IT Certification and Training Blog

TSHOOT - Stare and Compare

Aug 5, 2013 8:40:00 AM / by Kelson Lawrence posted in exam tips, TSHOOT, stare and compare

1 Comment

By Michael Aldridge

As I mentioned in my previous blog post, Cisco's 642-832 TSHOOT exam, part of the Cisco Certified Network Professional (CCNP) Routing and Switching track, is one of the most unique exams I have ever taken. Not only are there multiple choice and drag-and-drop questions, there are also trouble tickets that you will have to diagnose.

Read More

Troubleshooting Techniques

Jul 31, 2013 8:49:00 AM / by Kelson Lawrence posted in troubleshooting techniques, bottom up, top down, divide and conquer, OSI network model

0 Comments

By James Hanback

We live in a hurry-up world.

There's the person behind you in traffic who leans on the horn if your brake lights don't go dark during the nanosecond that the traffic light is transitioning from red to green. There's the one behind you in the self-checkout lane who does the heavy sigh and eye roll bit because you must take the time to dislodge your rewards card from your wallet so you can start scanning your groceries (you knew you should have installed that rewards card app on your smart phone). Oh, and then there's the person who blows past you at the speed of light on a single-lane stretch of highway only to find you puttering up behind them at the next clogged intersection. You no doubt chuckle quietly to yourself as you await the go signal on such an occasion because you know that you've covered the same amount of distance and arrived at a simultaneous point with the speed demon, but at a lower fuel cost.

Read More

Deciphering the Alphabet Soup of the 802.11 Standards

Jul 24, 2013 11:01:00 AM / by Kelson Lawrence posted in tips, 802.11 Standards, wireless networking, wireless standards

0 Comments

By James Hanback

Let's see. If you overlay the 802.11a standard with 802.11b standard and subtract the 5-gigahertz (GHz) band, you get an approximate 802.11g standard. Then add back the 5-GHz band, add four multiple-input and multiple-output (MIMO) streams to get the 802.11n standard. Subtract the 2.4-GHz band, multiply the available MIMO streams by 2, and you get the 802.11ac standard.

Read More

The TSHOOT Tree

Jul 18, 2013 11:50:00 AM / by Kelson Lawrence posted in TSHOOT Tree, TSHOOT trouble tickets

0 Comments

By Michael Aldridge

I've taken dozens of certification exams over the past 15 years, and I've created practice exams for most of them. But if I had to choose the one that was the most interesting to take and to create, I would have to choose Cisco's 642-832 TSHOOT exam, part of the Cisco Certified Network Professional (CCNP) Routing and Switching track.

Read More

What makes a solid-state drive faster?

Jul 8, 2013 2:30:00 PM / by Kelson Lawrence posted in Delana Hallstedt, solid-state drive, fast, immobility, SSD, SSDs

0 Comments

By Delana Hallstedt

What makes a solid-state drive faster?

Immobility.

Yep, it’s really as simple as that.

I don’t mean that in a portability sort of way; solid-state drives (SSDs) are quite portable! An SSD doesn’t move on the inside, and this lack of movement is what helps it perform so much faster than other storage devices. Having said that, it really wouldn’t be much of a blog post if I didn’t attempt to paint you some sort of similitude packed with a sampling of picturesque details that will assist you in a greater depth of understanding of just how this all works…right?

Read More

What Is Two-Factor Authentication and Why Do I Need It?

Jun 18, 2013 9:06:00 AM / by Kelson Lawrence posted in Two-Factor Authentication, password recovery techniques, social engineering

0 Comments

By James Hanback

Just when you thought it was safe to pull the curtains back from the windows and let the sun shine in on the bodies of all the defeated zombies of the weak password apocalypse, you find out that they're not really dead. You shored up your devices, your Internet accounts, and maybe even the combination on your locker at the gym with the strongest, most secure mixture of characters you could conceive. Nobody can guess them. Nobody can brute force crack them. You're gold, right?

Read More

What are the differences between an IPSec VPN and a GRE tunnel?

Jun 5, 2013 8:53:00 AM / by Kelson Lawrence posted in VPN vs GRE, differences between VPN and GRE

5 Comments

By Tim Charlton

IP Security (IPSec) Virtual Private Networks (VPNs) and Generic Routing Encapsulation (GRE) tunnels are both methods for transferring data across public, intermediary networks, such as the Internet. However, there are considerable differences between the two technologies. Let’s start with a brief overview.

Read More

MS Windows Tips and Tricks | 2.7.4 IE Security Features

May 16, 2013 12:54:00 PM / by Kelson Lawrence posted in Internet Explorer Security Features, InPrivate Browsing, Safety menu

0 Comments

By Val Bakh

2.7.4 Internet Explorer Security Features

The Internet has become an integral part of our lives. Nowadays, the Internet gives us access to e-mail, instant messaging, telephone, television, banking, shopping, research—you name it. It is so completely woven into nearly everything we do so that most of the time we don’t even think of it as something external, something that we need to connect to before we can make use of it. That is, of course, until something goes wrong. The Internet is not only a convenience; it is also a potential danger.

Read More

What’s an ARP?

May 9, 2013 8:21:00 AM / by Kelson Lawrence posted in Delana Hallstedt, ARP, What is ARP?, Address Resolution Protocol

0 Comments

By Delana Hallstedt

My initial plan for this blog post was to attempt to unravel the alphabet soup approach to all things technology related – Why so many acronyms?!? However, upon doing a little bit of research on the origins of acronyms (retronyms, neologism, and alphabetism oh my!), I quickly talked myself out of that and settled on one particular acronym.

Read More

A Cisco Administrator’s Guide to DHCP

May 1, 2013 1:28:00 PM / by Kelson Lawrence posted in DHCP Relay Agent, Guide to DHCP, DHCP, DHCP pool, DHCP leases

0 Comments

By Amy Haigh

As a network administrator, you will be responsible for ensuring that each host on your network is configured with the appropriate TCP/IP parameters to communicate with other hosts. To communicate on a network, either private or public, a host must be configured with — at minimum — an IP address, a subnet mask, and a default gateway. On a small private network with consistent hosts, you can manually configure these options on each host. But if you administer a large network, or even a small network where laptops and tablets continuously connect and disconnect, you will find implementing Dynamic Host Configuration Protocol (DHCP) to be a lifesaver.

Read More

Subscribe to Email Updates

Lists by Topic

see all

Posts by Topic

see all

Recent Posts