Monthly Archives: January 2023
24. Threat Defense & Endpoint Security In five five A we have threat difference and five B we have endpoint security. So what I’m going to do that in upcoming four sessions you’ll find that we’ll go and learn about that. How you can do the hacking means how we can get some more privilege […]
20. Wireless Authentication Methods Let us learn about wireless authentication method. Now, we know that WEP was started and most of the hardware at that point of time was supporting WEP based authentication methodology. But we know that what’s the problem with WEP, it does not have powerful encryption method. It is using RC four […]
16. API Security Now we know about the API and how we can use it. Let’s discuss about the security concern related to API. What is the problem with the API? So here you can see that you have It infrastructure inside that you may have application recognition engine, that is NBA may have you […]
12. Control Plane Policy Lab I’m going to show you. That how we can go and do the configuration for the Cop. Let me log into one of the router. Alright, so what we can do at this point of time is that let me show you the configuration for this. So I can go […]
9. Standard Access Control List Let us perform the lab tasks with the ACL. What we want to do here is that we have this lab setter first of all and you can see the IP addresses like that. We have done the configuration over these interfaces. These IP addresses are there, all the devices […]
5. ISE Switch Configuration In this section I will show you that how you can configure this switch for your AAA and what are the configuration required over the interfaces. So you can see here I have interface gig zero one that is connected with two domain. One is the voice domain one is the […]
1. Section 05 Lines & Password Let us start section number five. Section number five we have security and weightage is 20%. What topics we have we’ll start with the access control, the lines and password protection. The AAA configuration, ACL cop some of the rest API security heap with PSK. Now here you can […]
18. DNA Workflow & Assurance In four six we have to learn about DNA Center workflow. Mostly it is focused on that how we are going to use a DNA Center assurance feature to provide troubleshooting, to provide actually fast troubleshooting. Do we have full visibility, can we do the monitoring, management, et cetera? One […]
15. Capture the Packet over Data Plan SPAN RSPAN ERSPAN Next important topic we have that capture the packet at the label of data plane. For that we are using the popular technique that is switch port analyzer. This is nothing but a technique that we can mirror the port or we can send one […]
12. Understand Netflow Next important topic, we have NetFlow and flexible NetFlow. Now as the It evolve and as we need to analyze more and more data with respect to security analysis, with respect to troubleshooting, with respect to network analysis, we need to learn and understand the flow or the record. So for that […]