Vi ste ovdje
Overview/Description
Network staff is responsible for managing each device on the network according to best industry practices and for reducing device downtime. This course provides an overview of some of the tools for monitoring and troubleshooting Cisco devices. SNMP basic components and operation are explained. A graphing tool can use SNMP to periodically poll an SNMP agent (for example, a router) and graph the values. Syslog is another useful protocol that allows a network device to send event notification messages to a centralized logging server. The course also explains the NetFlow...
Overview/Description
Diagnosing and resolving problems is an essential skill of jetwork engineers. A particular problem can be diagnosed and sometimes even solved in many different ways. By using a structured approach to the troubleshooting process, you can greatly reduce the average time it takes to diagnose and solve a problem. This course describes various approaches to troubleshooting network connectivity issues. As with IPv4 networks, problems will arise in IPv6 networks. You will be required to troubleshoot these problems, and you can use the same structured approach as troubleshooting...
Overview/Description
This course starts with a review of VLAN and trunk technology. Understanding how VLANs and trunks operate and which protocols are associated with them is important for configuring, verifying, and troubleshooting VLANs and trunks on Cisco access switches. This course also addresses some of the common reasons that port connectivity, VLAN configuration, and trunk establishment can fail. It describes what information to look for to identify the source of the problem and determine how to solve it. Switched networks introduce redundancy, so an STP loop-avoidance mechanism is...
Overview/Description
Cisco VPN solutions provide an Internet-based WAN infrastructure for connecting branch offices, home offices, business partner sites, and remote telecommuters to all or portions of a company network. With cost-effective, high-bandwidth Internet connectivity that is secured by encrypted VPN tunnels, you can reduce WAN bandwidth costs while increasing connectivity speeds. This course describes the benefits of VPN implementation. GRE is a tunneling protocol that can encapsulate a wide variety of protocol packet types inside IP tunnels, creating a virtual point-to-point link...
Overview/Description
As an enterprise grows beyond a single location, it needs to interconnect LANs in various locations using a WAN. There are several technologies that are involved in the functioning of WANs, including hardware devices and software functions. This course describes the functions and characteristics of WANs and contrasts them with LANs. The course also explores how WANs relate to the OSI reference model in their design and function and which major hardware components are typically used in WAN environments. One of the most common types of WAN connection is the point-to-point...
Overview/Description
Understanding your customers' expectations and behaviors is essential to implementing a successful customer-focused service approach. But how do you get to the core of what your customers truly value? This course explores what customers value from a service perspective and how to identify their needs and expectations. It also examines how you can use customer relationship management tools to help identify and manage customer expectations in order to maintain competitive advantage.
Target Audience
Managers and leaders who want to develop their skills for approaching and...
Overview/Description
With the deployment of a new Operating System version comes the possibility of installation or operation issues of software and applications developed for previous OS versions. Software errors can be encountered during the installation, immediately after the installation, or after a period of use. Issues occurring during or soon after an installation are generally caused by some form of restriction, such as permission or policy constraints; an incompatible program configuration setting; or the inability of the installation program to access needed resources. Failures can...
Overview/Description
Since every project faces some degree of risk, good project management involves a thorough investigation into all potential risks that may impact the project throughout its life cycle. Identifying potential risks and their causes and impacts can mean the difference between a project that reaches a successful conclusion and one that does not. In this course, learners will continue to learn about processes within the Project Risk Management Knowledge Area. It covers the best practices outlined in A Guide to the Project Management Body of Knowledge (PMBOK® Guide) â...
Overview/Description
As we move towards more applications being delivered via the cloud, and businesses using a cloud computing models, we also need to consider the implications for the management of identity. This course ensures you are familiar with identity and access management (IAM) and the common industry protocols used to extend identity to the cloud. It covers the concept of federation between different CSPs and businesses, the need for proper identity and access control management, and it also explores the use of a Cloud Identity as a Service (IDaaS) offering. The course also...
Overview/Description
Of the many digital illustration applications available on the market, few have robust vector manipulation toolsets equal to that of Illustrator CS4. This course explores ways of transforming and arranging elements in your artwork from rotating and scaling to organizing artwork in layers and arrangement stacks. The course also describes how to use reusable symbols to speed illustration time, how to add and manipulate type in an Illustrator project, and how to add wow to your projects using styles and effects.
Target Audience
The intended audience is expected to be a range...