17 OCT 2024 - Welcome Back to TorrentFunk! Get your pirate hat back out. Streaming is dying and torrents are the new trend. Account Registration works again and so do Torrent Uploads. We invite you all to start uploading torrents again!
TORRENT DETAILS
CBT Nuggets - Cisco Certification Training 200-301 Cisco CCNA
14-Wireshark Fundamentals Capturing, Viewing, and Filtering Data/7. Practical Wireshark DNS.ts
32.7 MB
14-Wireshark Fundamentals Capturing, Viewing, and Filtering Data/8. Practical Wireshark Telnet.ts
23 MB
14-Wireshark Fundamentals Capturing, Viewing, and Filtering Data/9. Reviewing Wireshark Fundamentals.ts
22.7 MB
15-Describe and Analyze TCP and UDP Communication/1. Introduction to Describe and Analyze TCP and UDP Communication.ts
4.1 MB
15-Describe and Analyze TCP and UDP Communication/2. How TCP Starts a Session.ts
70.9 MB
15-Describe and Analyze TCP and UDP Communication/3. How TCP Sends Data (TCP Windowing).ts
42.2 MB
15-Describe and Analyze TCP and UDP Communication/4. How TCP Ends a Session.ts
40.1 MB
15-Describe and Analyze TCP and UDP Communication/5. How UDP Communicates.ts
48.2 MB
15-Describe and Analyze TCP and UDP Communication/6. Review of Describe and Analyze TCP and UDP Communication.ts
22.7 MB
16-Configure Windows, MAC, or Linux for Network Access/1. Introduction to Configure Windows, MAC, or Linux for Network Access.ts
5.8 MB
16-Configure Windows, MAC, or Linux for Network Access/2. Configuring and Testing Windows Network Access.ts
45.9 MB
16-Configure Windows, MAC, or Linux for Network Access/3. Configuring and Testing MacOS Network Access.ts
29.6 MB
16-Configure Windows, MAC, or Linux for Network Access/4. Configuring and Testing Ubuntu Linux Network Access.ts
66.8 MB
16-Configure Windows, MAC, or Linux for Network Access/5. Review of Configure Windows, MAC, or Linux for Network Access.ts
9.9 MB
17-Describe Network Switch Functions and How to Locate Network Devices/2. Connecting Devices to a Switch.ts
31.7 MB
17-Describe Network Switch Functions and How to Locate Network Devices/3. Switches Learning MAC Addresses.ts
54.8 MB
17-Describe Network Switch Functions and How to Locate Network Devices/4. Viewing and Filtering MAC Address Tables.ts
37.1 MB
17-Describe Network Switch Functions and How to Locate Network Devices/5. Locating Devices on a Network Switch.ts
78.9 MB
17-Describe Network Switch Functions and How to Locate Network Devices/6. Locating Devices Lab.ts
35.4 MB
17-Describe Network Switch Functions and How to Locate Network Devices/7. Review of Describe Network Switch Functions and How to Locate Network Devices.ts
13.3 MB
18-Diagnose Interface Status, Errors, and Cabling Issues on a Cisco Switch/2. Common Copper and Fiber Physical Issues.ts
55.2 MB
18-Diagnose Interface Status, Errors, and Cabling Issues on a Cisco Switch/3. The Quick Way to See Interface Status.ts
30.3 MB
18-Diagnose Interface Status, Errors, and Cabling Issues on a Cisco Switch/4. Examining Speed and Duplex Mismatches.ts
40.6 MB
18-Diagnose Interface Status, Errors, and Cabling Issues on a Cisco Switch/5. Deep-Dive Into Interface Counters.ts
98.1 MB
19-Describe Power over Ethernet (PoE) Capabilities and Standards/1. Introduction to Describe Power over Ethernet (PoE) Capabilities and Standards.ts
5.1 MB
19-Describe Power over Ethernet (PoE) Capabilities and Standards/2. How Power over Ethernet (PoE) Works.ts
44.8 MB
19-Describe Power over Ethernet (PoE) Capabilities and Standards/3. Exploring PoE Standards.ts
42.7 MB
19-Describe Power over Ethernet (PoE) Capabilities and Standards/4. PoE in Action on a Cisco Switch.ts
26.9 MB
19-Describe Power over Ethernet (PoE) Capabilities and Standards/5. Review of Describe Power over Ethernet (PoE) Capabilities and Standards.ts
13.9 MB
2-Introduction to CCNA (200-301) with Keith/1. Introduction to CCNA (200-301) with Keith.ts
39.6 MB
20-Explain IP Addressing and Subnetting Concepts/1. Introduction to Explain IP Addressing and Subnetting Concepts.ts
4.7 MB
20-Explain IP Addressing and Subnetting Concepts/2. The Classes of Addresses from A to E.ts
58.8 MB
20-Explain IP Addressing and Subnetting Concepts/3. The Fundamentals of IP, Mask, and Gateway.ts
63.5 MB
20-Explain IP Addressing and Subnetting Concepts/4. Public and Private Address Ranges.ts
80.9 MB
20-Explain IP Addressing and Subnetting Concepts/5. Network Designs that Require Subnetting.ts
49.8 MB
20-Explain IP Addressing and Subnetting Concepts/6. Review of Explain IP Addressing and Subnetting Concepts.ts
13.8 MB
21-Convert Decimal to Binary and Back/1. Introduction to Converting from Decimal to Binary and Back.ts
3.4 MB
21-Convert Decimal to Binary and Back/2. Process of Binary Conversion.ts
45.5 MB
21-Convert Decimal to Binary and Back/3. Practicing Decimal to Binary.ts
35.9 MB
21-Convert Decimal to Binary and Back/4. Practicing Binary to Decimal.ts
18.3 MB
22-Perform Subnetting Based on Network Requirements/1. Introduction to Perform Subnetting Based on Network Requirements.ts
3.9 MB
22-Perform Subnetting Based on Network Requirements/2. Subnetting Class C Networks Based on Network Requirements.ts
89.7 MB
22-Perform Subnetting Based on Network Requirements/3. Subnetting Class B Networks Based on Network Requirements.ts
70.1 MB
22-Perform Subnetting Based on Network Requirements/4. Subnetting Class A Networks Based on Network Requirements.ts
45.9 MB
22-Perform Subnetting Based on Network Requirements/5. Troublesome Networks.ts
31 MB
22-Perform Subnetting Based on Network Requirements/6. Review of Perform Subnetting Based on Network Requirements.ts
58.2 MB
23-Perform Subnetting Based on Host Requirements/1. Introduction to Perform Subnetting Based on Host Requirements.ts
3.6 MB
23-Perform Subnetting Based on Host Requirements/2. Subnetting Class C Networks Based on Host Requirements.ts
35.7 MB
23-Perform Subnetting Based on Host Requirements/3. Subnetting Class B Networks Based on Host Requirements.ts
19.3 MB
23-Perform Subnetting Based on Host Requirements/4. Subnetting Class A Networks Based on Host Requirements.ts
37.6 MB
23-Perform Subnetting Based on Host Requirements/5. Troublesome Hosts.ts
30 MB
23-Perform Subnetting Based on Host Requirements/6. Additional Examples of Subnetting Based on Host Requirements.ts
52.2 MB
24-Reverse Engineering Subnets and Using VLSM/1. Introduction to Reverse Engineering Subnets and VLSM.ts
5 MB
24-Reverse Engineering Subnets and Using VLSM/2. Doing Subnetting Backwards.ts
32.1 MB
24-Reverse Engineering Subnets and Using VLSM/3. Practical Reverse Engineering Examples.ts
60 MB
24-Reverse Engineering Subnets and Using VLSM/4. What is VLSM.ts
66.8 MB
24-Reverse Engineering Subnets and Using VLSM/5. VLSM Scenario.ts