Tags
Language
Tags
June 2025
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 1 2 3 4 5
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Ccnp Tshoot 300-135 2019 Video Boot Camp With Chris Bryant

    Posted By: ELK1nG
    Ccnp Tshoot 300-135 2019 Video Boot Camp With Chris Bryant

    Ccnp Tshoot 300-135 2019 Video Boot Camp With Chris Bryant
    Last updated 10/2017
    MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
    Language: English | Size: 4.41 GB | Duration: 27h 6m

    Pass The CCNP TSHOOT Exam With Chris Bryant – AND Prepare For Real-World Network Troubleshooting Success!

    What you'll learn

    Requirements

    Description

    This course is fully updated for the latest version of the CCNP TSHOOT exam (300-135). I've been preparing CCNP candidates for success since 2005 with my no-nonsense lectures using REAL Cisco switches and routers - no simulators here - and now I'm going to do the same for you.No prepackaged slides here - you'll see lab after lab on REAL Cisco switches and routers, all designed to teach you the finer points of advanced Cisco switching and prepare you for success in the exam room and real-world networking.From STP to BGP, from complex OSPF configurations to multicasting,  and everything in between  it's all here - and there's a forum right here on this site where you can ask me questions.  Your access to this online course is unlimited - you can watch the videos as often as you like and for as long as it takes for you to pass!  Let's get started!                                    Chris Bryant                                  CCIE #12933                                    "The Computer Certification Bulldog" 

    Overview

    Section 1: CCNP TSHOOT 300-135: Switching And EC Fundamentals

    Lecture 1 Switching 1: Checking The Fundamentals

    Lecture 2 Switching 2: Port Security Fundamentals

    Lecture 3 Switching 3: Port Security Static Addressing Lab

    Lecture 4 Switching 4: Port Security With Multiple Secure Addresses

    Lecture 5 Switching 5: The Errdisable Recovery Feature (… or IS it?)

    Lecture 6 Switching 6: Speaking Of Trunking

    Lecture 7 Switching 7: More Trunking!

    Lecture 8 Switching 8: Etherchannel Fundamentals

    Lecture 9 Switching 9: Things That Don't Play Well With Etherchannels

    Lecture 10 Switching 10: Etherchannel Negotiation Protocols

    Section 2: CCNP TSHOOT 300-135: Advanced Switching Options

    Lecture 11 Adv 1: Section Intro

    Lecture 12 Adv 2: Portfast

    Lecture 13 Adv 3: Uplinkfast

    Lecture 14 Adv 4: Backbonefast

    Lecture 15 Adv 5: Root Guard

    Lecture 16 Adv 6: BPDU Guard

    Lecture 17 Adv 7: BPDU Filter and Root Guard

    Lecture 18 Adv 8: UDLD

    Lecture 19 Adv 9: RSTP Theory

    Lecture 20 Adv 10: RSTP Synch & Compatibility

    Lecture 21 Adv. 11: CSP MST PVST

    Lecture 22 Adv 12: SDM Intro

    Lecture 23 Adv 13: SDM Lecture

    Section 3: CCNP TSHOOT 300-135: Analyzing And Troubleshooting OSPF

    Lecture 24 OSPF 1: The Fundamentals

    Lecture 25 OSPF 2: Fun With Hello And Dead Timers

    Lecture 26 OSPF 3: Network Masking and Point-To-Point Links

    Lecture 27 OSPF 4: NBMA Configuration And Troubleshooting

    Lecture 28 OSPF 5: Virtual Links - Yea Or Nay?

    Lecture 29 OSPF 6: Virtual Links – Building And Troubleshooting

    Lecture 30 OSPF 7: Authentication Labs Begin

    Lecture 31 OSPF 8: Password Authentication Mismatch Debugging And T-Shooting

    Lecture 32 OSPF 9: Spotting And Fixing Authentication Type Mismatches

    Lecture 33 OSPF 10: Area Authentication And Interface-Level Authentication

    Lecture 34 OSPF 11: Virtual Links and Authentication

    Lecture 35 OSPF 12: Passive and Non-Passive Interfaces

    Lecture 36 OSPF 13: The MTU

    Lecture 37 OSPF 14: Stub Areas And RIDs

    Section 4: CCNP TSHOOT 300-135: EIGRP

    Lecture 38 EIGRP 1: The "network" and "frame map (?)" Commands

    Lecture 39 EIGRP 2: Masks, Timers, and Flapping Links

    Lecture 40 EIGRP 3: K-Values and Passive Interfaces

    Lecture 41 EIGRP 4: More Passive Interfaces

    Lecture 42 EIGRP 5: Load Balancing, Traceroutes, and Pings

    Lecture 43 EIGRP 6: Splitting Your Horizons

    Lecture 44 EIGRP 7: Creating Subinterfaces From Not-Quite-Scratch

    Lecture 45 EIGRP 8: Conclusion of Subinterface Creation Lab

    Section 5: CCNP TSHOOT 300-115: Route Redistribution

    Lecture 46 Redistribution 1: To AutoRedistribute (Or Not)

    Lecture 47 Redistribution 2: EIGRP > RIP

    Lecture 48 Redistribution 3: Testing And T-Shooting With Pings And Traces

    Lecture 49 Redistribution 4: RIP and EIGRP

    Lecture 50 Redistribution 5: OSPF

    Lecture 51 Redistribution 6: Fine-Tuning With Route Maps (Part 1)

    Lecture 52 Redistribution 7: Fine-Tuning With Route Maps (Part 2)

    Section 6: TSHOOT 300-115: The Hot Standby Routing Protocol

    Lecture 53 HSRP 1: The Fundamentals

    Lecture 54 HSRP 2: Preemption And Testing

    Lecture 55 HSRP 3: Interface Tracking Lab Begins

    Lecture 56 HSRP 4: Interface Tracking Lab Concludes

    Lecture 57 HSRP 5: Route Tracking Lab Begins

    Lecture 58 HSRP 6: Route Tracking Lab Ends

    Section 7: CCNP TSHOOT 300-115: Access Lists

    Lecture 59 ACL 1: A Refresher

    Lecture 60 ACL 2: Named ACLs And Placement

    Lecture 61 ACL 3: Line Order, Placement, And…Notepad?

    Lecture 62 ACL 4: NAT Lab Begins

    Lecture 63 ACL 5: NAT Lab Concludes

    Lecture 64 ACL 6: Time Range Time!

    Lecture 65 ACL 7: More Time Ranges

    Lecture 66 ACL 8: The Network Time Protocol

    Lecture 67 ACL 9: NTP Authentication

    Section 8: CCNP TSHOOT 300-115: BGP

    Lecture 68 BGP 1: A Note For TSHOOT Students

    Lecture 69 BGP 1A: Intro Remarks

    Lecture 70 BGP 2: External BGP Peering

    Lecture 71 BGP 3: iBGP Peering And Loopback Interfaces

    Lecture 72 BGP 4: eBGP Peering And Loopback Interfaces

    Lecture 73 BGP 5: Advertising Routes With The "Network" Command

    Lecture 74 BGP 6: The Origin and Next-Hop Attributes

    Lecture 75 BGP 7: BGP Best-Path Selection Process

    Lecture 76 BGP 8: The Mystery Of The Next-Hop Address

    Lecture 77 BGP 9: Mystery… SOLVED!

    Lecture 78 BGP 10: The Multi-Exit Discrimator (MED)

    Lecture 79 BGP 11: Local Preference: All Or Nothing At All

    Lecture 80 BGP 12: Local Preference: Changing One, But Not All

    Lecture 81 BGP 13: Carry That Weight (Attribute)

    Lecture 82 BGP 14: More Weight

    Lecture 83 BGP 15: Route Summarization and Advertisements

    Lecture 84 BGP 16: Synch Rules and the Full Mesh

    Lecture 85 BGP 17: The Why and How of Route Reflectors

    Lecture 86 BGP 18: Prefix Lists, Part I

    Lecture 87 BGP 19: Prefix Lists, Part II

    Lecture 88 BGP 20: Success Tips

    Section 9: TSHOOT 300-135: VPNs And VRF Lite

    Lecture 89 VPN Intro For TSHOOT Students

    Lecture 90 VPN 1: The Dreaded But Necessary Theory

    Lecture 91 VPN 2: IKE Phase 1 In Action

    Lecture 92 VPN 3: Configuring IPSec SAs

    Lecture 93 VPN 4: IPSec SA Lab Continues

    Lecture 94 VPN 5: A Dash Of DMVPN

    Lecture 95 VPN 6: VRF Lab Begins

    Lecture 96 VPN 7: VRF Lab Continues

    Lecture 97 VPN 8 VRF Lab Concludes

    Lecture 98 VPN 9: The Conclusion!

    Section 10: Your Free CCNA Security 210-260 Course Begins Here!

    Lecture 99 Intro 1: Citizen C.I.A.

    Lecture 100 Intro 2: Introduction To SIEM

    Lecture 101 Intro 3: SIEM Continues

    Lecture 102 Intro 4: Recon Attacks and Phishing

    Lecture 103 Intro 5: Social Engineering and Spear Phishing

    Lecture 104 Intro 6: Privilege Escalation

    Lecture 105 Intro 7: More Escalation!

    Lecture 106 Intro 8: DoS and DDoS Attacks

    Lecture 107 Intro 9: Advanced Persistent Threats

    Section 11: CCNA Security 210-260, Section 2

    Lecture 108 Attack 1: Man-In-The-Middle Attacks

    Lecture 109 Attack 2: ARP Poisoning and Dynamic ARP Inspection

    Lecture 110 Attack 3: DAI Commands

    Lecture 111 Attack 4: MAC Spoofing and CAM Table Overflows

    Lecture 112 Attack 5: Port Security Fundamentals

    Lecture 113 Attack 6: Port Security Dynamic Address Learning

    Lecture 114 Attack 7: Port Security Shutdown and Recovery

    Lecture 115 Attack 8: Port Security and Automatic Port Reenabling

    Lecture 116 Attack 9: Port Security Static Address Aging

    Lecture 117 Attack 10: Port Security Dynamic Address Aging

    Lecture 118 Attack 11: Refresh Your VLAN Knowledge Here!

    Lecture 119 Attack 12: Private VLAN Theory

    Lecture 120 Attack 13: Private VLAN Labs

    Lecture 121 Attack 14: OSPF Authentication Fundamentals

    Lecture 122 Attack 15: OSPF Clear-Text Authentication

    Lecture 123 Attack 16: OSPF MD5 Authentication

    Lecture 124 Attack 17: Root Guard

    Lecture 125 Attack 18: BPDU Guard and Loop Guard

    Lecture 126 Attack 19: VLAN ACL Lab, Part 1

    Lecture 127 Attack 20: VLAN ACL Lab, Part 2

    Lecture 128 Attack 21, VLAN Hopping

    Lecture 129 Attack 22: DHCP Snooping Facts

    Lecture 130 Attack 23: DHCP Snooping Address Renewal

    Lecture 131 Attack 24: DHCP Snooping – 1st Time Address Acquisition Lab

    Lecture 132 Attack 25: IPSG Theory & Lab 1 Begins

    Lecture 133 Attack 26: IPSG Lab 1 Continues

    Lecture 134 Attack 27: IPSG Lab 2 (Static Mappings, No DHCP)

    Lecture 135 Attack 28: Segue To The Next Section

    Section 12: CCNA Security 210-260: Privilege Levels

    Lecture 136 Levels 1: The First Default

    Lecture 137 Levels 2: The Other Defaults

    Lecture 138 Levels 3: Intro To Custom Levels

    Lecture 139 Levels 4: Custom Level Lab Continues (Configure and Interface Modes)

    Lecture 140 Levels 5: The Autocommand and One-Time Password Options

    Lecture 141 Levels 6: Privilege Levels and "Show Run"

    Lecture 142 Levels 7: Role-Based CLI Begins

    Lecture 143 Levels 8: Role-Based CLI Continues

    Lecture 144 Levels 9: Superviews!

    Lecture 145 Levels 10: Applying The Views, Part 1

    Lecture 146 Levels 11: Applying The Views, Part 2

    Lecture 147 Levels 12: Introduction To Lawful Intercept

    Lecture 148 Levels 13: The Resilient Configuration

    Lecture 149 Levels 14: Resilient Configs and Remote Connections

    Lecture 150 Levels 15: Testing The Resilient Config

    Lecture 151 Levels 16: Testing The Resilient Image

    Section 13: CCNA Security Course: Protecting The Control Plane

    Lecture 152 Plane 1: Introduction To CoPP

    Lecture 153 Plane 2: Class Maps and CoPP

    Lecture 154 Plane 3: Policy Maps and CoPP

    Lecture 155 Plane 4: Verifying CoPP / Intro To CPPp

    Section 14: CCNA Security 210-260: VPNs

    Lecture 156 VPN 1: Site-to-Site VPN Intro

    Lecture 157 VPN 2: The Two Phases Of ISAKMP

    Lecture 158 VPN 3: Writing The ISAKMP Policy, Part 1

    Lecture 159 VPN 4: Writing The ISAKMP Policy, Part 2

    Lecture 160 VPN 5: Finishing The ISAKMP Policy / Adding The Keys

    Lecture 161 VPN 6: Writing The Transform Sets

    Lecture 162 VPN 6A: Defining Interesting Traffic

    Lecture 163 VPN 7: Writing The Crypto Map

    Lecture 164 VPN 8: Testing and Troubleshooting

    Lecture 165 VPN 9: Crypto Map This n' That

    Lecture 166 VPN 10: Debugging The Tunnel Build

    Lecture 167 VPN 11: Diffie-Hellman Details

    Lecture 168 VPN 12: Using ASDM To Build A VPN

    Lecture 169 VPN 13: More VPN Building With ADSM

    Lecture 170 VPN 14: Wrapping Up Our 1st ADSM VPN Build

    Section 15: CCNA Security 210-260: Firewalls

    Lecture 171 Firewall 1: What's A Firewall?

    Lecture 172 Firewall 2: Stateful and Stateless Filtering

    Lecture 173 Firewall 3: Proxy Firewalls

    Lecture 174 Firewall 4: Personal Firewalls

    Lecture 175 Firewall 5: Cisco ZBF And Zone Pairs

    Lecture 176 Firewall 6: The DMZ

    Lecture 177 Firewall 7: IP Addresses for Firewall Labs

    Lecture 178 Firewall 8: CCP Basic Firewall Lab

    Lecture 179 Firewall 9: Basic Firewall Lab Concludes

    Lecture 180 Firewall 10: Advanced Firewall Lab Begins

    Lecture 181 Firewall 11: Advanced Firewall Lab Concludes

    Lecture 182 Firewall 12: Intro To ASA Firewalling

    Lecture 183 Firewall 13: Configuring A New ASA

    Lecture 184 Firewall 14: ADSM Lab Begins – Outside Interface

    Lecture 185 Firewall 15: ADSM Lab Continues

    Lecture 186 Firewall 16: ADSM Lab Continues (Access Rule Application)

    Lecture 187 Firewall 17: ADSM Lab Continues (Global Rule Permit)

    Lecture 188 Firewall 18: ADSM Lab Concludes

    Lecture 189 Firewall 18: October 21 Weekend Note

    Section 16: CCNA Security 210-260: The IPS and IDS

    Lecture 190 IPS 1: Similarities and Differences

    Lecture 191 IPS 2: Where They Can Go, What They Can Do

    Lecture 192 IPS 3: Sensor Types