SNMP

This video explains how SNMP (Simple Network Management Protocol) is used to monitor and manage network devices — allowing network administrators to collect information about routers, switches, and other devices (like status, performance data, interface statistics) from a central location. It describes different SNMP versions, how SNMP agents and managers work, and how to configure SNMP on network devices to enable monitoring and remote management. By the end of the lesson, you gain understanding of how SNMP helps maintain network health, detect problems early, and simplify administration.

SNMP (Part 2)

It focuses on SNMP (Simple Network Management Protocol). It walks through practical lab work (day‑40) to show how SNMP can be configured and used for network monitoring and management. The tutorial breaks down key steps: enabling SNMP on network devices, setting community strings, verifying SNMP communication, and demonstrating how SNMP helps network administrators monitor device status and performance. It’s a hands‑on demonstration aimed at giving viewers actionable skills for real‑world networking environments.

Syslog

It shows how to configure and use it in a lab setting. It walks you through enabling Syslog on network devices, setting up system logging (including timestamps and event severity levels), and verifying that devices send log messages correctly. The video emphasizes how Syslog helps network administrators monitor device events (like interface status changes or errors), record logs centrally, and improve network visibility and troubleshooting.

Syslog (Part 2)

This video covers Syslog and shows how to configure and use it in a lab setup. It explains how Syslog allows network devices to record—locally or send to a server—important events like interface status changes, system reboots, or errors. You learn how to enable logging on devices, configure where log messages are stored (console, buffer, external server), and control which events are recorded by setting severity levels. The video emphasizes why Syslog is important for monitoring, troubleshooting, and maintaining visibility over network events, and how it complements (but differs from) protocols like SNMP.

SSH

It shows how to enable SSH on network devices to allow secure, encrypted remote access instead of insecure protocols. The video walks through steps like generating cryptographic keys, configuring SSH settings, and connecting to devices using SSH, highlighting why SSH is important for secure management of routers and switches.

SSH (Part 2)

This video covers FTP (File Transfer Protocol) and TFTP (Trivial File Transfer Protocol). It explains how these protocols are used to transfer files across a network — for example, uploading or downloading configuration files or IOS images to network devices. The tutorial shows how to configure device settings to support FTP/TFTP transfers and discusses when to use FTP versus TFTP depending on use‑case (e.g. security, reliability, simplicity). The lesson highlights how mastering FTP/TFTP is important for network administration tasks such as backup, restoration, and device configuration management.

FTP & TFTP

This video covers how to use FTP and TFTP for transferring files in a network environment. It demonstrates how to configure devices so they can send and receive files — such as configuration files or system images — using FTP/TFTP. The video emphasizes when to use FTP (versatile, more features) vs. TFTP (lightweight, simpler), and why knowing these protocols is useful for tasks like device backup, restoration, or firmware upgrades. In short: mastering FTP and TFTP helps network administrators manage network devices more efficiently and reliably.

FTP & TFTP (Part 2)

This video shows you how to use FTP (File Transfer Protocol) and TFTP (Trivial File Transfer Protocol) for transferring files in a network context. You learn how to configure network devices so they can send and receive files, such as configuration backups or system images, using FTP or TFTP. The video explains the difference between FTP and TFTP — in terms of complexity, features, and use‑cases — and why knowing when to use each protocol matters. Ultimately, the lesson underlines how mastering FTP and TFTP is valuable for common network administration tasks like device backup, restoration, and firmware or configuration management.

NAT (Part 1)

This video covers the basics of Network Address Translation (NAT). It explains what NAT is, why it’s used (for example, allowing multiple devices on a private network to share a single public IP address), and how to configure NAT on network devices. The lesson walks through “static NAT” setup in the lab — mapping a private IP to a public IP so external users can reach internal resources — which is especially important for services hosted inside a private network. Overall, the video shows how understanding NAT helps manage IP addressing and security in real‑world networks.

Static NAT

The video — part of the Jeremy’s IT Lab CCNA 200‑301 series — walks through a hands‑on lab for configuring Static NAT (Network Address Translation) on a router. It explains how NAT allows private internal IP addresses to be mapped to public IP addresses so internal devices can be accessed from outside networks. The video demonstrates the commands for setting up inside and outside interfaces, creating static one‑to‑one IP mappings, and verifying NAT translation tables — reinforcing why understanding static NAT is essential for real‑world network configuration.

NAT (part 2)

This video covers advanced Network Address Translation (NAT), specifically dynamic NAT and Port Address Translation (PAT). It explains how dynamic NAT maps internal “private” IP addresses to a pool of public IP addresses on a first‑come, first‑served basis and discusses potential issues like NAT pool exhaustion. The video then shows how to configure both dynamic NAT and PAT on routers (pool‑based and interface‑based), and how PAT enables many inside devices to share a single public IP by translating unique source ports. Overall, it demonstrates how dynamic NAT and PAT are used to provide scalable, flexible Internet access for private networks and why they are essential for real‑world network deployment.

Dynamic NAT

This video is a hands‑on lab demonstrating how to configure dynamic NAT and PAT (Port Address Translation) on a router. It guides you through setting up NAT pools for dynamic translation, configuring interface‑based PAT so multiple private IP addresses can share a single public IP with different source ports, and verifying NAT translations in real time. This helps you understand how dynamic NAT/PAT is used to allow many internal devices to access the Internet via a single public IP — a common real‑world network setup. The video reinforces why NAT is vital for IP address management and proper connectivity for internal networks connecting to the public network.

QoS (Part 1)

This video expands on Network Address Translation (NAT) by diving into dynamic NAT and Port Address Translation (PAT). It shows how dynamic NAT uses a pool of public IPs to map private IPs as needed, and how PAT allows multiple private devices to share a single public IP by translating different source ports. The lab demonstrates step‑by‑step configuration commands, explains common challenges (like pool exhaustion), and shows how dynamic NAT/PAT supports real‑world network setups where many internal users need Internet access.

Voice VLANs

This video shows how to configure a voice VLAN on a network switch for environments using IP phones. It walks through the steps to create a separate VLAN for voice traffic (used by phones) and a different VLAN for data traffic (used by PCs), then assign a switch port so an IP phone and a computer plugged into that phone can share one physical port. By using a command such as switchport voice vlan <ID>, the switch ensures that voice traffic gets isolated and managed separately from regular data — which improves call quality, security, and network organization. The lab demonstrates how voice VLANs enable proper segmentation of voice and data, which is especially useful in VoIP deployments and is a key skill in network configuration and for the exam.

QoS (Part 2)

This video delves deeper into Quality of Service (QoS) concepts and explains how networks manage and prioritize traffic to ensure performance for critical services (like voice or video). It covers how to classify and mark traffic (using fields like PCP/CoS for VLAN‑tagged frames, or DSCP/ToS in IP headers), and then how traffic scheduling, queuing, and congestion‑management mechanisms work (such as multiple‑queue scheduling, fair‑queuing, low‑latency queuing). The video also contrasts two key traffic‑rate control techniques — shaping (smoothes out traffic by buffering) vs. policing (drops excess packets) — and explains when each is useful.

QoS

This lab video shows how to configure Quality of Service (QoS) on a Cisco router — turning theory into practice. It walks you through setting up QoS policies: creating class maps to classify traffic, defining policy maps to apply QoS treatment, and then applying “service‑policy” on interfaces. You also learn how to check and verify traffic markings (like DSCP values) to confirm QoS is working. This is important because QoS ensures that important traffic (like voice or video) gets prioritized over less critical traffic — helping maintain performance and reliability on real networks.

Security Fundamentals

This video introduces the core security principles that every network professional needs to know under CCNA 200-301. It explains the foundational security framework — the CIA Triad (Confidentiality, Integrity, Availability) — and explores common threats and vulnerabilities (like DoS, spoofing, man‑in‑the‑middle attacks, malware, and social engineering), helping you understand what dangers networks face. The lesson also covers how to defend against those threats using secure authentication (strong passwords, Multi‑Factor Authentication), and the AAA (Authentication, Authorization, Accounting) model for controlling and monitoring access. 

Kali Linux Demo

This lab video demonstrates a practical security scenario using Kali Linux to perform a DHCP exhaustion (starvation) attack — simulating a network threat against DHCP services. The demo shows how an attacker can flood a network’s DHCP server with bogus requests (using a tool with Kali) so that real clients cannot obtain valid IP addresses. Then it illustrates what happens when a legitimate device tries to connect after the attack — failing to receive an IP — and how clearing DHCP bindings may temporarily restore service. The video reinforces the importance of understanding network threats and vulnerabilities: even basic services like DHCP can be exploited, underlining why security awareness and protective measures are essential in real‑world networking.

Port Security

This video shows how to implement Port Security on a switch to control which physical devices are allowed to connect to each port — by limiting allowed MAC addresses per port. It walks through configuration commands (e.g. enabling port‑security on a port, setting the maximum number of MAC addresses, optionally using “sticky” MAC learning) and explains the possible violation modes (shutdown, restrict, protect) that determine what happens if an unauthorized MAC tries to use the port. The lab also covers how to verify port‑security status with show commands, how to recover a port from error-disabled state, and why port security is important for preventing unauthorized access or attacks (like rogue devices or MAC flooding).

Port Security (Part 2)

This video gives a practical demonstration of how to configure and use port security on a switch port in a network. It shows how to enable port security — defining which MAC address(es) are allowed, setting the maximum number of allowed MAC addresses, and optionally using “sticky” MAC address learning so that dynamically learned addresses become persistent. It also walks through the different violation modes (shutdown, restrict, protect), and shows what happens when an unauthorized device connects (e.g., port disabled or packets dropped). Finally, you learn how to verify port‑security status with “show” commands and how to recover a port if it becomes error‑disabled, reinforcing how port security helps protect a network from unauthorized access or MAC‑flooding attacks.

DHCP Snooping

The video covers DHCP Snooping, a security feature on switches that helps prevent malicious or malformed DHCP messages from compromising the network. It explains how enabling DHCP snooping can protect against attacks such as rogue DHCP servers distributing bad IP configurations, by permitting DHCP offers only from trusted ports. The lab shows how to configure DHCP snooping on a switch, mark trusted/untrusted interfaces, and verify that unauthorized DHCP responses are blocked — illustrating how this simple measure adds a crucial layer of security for enterprise LANs.

DHCP Snooping (Part 2)

This video demonstrates how to configure DHCP Snooping on a switch to enhance network security. It explains how DHCP Snooping works by allowing only DHCP messages from trusted ports — blocking rogue DHCP servers or malicious DHCP responses on untrusted ports. The lab covers enabling DHCP Snooping globally and per‑VLAN, designating trusted/untrusted ports, building the DHCP binding table, enabling rate‑limiting to prevent DHCP‑starvation attacks, and verifying the configuration. Overall, it shows how DHCP Snooping protects against DHCP starvation or poisoning attacks and why it’s a key security mechanism for real‑world LANs.

Dynamic ARP Inspection

This video explains Dynamic ARP Inspection (DAI) — a security feature on network switches that helps prevent ARP‑based attacks like ARP spoofing or ARP poisoning. It shows how DAI works: the switch checks incoming ARP requests/replies on untrusted ports against a trusted database (often built via DHCP Snooping) and rejects any ARP message whose sender IP/MAC pair doesn’t match — preventing malicious devices from impersonating others. The lab in the video walks through the commands to enable DAI, specify trusted vs. untrusted ports, and verify the inspection status. The lesson underscores how DAI adds a valuable layer of protection at Layer 2, helping maintain correct mapping between IP and MAC addresses and protecting network integrity.