Ccnp Route 300-101 Video Boot Camp With Chris Bryant

Prkos

U P L O A D E R
40d57939e2637e6352de65bcfd0017a6.jpg


Ccnp Route 300-101 Video Boot Camp With Chris Bryant
Last updated 10/2017
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 20.70 GB | Duration: 30h 12m

Pass The CCNP ROUTE 300-101 Exam With Chris Bryant -- AND Prepare For Real-World Networking Success!



What you'll learn

Requirements

Description
The CCNP ROUTE 300-101 exam is generally considered the toughest of the three exams you must pass in order to earn your CCNP. Get ready to pass it with a little help from Chris Bryant, CCIE #12933.You can watch the videos as often as you like until you pass the CCNP ROUTE exam! Your download ability and online access NEVER expire.Since 2005, I've prepared CCNP candidates for success on the difficult routing exam - currently called the CCNP ROUTE exam -- and now I'm going to do the same for you.No prepackaged slides here - you'll see lab after lab on REAL Cisco routers, all designed to teach you the finer points of advanced Cisco routing and prepare you for success in the exam room and real-world networking. From BGP to route redistribution, from multi-area OSPF to distribute-lists, it's all here - and there's a forum right here on this site where you can ask me questions. Your access to this online course is unlimited - you can watch the videos as often as you like and for as long as it takes for you to pass! Let's get started! Chris Bryant CCIE #12933 "The Computer Certification Bulldog"

Overview
Section 1: CCNP ROUTE 300-101: A Brief And Painless (Mostly) Review

Lecture 1 Watching Your Free CCNA Security 210-260 Course

Lecture 2 Review 1: The Case Of TCP v UDP, Part The First

Lecture 3 Review 2: The Case Of TCP v UDP, Part The Second

Lecture 4 Review 3: PPP -- Over Ethernet And Otherwise

Lecture 5 Review 4: Rip-Roarin' Routing Review (Really!)

Section 2: CCNP ROUTE 300-101: EIGRP Fundamentals

Lecture 6 EIGRP Fund 1: Adjacencies And Successors

Lecture 7 EIGRP 2: NBMA Network Lab

Lecture 8 EIGRP 3: Baby, Baby, Where Did Our Subnets Go?

Lecture 9 EIGRP 4: Successors and Feasible Successors

Lecture 10 EIGRP 5: Promoting A Feasible Successor

Lecture 11 EIGRP Fund 6: The Variance Command

Lecture 12 EIGRP Fund 7: DUAL, Passive, And Active Routes

Section 3: CCNP ROUTE 300-101: EIGRP Advanced Concepts

Lecture 13 Adv EIGRP 1: Packet Types And Timers

Lecture 14 Adv EIGRP 2: Hello Timers Lab

Lecture 15 Adv EIGRP 3: "show ip eigrp neighbor" And Some Distance

Lecture 16 Adv EIGRP 4: Feasible, Reported, And Advertised Distances

Lecture 17 Adv EIGRP 5: FD, AD, And Variance

Lecture 18 Adv EIGRP 6: Default And Non-Default Admin Distances

Lecture 19 Adv EIGRP 7: Autosummarization

Lecture 20 Adv EIGRP 8: Manual Route Summarization

Lecture 21 Adv EIGRP 9: The AD 5 and Stub Routing Theory

Lecture 22 Adv EIGRP 10: Passive Interfaces

Lecture 23 Adv EIGRP 11: The Metric Weights

Lecture 24 Adv EIGRP 12: Know Thy Interface Types

Lecture 25 Adv EIGRP 13: Propagating Static Default Routes

Lecture 26 Adv EIGRP 14: The IP Default-Network Command

Lecture 27 Adv EIGRP 15: Neighbor Authentication

Section 4: CCNP ROUTE 300-101: The Fundamentals Of OSPF Success

Lecture 28 OSPF Fund 1: Link State Protocol Operation

Lecture 29 OSPF Fund 2: The DR And BDR

Lecture 30 OSPF Fund 3: DR For Life -- Or IS It?

Lecture 31 OSPF Fund 4: The Buildout Begins! (Broadcast Segment)

Lecture 32 OSPF Fund 5: Building An NBMA Network

Lecture 33 OSPF Fund 6: Building A Point-To-Point Network

Lecture 34 OSPF Fund 7: The Missing Subnets and Virtual Links

Lecture 35 OSPF Fund 8: One Big Area Zero?

Lecture 36 OSPF Fund 9: Interface Cost And Reference Bandwidths

Lecture 37 OSPF Fund 10: The Bandwidth Command And Interface Cost

Lecture 38 OSPF Fund 11: Audible! Lab Confirm And Changing The RID

Lecture 39 OSPF Fund 12: Four Routers Walk Into A Broadcast Network..

Section 5: CCNP ROUTE 300-101: Advanced OSPF Skills

Lecture 40 OSPF Adv A1: Router And LSA Type Review

Lecture 41 OSPF Adv 1: Intro To Route Redistribution And Stub Areas

Lecture 42 OSPF Adv 2: Configuring Stub And Total Stub Areas

Lecture 43 OSPF Adv 3: Configuring NSSAs

Lecture 44 OSPF Adv 4: E1, E2, N1, And N2 Routes

Lecture 45 OSPF Adv 5: More Route Redistribution!

Lecture 46 OSPF Adv 6: Simple Authentication

Lecture 47 OSPF Adv 7: MD5 Authentication

Section 6: CCNP ROUTE 300-101: Route Redistribution

Lecture 48 RouteRedis 1: The Fundamentals Of Success

Lecture 49 RouteRedis 2: OSPF-To-RIP Redistribution

Lecture 50 RouteRedis 3: Ping Both Ways After Redistribution

Lecture 51 RouteRedis4: Beware The Routing Suboptimal

Lecture 52 RouteRedis 5: Changing The AD For An Entire Protocol

Lecture 53 RouteRedis 6: Changing The AD For Some Routes (Or One)

Lecture 54 RouteRedis 7: Changing The AD Based On OSPF Route Type

Lecture 55 Route Redis 8: Redistributing EIGRP (And Tweaking The AD)

Lecture 56 RouteRedis 9: Using Distribute Lists With OSPF

Lecture 57 RouteRedis 10: Distribute Lists And EIGRP Updates

Lecture 58 RouteRedis 11: Route Redistribution And Distribute Lists

Lecture 59 RouteRedis 12: Can Multiple Distribute Lists Co-Exist?

Lecture 60 RouteRedis 13: Writing And Verifying A Route Map

Lecture 61 RouteRedis 14: Applying Route Maps During Route Redistribution

Lecture 62 RouteRedis 15: Route Maps And 2-Way Route Redistribution

Lecture 63 RouteRedis 16: More Route Maps And 2-Way Redistribution!

Lecture 64 RouteRedis 17: Policy Routing Theory And Application

Lecture 65 RouteRedis 18: More Policy Routing Lab Work!

Lecture 66 RouteRedis 19: Local Policy Routing Theory And Application

Section 7: CCNP ROUTE 300-101: VPNs And IPSec

Lecture 67 VPN 1: The Dreaded But Necessary Theory

Lecture 68 VPN 2: IKE Phase 1 In Action

Lecture 69 VPN 3: IPSec SA Configuration

Lecture 70 VPN 4: Building, Verifying, And Debugging Your VPN Build!

Lecture 71 VPN 5: A Dash Of DMVPN, NHRP, And mGRE

Lecture 72 VPN 6: VRF Lab Part 1

Lecture 73 VRF 7: VRF Lab Part 2

Lecture 74 VRF 8: VRF Lab Part 3

Lecture 75 VRF 9: VRF Lab Part 4 -- Pinging!

Section 8: CCNP ROUTE 300-101: IP Version 6 Success

Lecture 76 IPv6 1: Fundamentals And Zero Compression Techniques

Lecture 77 IPv6 2: EUI And The Interface Identifiers

Lecture 78 IPv6 3: Stateless And Stateful Autoconfiguration

Lecture 79 IPv6 4: Building An OSPFv3 Broadcast Segment

Lecture 80 IPV6 5: Adding Loopbacks To Our OSPFv3 Network

Lecture 81 IPv6 6: Configuring OSPFv3 Point-To-Point Networks

Lecture 82 IPv6 7: Configuring An OSPF NBMA Network

Lecture 83 IPv6 8: Route Redistribution And Stub Routing With OSPFv3

Lecture 84 IPv6 9: Configuring EIGRP On IPV6

Lecture 85 IPv6 10: Configuring RIPng

Lecture 86 IPV6 11: T-Shooting OSPF v3

Lecture 87 IPv6 12: Migration Strategies

Section 9: CCNP ROUTE 300-101: Route And Network Security

Lecture 88 Security 1: Standard And Extended ACLs

Lecture 89 Security 2: Host, Any, and Seeing Dollar Signs

Lecture 90 Security 3: Extended ACL Lab

Lecture 91 Security 4: Named ACL Lab

Lecture 92 Security 5: Time-Based ACL Lab

Lecture 93 Security 6: Password Review And Telnet Lab

Lecture 94 Security 7: Username / Password Database And Telnet Lab

Lecture 95 Security 8: Secure Shell And SNMP

Lecture 96 Security 9: The Network Time Protocol

Lecture 97 Security 10: NTP Server / Client Lab

Lecture 98 Security 10A: NTP Broadcast Lab

Lecture 99 Security 11: Unicast RPF

Lecture 100 Security 12 IP Helper Address

Lecture 101 Security 13: Using And Filtering "Debug IP Packet"

Lecture 102 Security 14: Spotting Possible Memory Issues

Lecture 103 Security 15: Core Dump

Section 10: CCNP ROUTE 300-101: BGP

Lecture 104 BGP 1: Intro Remarks

Lecture 105 BGP 2: External BGP Peerings

Lecture 106 BGP 3: iBGP Peering And Loopback Interface Discussion

Lecture 107 BGP 4: eBGP Peering With Loopback Interfaces

Lecture 108 BGP 5: Advertising Routes With The "Network" Command

Lecture 109 BGP 6: The Origin And Next-Hop Attributes, Plus The Best-Path Selection Process

Lecture 110 BGP 7: Examining The Selection Of One BGP Path Over Another

Lecture 111 BGP 8: Next-Hop Addresses

Lecture 112 BGP 9: The Next-Hop Address Rule

Lecture 113 BGP 10: The Multi-Exit Discriminator (MED)

Lecture 114 BGP 11: Local Preference -- All Or Nothing At All

Lecture 115 BGP 12: Local Preference -- Changing One But Not All

Lecture 116 BGP 13: The Weight Attribute

Lecture 117 BGP 14: More Weight Work!

Lecture 118 BGP 15: Route Summarization

Lecture 119 BGP 16: Synch Rules And The Full Mesh

Lecture 120 BGP 17: Route Reflectors -- Why And How

Lecture 121 BGP 18: Prefix Lists Begin

Lecture 122 BGP 19: Prefix Lists Continue

Lecture 123 BGP 20: A Few Final Tips...

Section 11: CCNP ROUTE 300-101: NAT And PAT

Lecture 124 NAT 1: Static NAT

Lecture 125 NAT 2: Dynamic NAT

Lecture 126 NAT 3: Port Address Translation

Section 12: Your Free CCNA Security Course Starts HERE!

Lecture 127 Fund 1: Citizen C.I.A.

Lecture 128 Fund 2: Intro To SIEM

Lecture 129 Fund 3: More SIEM

Lecture 130 Fund 4: Recon Attacks and Phishing

Lecture 131 Fund 5: Social Engineering and Spear Phishing

Lecture 132 Fund 6: Privilege Escalation and Telnet

Lecture 133 Fund 7: Privilege Escalation Continues

Lecture 134 Fund 8: DoS and DDoS Attacks

Lecture 135 Fun 9: Advanced Persistent Threats

Section 13: CCNA Security 210-260, Section 2

Lecture 136 Attack 1: Man-In-The-Middle Attacks

Lecture 137 Attack 2: ARP Poisoning and Dynamic ARP Inspection

Lecture 138 Attack 3: DAI Commands

Lecture 139 Attack 4: MAC Spoofing and CAM Table Overflows

Lecture 140 Attack 5: Port Security Fundamentals

Lecture 141 Attack 6: Port Security Dynamic Address Learning

Lecture 142 Attack 7: Port Security Shutdown And Recovery

Lecture 143 Attack 8: Port Security and Automatic Port Reenabling

Lecture 144 Attack 9: Port Security Static Address Aging

Lecture 145 Attack 10: Port Security Dynamic Address Aging

Lecture 146 Attack 11: Refresh Your VLAN Knowledge Here!

Lecture 147 Attack 12: Private VLAN Theory

Lecture 148 Attack 13: Private VLAN Lab

Lecture 149 Attack 14: OSPF Authentication Fundamentals

Lecture 150 Attack 15: OSPF Clear-Text Authentication

Lecture 151 Attack 16: OSPF MD5 Authentication

Lecture 152 Attack 17: Root Guard

Lecture 153 Attack 18: BPDU Guard and Loop Guard

Lecture 154 Attack 19: VLAN ACLs, Part 1

Lecture 155 Attack 20: VLAN ACLs, Part 2

Lecture 156 Attack 21: Stoppin' VLAN Hoppin'

Lecture 157 Attack 22: DHCP Snooping Intro

Lecture 158 Attack 23: DHCP Snooping Address Renewal

Lecture 159 Attack 24: DHCP Snooping First-Time Address Acquisition

Lecture 160 Attack 25: IPSG Theory and Lab 1

Lecture 161 Attack 26: IPSG Lab Continues

Lecture 162 Attack 27: IPSG Lab, Static Mappings, No DHCP

Lecture 163 Attack 28: Segue To The Next Section

Section 14: CCNA Security 210-260: Privilege Levels

Lecture 164 Levels 1: The First Default

Lecture 165 Levels 2: The Other Defaults

Lecture 166 Levels 3: Intro To Custom Levels

Lecture 167 Levels 4: Custom Level Lab Continues (Configure and Interface Levels)

Lecture 168 Levels 5: The Autocommand and One-Time Password Options

Lecture 169 Levels 6: Privilege Levels and "Show Run"

Lecture 170 Levels 7: Role-Based CLI Begins

Lecture 171 Levels 8: Role-Based CLI Continues

Lecture 172 Levels 9: Superviews!

Lecture 173 Levels 10: Applying The Views, Part 1

Lecture 174 Levels 11: Applying The Views, Part 2

Lecture 175 Levels 12: Intro To Lawful Intercept

Lecture 176 Levels 13: Resilient Config Labs Begin

Lecture 177 Levels 14: Resilient Config Labs Continue

Lecture 178 Levels 15: Resilient Config Test

Lecture 179 Levels 16: Resilient Image Test

Section 15: CCNA Security 210-160: Protecting The Control Plane

Lecture 180 Control Plane 1: Intro To CoPP

Lecture 181 Control Plane 2: Class Maps and CoPP

Lecture 182 Control Plane 3: Policy Maps and CoPP

Lecture 183 Control Plane 4: Verifying CoPP / Intro To CPPp

Section 16: CCNA Security 210-260: VPNs

Lecture 184 VPN 1: Site-to-Site VPNs

Lecture 185 VPN 2: The Phases Of ISAKMP

Lecture 186 VPN 3: Writing The ISAKMP Policy, Part 1

Lecture 187 VPN 4: Writing The ISAKMP Policy, Part 2

Lecture 188 VPN 5: Finishing The ISAKMP Policy / Writing The Keys

Lecture 189 VPN 6: Writing The Transform Sets

Lecture 190 VPN 6A: Defining Interesting Traffic

Lecture 191 VPN 7: Writing The Crypto Map

Lecture 192 VPN 8: Testing and Troubleshooting

Lecture 193 VPN 9: Crypto Map This n' That

Lecture 194 VPN 10: Debugging The Tunnel Build

Lecture 195 VPN 11: Diffie-Hellman Details

Lecture 196 VPN 12: Using ASDM To Build A VPN

Lecture 197 VPN 13: More VPN Building With ASDM

Lecture 198 VPN 14: Wrapping Up Our 1st ADSM VPN Build

Section 17: CCNA Security 210-260: Firewalls

Lecture 199 Firewall 1: What The Heck IS a Firewall?

Lecture 200 Firewall 2: Stateless and Stateful Filtering

Lecture 201 Firewall 3: Proxy Firewalls

Lecture 202 Firewall 4: Personal Firewalls

Lecture 203 Firewall 5: Cisco ZBF and Zone Pairs

Lecture 204 Firewall 6: The DMZ

Lecture 205 Firewall 7: IP Addressing Scheme For Firewall Labs

Lecture 206 Firewall 8: Basic Firewall Wizard Lab (CCP)

Lecture 207 Firewall 9: Basic Firewall Lab Concludes

Lecture 208 Firewall 10: Advanced Firewall Lab Begins

Lecture 209 Firewall 11: Advanced Firewall Lab Ends

Lecture 210 Firewall 12: Intro To ASA Firewalling

Lecture 211 Firewall 13: Configuring A New ASA

Lecture 212 Firewall 14: ADSM Lab Begins -- Outside Interface

Lecture 213 Firewall 15: ADSM Lab Continues

Lecture 214 Firewall 16: ADSM Lab Continues (Access Rule Application)

Lecture 215 Firewall 17: ADSM Lab Continues (Global Rule Application)

Lecture 216 Firewall 18: ADSM Lab Concludes

Lecture 217 Firewall 19: October 21 Weekend Note

Section 18: CCNA Security 210-260: The IPS and IDS

Lecture 218 IPS 1: Similarities and Differences

Lecture 219 IPS 2: Where They Can Go, What They Can Do

Lecture 220 IPS 3: Sensor Types

Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!

cnp_route_300101_video_boot_camp_with_chris_bryant.jpg


Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!

Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!

Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
 
Kommentar

In der Börse ist nur das Erstellen von Download-Angeboten erlaubt! Ignorierst du das, wird dein Beitrag ohne Vorwarnung gelöscht. Ein Eintrag ist offline? Dann nutze bitte den Link  Offline melden . Möchtest du stattdessen etwas zu einem Download schreiben, dann nutze den Link  Kommentieren . Beide Links findest du immer unter jedem Eintrag/Download.

Data-Load.me | Data-Load.ing | Data-Load.to

Auf Data-Load.me findest du Links zu kostenlosen Downloads für Filme, Serien, Dokumentationen, Anime, Animation & Zeichentrick, Audio / Musik, Software und Dokumente / Ebooks / Zeitschriften. Wir sind deine Boerse für kostenlose Downloads!

Ist Data-Load legal?

Data-Load ist nicht illegal. Es werden keine zum Download angebotene Inhalte auf den Servern von Data-Load gespeichert.
Oben Unten