Tag Archive: 6 weeks summer Taining

Get familiar with Networking Terms

Network: A network is just a collection of devices and end systems connected to each other and able to communicate with each other.There are two types of topologies in networking.  The physical topology is what the network looks like and how…
Read more

Get familiar with networking terms

Network :A network is just a collection of devices and end systems connected to each other and able to communicate with each other.There are two types of topologies in networking.  The physical topology is what the network looks like and how…
Read more

Cisco IOS Basics

The following are some key points that summarize the IOS basics: Types of Memory: There are different types of memory on a Cisco device: ROM: The Read-Only Memory (ROM) on a Cisco device is like the ROM on a computer in the…
Read more

CCNA Exam Question Types Demo

“Earlier this month, I actually decided to take the test. Needless to say, I didn’t pass for a simple reason…. The simulations were a bit confusing. I pretty much had to skip all of them.  I do know how to…
Read more

Cisco IS-IS Configuration Primer

With the expansion of today’s networks over the last 30 years, routing protocols have become a vital central part of these networks to ensure efficient routing and reachability. Along with the well known routing protocols like OSPF and EIGRP there…
Read more

Why Cisco is the Most Strategic Digital Partner

Since taking over as CEO, I have spent a lot of my time listening. I’ve met with customers, partners, government leaders, investors, and Cisco’s employees. Each conversation yielded new insights and fueled my continued optimism about our future. What I…
Read more

Getting More Responsive Security by Learning From Disaster Responses

As the Dutch philosopher Erasmus once said, “prevention is better than cure.” Most organizations’ security approaches have focused primarily on erecting defensive systems to prevent attackers from compromising information and systems through exploiting security weaknesses associated with technology, process, or…
Read more