Home > Articles > Certification

Certification

622 Items

Sort by Date | Title

Implementing Cisco Unified Communications Manager: Digit Manipulation (CCNP Voice)
Oct 1, 2011
This chapter describes digit manipulation tools that allow a CUCM administrator to implement flexibility and transparency in the dial plan of a company.
CCNA SEC: Router Hardening
Sep 14, 2011
This article discusses various means of making sure your routers are set up with maximum security, including manually hardening the router and router hardening with Cisco SDM.
To Route or Not to Route: A Day in the Life of a Router
Aug 31, 2011
A lot goes into the decision process regarding routing, and it happens long before a packet arrives at the router for its turn to be forwarded. In this article, the author takes a close look at a day in the life of the router.
What Happens in the VLAN Stays in the VLAN
Aug 31, 2011
This article discusses discover the secrets of the VLAN and why it is a critical tool in today's networks.
Working with Protocol Analyzers and Related Certifications
Aug 30, 2011
Ed Tittel, creator of the Exam Cram series, discusses the current network protocol analyzers that any real expert needs to know. Who exactly counts as an "expert?" Ed also sorts out which of the many available certifications are really useful in identifying true masters of protocol analysis.
Implementing Cisco Unified Communications Manager, Part 2 (CCNP Voice): Examining Remote-Site Redundancy Options
Aug 25, 2011
This chapter provides an overview of the different options with remote-site redundancy in CUCM multisite installations.
CCNP Security VPN Cert Guide: Configuring Policies, Inheritance, and Attributes
Aug 24, 2011
This chapter looks at the methods available for policy assignment in real-life scenarios and reviews how these policy methods work together if more than one is assigned to a user through the inheritance mode.
Launching Windows 7 Control Panel Applets with Administrative Permissions
Aug 24, 2011
This article lists and discusses the commands used to launch many of the control panel applets and other tools in Windows 7.
Preparing for 70-668: PRO: Microsoft SharePoint 2010, Administrator
Aug 18, 2011
In this third article in Scott Jamison's SharePoint 2010 certification series, he provides an overview of the PRO administrator exam, otherwise known as 70-668.
Preparing for 70-667: TS: Microsoft SharePoint 2010, Configuring
Aug 17, 2011
This article provides an overview of the Microsoft SharePoint 2010 TS administrator exam, otherwise known as 70-667.
CCNP: Troubleshooting EIGRP
Aug 3, 2011
In this article, we will examine the art of Troubleshooting EIGRP, a key topic for CCNP certification. This article will begin by reviewing key information we should keep in mind about the protocol or its proper implementation and troubleshooting, and then specific scenarios will be illustrated. The article will also provide specific command guidance and usage.
Flexible Netflow Concepts and Configuration
Jul 22, 2011
This article takes a look at the typical uses for the Flexible Netflow feature, how it works and how it can be configured into a complete solution.
Cisco Network Infrastructure Security: Control Plane Policing Concepts and Configuration
Jul 21, 2011
This article takes a looks at control plane policing, examining what it is, how it works and how it can be configured to secure this equipment.
SNMP Concepts and Configuration
Jul 20, 2011
This article takes a look at some of the basic SNMP concepts, examining how it works and how it can be configured to perform basic functions.
Routing Protocol Authentication Concepts and Configuration
Jul 13, 2011
This article takes a look at the available routing protocol authentication options for the most often used routing protocols: EIGRP, OSPF, RIP and BGP.
Spanning Tree Protocol Concepts and Configuration
Jul 13, 2011
This article takes a look at some of the basic STP concepts and reviews the configuration required to deploy STP on a switch.
Securing the Management Plane of a Cisco Network Device
Jul 11, 2011
This article takes a look at a couple of the different features that can be used to secure the management plane of a Cisco network device (or devices) and reviews the basic configuration of these features.
Unicast Reverse Path Forwarding Concepts and Configuration
Jul 8, 2011
This article goes over the Unicast Reverse Path Forwarding (Unicast RPF) feature and how it can be configured to deal with an IP source address spoofing attack.
Exchange Server 2010 Portable Command Guide: Advanced Techniques
Jul 7, 2011
This chapter provides information and commands covering working with pipelines, running programs, creating and running scripts, registry modifications with PowerShell, and understanding quotes in Exchange Server 2010.
Basic NAT Concepts and Configuration
Jul 6, 2011
This article looks at some of the basic concepts that are used when configuring NAT and reviews the configuration steps required to get NAT working.

<< < Prev Page 6 7 8 9 10 Next >