- Switching 1: Checking The Fundamentals
- Switching 2: Port Security Fundamentals
- Switching 3: Port Security Static Addressing Lab
- Switching 4: Port Security With Multiple Secure Addresses
- Switching 5: The Errdisable Recovery Feature (... or IS it?)
- Switching 6: Speaking Of Trunking
- Switching 7: More Trunking!
- Switching 8: Etherchannel Fundamentals
- Switching 9: Things That Don't Play Well With Etherchannels
- Switching 10: Etherchannel Negotiation Protocols
- Adv 1: Section Intro
- Adv 2: Portfast
- Adv 3: Uplinkfast
- Adv 4: Backbonefast
- Adv 5: Root Guard
- Adv 6: BPDU Guard
- Adv 7: BPDU Filter and Root Guard
- Adv 8: UDLD
- Adv 9: RSTP Theory
- Adv 10: RSTP Synch & Compatibility
- Adv. 11: CSP MST PVST
- Adv 12: SDM Intro
- Adv 13: SDM Lecture
- OSPF 1: The Fundamentals
- OSPF 2: Fun With Hello And Dead Timers
- OSPF 3: Network Masking and Point-To-Point Links
- OSPF 4: NBMA Configuration And Troubleshooting
- OSPF 5: Virtual Links - Yea Or Nay?
- OSPF 6: Virtual Links -- Building And Troubleshooting
- OSPF 7: Authentication Labs Begin
- OSPF 8: Password Authentication Mismatch Debugging And T-Shooting
- OSPF 9: Spotting And Fixing Authentication Type Mismatches
- OSPF 10: Area Authentication And Interface-Level Authentication
- OSPF 11: Virtual Links and Authentication
- OSPF 12: Passive and Non-Passive Interfaces
- OSPF 13: The MTU
- OSPF 14: Stub Areas And RIDs
- EIGRP 1: The "network" and "frame map (?)" Commands
- EIGRP 2: Masks, Timers, and Flapping Links
- EIGRP 3: K-Values and Passive Interfaces
- EIGRP 4: More Passive Interfaces
- EIGRP 5: Load Balancing, Traceroutes, and Pings
- EIGRP 6: Splitting Your Horizons
- EIGRP 7: Creating Subinterfaces From Not-Quite-Scratch
- EIGRP 8: Conclusion of Subinterface Creation Lab
- Redistribution 1: To AutoRedistribute (Or Not)
- Redistribution 2: EIGRP > RIP
- Redistribution 3: Testing And T-Shooting With Pings And Traces
- Redistribution 4: RIP and EIGRP
- Redistribution 5: OSPF
- Redistribution 6: Fine-Tuning With Route Maps (Part 1)
- Redistribution 7: Fine-Tuning With Route Maps (Part 2)
- HSRP 1: The Fundamentals
- HSRP 2: Preemption And Testing
- HSRP 3: Interface Tracking Lab Begins
- HSRP 4: Interface Tracking Lab Concludes
- HSRP 5: Route Tracking Lab Begins
- HSRP 6: Route Tracking Lab Ends
- ACL 1: A Refresher
- ACL 2: Named ACLs And Placement
- ACL 3: Line Order, Placement, And...Notepad?
- ACL 4: NAT Lab Begins
- ACL 5: NAT Lab Concludes
- ACL 6: Time Range Time!
- ACL 7: More Time Ranges
- ACL 8: The Network Time Protocol
- ACL 9: NTP Authentication
- BGP 1: A Note For TSHOOT Students
- BGP 1A: Intro Remarks
- BGP 2: External BGP Peering
- BGP 3: iBGP Peering And Loopback Interfaces
- BGP 4: eBGP Peering And Loopback Interfaces
- BGP 5: Advertising Routes With The "Network" Command
- BGP 6: The Origin and Next-Hop Attributes
- BGP 7: BGP Best-Path Selection Process
- BGP 8: The Mystery Of The Next-Hop Address
- BGP 9: Mystery... SOLVED!
- BGP 10: The Multi-Exit Discrimator (MED)
- BGP 11: Local Preference: All Or Nothing At All
- BGP 12: Local Preference: Changing One, But Not All
- BGP 13: Carry That Weight (Attribute)
- BGP 14: More Weight
- BGP 15: Route Summarization and Advertisements
- BGP 16: Synch Rules and the Full Mesh
- BGP 17: The Why and How of Route Reflectors
- BGP 18: Prefix Lists, Part I
- BGP 19: Prefix Lists, Part II
- BGP 20: Success Tips
- VPN Intro For TSHOOT Students
- VPN 1: The Dreaded But Necessary Theory
- VPN 2: IKE Phase 1 In Action