Network devices creating wireless LANs by connecting wireless clients to wired infrastructure
Foundational network security principles including CIA triad, authentication methods, and security devices
Cisco wireless deployment models including autonomous, controller-based, and cloud architectures
Layer 5 managing communication sessions, dialog control, and session recovery between applications
Dedicated VLANs for VoIP traffic with QoS prioritization and separation from data traffic
Layer-by-layer approach to diagnosing complete loss of network connectivity
Trusted third-party authentication protocol using symmetric key cryptography and tickets for secure network authentication
Forward and reverse proxy servers acting as intermediaries between clients and servers
Understanding software dependencies, dependency resolution, and troubleshooting broken or missing dependencies
Network Attached Storage providing file-level storage access to heterogeneous network clients over standard protocols