Chapters & Articles

      All Articles

      Showing 1-20 of 865

      Sort by Date | Title

      Page: 1 2 3 4 5 Next >

      1.
      Cisco Catalyst SD-WAN Components
      Dec 27, 2024
      2.
      Configure and Verify Single Area OSPFv2
      Dec 27, 2024
      3.
      Dashboards
      Dec 27, 2024
      4.
      Role-Based Access Control (RBAC)
      Dec 27, 2024
      5.
      Segment Routing for Service Provider and Enterprise Networks
      Dec 27, 2024
      6.
      First Hop Redundancy Protocols
      By Wendell Odom, Jason Gooley, David Hucaby
      Aug 5, 2024

      First Hop Redundancy Protocols (FHRPs) add the function of redundancy and load sharing for the default router function in any subnet. In this sample chapter you will learn the purpose, functions, and concepts of FHRPs. This chapter covers the following exam objectives from the CCNA 200-301 v1.1 exam: 3.0 IP Connectivity and 3.5 FHRPs.

      7.
      Implementing Basic OSPF Features
      By Wendell Odom
      Aug 5, 2024

      Configuring OSPF, using mostly default settings for all the optional features, requires only a few commands. Here you will learn how to implement OSPFv2 using network Commands and Interface Subcommands. This sample chapter from CCNA 200-301 Official Cert Guide covers the following CCNA 200-301 v1.1 exam objectives: 3.0 IP Connectivity to 3.4.d Router ID.

      8.
      Latency, delay, speed test vs. iPerf
      By Allan Johnson
      Aug 5, 2024

      Prepare for your CCST Networking exam in 31 days. Today's review focuses on the different measurements for network performance, the sources of delay, testing network performance online, and testing network performance using the Windows iPerf tool.

      9.
      pyATS Triggers and Verifications
      By John Capobianco, Dan Wade
      Aug 5, 2024

      The pyATS library (Genie) provides the Genie Harness to execute network tests with dynamic and robust capabilities. The Genie Harness can be daunting for new users of the pyATS library (Genie), as there are many configuration options and parameters. By the end of the chapter, you'll understand the powerful capabilities of Genie Harness and how to write and execute triggers and verifications.

      10.
      SD-WAN and DMVPN
      By Dhrumil Prajapati, Jeremy Bowman, Navin Suvarna
      Aug 5, 2024

      Learn common design strategies in SD-WAN and DMVPN deployments, and how to design and deploy these two technologies to integrate with other IBN domains, in this sample chapter from Designing Real-World Multi-domain Networks.

      11.
      The Meraki Admin Experience
      By Arun Paul, Jeffry Handal, Medi Jaafari, Mike Woolley
      Aug 5, 2024

      The Cisco Meraki platform can now be used to manage all digital cloud operations in one single integration. In this sample chapter from Cisco Meraki Fundamentals: Cloud-Managed Operations, you will learn how the Dashboard can help administrators monitor and proactively address potential issues in their day-to-day workflow.

      12.
      Access Management
      By Shane Sexton, Raymond Lacoste
      Apr 17, 2024

      In this sample chapter from Cisco Certified Support Technician (CCST) Cybersecurity 100-160 Official Cert Guide, you will learn how to provide an access management solution using the AAA framework, which outlines the best practices you need to consider when it comes to authentication, authorization, and accounting. This chapter covers CCST exam objective 1.3.

      13.
      Communication Principles
      By Cisco Networking Academy
      Apr 17, 2024

      This Companion Guide is the official supplemental textbook for the Networking Essentials course in the Cisco Networking Academy. This sample chapter covers the communication protocols for networks as well as network communication standards. You will also learn what the difference is between the OSI and TCP/IP models.

      14.
      Hacking AI Systems
      By Omar Santos, Petar Radanliev
      Apr 17, 2024

      Learn to identify an AI attack and the potential impacts of data breaches on AI and ML models. Demonstrate real-world knowledge by designing and implementing proactive security measures to protect AI and ML systems from potential attacks.

      15.
      Impact of AI in Other Emerging Technologies
      By Omar Santos, Hazim Dahir, Samer Salam
      Apr 17, 2024

      This sample chapter explains the complex interplay between AI and four other pivotal domains: quantum computing, blockchain technologies, autonomous vehicles and drones, and edge computing.

      16.
      Implementing Data Center Overlay Protocols
      By Somit Maloo, Firas Ahmed, Iskren Nikolov
      Apr 17, 2024

      In this sample chapter from CCNP and CCIE Data Center Core DCCOR 350-601 Official Cert Guide, 2nd Edition, you will get an overview of the Virtual Extensible LAN (VXLAN), with coverage of Layer 2 VLAN extension to provide multitenant flexibility, high segment scalability, and Layer 2 spanning tree improvement, along with a configuration example mapped to the exam objectives.

      17.
      Measuring Zero Trust Success
      By Avinash Naduvath
      Apr 17, 2024

      This sample chapter from In Zero Trust We Trust focuses on helping you craft standard metrics based on key constructs, such as risk and performance, so that you can showcase the value that Zero Trust brings to the enterprise infrastructure, processes, and people.

      18.
      Physical and Logical Infrastructure Requirements
      By Jerome Henry, David Hucaby
      Apr 17, 2024

      In this sample chapter from CCNP Enterprise Wireless Design ENWLSD 300-425 and Implementation ENWLSI 300-430 Official Cert Guide, 2nd Edition, the authors cover physical and logical infrastructure requirements including powering an access point with Power over Ethernet (PoE) and the communication flow of CAPWAP control and data channels. This chapter covers ENWLSD exam topics 2.1-2.2.

      19.
      Software-Defined Networking Security and Network Programmability
      By Omar Santos
      Apr 17, 2024

      In this sample chapter from CCNP and CCIE Security Core SCOR 350-701 Official Cert Guide, 2nd Edition, you will learn about Software-Defined Networking (SDN) and SDN Security, as well as an overview of network programmability and how networks are being managed using modern application programming interfaces (APIs) and other functions. This chapter covers SCOR 350-701 exam objectives 1.7-1.8.

      20.
      Solving Congestion with Storage I/O Performance Monitoring
      By Paresh Gupta, Edward Mazurek
      Apr 17, 2024

      This sample chapter from Detecting, Troubleshooting, and Preventing Congestion in Storage Networks explains the use of storage I/O performance monitoring for handling network congestion problems and includes practical case studies.

      Page: 1 2 3 4 5 Next >