Search Torrents
|
Browse Torrents
|
48 Hour Uploads
|
TV shows
|
Music
|
Top 100
Audio
Video
Applications
Games
Porn
Other
All
Music
Audio books
Sound clips
FLAC
Other
Movies
Movies DVDR
Music videos
Movie clips
TV shows
Handheld
HD - Movies
HD - TV shows
3D
Other
Windows
Mac
UNIX
Handheld
IOS (iPad/iPhone)
Android
Other OS
PC
Mac
PSx
XBOX360
Wii
Handheld
IOS (iPad/iPhone)
Android
Other
Movies
Movies DVDR
Pictures
Games
HD - Movies
Movie clips
Other
E-books
Comics
Pictures
Covers
Physibles
Other
Details for:
INE CCNA 200-301 Keith Bogart FULL COURSE 720p
ine ccna 200 301 keith bogart full course 720p
Type:
Other
Files:
10
Size:
16.3 GB
Uploaded On:
Aug. 13, 2020, 5:10 p.m.
Added By:
Anonymous
Seeders:
2
Leechers:
1
Info Hash:
F35C8BAF7188F0EDC09BAE197DA5CE7D3529EDA0
Get This Torrent
The premier CCNA 200-301 training course, provided by INE. https://ine.com/ https://my.ine.com/path/61c16913-c899-49c3-991b-0aa2ae123b8d * 99 hours of 720p video in 393 MP4 files split between 8 sections and 42 courses. * 101 PDF files containing course materials also included. * Premade video playlists for MPC and VLC included. This torrent is more complete and up to date than the 1080p version also available on TPB. The video quality is lower (720p) but it is still very watchable. The best CCNA training available, highly recommended! Full directory tree: ──INE CCNA 200-301 │ INE CCNA 200-301 Full Playlist.mpcpl │ INE CCNA 200-301 Full Playlist.pls │ ├─00-CCNA 200-301 Course Learning Path [2020] - [full content] │ 00-CCNA 200-301 Course Learning Path [2020] - [full content].pdf │ 00-CCNA 200-301 Course Learning Path [2020] - [full content].png │ 00-CCNA 200-301 Course Learning Path [2020] - [full content].txt │ ├─01-Networking Fundamentals │ │ 01-Networking Fundamentals Playlist.mpcpl │ │ 01-Networking Fundamentals Playlist.pls │ │ │ ├─01-Introduction to Networking Technologies │ │ ├─00-Course Files │ │ │ Intro-Network-Technologies.pdf │ │ │ │ │ ├─01-Course Introduction │ │ │ 01-Course Introduction.mp4 │ │ │ │ │ ├─02-Components Of Computer Networks │ │ │ 01-What Is A Computer Network.mp4 │ │ │ 02-Servers, NICs, Switches, Routers and Firewalls.mp4 │ │ │ 03-Wi-Fi and DNA Center.mp4 │ │ │ │ │ ├─03-Network Math │ │ │ 01-Binary.mp4 │ │ │ 02-Hexadecimal.mp4 │ │ │ │ │ ├─04-Network Architectures │ │ │ 01-Network Topology Architectures.mp4 │ │ │ │ │ └─05-Power Over Ethernet │ │ 01-Power Over Ethernet (PoE).mp4 │ │ │ ├─02-Beginning the Cisco Journey │ │ ├─00-Course Files - no files │ │ ├─01-Course Introduction │ │ │ 01-Course Introduction.mp4 │ │ │ │ │ └─02-Topic │ │ 01-Building a Small Wired Network - Part 1.mp4 │ │ 02-Building a Small Wired Network - Part 2.mp4 │ │ 03-Building a Small Wired Network - Part 3.mp4 │ │ 04-Building a Small Wired Network - Part 4.mp4 │ │ 05-Building a Small Wired Network - Part 5.mp4 │ │ │ ├─03-Introduction to IPv4, TCP and UDP │ │ ├─00-Course Files │ │ │ Introduction To IPv4 TCP & UDP.pdf │ │ │ │ │ ├─01-Course Introduction │ │ │ 01-Course Introduction.mp4 │ │ │ │ │ ├─02-Introducing IPv4 │ │ │ 01-History and Purpose Of The Internet Protocol.mp4 │ │ │ 02-IPv4 Header Fields.mp4 │ │ │ │ │ ├─03-IPv4 Address Overview │ │ │ 01-Why Do We Need IPv4 Addresses.mp4 │ │ │ 02-Identifying The Network Bits.mp4 │ │ │ 03-Identifying Your Own IP Information.mp4 │ │ │ │ │ ├─04-Introducing UDP │ │ │ 01-Overview Of UDP.mp4 │ │ │ │ │ └─05-Introducing TCP │ │ 01-Introduction To TCP.mp4 │ │ 02-TCP 3-Way Handshake.mp4 │ │ │ ├─04-IPv4 Addressing and Subnetting │ │ ├─00-Course Files │ │ │ IPv4-Addressing-Subnetting.pdf │ │ │ │ │ └─01-Topic │ │ 01-Course Introduction.mp4 │ │ 02-Brief History of IPv4.mp4 │ │ 03-Communications within Broadcast Domains.mp4 │ │ 04-Identifying Classes and Types of IPv4 Addresses - Part 1.mp4 │ │ 05-Identifying Classes and Types of IPv4 Addresses - Part 2.mp4 │ │ 06-IPv4 Governing Bodies.mp4 │ │ 07-Private vs Public Addresses.mp4 │ │ 08-IPv4 Subnet Masks.mp4 │ │ 09-Same-Length Subnetting - Part 1.mp4 │ │ 10-Same-Length Subnetting - Part 2.mp4 │ │ 11-Variable-Length Subnet Masking.mp4 │ │ 12-IPv4 Address Summarization and Supernetting.mp4 │ │ │ ├─05-What is Ethernet and Why Should I Care │ │ ├─00-Course Files │ │ │ What-Is-Ethernet-Anyway.pdf │ │ │ │ │ └─01-Ethernet │ │ 01-Course Introduction.mp4 │ │ 02-Overview & History.mp4 │ │ 03-CSMA-CD Operation.mp4 │ │ 04-Autonegotiation.mp4 │ │ 05-Ethernet Frame Structure.mp4 │ │ 06-Ethernet Frame Size.mp4 │ │ 07-Ethernet Cabling.mp4 │ │ │ ├─06-CCT Routing and Switching Technologies - 640-692 RSTECH │ │ ├─00-Course Files │ │ │ ├─Section-1 │ │ │ │ 1-1_Identifying-Interfaces.pdf │ │ │ │ 1-2_Identifying-Cabling.pdf │ │ │ │ 1-3_Identifying-Products-By-Logo.pdf │ │ │ │ 1-4_Identifying-Serial-Numbers.pdf │ │ │ │ 1-5_Identifying-Common-Components.pdf │ │ │ │ 1-6_Describing-Memory.pdf │ │ │ │ Course-Introduction.pdf │ │ │ │ │ │ │ ├─Section-2 │ │ │ │ │ 2-1_Operating_Modes.pdf │ │ │ │ │ 2-4_Copying-Config-Files.pdf │ │ │ │ │ 2-5_Basic-Cisco-IOS-Commands.pdf │ │ │ │ │ 2-6_Config-Register.pdf │ │ │ │ │ │ │ │ │ └─COnfig-Register │ │ │ │ Bit-15-set.txt │ │ │ │ OEM-Bit disabled.txt │ │ │ │ │ │ │ ├─Section-3 │ │ │ │ 3-10_OSI-Model-Dataflows.pdf │ │ │ │ 3-11_Common-Phy-Datalnk-Problems.pdf │ │ │ │ 3-1_Basic-Device-Functionality.pdf │ │ │ │ 3-2_IP-Address-Mask.pdf │ │ │ │ 3-3_Differentiating-Layer2-Technologies.pdf │ │ │ │ 3-4_Describe-FTP-TFTP-Telnet-SSH_Ping.pdf │ │ │ │ 3-6_Describe-Telco-Termination-CSU-DSU.pdf │ │ │ │ │ │ │ └─Section-4 │ │ │ 4-10_Identify-Loopback-Plugs.pdf │ │ │ 4-11_Identify-Null-Modem-Cable.pdf │ │ │ 4-12_Using-TFTP-Servers.pdf │ │ │ 4-1_Text-editors-terminal-emulators.pdf │ │ │ 4-4_Connecting-Laptops-to-Networks.pdf │ │ │ 4-Modems-to-Console-Ports.pdf │ │ │ │ │ ├─01-Identify Cisco Equipment and Related Hardware │ │ │ 01-Introduction.mp4 │ │ │ 02-Identifying Interfaces on Cisco Devices.mp4 │ │ │ 03-Identify the Cabling on Cisco Equipment.mp4 │ │ │ 04-Identify Cisco Products by Logo Marking and Model Number.mp4 │ │ │ 05-Identify and Locate the Serial Number of Cisco Products.mp4 │ │ │ 06-Identify and describe the Commonly used Components.mp4 │ │ │ 07-Describe Common Terms Related to Hardware Memory in Cisco Routers and Switches.mp4 │ │ │ │ │ ├─02-Describe Cisco IOS Software Operation │ │ │ 01-Intro to Cisco IOS and CatOS.mp4 │ │ │ 02-Copying Config Files.mp4 │ │ │ 03-Basic Cisco IOS Software Commands.mp4 │ │ │ 04-The Configuration Register.mp4 │ │ │ 05-Performing Password Recovery.mp4 │ │ │ 06-Upgrade Procedure for Cisco IOS.mp4 │ │ │ │ │ ├─03-General Networking Knowledge │ │ │ 01-Basic Hardware Functionality.mp4 │ │ │ 02-What is an IP Address and Subnet.mp4 │ │ │ 03-Differentiating Layer-2 Technologies.mp4 │ │ │ 04-Describing FTP, TFTP, Telnet, SSH and Ping - Part 1.mp4 │ │ │ 05-Describing FTP, TFTP, Telnet, SSH and Ping - Part 2.mp4 │ │ │ 06-Telco Termination Points and CSU-DSUs.mp4 │ │ │ 07-Common Problems at Layer-1 and Layer-2 - Part 1.mp4 │ │ │ 08-Common Problems at Layer-1 and Layer-2 - Part 2.mp4 │ │ │ 09-Understanding the OSI Model.mp4 │ │ │ 10-Explaining Data Flows Using the OSI & TCP-IP Models.mp4 │ │ │ │ │ └─04-Service-related Knowledge │ │ 01-Using Terminal Emulators and Text Editors.mp4 │ │ 02-Connecting Laptops to Network Interfaces.mp4 │ │ 03-Connecting Modems to Console Ports.mp4 │ │ 04-Identifying Loopback Plugs.mp4 │ │ 05-Identifying Null Modem Cables.mp4 │ │ 06-Using TFTP Servers.mp4 │ │ │ ├─07-Identifying Ethernet Interface and Cabling Issues │ │ ├─00-Course Files - no files │ │ └─01-Identifying Ethernet Interface and Cabling Issues (Video) │ │ 01-Troubleshooting Layer-1 Problems.mp4 │ │ │ ├─08-Introduction to IPv6 │ │ ├─00-Course Files - no files │ │ └─01-Topic │ │ 01-Introduction to IPv6.mp4 │ │ 02-History and Address Representation.mp4 │ │ 03-v4 and v6 Header Comparisons.mp4 │ │ 04-Interface-IDs.mp4 │ │ 05-Address Types.mp4 │ │ 06-IPv6 Neighbor Discovery.mp4 │ │ 07-ARP and The IPv6 Solution - Solicited Node Multicast.mp4 │ │ │ ├─09-Understanding Common Network Applications │ │ ├─00-Course Files │ │ │ Common-Network-Applications.pdf │ │ │ │ │ └─01-Topics │ │ 01-Understanding Common Network Application.mp4 │ │ 02-What do Applications have to do with a CCNA.mp4 │ │ 03-TCP and UDP - An Overview.mp4 │ │ 04-DNS.mp4 │ │ 05-Categories-Types of Applications.mp4 │ │ 06-Email.mp4 │ │ 07-Web Browsing.mp4 │ │ 08-Telnet.mp4 │ │ │ └─10-Virtualization Fundamentals │ ├─00-Course Files │ │ Virtualization-Fundamentals.pdf │ │ │ ├─01-Course Introduction │ │ 01-Course Introduction.mp4 │ │ │ ├─02-Virtualization Introduction │ │ 01-Introduction To Virtualization.mp4 │ │ 02-An Overview Of Hypervisors.mp4 │ │ 03-Virtual Switches.mp4 │ │ │ ├─03-Virtualization Considerations │ │ 01-Virtual Machine Resource Considerations.mp4 │ │ 02-Virtualization Networking & Management Considerations.mp4 │ │ │ └─04-Demonstration │ 01-Virtualization Demonstration.mp4 │ 02-Course Conclusion.mp4 │ ├─02-Wired Network Access Technologies │ │ 02-Wired Network Access Technologies Playlist.mpcpl │ │ 02-Wired Network Access Technologies Playlist.pls │ │ │ ├─01-CDP and LLDP - Discovery Protocols │ │ ├─00-Course Files - no files │ │ └─01-Cisco Discovery Protocol (Video) │ │ 01-Cisco Discovery Protocol (CPD).mp4 │ │ │ ├─02-Introduction to Layer-2 Switching │ │ ├─00-Course Files - no files │ │ └─01-Layer-2 Switching (Video) │ │ 01-Introduction to Layer-2 Switching.mp4 │ │ │ ├─03-Implementing Interswitch Connectivity Using VLANs and VLAN Trunks │ │ ├─00-Course Files - no files │ │ └─01-Topic │ │ 01-Virtual LANs (VLANs).mp4 │ │ 02-Voice VLAN.mp4 │ │ 03-VLAN Trunks - Part 1.mp4 │ │ 04-VLAN Trunks - Part 2.mp4 │ │ 05-Dynamic Trunking Protocol.mp4 │ │ │ ├─04-The Rapid PVST-plus Spanning-Tree Protocol │ │ ├─00-Course Files │ │ │ Loop-Prevention-With-802_1w_RSTP.pdf │ │ │ │ │ ├─01-Course Introduction │ │ │ 01-Course Introduction.mp4 │ │ │ │ │ ├─02-Loop Prevention │ │ │ 01-The Goals Of Loop Prevention.mp4 │ │ │ │ │ ├─03-RSTP Operation │ │ │ 01-Root Bridge Election.mp4 │ │ │ 02-Essential RSTP Cisco IOS Commands.mp4 │ │ │ 03-Root Port Election.mp4 │ │ │ 04-Designated and Non-Designated Port Election.mp4 │ │ │ │ │ ├─04-RSTP Load-Balancing │ │ │ 01-Rapid-PVST Topology Manipulation.mp4 │ │ │ │ │ ├─05-RSTP Sync Process │ │ │ 01-RSTP Sync Process.mp4 │ │ │ │ │ ├─06-RSTP Timers │ │ │ 01-RSTP Timers.mp4 │ │ │ │ │ └─07-Topology Changes │ │ 01-RSTP Topology Changes.mp4 │ │ │ └─05-Understanding Etherchannels │ ├─00-Course Files - no files │ └─01-LAN Switching Technologies - Spanning-Tree │ 01-Understanding Etherchannels.mp4 │ ├─03-Wireless Network Access Technologies │ │ 03-Wireless Network Access Technologies Playlist.mpcpl │ │ 03-Wireless Network Access Technologies Playlist.pls │ │ │ ├─01-Wi-Fi Fundamental Principles │ │ ├─00-Course Files │ │ │ WiFi_Fundamental_Principles_PDF.pdf │ │ │ │ │ ├─01-Course Introduction │ │ │ 01-Course Introduction.mp4 │ │ │ │ │ ├─02-Introduction To Wi-Fi │ │ │ 01-Wi-Fi Defined.mp4 │ │ │ 02-Wi-Fi Components.mp4 │ │ │ 03-Wi-Fi Network Types and Terminology.mp4 │ │ │ │ │ ├─03-Radio Frequency Fundamentals │ │ │ 01-Radio Frequency Explained.mp4 │ │ │ 02-Wi-Fi Modulation Techniques.mp4 │ │ │ 03-Radio Frequency Propagation.mp4 │ │ │ │ │ └─04-Implementing RF Channels │ │ 01-RF Channels.mp4 │ │ 02-Planning For RF Channel Implementation.mp4 │ │ 03-RF Channel Implementation - Demonstration.mp4 │ │ │ ├─02-An Overview Of Wi-Fi Components and Architectures │ │ ├─00-Course Files │ │ │ An Overview Of Wi-Fi Components & Architectures.pdf │ │ │ │ │ ├─01-Course Introduction │ │ │ 01-Course Introduction.mp4 │ │ │ 02-What Is A Wireless Architecture.mp4 │ │ │ │ │ ├─02-Types Of WLAN Architectures │ │ │ 01-Autonomous WLAN Architectures.mp4 │ │ │ 02-Cloud-Based WLAN Architectures.mp4 │ │ │ 03-Split-MAC WLAN Architectures.mp4 │ │ │ 04-Introduction To CAPWAP.mp4 │ │ │ │ │ ├─03-WLAN Controllers │ │ │ 01-WLAN Controller Deployment Options.mp4 │ │ │ 02-Cisco WLAN Controllers.mp4 │ │ │ 03-Infrastructure Connections Of WLAN Components.mp4 │ │ │ │ │ └─04-Access Point Modes │ │ 01-Cisco Access Point Modes.mp4 │ │ │ └─03-Jumping Into Wi-Fi Security │ ├─00-Course Files │ │ Jumping-Into-WiFi-Security.pdf │ │ │ ├─01-Course Introduction │ │ 01-Course Introduction.mp4 │ │ │ ├─02-Overview Of Wi-Fi Security │ │ 01-The Need For & Components Of Wi-Fi Security.mp4 │ │ 02-Wi-Fi Security - Authentication.mp4 │ │ │ ├─03-WEP and WPA │ │ 01-Understanding WEP and WPA.mp4 │ │ 02-An Overview Of WPA2.mp4 │ │ 03-An Overview Of WPA3.mp4 │ │ │ └─04-WPA2 Configuration │ 01-Configuring WPA2 With PSK (Autonomous Access Points).mp4 │ 02-Configuring WPA2 With PSK (Wireless Controller).mp4 │ ├─04-Establishing IPv4-Pv6 Connectivity │ │ 04-Establishing IPv4-Pv6 Connectivity Playlist.mpcpl │ │ 04-Establishing IPv4-Pv6 Connectivity Playlist.pls │ │ │ ├─01-IP Routing Basics │ │ ├─00-Course Files │ │ │ IP-Routing-Basics.pdf │ │ │ │ │ ├─01-Introduction │ │ │ 01-Course Introduction.mp4 │ │ │ 02-Why Do We Need Routing.mp4 │ │ │ 03-Identifying Routable Addresses.mp4 │ │ │ 04-What Happens to a Packet.mp4 │ │ │ 05-Where Are Routes Stored - Part 1.mp4 │ │ │ 06-Where Are Routes Stored - Part 2.mp4 │ │ │ 07-How Are Routes Selected.mp4 │ │ │ │ │ └─02-Contrasting Routing Protocols │ │ 01-Contrasting Routing Protocols - IGP and EGP.mp4 │ │ 02-Contrasting Routing Protocols - High-Level Differences.mp4 │ │ 03-Contrasting Routing Protocols - Distance Vector.mp4 │ │ 04-Contrasting Routing Protocols - Link State.mp4 │ │ 05-Contrasting Routing Protocols - Advanced Distance Vector.mp4 │ │ 06-Contrasting Routing Protocols - Path Vector.mp4 │ │ │ ├─02-Static Routing (Video) │ │ ├─00-Course Files - no files │ │ └─01-Routing Fundamentals │ │ 01-Static Routing (Video).mp4 │ │ │ ├─03-Floating Static Route (Video) │ │ ├─00-Course Files - no files │ │ └─01-Routing Fundamentals │ │ 01-Floating Static Route (Video).mp4 │ │ │ ├─04-Implementing Static Default Routes (Video) │ │ ├─00-Course Files - no files │ │ └─01-Routing Technologies - General Routing │ │ 01-Implementing Static Default Routes (Video).mp4 │ │ │ ├─05-Implementing Inter-VLAN Routing │ │ ├─00-Course Files │ │ │ Inter-VLAN-Routing.pdf │ │ │ │ │ └─01-Inter-VLAN Routing │ │ 01-Course Introduction.mp4 │ │ 02-Why Do We Need Inter-VLAN Routing.mp4 │ │ 03-Router-On-A-Stick - Theory.mp4 │ │ 04-Router-On-A-Stick - Implementation.mp4 │ │ 05-Switched Virtual Interfaces - Theory.mp4 │ │ 06-Switched Virtual Interfaces - Implementation.mp4 │ │ │ ├─06-IPv4 Routing With OSPFv2 │ │ ├─00-Course Files - no files │ │ └─01-IPv4 Routing With OSPFv2 │ │ 01-Open Shortest Path First (OSPF) Introduction.mp4 │ │ 02-OSPF Packet Types and Adjacencies.mp4 │ │ 03-OSPF DR and BDR Election.mp4 │ │ 04-OSPF Network Types, Router Roles, and Tables.mp4 │ │ 05-Implementing OSPF.mp4 │ │ 06-OSPF Cost.mp4 │ │ │ ├─07-Implementing IPv6 (Video) │ │ ├─00-Course Files - no files │ │ └─01-Routing Fundamentals │ │ 01-Implementing IPv6.mp4 │ │ │ ├─08-Introduction to EIGRP │ │ ├─00-Course Files - no files │ │ └─01-Introduction to EIGRP │ │ 01-Introduction to EIGRP.mp4 │ │ │ ├─09-EIGRP - Packet Types │ │ ├─00-Course Files - no files │ │ └─01-EIGRP - Packet Types │ │ 01- Packet Types.mp4 │ │ │ └─10-The Diffusing Update Algorithm for EIGRP (DUAL) │ ├─00-Course Files - no files │ └─01-The Diffusing Update Algorithm for EIGRP (DUAL) │ 01-The Diffusing Update Algorithm for EIGRP (DUAL).mp4 │ ├─05-Utilizing IP-Based Service │ │ 05-Utilizing IP-Based Service Playlist.mpcpl │ │ 05-Utilizing IP-Based Service Playlist.pls │ │ │ ├─01-Switching Security Features │ │ ├─00-Course Files │ │ │ Switching-Security-Features.pdf │ │ │ │ │ ├─01-Course Introduction │ │ │ 01-Course Introduction.mp4 │ │ │ │ │ ├─02-Port Security │ │ │ 01-Port Security.mp4 │ │ │ 02-Monitoring Port Security.mp4 │ │ │ 03-Port Security Demonstration.mp4 │ │ │ │ │ ├─03-DHCP Snooping │ │ │ 01-Overview Of DHCP Operations.mp4 │ │ │ 02-Securing Network Access With DHCP Snooping.mp4 │ │ │ 03-Configuring DHCP Snooping In Cisco IOS.mp4 │ │ │ 04-DHCP Snooping Demonstration.mp4 │ │ │ │ │ ├─04-Dynamic ARP Inspection │ │ │ 01-Securing Network Access With Dynamic ARP Inspection.mp4 │ │ │ 02-Configuring Dynamic ARP Inspection In Cisco IOS.mp4 │ │ │ 03-Dynamic ARP Inspection Demonstration.mp4 │ │ │ │ │ └─05-AAA Overview │ │ 01-Securing Switch Access With AAA.mp4 │ │ │ ├─03-HSRP (Video) │ │ ├─00-Course Files - no files │ │ └─01-Infrastructure Services - HSRP │ │ 01-Hot Standby Router Protocol.mp4 │ │ │ ├─04-Access-Control Lists │ │ ├─00-Course Files - no files │ │ └─01-Infrastructure Services - Access-Lists │ │ 01-Access-List Overview.mp4 │ │ 02-Standard ACLs.mp4 │ │ 03-Extended ACLs.mp4 │ │ 04-Named ACLs.mp4 │ │ │ ├─05-A Beginners Guide To Network Address Translation (NAT) │ │ ├─00-Course Files │ │ │ Beginners-Guide-To-NAT.pdf │ │ │ │ │ ├─01-Course Introduction │ │ │ 01-Course Introduction.mp4 │ │ │ │ │ ├─02-Introduction To NAT │ │ │ 01-Introducing Network Address Translation.mp4 │ │ │ │ │ └─03-Types of NAT │ │ 01-Static NAT.mp4 │ │ 02-Dynamic NAT.mp4 │ │ 03-Port Address Translation (PAT).mp4 │ │ │ ├─06-Network Monitoring With SNMP and SYSLOG │ │ ├─00-Course Files │ │ │ Network-Monitoring-With-SNMP-SYSLOG.pdf │ │ │ │ │ ├─01-Course Introduction │ │ │ 01-Course Introduction.mp4 │ │ │ │ │ ├─02-SNMP Introduction │ │ │ 01-Introduction To SNMP.mp4 │ │ │ 02-SNMP Components.mp4 │ │ │ │ │ ├─03-SNMP Versions │ │ │ 01-SNMP Versions.mp4 │ │ │ │ │ ├─04-SNMP Configuration │ │ │ 01-Configuring SNMPv1-v2c.mp4 │ │ │ 02-Configuring SNMPv3.mp4 │ │ │ 03-Verifying Your SNMP Configuration.mp4 │ │ │ │ │ └─05-Syslog │ │ 01-Introduction To Syslog.mp4 │ │ │ ├─07-Enhancing Network Operations With QoS │ │ ├─00-Course Files │ │ │ Enhancing-Network-Operations_With-QoS.pdf │ │ │ │ │ ├─01-Course Introduction │ │ │ 01-Course Introduction.mp4 │ │ │ │ │ ├─02-Introduction To QoS │ │ │ 01-Introduction To QoS.mp4 │ │ │ │ │ ├─03-Classification │ │ │ 01-Classification and Marking.mp4 │ │ │ 02-IP Precedence and DSCP.mp4 │ │ │ │ │ ├─04-Congestion Avoidance │ │ │ 01-Congestion Avoidance With Policing and Shaping.mp4 │ │ │ 02-Congestion Avoidance With Pre-Emptive Queue Drops.mp4 │ │ │ │ │ └─05-Congestion Management │ │ 01-Congestion Management Control With Queuing and Scheduling.mp4 │ │ │ ├─08-Introduction To Cloud Computing (Video) --- here 30.04.2020 │ │ ├─00-Course Files - no files │ │ └─01-Infrastructure Services - Cloud Computing │ │ 01-Introduction to Cloud Computing.mp4 │ │ │ └─09-Introducing VPNs │ ├─00-Course Files - no files │ └─01-WAN Technologies - VPNs and MPLS │ 01-MPLS Terminology and Concepts.mp4 │ 02-Introduction to VPNs.mp4 │ 03-Configuring GRE Tunnels.mp4 │ ├─06-Network Automation and Programmability │ │ 06-Network Automation and Programmability Playlist.mpcpl │ │ 06-Network Automation and Programmability Playlist.pls │ │ │ └─01-Introducing Network Programmability and Automation │ ├─00-Course Files │ │ JSON-Output-interpreting.rtf │ │ VOD-3459_Introducing Network Programmability and Automation_PDF.pdf │ │ │ ├─01-Course Introduction │ │ 01-Course Introduction.mp4 │ │ │ ├─02-Automation Goals and Impact │ │ 01-Historical-To-Current Methods Of Network Management.mp4 │ │ 02-Introduction To Network Management Automation.mp4 │ │ 03-Network Management Automation Origination Points.mp4 │ │ 04-Network Management Automation Protocols and Impact.mp4 │ │ │ ├─03-SDN and Automation │ │ 01-Comparing Traditional Networks With Controller-Based Networking.mp4 │ │ 02-Controller-Based SDN Architectures.mp4 │ │ 03-SDNs Relationship To Management, Control and Data Planes.mp4 │ │ 04-Introducing Northbound and Southbound APIs.mp4 │ │ │ ├─04-DNA Center │ │ 01-Introduction To Cisco DNA Center.mp4 │ │ 02-Architectural Elements Of Intent-Based Networking.mp4 │ │ 03-Comparing Traditional Campus Networks Against DNA Center-Enabled Networks.mp4 │ │ │ ├─05-REST │ │ 01-Characteristics Of REST-based APIs.mp4 │ │ │ ├─06-Network Automation Tools │ │ 01-Overview Of Network Automation Tools.mp4 │ │ │ └─07-Data Encoding and Representation │ 01-Encoding Data With JSON.mp4 │ ├─07-Additional Resources │ │ 07-Additional Resources Playlist.mpcpl │ │ 07-Additional Resources Playlist.pls │ │ │ ├─01-Effective techniques for building home labs and using remote labs │ │ ├─00-Course Files │ │ │ Building-and-Using-Labs.pdf │ │ │ │ │ └─01-Topics │ │ 01-Building Home Labs - Prepare.mp4 │ │ 02-Building Home Labs - Plan.mp4 │ │ 03-Building Home Labs - Design, Implement, and Operate.mp4 │ │ 04-Building Home Labs - Last Tips.mp4 │ │ 05-Using Remote Labs - Following Lab Guides.mp4 │ │ 06-Using Remote Labs - Creating Your Own Labs.mp4 │ │ 07-Using Remote Labs - Renting INE Remote Racks.mp4 │ │ │ ├─02-Getting Started with GNS3 │ │ ├─00-Course Files - no files │ │ ├─01-An Introduction to GNS3 │ │ │ 01-GNS3 Course Introduction.mp4 │ │ │ 02-A Simulator or an Emulator.mp4 │ │ │ │ │ ├─02-Selecting a Cisco IOS image │ │ │ 01-Cisco Platform Considerations.mp4 │ │ │ 02-Feature Sets.mp4 │ │ │ 03-Memory Considerations.mp4 │ │ │ │ │ ├─03-GNS3 Download and Installation │ │ │ 01-Locating and Downloading GNS3.mp4 │ │ │ 02-The GNS3 Setup Wizard - Part 1.mp4 │ │ │ 03-The GNS3 Setup Wizard - Part 2.mp4 │ │ │ 04-Projects, Topologies and Nodes.mp4 │ │ │ 05-Device Toolbar and Workspace - Part 1.mp4 │ │ │ 05-Device Toolbar and Workspace - Part 2.mp4 │ │ │ │ │ ├─04-Implementing Switching with GNS3 │ │ │ 01-Built-In Ethernet Switch Node.mp4 │ │ │ 02-Connecting Your GNS3 Topology to an External Switch.mp4 │ │ │ 03-EtherSwitch Router.mp4 │ │ │ │ │ ├─05-Using Built-In GNS3 Nodes │ │ │ 01-Built-In Hub Node.mp4 │ │ │ 02-Built-In Frame-Relay Switch Node.mp4 │ │ │ 03-Using the VPCS Node.mp4 │ │ │ │ │ ├─06-Using Wireshark within GNS3 │ │ │ 01-Using Wireshark within GNS3.mp4 │ │ │ │ │ ├─07-GNS3 Snapshots │ │ │ 01-Using GNS3 Snapshots.mp4 │ │ │ │ │ ├─08-Terminal Emulators │ │ │ 01-Changing your Terminal Emulator within GNS3.mp4 │ │ │ │ │ ├─09-GNS3 CCNA Example Labs - EIGRP │ │ │ 01-EIGRP - Lab Overview, Objectives and Topology.mp4 │ │ │ 02-EIGRP - Part 1 - Building the Physical Topology.mp4 │ │ │ 03-EIGRP - Part 2 - Adding IP Addresses.mp4 │ │ │ 04-EIGRP - Part 3 - Configuring Basic EIGRP.mp4 │ │ │ 04-EIGRP - Part 4 - Adding EIGRP Authentication.mp4 │ │ │ 05-EIGRP - Part 5 - Manipulating EIGRP Path Selection.mp4 │ │ │ │ │ └─10-GNS3 CCNA Example Labs - Switching │ │ 01-Switching - Lab Overview, Objectives and Topology.mp4 │ │ 02-Switching - Part 1 - Building the Physical Topology.mp4 │ │ 03-Switching - Part 2 - Adding IP Addresses and Static Routes.mp4 │ │ 04-Switching - Part 3 - Configuring VTP and VLANs.mp4 │ │ 05-Switching - Part 4 - Modifying Spanning-Tree.mp4 │ │ │ └─03-Wireshark Technologies │ ├─00-Course Files │ │ INE-Wireshark-Technologies-1.1.1.pdf │ │ INE-Wireshark-Technologies-1.1.2.pdf │ │ INE-Wireshark-Technologies-1.1.3.pdf │ │ INE-Wireshark-Technologies-1.1.4.pdf │ │ INE-Wireshark-Technologies-1.2.1.pdf │ │ INE-Wireshark-Technologies-1.2.2.pdf │ │ INE-Wireshark-Technologies-1.2.3.pdf │ │ INE-Wireshark-Technologies-1.3.1.pdf │ │ INE-Wireshark-Technologies-1.3.2.pdf │ │ INE-Wireshark-Technologies-1.3.3.pdf │ │ INE-Wireshark-Technologies-2.1.1.pdf │ │ INE-Wireshark-Technologies-2.1.2.pdf │ │ INE-Wireshark-Technologies-2.1.3.pdf │ │ INE-Wireshark-Technologies-2.1.4.pdf │ │ INE-Wireshark-Technologies-2.2.1.pdf │ │ INE-Wireshark-Technologies-2.2.2.pdf │ │ INE-Wireshark-Technologies-2.2.3.pdf │ │ INE-Wireshark-Technologies-2.3.1.pdf │ │ INE-Wireshark-Technologies-2.3.2.pdf │ │ INE-Wireshark-Technologies-2.3.3.pdf │ │ INE-Wireshark-Technologies-2.3.4.pdf │ │ INE-Wireshark-Technologies-2.4.1.pdf │ │ INE-Wireshark-Technologies-2.4.2.pdf │ │ INE-Wireshark-Technologies-2.4.3.pdf │ │ INE-Wireshark-Technologies-2.4.4.pdf │ │ INE-Wireshark-Technologies-2.5.1.pdf │ │ INE-Wireshark-Technologies-2.5.2.pdf │ │ INE-Wireshark-Technologies-2.5.3.pdf │ │ INE-Wireshark-Technologies-2.6.1.pdf │ │ INE-Wireshark-Technologies-2.6.2.pdf │ │ INE-Wireshark-Technologies-3.1.1.pdf │ │ INE-Wireshark-Technologies-3.1.2.pdf │ │ INE-Wireshark-Technologies-3.1.3.pdf │ │ INE-Wireshark-Technologies-3.2.1.pdf │ │ INE-Wireshark-Technologies-3.2.2.pdf │ │ INE-Wireshark-Technologies-3.3.1.pdf │ │ INE-Wireshark-Technologies-3.3.2.pdf │ │ INE-Wireshark-Technologies-3.4.1.pdf │ │ INE-Wireshark-Technologies-3.4.2.pdf │ │ INE-Wireshark-Technologies-3.5.1.pdf │ │ INE-Wireshark-Technologies-3.5.2.pdf │ │ INE-Wireshark-Technologies-3.6.1.pdf │ │ INE-Wireshark-Technologies-3.6.2.pdf │ │ INE-Wireshark-Technologies-3.7.1.pdf │ │ INE-Wireshark-Technologies-3.7.2.pdf │ │ INE-Wireshark-Technologies-3.8.1.pdf │ │ INE-Wireshark-Technologies-3.8.2.pdf │ │ INE-Wireshark-Technologies-3.9.1.pdf │ │ INE-Wireshark-Technologies-3.9.2.pdf │ │ INE-Wireshark-Technologies-4.1.1.pdf │ │ INE-Wireshark-Technologies-4.2.1.pdf │ │ INE-Wireshark-Technologies-4.2.2.pdf │ │ INE-Wireshark-Technologies-4.2.3.pdf │ │ INE-Wireshark-Technologies-4.3.1.pdf │ │ INE-Wireshark-Technologies-4.3.2.pdf │ │ INE-Wireshark-Technologies-4.3.3.pdf │ │ │ ├─01-Network Analysis Fundamentals │ │ ├─01-Network Fundamentals │ │ │ 01-Network Layers and OSI.mp4 │ │ │ 02-Protocols.mp4 │ │ │ 03-Routers and Switches.mp4 │ │ │ 04-Other Network Hardware.mp4 │ │ │ │ │ ├─02-Protocol and Network Analysis Concepts │ │ │ 01-Protocol Analysis.mp4 │ │ │ 02-TCP-IP.mp4 │ │ │ 03-Ethernet.mp4 │ │ │ │ │ └─03-Getting, Installing, and Configuring Wireshark │ │ 01-Installing Wireshark.mp4 │ │ 02-Configuring your PC.mp4 │ │ 03-Configuring Wireshark.mp4 │ │ │ ├─02-Capturing Network Traffic │ │ ├─01-Wireshark Interface │ │ │ 01-Navigating the GUI.mp4 │ │ │ 02-Window Panes.mp4 │ │ │ 03-Profiles.mp4 │ │ │ 04-Preferences.mp4 │ │ │ │ │ ├─02-Configuring a Capture │ │ │ 01-Selecting an Interface.mp4 │ │ │ 02-Pre-capture rules.mp4 │ │ │ 03-Colorizing.mp4 │ │ │ │ │ ├─03-Starting a Capture │ │ │ 01-Capturing Packets.mp4 │ │ │ 02-Timestamps and time values.mp4 │ │ │ 03-Navigation.mp4 │ │ │ 04-Sample Captures.mp4 │ │ │ │ │ ├─04-Filters │ │ │ 01-Setting Filters.mp4 │ │ │ 02-Capture Filters.mp4 │ │ │ 03-Display Filters.mp4 │ │ │ 04-Advanced Filters.mp4 │ │ │ │ │ ├─05-Statstics │ │ │ 01-Troubleshooting with Statistics.mp4 │ │ │ 02-Flow Graphs.mp4 │ │ │ 03-I-O Graphs.mp4 │ │ │ │ │ └─06-Command Line │ │ 01-Command-Line Tools.mp4 │ │ 02-Tshark.mp4 │ │ │ ├─03-Analyzing Traffic (Troubleshooting) │ │ ├─01-Basic Analysis │ │ │ 01-UDP and TCP Streams.mp4 │ │ │ 02-Using the Expert.mp4 │ │ │ 03-Expert Advanced Features.mp4 │ │ │ │ │ ├─02-Analyzing TCP-IP │ │ │ 01-Capturing Client-Server Response.mp4 │ │ │ 02-TCP Sequencing and Handshake.mp4 │ │ │ │ │ ├─03-Analyzing ARP │ │ │ 01-Capturing IP Resolution.mp4 │ │ │ 02-Broadcast Storm.mp4 │ │ │ │ │ ├─04-Analyzing DHCP │ │ │ 01-Reviewing DORA.mp4 │ │ │ 02-Rogue DHCP Server.mp4 │ │ │ │ │ ├─05-Analyzing DNS │ │ │ 01-Capturing DNS.mp4 │ │ │ 02-DNS Resolution Analysis.mp4 │ │ │ │ │ ├─06-Analyzing HTTP │ │ │ 01-Capturing HTTP.mp4 │ │ │ 02-Poorly Performing Website.mp4 │ │ │ │ │ ├─07-Analyzing VOIP │ │ │ 01-Capturing VOIP.mp4 │ │ │ 02-Analyzing Poor Voice Quality.mp4 │ │ │ │ │ ├─08-Analyzing FTP │ │ │ 01-Capturing FTP.mp4 │ │ │ 02-Analyzing Data Transfer.mp4 │ │ │ │ │ └─09-Analyzing Wireless │ │ 01-Capturing Wireless.mp4 │ │ 02-Analyzing Incorrect SSID.mp4 │ │ │ └─04-Saving and Working with Files │ ├─01-Annotating Captures │ │ 01-Annotating Files.mp4 │ │ │ ├─02-Saving Captures │ │ 01-Saving Captures.mp4 │ │ 02-Multiple Files.mp4 │ │ 03-Different Formats.mp4 │ │ │ └─03-Merging Captures │ 01-Importing Data.mp4 │ 02-Exporting Data.mp4 │ 03-Merging Data.mp4 │ └─08-Final Preparations │ 08-Final Preparations Playlist.mpcpl │ 08-Final Preparations Playlist.pls │ ├─00-Course Files │ CCNA-Bootcamp_Lab_Tasks.pdf │ CCNA-Bootcamp_Part-1.pdf │ CCNA-Bootcamp_Part-2.pdf │ ├─01-Networking Basics │ ├─01-The Internet Protocol │ │ 01-An Overview Of IPv4, TCP and UDP.mp4 │ │ 02-An Overview Of IPv4, TCP and UDP - Part 2.mp4 │ │ │ ├─02-Using Cisco IOS │ │ 01-Securing IOS Remote Access.mp4 │ │ │ ├─03-Switching │ │ 01-Basic Switch Configuration.mp4 │ │ 02-Using VLANs For Network Segmentation.mp4 │ │ 03-Extending VLANs With VLAN Trunks.mp4 │ │ 04-Dynamic Trunking Protocol.mp4 │ │ │ └─04-Topology Mapping │ 01-Mapping The Topology With CDP and LLDP.mp4 │ ├─02-Layer-2 Loop Prevention │ ├─01-RSTP │ │ 01-The Goals Of Loop Prevention.mp4 │ │ 02-Reviewing RSTP Functionality.mp4 │ │ 03-Essential RSTP Cisco IOS Commands.mp4 │ │ 04-Root Port Election.mp4 │ │ 05-Designated and Nondesignated Port Election.mp4 │ │ 06-RSTP Timers.mp4 │ │ 07-Portfast and Edge Ports.mp4 │ │ │ └─02-EtherChannel │ 01-Port Bundling With EtherChannel.mp4 │ ├─03-Cisco IOS DHCP Services │ └─01-DHCP Services │ 01-Utilizing Network Devices For DHCP.mp4 │ ├─04-Switching Security Features │ ├─01-Port Security │ │ 01-Securing Switchports With Port Security.mp4 │ │ 02-Monitoring Port Security.mp4 │ │ │ ├─02-DHCP Protection │ │ 01-Securing Network Access With DHCP Snooping.mp4 │ │ 02-Configuring DHCP Snooping In Cisco IOS.mp4 │ │ │ └─03-ARP Protection │ 01-Denying ARP Attacks With Dynamic ARP Inspection.mp4 │ 02-Configuring Dynamic ARP Inspection In Cisco IOS.mp4 │ ├─05-IP Routing │ ├─01-Routing Essentials │ │ 01-Routing IP Packets.mp4 │ │ 02-Inter-VLAN Routing.mp4 │ │ 03-Static Routing.mp4 │ │ │ ├─02-IPv6 Essentials │ │ 01-Introduction To IPv6 - Part 1.mp4 │ │ 02-Introduction To IPv6 - Part 2.mp4 │ │ 03-Implementing IPv6.mp4 │ │ │ ├─03-OSPF │ │ 01-Open Shortest Path First.mp4 │ │ 02-OSPF DR and BDR Elections.mp4 │ │ 03-Implementing OSPF In Cisco IOS.mp4 │ │ 04-Influencing OSPF Path Selection.mp4 │ │ │ └─04-EIGRP │ 01-An EIGRP Refresher.mp4 │ ├─06-Access Control Lists │ └─01-Access Control Lists │ 01-Classification Using Access Control Lists.mp4 │ 02-Standard ACLs.mp4 │ 03-Extended ACLs.mp4 │ ├─07-First Hop Redundancy Protocols │ └─01-The Hot Standby Router Protocol │ 01-Protecting The First Hop With HSRP.mp4 │ ├─08-IP Services With NAT │ └─01-Network Address Translation │ 01-Introducing Network Address Translation.mp4 │ 02-Static NAT.mp4 │ 03-Dynamic NAT.mp4 │ 04-Port Address Translation.mp4 │ ├─09-Wireless LANs │ ├─01-Wi-Fi Principles │ │ 01-Working With Wi-Fi.mp4 │ │ 02-Wi-Fi Components.mp4 │ │ 03-Wi-Fi Network Types and Terminology.mp4 │ │ 04-Wi-Fi Bands and Channels.mp4 │ │ │ ├─02-WLAN Architectures and Controllers │ │ 01-Autonomous WLAN Architectures.mp4 │ │ 02-Split MAC WLAN Architectures.mp4 │ │ 03-Introduction To CAPWAP.mp4 │ │ 04-Cisco WLAN Controllers.mp4 │ │ 05-Infrastructure Connections Of WLAN Components.mp4 │ │ │ └─03-Wi-Fi Security │ 01-Wi-Fi Security Authentication.mp4 │ 02-Understanding WEP and WPA.mp4 │ 03-Configuring WPA2 With PSK (WLAN Controllers).mp4 │ ├─10-Quality Of Service │ ├─01-QoS │ │ 01-Classification and Marking.mp4 │ │ 02-IP Precedence and DSCP.mp4 │ │ │ ├─02-Congestion Avoidance │ │ 01-Congestion Avoidance With Policing and Shaping.mp4 │ │ 02-Congestion Avoidance With Pre-Emptive Queue Drops.mp4 │ │ │ ├─03-Congestion Management │ │ 01-Congestion Management Control With Queuing and Scheduling.mp4 │ │ │ └─04-WLAN QoS │ 01-Wi-Fi QoS.mp4 │ ├─11-Network Programmability and Automation │ ├─01-Software Defined Networking │ │ 01-Introduction To Network Management Automation.mp4 │ │ 02-Approaches For SDN Controllers.mp4 │ │ 03-Controller-Based SDN Architectures.mp4 │ │ 04-SDNs Relationship To Management, Control and Data Planes.mp4 │ │ 05-Introducing Northbound and Southbound APIs.mp4 │ │ │ └─02-Network Programmability │ 01-Characteristics Of REST-based APIs.mp4 │ 02-Encoding Data With JSON.mp4 │ 03-Overview Of Network Automation Tools.mp4 │ └─12-Virtual Private Networks └─01-VPNs 01-Introduction To VPNs.mp4 02-MPLS Terminology and Concepts.mp4
Get This Torrent
INE CCNA 200-301.part01.rar
2.0 GB
Full Content Directory Tree.txt
45.6 KB
INE CCNA 200-301.part02.rar
2.0 GB
INE CCNA 200-301.part03.rar
2.0 GB
INE CCNA 200-301.part04.rar
2.0 GB
INE CCNA 200-301.part05.rar
2.0 GB
INE CCNA 200-301.part06.rar
2.0 GB
INE CCNA 200-301.part07.rar
2.0 GB
INE CCNA 200-301.part08.rar
2.0 GB
INE CCNA 200-301.part09.rar
345.5 MB
Similar Posts:
Category
Name
Uploaded
Other
INE CCNA 200-301 2020 Keith Bogart
Feb. 1, 2023, 8:42 a.m.
Other
INE - CCNA Data Center
Feb. 3, 2023, 8:23 a.m.