-
Cisco CSR Virtual Router
After watching this video; you will be able to describe Cisco CSR virtual router.
-
Cisco FabricPath
After watching this video; you will be able to describe Cisco FabricPath.
-
Cisco IAC
After watching this video; you will be able to describe Cisco IAC.
-
Cisco Intercloud Fabric
After watching this video; you will be able to describe Cisco Intercloud Fabric.
-
Cisco Intercloud Fabric Architectural Overview
After watching this video; you will be able to describe Cisco Intercloud Fabric architecture.
-
Cisco Intercloud Fabric Core Services
After watching this video; you will be able to describe Cisco Intercloud Fabric core services.
-
Cisco Extension Mobility in Cisco Unified Communications Manager
After watching this video; you will be able to describe the Cisco Extension Mobility feature; its login process; and the default device profile.
-
Cisco Configuration Professional Community
After watching this video; you will be able to describe Cisco Configuration Professional communities.
-
Cisco Expressway-C and Cisco Expressway-E
After watching this video; you will be able to describe the functions of Expressway-C and Expressway-E.
-
Cisco Expressway as a NAT and Security Solution
After watching this video; you will be able to describe Cisco expressway as a NAT and security solution.
-
Cisco Extension Mobility
After watching this video; you will be able to describe Cisco extension mobility.
-
Cisco Extension Mobility and CSSs
After watching this video; you will be able to describe Cisco extension mobility and CSSs.
-
Cisco Extension Mobility Configuration Elements
After watching this video; you will be able to describe Cisco extension mobility configuration elements.
-
Cisco Extension Mobility Configuration Steps (Pt 1)
After watching this video; you will be able to describe Cisco extension mobility configuration steps.
-
Cisco Extension Mobility Configuration Steps (Pt 2)
After watching this video; you will be able to implement Cisco extension mobility configuration steps.
-
Cisco Extension Mobility Login Process
After watching this video; you will be able to describe the Cisco extension mobility login process.
-
Cisco Extension Mobility Phone Model Differences
After watching this video; you will be able to describe Cisco extension mobility phone model differences.
-
Cisco Firewall Zoning
In Cisco SENSS 1.0; you can use firewall zoning to secure zone perimeters and control ingress traffic without influencing zone services. In this video; Michael Shannon discusses data flow between controlled and uncontrolled zones and explains how the perimeters of multiple controlled zones; each subject to its own ingress policies and services; are secured.
-
Cisco Collaboration Endpoint Aggregation Architecture
After watching this video; you will be able to describe Cisco collaboration endpoint aggregation and gateway architecture.
-
Cisco Collaboration Endpoint Protocols
After watching this video; you will be able to identify protocols used by Cisco unified IP phones and Cisco Jabber.
-
Cisco Collaboration Endpoint Status Verification
After watching this video; you will be able to recognize how to verify Cisco collaboration endpoint registration status.
-
Cisco Collaboration Media Service Call Control Architecture Options
After watching this video; you will be able to describe the media service architecture of Cisco collaboration.
-
Cisco Digital Media Players (Part 1)
After watching this video; you will be able to describe Cisco Digital Media Players.
-
Cisco Digital Media Players (Part 2)
After watching this video; you will be able to describe Cisco Digital Media Players.
-
Cisco Digital Media Suite
After watching this video; you will be able to describe Cisco Digital Media Suite functional subsystems .
-
Cisco DMP Installation (Part 1)
After watching this video; you will be able to describe Cisco DMP installation.
-
Cisco DMP Installation (Part 2)
After watching this video; you will be able to describe Cisco DMP installation.
-
Cisco DMP Management
After watching this video; you will be able to perform management of Cisco DMP.
-
Cisco DMP to Cisco DMM Registration Process
After watching this video; you will be able to describe and perform Cisco DMP to DMM registration and verification.
-
Cisco DMP-to-Appspace Registration Process
After watching this video; you will be able to describe and perform Cisco DMP-to Appspace registration and verification.
-
Cisco DX Series Endpoint Characteristics
After watching this video; you will be able to describe characteristics of DX series endpoints.
-
Cisco DX650 Capabilities and Protocols
After watching this video; you will be able to describe Cisco DX650 capabilities and protocols.
-
Cisco DX650 Problem Reporting Tool
After watching this video; you will be able to use the Cisco DX650 Problem Reporting Tool.
-
Cisco DX650 User Interface
After watching this video; you will be able to describe the Cisco DX650 user experience.
-
Cisco Intelligent Proximity
After watching this video; you will be able to describe Cisco Intelligent Proximity.
-
Cisco Collaboration Desktop Endpoint Portfolio
After watching this video; you will be able to describe Cisco collaboration desktop endpoint portfolio.
-
Cisco FabricPath Control Plane
After watching this video; you will be able to describe how FabricPath uses the IS-IS protocol for control plane operations.
-
Cisco FabricPath vs. Classic Ethernet
After watching this video; you will be able to match the classic Ethernet and Cisco FabricPath modes to their functions.
-
Cisco FET-10G
After watching this video; you will be able to recognize the function of a Fabric Extender Transceiver (FET).
-
Cisco Clientless SSL VPN
After watching this video; you will be able to describe Cisco clientless SSL VPN.
-
Cisco Clientless SSL VPN Resource Access Methods
After watching this video; you will be able to describe Cisco clientless SSL VPN resource access methods.
-
Cisco Clientless SSL VPN Use Cases
After watching this video; you will be able to describe Cisco clientless SSL VPN use cases.
-
Cisco Cloud Web Security Features and Benefits
After watching this video; you will be able to describe Cisco cloud web security features and benefits.
-
Cisco Collective Security Intelligence Cloud
After watching this video; you will be able to describe Cisco collective security intelligence cloud.
-
Cisco Common Classification Policy Language
After watching this video; you will be able to describe Cisco common classification policy language.
-
Cisco ESA GUI Management
After watching this video; you will be able to describe Cisco ESA GUI management.
-
Cisco FireSIGHT Capabilities
After watching this video; you will be able to describe Cisco FireSIGHT capabilities.
-
Cisco Express Forwarding
In this video; Raymond Lacoste explains the method used and the path taken to forward packets using Cisco Express Forwarding.
-
Cisco Clientless SSL VPN Application Access Methods
After watching this video; you will be able to describe the methods for accessing applications over a Cisco Clientless SSL VPN connection.
-
Cisco Cloud Web Security
In this video; Michael Shannon provides a demonstration of Cisco Cloud Web Security in SITCS 1.0.
-
Cisco Cloud Web Security Authentication Key and Traffic Redirection
In this video; Michael Shannon discusses Cisco Cloud Web Security authentication key and traffic redirection in SITCS 1.0.
-
Cisco Cloud Web Security Overview
In this video; Michael Shannon provides an overview of Cisco Cloud Web Security in SITCS 1.0.
-
Cisco ESA Deployment Scenarios
In this video; Michael Shannon presents an overview of Cisco E-mail ESA Listener.
-
Cisco ESA Incoming and Outgoing Mail Policies Overview
In this video; Michael Shannon provides an overview of the ESA Incoming and Outgoing Mail Policy configuration.
-
Cisco ESA LDAP Integration
In this video; Michael Shannon gives an overview of the Cisco Registered Envelope Service.
-
Cisco ESA Licensing
In this video; Michael Shannon explains Cisco ESA licensing requirements.
-
Cisco ESA Listener Overview
In this video; Michael Shannon explores Cisco Email Security Appliance Listener; and by definition; a listener on the ESA is an SMTP daemon.
-
Cisco ESA Mail Policies Matching
In this video; Michael Shannon explains how the ESA matches Mail Policies.
-
Cisco ESA Services Overview
In this video; Michael Shannon gives an overview of Cisco Email Security Appliance services.
-
Cisco Hybrid Email Security Solution
In this video; Michael Shannon explains the Cisco Hybrid Email Security Solution.
-
Cisco Discovery Protocol
After watching this video; you will be able to describe Cisco Discovery Protocol.
-
Cisco Discovery Protocol Configuration
After watching this video; you will be able to tune CDP configuration.
-
Cisco Hierarchical Network Model
After watching this video; you will be able to describe the three layers of the Cisco Hierarchical Network Model.
-
Cisco Enterprise Campus Architecture
In SWITCH 2.0; you can create a dialogue design pre-set by building Cisco enterprise campus architecture. In this video; Dan Young demonstrates how this architecture is made up of three layers and the features associated with each layer.
-
Cisco FlexLinks
In this video; Raymond Lacoste provides an overview and demonstration of Cisco FlexLinks in SWITCH 2.0.
-
Cisco EEM
The TSHOOT 2.0 certification covers the Cisco's Embedded Event Manager (EEM); which allows you to create custom events and take action correspondingly in response to events. In this video; Kevin Wallace discusses the EEM and provides examples on how to use it.
-
Cisco Clientless SSL VPN
After watching this video; you will be able to describe Cisco clientless SSL VPNs operation and contrast them with client-based remote access VPNs.
-
Cisco ESA GUI Management
In this video; Michael Shannon gives an overview of ESA Graphical User Interface Management.
-
Cisco Email Security Solutions and Basic Setup Components
Cisco Email Security Appliance (ESA) protects the email infrastructure and employees who use email at work by filtering unsolicited and malicious email before it reaches the user. It provides high-availability email protection against the constant, dynamic, and rapidly changing threats affecting email today. This course is one in a series in the Skillsoft learning path that covers the objectives of the Implementing Cisco Threat Control Solutions (SITCS) 1.5 exam, 300-210.
- start the course
- define Cisco Hybrid Email Security Solution
- recognize SMTP Terminologies, Flow, and Conversation
- describe Cisco ESA services and GUI management
- define incoming and outgoing mail processing
- describe Cisco ESA LDAP integration and Cisco Registered Envelope Service (CRES)
- describe Cisco ESA Listener
- specify Cisco ESA deployment examples
- configure Cisco ESA Listener major components: HAT and RAT
- describe Cisco ESA One Listener Deployment Scenarios
- configure a One Listener Deployment Scenario: HAT > Sender Group and Sender Group SBRS
- configure a One Listener Deployment Scenario: HAT > BLACKLIST and RELAYLIST Sender Groups
- configure a One Listener Deployment Scenario: HAT > Add Sender Group
- configure a One Listener Deployment Scenario: HAT > Mail Flow Policy
- configure a One Listener Deployment Scenario: HAT > Mail Flow Policy > Anti-Spam and Anti-Virus
- configure a One Listener Deployment Scenario: HAT > Mail Flow Policies Summary
- configure a One Listener Deployment Scenario: RAT
- configure a One Listener Deployment Scenario: SMTP Routes
- configure a One Listener Deployment Scenario: Email Relaying on Internal Mail Server
- define ESA security solutions and configuration