 10: Applying The Views, Part 1

Lecture 146 Levels 11: Applying The Views, Part 2

Lecture 147 Levels 12: Introduction To Lawful Intercept

Lecture 148 Levels 13: The Resilient Configuration

Lecture 149 Levels 14: Resilient Configs and Remote Connections

Lecture 150 Levels 15: Testing The Resilient Config

Lecture 151 Levels 16: Testing The Resilient Image

Section 13: CCNA Security Course: Protecting The Control Plane

Lecture 152 Plane 1: Introduction To CoPP

Lecture 153 Plane 2: Class Maps and CoPP

Lecture 154 Plane 3: Policy Maps and CoPP

Lecture 155 Plane 4: Verifying CoPP / Intro To CPPp

Section 14: CCNA Security 210-260: VPNs

Lecture 156 VPN 1: Site-to-Site VPN Intro

Lecture 157 VPN 2: The Two Phases Of ISAKMP

Lecture 158 VPN 3: Writing The ISAKMP Policy, Part 1

Lecture 159 VPN 4: Writing The ISAKMP Policy, Part 2

Lecture 160 VPN 5: Finishing The ISAKMP Policy / Adding The Keys

Lecture 161 VPN 6: Writing The Transform Sets

Lecture 162 VPN 6A: Defining Interesting Traffic

Lecture 163 VPN 7: Writing The Crypto Map

Lecture 164 VPN 8: Testing and Troubleshooting

Lecture 165 VPN 9: Crypto Map This n' That

Lecture 166 VPN 10: Debugging The Tunnel Build

Lecture 167 VPN 11: Diffie-Hellman Details

Lecture 168 VPN 12: Using ASDM To Build A VPN

Lecture 169 VPN 13: More VPN Building With ADSM

Lecture 170 VPN 14: Wrapping Up Our 1st ADSM VPN Build

Section 15: CCNA Security 210-260: Firewalls

Lecture 171 Firewall 1: What's A Firewall?

Lecture 172 Firewall 2: Stateful and Stateless Filtering

Lecture 173 Firewall 3: Proxy Firewalls

Lecture 174 Firewall 4: Personal Firewalls

Lecture 175 Firewall 5: Cisco ZBF And Zone Pairs

Lecture 176 Firewall 6: The DMZ

Lecture 177 Firewall 7: IP Addresses for Firewall Labs

Lecture 178 Firewall 8: CCP Basic Firewall Lab

Lecture 179 Firewall 9: Basic Firewall Lab Concludes

Lecture 180 Firewall 10: Advanced Firewall Lab Begins

Lecture 181 Firewall 11: Advanced Firewall Lab Concludes

Lecture 182 Firewall 12: Intro To ASA Firewalling

Lecture 183 Firewall 13: Configuring A New ASA

Lecture 184 Firewall 14: ADSM Lab Begins – Outside Interface

Lecture 185 Firewall 15: ADSM Lab Continues

Lecture 186 Firewall 16: ADSM Lab Continues (Access Rule Application)

Lecture 187 Firewall 17: ADSM Lab Continues (Global Rule Permit)

Lecture 188 Firewall 18: ADSM Lab Concludes

Lecture 189 Firewall 18: October 21 Weekend Note

Section 16: CCNA Security 210-260: The IPS and IDS

Lecture 190 IPS 1: Similarities and Differences

Lecture 191 IPS 2: Where They Can Go, What They Can Do

Lecture 192 IPS 3: Sensor Types