Cybersecurity

Wireless network security

This lesson constitutes Part 3 of 4 of the wireless networking series of lessons for the CCNA. This lesson focuses on wireless network security and explores various methods for securing a wireless network. Part 1, Wireless fundamentals for the CCNA, covered how a single access point (AP) can provide a basic service set (BSS) for […]

Wireless network security Read More »

Securing-Wireless-Networks

DAI configuration and verification

We continue our studies of the topics in the Security Fundamentals section of the CCNA exam blueprint. This lesson covers dynamic ARP inspection configuration and verification on Cisco switches. Dynamic ARP Inspection (DAI) is covered in exam topic 5.7, which says you must be able to “Configure Layer 2 security features (DHCP snooping, dynamic ARP

DAI configuration and verification Read More »

dynamic-ARP-inspection

DHCP snooping configuration and verification

We continue our studies of the topics in the Security Fundamentals section of the CCNA exam blueprint. This lesson covers DHCP snooping configuration and verification on Cisco devices. DHCP snooping is covered in exam topic 5.7, which says you must be able to “Configure Layer 2 security features (DHCP snooping, dynamic ARP inspection, and port

DHCP snooping configuration and verification Read More »

DHCP-Snooping-ccna

Switch port security configuration and verification

In this lesson we continue our studies of the topics in the Security Fundamentals section of the CCNA exam blueprint. This lesson covers switch port security configuration and verification. Port security is a security feature of Cisco switches that allows you to control what source MAC addresses are allowed to enter a switchport. Port security

Switch port security configuration and verification Read More »

switch-port-security-ccna

CCNA security fundamentals

These CCNA study notes cover a big chunk of the topics listed in Section 5 Security Fundamentals of the CCNA exam blueprint – specifically, subsections 5.1 Define key security concepts (threats, vulnerabilities, exploits, and mitigation techniques), 5.2 Describe security program elements (user awareness, training, and physical access control), 5.4 Describe security password policies elements, such

CCNA security fundamentals Read More »

MITM-attack

Cisco IOS CLI and device security

This is an introduction to the Cisco IOS CLI and basic device security configuration. This post constitutes Issue 1 of my CCNA 200-301 study notes. You may also be interested in CCNA 200-301 study notes. What is a CLI? Let’s get started with configuring some Cisco devices. This lesson is about the Cisco IOS CLI.

Cisco IOS CLI and device security Read More »

Cisco-IOS-CLI

How data flow through the Internet

This post presents the module How data flow through the Internet, part of a planned course on Networking Fundamentals. When you complete this module, you will understand how data flow through the Internet. After completing the seven lessons of this module, you will be able to apply everything you learned to explain what happens when

How data flow through the Internet Read More »

how-data-flow-through-internet-1200x888px

The Open Systems Interconnection (OSI) Model

This post discusses the Open Systems Interconnection (OSI) Model. It constitutes Lesson 2 of the module How data flow through the Internet. Key concepts discussed in this post include the OSI model Physical layer, Data Link layer, Network layer, Transport layer, Session layer, Presentation layer, Application layer, and data encapsulation/de-encapsulation. You may also be interested

The Open Systems Interconnection (OSI) Model Read More »

Open-Systems-Interconnection-osi-1200x675px

Compliance frameworks and industry standards

This post covers the background needed to understand the key cybersecurity compliance frameworks and industry standards recommended or required for organizations to implement to protect critical data – important knowledge no matter what cybersecurity role you have within an organization. Cybersecurity compliance frameworks and industry standards discussed include NIST, GDPR, ISO, SOC, HIPAA, and PCI. This post

Compliance frameworks and industry standards Read More »

Cybersecurity-Compliance-Frameworks-Industry-Standards-1200x800px
Text copying is disabled!