Tips & Tricks
Your Valuable Source of In-depth Technical Information
You probably noticed that the IT (being high on the list of nice-to–be-in industries) attracts more and more youngsters who believe career development is all about reading white papers. This attitude inevitably leads them to achieve only "talking–head" level of technical expertise. Ironically, they're usually the ones who provide tons of new white papers in the years to come...
Our industry needs more meat on the bones – useful advice from senior experts who started their careers in 80' or 90' and managed to keep the pace with technology (r)evolution until today. The ones who learned the hard way what an IT manager and his team is facing on a daily basis. Those who know that the technical excellence itself is useless if it doesn't contribute to the company bottom-line and make your life easier.
What do the Meltdown and Spectre vulnerabilities mean for IT environments?
Who is affected by the Meltdown and Spectre vulnerabilities and how can you protect your IT environm... more
How to defend against DDoS attacks?
DDoS attacks are relatively inexpensive and easy to execute, so every organization is a potential ta... more
Critical WPA2 vulnerability: you must update your devices and Wi-Fi infrastructure
Hackers can exploit the KRACK attack to intercept encrypted wireless traffic and thereby steal your... more
So You Want To Become A Cloud Provider?
What’s not to love about the pay-as-you-go model of cloud computing? Your service price is distribut... more
7 tips to boost your Wi-Fi network
Learn how to set up a reliable, secure, and fast wireless network in your organization that won'... more
Call Home Service
Call Home is an e-mail-based real-time alert mechanism on Cisco routers. It provides a range of mess... more
Benefits of Implementing NETCONF
Network Configuration Protocol (NETCONF) is a standardized network management protocol that provides... more
Using the IOS XR Routing Policy Language for BGP
In a modern, BGP enabled network, where a service provider can peer with dozens of other carriers, i... more
Wireless Clients - The Real Story
Understand the issues introduced by wireless clients in this CWNP webinar. Topics covered include client types and capabilities as well as sources you can use to locate detailed information about clients.
Introduction to Cisco Advanced Malware Protection (AMP)
Learn about the core Cisco Advanced Malware Protection (AMP) functionality and gain an overview of AMP's core features, including cloud-based file reputation lookups, dynamic analysis with Threat Grid, and retrospection.
Related training: Protecting Against Malware Threats with Cisco AMP for Endpoints (SSFAMP)
Cisco Web Security Appliance (WSA) Defense In Depth
In this video, Aniket Arondekar from Cisco walks you through how the various security layers in the Cisco Web Security Appliance protect customers across the entire attack continuum.
Related training: Securing the Web with Cisco Web Security Appliance (SWSA)
Fast Track to Wi-Fi Security
This webinar covers the basics of Wi-Fi security. You will learn about the deprecated security options as of 802.11-2012 and a new security solution yet to catch on, which was introduced in 802.11ad.
Related training: Enterprise Wi-Fi Security (CWSP)