Naša akadémia, ktorá má už 20 ročnú históriu, bola založená pri Katedre informačných sietí FRI ŽU ako Lokálna Cisco Sieťová Akadémia. Neskôr sa stala Regionálnou Cisco Sieťovou Akadémiou (ID: 52143) v rámci programu Cisco Networking Academy Program (NetAcad). V súčasnej dobe je na pozícií Cisco Sieťovej Akadémie (Cisco Networking Academy) a jedného z troch Inštruktorských tréningových centier (Instructor Training Center - ITC).
Akadémia je prevádzkovaná na katedre informačných sietí FRI (sedem inštruktorov) a na katedre multimédií a informačno-komunikačných technológií (KMIKT) FEIT (dvaja inštruktori).
Si študent, doktorand alebo učiteľ?Nezáleži či si študent, doktorand alebo učiteľ našej fakulty/univerzity alebo si z inej školy. Ponúkame Ti možnosť zapojiť sa do programu NetAcad a zvýšiť svoj potenciál po škole! |
Si učiteľ - inštruktor?Ak si učiteľ-inštruktror ľubovoľnej NetAcad akadémie ponúkame Ti možnosť zvýšiť si svoje vedomosti absolvovaním kurzov NetAcad alebo rekondičné stretnutia! |
Si zamestnaný alebo nezamestnaný?Zamestnancom komerčných spoločností ponúkame možnosť zvýšiť vzdelanie, rekvalifikáciu, prípraviť sa na priemyselné certifikácie alebo ponúkame prípravu školení z oblasti IP sietí na požiadanie! Nezamestnaným ponúkame možnosť doplnenia vzdelania a zvýšiť tak šancu zamestnať sa! |
Odkaz na stránku |
Configuring IP Session Filtering (Reflexive Access Lists) The article shows how to configure reflexice ACL in IOS 15.1 |
||
Configuring IP Access Lists Document ID: 23602 This document describes how IP access control lists (ACLs) can filter network traffic. It also contains brief descriptions of the IP ACL types, feature availability, and an example of use in a network. |
||
Cisco Router and Security Device Manager 2.5 User Guide Technical documentation |
||
Cisco Router and Security Device Manage This data sheet provides an overview of features, benefits, and product availability of the Cisco® Router and Security Device Manager (SDM). |
||
Identifying Incidents Using Firewall and Cisco IOS Router Syslog Events Syslog messages from transit network devices can provide insight into and context for security events that may not be available from other sources. |
||
Cisco Guide to Harden Cisco IOS Devices Document ID: 13608 This document contains information to help you secure your Cisco IOS® system devices, which increases the overall security of your network. Structured around the three planes into which functions of a network device can be categ |
||
Understanding debug ppp negotiation Output Document ID: 25440 In dial-related applications, PPP is the most commonly used encapsulation type. PPP allows two machines on a point-to-point communication link to negotiate various parameters for authentication, compression, and the Layer 3 (L3) |
||
Troubleshooting PPP (CHAP or PAP) Authentication Document ID: 25646 Point-to-Point Protocol (PPP) authentication issues are one of the most common causes for dialup link failures. This document provides some troubleshooting procedures for PPP authentication issues. |
||
Understanding and Configuring PPP CHAP Authentication Document ID: 25647 The Challenge Handshake Authentication Protocol (CHAP) (defined in RFC 1994 leavingcisco.com) verifies the identity of the peer by means of a three-way handshake. These are the general steps performed in CHAP |
||
Configuring and Troubleshooting PPP Password Authentication Protocol (PAP) Document ID: 10313 Point-to-Point Protocol (PPP) currently supports two authentication protocols: Password Authentication Protocol (PAP) and Challenge Handshake Authentication Protocol (CHAP). |
||
Configuring DHCP This tittle describes how to configure Dynamic Host Configuration Protocol (DHCP). |
||
How NAT Works If you are reading this, you are most likely connected to the Internet and there's a very good chance that you are using Network Address Translation (NAT) right now! |
||
Introduction to NAT | ||
Configuring Network Address Translation: Getting Started This document explains configuring Network Address Translation (NAT) on a Cisco router for use in common network scenarios. The target audience of this document is first time NAT users. |
||
NAT: Local and Global Definitions This document defines and clarifies the Network Address Translation (NAT) terms of inside local, inside global, outside local, and outside global. Refer to the Network Address Translation White Paper for further information on network services offere |
||
NAT Order of Operation This document illustrates that the order in which transactions are processed using Network Address Translation (NAT) is based on whether a packet is going from the inside network to the outside network, or from the outside network to the inside netwo |