17. 14.16 Forensic Concepts As we are securing our network. It’s great to have devices like a firewall and intrusion prevention system, sensor use, strong hashing and encryption algorithms. But something that often gets overlooked or we don’t give it enough attention is physical security. We want to make sure that somebody doesn’t go in […]
14. 14.13 Authentication Servers In this video, we want to talk about some different types of authentication servers. First up, let’s consider AAA server. And we’re going to have a couple of categories of AAA servers. And the A’s here stand for authentication asking who are you? Authorization asking what are you allowed to do? […]
12. 14.11 Wireless Security Options In this video, we want to consider some wireless security options. And the big goal that we have is we want to protect the information flowing through radio waves from any potential eavesdroppers or have anybody get access to the network that should not have access to the network. Let’s […]
9. 14.8 Common Defense Strategies What are some best practices to help protect our network against attacks? That’s what we’re going to discuss in this video. As a first best practice, let’s change default credentials on our equipment. If you have a wireless access point with a username of admin and a password of admin, […]
6. 14.5 VLAN Hopping Attacks In this video, we want to consider how an attacker can launch a VLAN hopping attack. And we’ll take a look at a couple of examples of how they might do that. And a VLAN hopping attack is where an attacker in one VLAN is accessing their victim in another […]
3. 14.2 Vulnerabilities and Exploits In this video we want to contrast a couple of terms an exploit and a vulnerability. First consider a vulnerability. A vulnerability is some sort of a weakness or a flaw within a system that is supposed to be secured. An example might be having a weak password to get […]
1. 14.0 Securing a Network One of the most critical pieces of a network design involves how you’re going to protect your network from attacks. And in this module, we’re going to be considering many different types of attacks that we want to protect ourselves from. And we’re going to arm ourselves with a ton […]
6. 12.5 QoS Markings In this video, let’s consider how we can mark our traffic so that the next router or the next switch can look at that marking and make a decision based on that marking using some sort of a quality of service mechanism. And we have markings both at layer two and […]
4. 12.3 Unified Communications Networks In this video, we want to consider some of the components we might find in a unified communications network. And that’s a term that Cisco coined. And the implication is we can have not just voice over our network, not just voiceover IP in other words, but we could have […]
1. 12.0 Streaming Voice and Video with united communications Not only do our networks do a great job of getting data from point A to point B on the network, but these super fast, super reliable networks also do a great job of carrying voice and video. And that’s going to be the focus of […]