Imate žicu za učenje?

Overview/Description In the Analyze phase of the DMAIC methodology, Six Sigma teams analyze the underlying causes of issues that need to be addressed for the successful completion of their improvement projects. To that end, teams conduct a number of statistical analyses to determine the nature of variables and their interrelationships in the process under study. It is rarely possible to study and analyze the full scope of population data pertaining to all processes, products, or services, so Six Sigma teams typically collect samples of the population data to be analyzed, and based on that...
Overview/Description The hypothesis test is one of the most important tools used in the Analyze stage of the Six Sigma DMAIC methodology. A hypothesis test helps to determine whether or not an observed relationship or difference truly exists between inputs and outputs identified in the earlier stages of the process. Six Sigma teams are interested in determining whether this relationship or difference is due to random chance or if it is a true difference. If it is a real difference, Six Sigma teams like to determine if it has practical significance. The goal of this course is to explore...
Overview/Description Access control lists enable administrators to identify specific traffic which get special treatment. This course introduces the general concepts of ACL operation and how ACLs can use wildcard masking, as well as how to determine the wildcard mask for a range of IP subnets. The course distinguishes between different types of ACLs, with a focus on the configuration for standard numbered ACLs. Two scalability challenges for the Internet are the depletion of the registered IPv4 address space and scaling in routing. Cisco IOS NAT and PAT are mechanisms for conserving...
Overview/Description Once you have the subnetting basics down and understand how to divide a network into two or more networks you are ready to determine the optimal subnet mask for a given scenario and how to calculate the usable range of IP addresses that can be used in each of those subnets. This course starts by reviewing and working through a detailed subnetting example that has specific requirements. Next the course introduces block sizes which tell you how many addresses are within the network. It also explains how the first subnet address is reserved to refer to the network itself...
Overview/Description Ethernet is the network access layer of TCP/IP. This course describes different Ethernet copper and fiber options. Ethernet media options are presented with a description of the most common connectors and cable types. The Ethernet frame structure is introduced, and important fields are explained. MAC addresses and their function are described, while switch frame processing operations and duplex options are explained. The course also covers collision domains and provides configuration examples for duplex settings. Most issues that affect a switched network are...
Overview/Description The growth of the Internet and the adoption of networking over the past 20 years are pushing the IP version 4 (IPv4) to the limits of its addressing capacity and its ability for continued growth. To sustain the evolution of the Internet and the ability to scale networks for future demands requires a limitless supply of IP addresses and improved mobility. In response, the Internet Engineering Task Force (IETF) developed a next-generation protocol, IP version 6 (IPv6). IPv6 satisfies the increasingly complex requirements of hierarchical addressing that IPv4 does not satisfy...
Overview/Description When physical access has been enabled, you must secure access to the switch via the console port and the vty ports. You must also filter access to network devices from remote or internal locations.This course describes the steps that are required to secure local and remote access to network. It then goes on to describing the need for securing unused ports. It presents port security as a solution to the problem of maintaining control of utilized ports. The need to disable unused services is illustrated, and configuration examples show how to disable them. Why the correct...
Overview/Description Understanding the benefits of computer networks and how they function is important in maximizing communication channels among end users. This course describes the concept of computer networking, introduces the components of a computer network, and explains how users benefit from using networks. The host-to-host communication models were created to help define how network processes function, including the various components of networks and the transmission of data. Understanding the structure and purpose of the most commonly used protocol stack TCP/IP is central to...
Overview/Description Cisco IOS Software is a feature-rich network system software that provides network intelligence to meet all of today's networking demands. It is the industry-leading, and most widely deployed, network system software. This course describes Cisco IOS Software and the basic Cisco IOS CLI functions and operations. This course also describes how to navigate the Cisco IOS CLI configuration modes, how to use embedded keyboard help, how to manage configurations, and how to use additional Cisco IOS features to improve the user experience in the CLI. Target Audience...
Overview/Description Understanding the packet delivery process is a fundamental part of understanding networking devices. You must understand host-to-host communications to administer a network. This course provides a step-by-step analysis of host-to-host communications and the packet-delivery process over a routed network. The course also illustrates the role of Layer 2 and Layer 3 addresses in packet delivery, as well as the role of ARP. Routing is the process by which a packet moves from one location to another. In the terms of computer networks, it is the process of determining where to...

Koraci do učenja

1Prijavi se

Prijavite se, a ako nemate korisničko ime, registrirajte se.

2Pronađi i upiši program

Pronađite edukacijske programe u Katalogu i Certifikaciji, ili koristite polje za pretragu.

3Uči

Upisani programi dostupni su u meniju Korisnik, Moji tečajevi.

»Detaljne upute

Trebate pomoć?