Practical Networking .net
chat

Looking for Reviewers for my TLS/SSL Deep Dive course

I am beginning the process of recording my TLS/SSL Deep Dive course. It is one of the most requested classes from the Course Survey. The course is a deep dive on TLS and SSL, the protocols which secure the Internet. The course will take anyone with any amount of exposure to SSL/TLS and make them […]

post

CCNA Training Videos from Jeremy’s IT Lab

I recently made a recommendation for a full CCNA training course. I’ve come across another resource that I would also recommend. Jeremy of JeremysITlab.com has been putting together videos on Youtube covering the entire CCNA 200-301 curriculum. He hasn’t completed the entire video series yet, but he is regularly releasing new videos. This is a […]

video

Named ACL Syntax

Part 4 of the video series on Access Control Lists picks apart the syntax required to configure a Named Access List. In the video, we will continue where we left off in the prior videos by re-configuring the Numbered ACL as a Named ACL. You’ll see just how similar the syntax is between Numbered ACLs […]

video

Numbered ACL Configuration

In Part 3 of the series on ACLs, we go through a live demonstration of the configuration of various Numbered ACL statements. We’ll use the syntax we learned in the prior video to create access list entries to match specific packets. In doing so, we’ll get to talk through some important concepts — the implicit […]

video

Numbered ACL Syntax

Part 2 of the video series on Access Control List picks apart the syntax for configuring Numbered ACL. We’ll step through each field in the command of a Numbered ACL and explain the ins and outs of what they mean and how they work. Specifically, we’ll cover these items: 0:00 – Start / Review of […]

video

What are Access Control Lists?

I’m releasing a new video series which will unpack Access Control Lists in detail. The first video in the series answers the question: What are Access Control Lists (ACLs)? In this video I teach the following concepts: 0:00 Intro 0:21 What are Access Lists? 0:41 What are various applications of Access Lists? 1:34 Topology and […]

video

Discontiguous Wildcard Masks

If you’ve been doing Networking, then you are probably familiar with CIDR notation, and how it correlates to Subnet Masks and Wildcard Masks. Which means you know that a /26 correlates to a Subnet Mask of 255.255.255.192 and a Wildcard Mask of 0.0.0.63. But what is the purpose of a Wildcard Mask if you already […]

post

Full CCNA Course by Neil Anderson

I get many requests for a full CCNA exam course. And while the idea has some appeal, I currently have no plans to produce my own CCNA training course at this time. However, I did want to provide you all with my recommendation for a CCNA course: Neil Anderson’s CCNA Boot Camp course. There are […]