1. SEQ6 Sub 01 Security Configuration
2. SEQ6 Sub 02 Mac Adress Table Attack
3. SEQ6 Sub 03 LAN Attacks
4. SEQ6 Sub 04 Implement Port Security
5. SEQ6 Sub 05 Mitigate DHCP Attacks
6. SEQ6 Sub 06 Mitigate Stp Attacks
7. SEQ6 Sub 07 Mitigate Stp Attacks
8. SEQ6 Sub 08 Mitigate STP Attacks
9. SEQ6 Sub 09 Wlan Configuration
10. SEQ6 Sub 10 Remote Site WLAN Configuration
11. SEQ6 Sub 11 Configura a Basic WLAN on the wlc
12. SEQ6_Sub_12 Configuration a WPA2 Enterprise WLAN on the wlc
13. SEQ6 Sub 13 Troubleshoot WLAN Issues
14. SEQ6 Sub 14 Network Design
15. SEQ6 Sub 15 Scalable Networks
16. SEQ6 Sub 16 Switch Hardware
17. SEQ6 Sub 17 Router Hardware
18. SEQ6 Sub 18 WLAN concepts
19. SEQ6 Sub 19 WLAN components
20. SEQ6 Sub 20 Secure WLANs
21. SEQ6 Sub 21 WLAN Encryption
22. SEQ6 Sub 22 ACL Concepts
23. SEQ6 Sub 23 Purpose of ACLs
24. SEQ6 Sub 24 Wildcard Masks in ACLs
25. SEQ6 Sub 25 Types of ipv4 acls
26. SEQ6 Sub 26 Configure standard ipv4 acls
27. SEQ6 Sub 27 Modify ipv4 acls
28. SEQ6 Sub 28 Secure VTY Ports...ndard ipv4 ACL
29. SEQ6 Sub 29 ipv6 ACLs
30. SEQ6 Sub 30 VPN and IPsec concepts
31. SEQ6 Sub 31 IPsec
32. SEQ6 Sub 32 Network programming
33. SEQ6 Sub 33 Cloud Computing
34. SEQ6 Sub 34 Virtualization
35. SEQ6 Sub 35 Virtual Network Infrastructure
36. SEQ6 Sub 36 Software-Defined Networking
37. SEQ6 Sub 37 CONTROLLERS
38. SEQ6 Sub 38 ACI
39. SEQ6 Sub 39 Network Automation
40. SEQ6 Sub 40 Data Formats
41. SEQ6 Sub 41 APIs
42. SEQ6 Sub 42 1BN and Cisco DNA Center
Student feedback
4.9
Course rating
Reviews
Srinivasan Manohar
Matthew
Maher Haddad
James