[bs_icon name=”glyphicon glyphicon-chevron-right”] Introduction To Network
Monthly Archives:: January 2016
[bs_icon name=”glyphicon glyphicon-chevron-right”] The Purpose and Properties of Routing
Common IPv4 and IPv6 Routing Protocols
Proper Use of Addressing Technologies
Identify the Following Address Formats
Traceroute – A command-line troubleshooting tool that enables you to view the route to a specified host. This will show how many hops the packets have to travel and how long it takes. In Windows operating systems, the command used is “tracert”.
Common Networking Protocols
Here are the steps for troubleshooting a network
One of the most ever-present and ancient uses of the Internet and networking has been to provide remote access to networks or network resources.
A key aspect to any war is to know your enemy. If you consider the battle against malicious users a war, then understanding the attacks that they use is crucial.
Incident response [bs_icon name=”glyphicon glyphicon-chevron-right”] Concept and procedures
SNMP: It (SNMP) is a mainstream convention for system administration. It is utilized for gathering data from, and designing, system gadgets, for example, servers, printers, centers, switches, and switches on an Internet Protocol (IP) system.
Data access controls are established to control how subjects can access data, what they can access with it, and what they can do with it once accessed. Three primary types of access control are discussed in this section. [bs_icon name=”glyphicon glyphicon-chevron-right”] Mandatory Access Control (MAC)
The two law systems that form the basis of legal systems in most countries are:
Kerberos is a network authentication protocol created by the Massachusetts Institute of Technology (MIT) that uses secret-key cryptography. Kerberos has three parts: a client, server, and trusted third party (KDC) to mediate between them.
[bs_icon name=”glyphicon glyphicon-chevron-right”] Types of Attacks Denial of Service (DoS) Smurf Fraggle SYN Flood Teardrop Distributed Denial of Service (DDoS) Ping Sweep Port Scan Salami attack Man-in-the-Middle Session or TCP Hijacking Replay Buffer Overflow Scareware and Ransomeware Password attack Covert channels [bs_icon name=”glyphicon glyphicon-chevron-right”] Web Attacks SQL Injection – An injection of SQL query through input… Read more »
Asymmetric Systems –Uses a pair of keys (private and public) for encryption and decryption
Identify Commonly Used TCP/UDP Ports
Follow @ASM_Educational Cisco CCNA-Extended access list In this Lab we will cover the concept of Extended ACL , make sure read another blogs about Standard ACL .
Follow @ASM_Educational Click here to read the presentation Cisco CCNA-Standard access list There are two kinds of ACL:
Follow @ASM_Educational seated at PC1 =10.10.10.1 I can not ping 22.214.171.124
Follow @ASM_Educational Wild cards are very important in OSPF
Follow @ASM_Educational In this lab we are trying to make our Cisco Router Act as a DHCP server , that is R1 will give ip address 10.10.10.0/24 to left side Pc and it will give the IP address 126.96.36.199/24 to right side of PC. The Goal is Prepare you for your Cisco CCNA Certification exam.
Authentication : The verification of a person’s identity – Helps protect against unauthorized access.
Optical disc drives use removable media to store and retrieve data, typically 5.25”.
No network connectivity?
Hard Disk Drives are nonvolatile (meaning they don’t lose data when power off) devices that store data, generally 3.5”. Types of HDD include:
RAID stands for Redundant Array of Inexpensive Disks. RAID 0 is striping, RAID 1 is mirroring , RAID 5 is striping with parity, RAID 10 is mirrored sets in a striped set. [bs_icon name=”glyphicon glyphicon-arrow-right”] RAID 0 is not fault-tolerant. If RAID 1 uses two disk controllers, it is disk duplexing. … Read more »
Sound cards connect as x1 PCIe or PCI cards and normally have PC 99 color-coded 1/8” mini-jacks for I/O and speakers, and optical I/Os known as S/PDIF (example: TOSLINK). Alternatively referred to as an audio output device, sound board, or audio card. A sound card is an expansion card or IC for producing sound… Read more »
Video cards connect to motherboards by way of x16 PCIe (most common, typically black), AGP (brown), or PCI (white) expansion slots.
Random Access Memory (RAM) types include SDRAM, DDR, DDR2, DDR3, RDRAM and SODIMMs.
The Central Processing Unit (CPU) or processor takes care of all calculations.
Motherboards – Connect everything together. Typical form factors include ATX (most common), microATX, ITX, and BTX.
Here are ASM Students who has taken ,CompTIA ,Cisco ,CCNA, CCNP ,Microsoft ,MCSA Exam. We are proud of them.
Dynamic ARP Inspection (DAI) is a security feature that fixes some well-known weaknesses in the ARP protocol.
In order to Prevent Man-In-Middle Attack we will use Port Security (for Example to secure Port f0/3)
Please Join us for this Homeless Outreach on Sunday 2/14/2016 at Rockville MD.
Please Join us for this Homeless Outreach on Sunday 1/10/2016 at Rockville MD.
DHCP Snooping is used to block untheorized DHCP server.
Follow @ASM_Educational In this lab we are showing the concept of Cisco Static Route , so it would prepare you for Cisco CCNA Certification.
Search our blog. Welcome to ASM Blogs . For your convenience we offer the Exam cram and Tips in different formats. Please feel free to contact us about our blogs or courses Notes & Cisco CCNA Exam Notes & Tips Cisco CCNP Exam Notes & Tips Juniper JNCIA Exam Notes & Tips CompTIA A+ Exam Notes &… Read more »
Follow @ASM_Educational In here we are covering basic Cisco CCNA Password Router Configuration.