Follow @ASM_Educational Using DHCP Server with Inter-Vlan Routing (Router on stick) On Last Video we talked about the router on stick that is we made sure that client from Network 10.10.10.0 can communicate with Network 20.20.20.0
Monthly Archives:: April 2016
Cisco CCNA VLAN Configuration
Follow @ASM_Educational Setting up VLAN’s On a new switch, all the ports are in VLAN 1 by default. We just plug in the Ethernet cables and the devices can communicate. Furthermore, all the ports are in the up/up (administratively up) mode.
CompTIA A+ | Microsoft MTA O/S: PC Expansion Slots
Alternatively referred to as a bus slot or expansion port, an expansion slot is connection or port located inside a computer on the motherboard or riser board that allows a computer hardware expansion card to be connected.
CompTIA A+ | Microsoft MTA O/S: Power Devices and Supplies
Power Supplies Okay, now that we’ve tested our AC outlet and put some protective power devices into play, let’s go ahead and talk power supplies.
CompTIA A+ | Microsoft MTA O/S: CPU sockets
You may not typically handle the insides of your computers, but if your business requires knowledge of Central Processing Units (CPU), then you’ll also need to learn about CPU sockets
CompTIA A+ | Microsoft MTA O/S: Ports
Computer port In computer hardware, a port serves as an interface between the computer and other computers or peripheral devices.
CompTIA A+ | Microsoft MTA O/S: Hard Drives
What does a hard drive do? Storage is the hard drive’s responsibility. Everything you keep on your computer is on a hard drive.
CompTIA A+ | Microsoft MTA O/S: Notebook and Desktop Memory
What Is Memory, or RAM? System memory, frequently called main memory or RAM (Random Access Memory), is a type of computer memory that can be accessed randomly.
CISSP Security & Risk Management-The Complete & Effective Security Program
Oversight Committee Representation
CISSP Security & Risk Management-Security Governance
Organizational or corporate governance has existed since time immemorial to ensure the efficient running via control structures.
CISSP Telecommunications and Network-Wireless Technologies
Wireless Communications WAP (Wireless Applications Protocol) –Developed for wireless (PDA’s, mobile phones, pagers, etc. devices to communicate)
CISSP Telecommunications and Network-Tunneling Protocols
Tunneling is a method of transferring data from one network to another by encapsulating the packets in an additional header. The additional header provides routing information so that the encapsulating payload traverse the intermediate networks.
CISSP Telecommunications and Network Security-IPSec
IPSec IPSec is an architecture or framework for security services for IP networks. It works at the Network Layer of the OSI Model. It is actually a standard for secure data transmission. It provides mechanisms for authentication and encryption. Defined by RFC 4301 and carries a set of functions, it is mandatory in IPv6. IPSec… Read more »
CISSP Telecommunications and Network Security
Open Systems Interconnect (OSI) Model
CISSP WANS and Their Components
WANS and Their Components Wide area networks (WANs) are considerably different than LANs. Organizations usually own their own LANs, but WAN services are typically leased; it’s not feasible to have your network guy run a cable from New York to Dallas.
CompTIA Network+ | Microsoft MTA Networking: Hardware Tools
Source mc mcse Certification Resources Cable Testers – Cable testers are electronic devices used to test a cable’s integrity by checking for opens and shorts which can cause connectivity problems.
CompTIA Network+ | Microsoft MTA Networking: Troubleshoot Common Connectivity Issues and Select an Appropriate Solution
Source mc mcse Certification Resources Crosstalk Symptoms: Slow network performance and/or an excess of dropped or unintelligible packets. In telephony applications, users hear pieces of voice or conversations from a separate line.
CompTIA Network+ | Microsoft MTA Networking: Implement the Following Network Troubleshooting Methodology
Source mc mcse Certification Resources Gather Information on the Problem In a contact center network, problems are typically discovered and reported by one of the following types of users:
CompTIA Network+ | Microsoft MTA Networking: Parameters Influencing Quality of Service(QOS)
Source mc mcse Certification Resources Bandwidth – is the average number of bits that can be transmitted from the source to a destination over the network in one second.
Cisco CCNA Router on Stick
Follow @ASM_Educational Cisco CCNA-Router on Stick Inter VLAN Communication (Router on Stick) Earlier we built and tested the following topology:
CompTIA Sec+ | Microsoft MTA Security: Types of Wireless Attacks Part 2
The Types of Wireless Attacks Part 2 CompTIA Security+ Objective 1.2 WPS Attacks Wi-Fi Protected Setup (WPS) allows users to configure a wireless network without typing in the passphrase. Instead, users can configure devices by pressing buttons or by entering a short personal identification number (PIN). For example, a user can configure a new wireless… Read more »
CompTIA Sec+ | Microsoft MTA Security: Types of Wireless Attacks
The Types of Wireless Attacks Part 1 CompTIA Security+ Objective 1.2 Replay Attacks A replay attack occurs when an attacker copies a stream of messages between two parties and replays the stream to one or more of the parties. Unless mitigated, the computers subject to the attack process the stream as legitimate messages, resulting in a range… Read more »
CompTIA and Immersive Labs Issue A Pen Test Challenge
CompTIA and Immersive Labs are challenging cybersecurity professionals in the United States and United Kingdom to test their penetration testing skills this month. The two organizations launched the pen test challenge on the opening day of RSA® Conference 2019. “Penetration testing, if done right, is a proven and valuable activity that all organizations should engage… Read more »
CompTIA Sec+ | Microsoft MTA Security: Most Common Application/Service Attacks Part 2
The nature of cyberattacks is constantly in flux, always evolving to keep pace with the times. Hacking of websites, theft of credit card information and other personal information has become an almost daily occurrence, along with illegal remittances via Internet banking. Recent years have witnessed the accelerating dissemination of new technologies such as IoT… Read more »
CompTIA Sec+ | Microsoft MTA Security: Most Common Application/Service Attacks Part 1
“Richard Clarke, a former counter-terrorism expert for the United Government, once said, “If you spend more on coffee than on IT security, you will be hacked. What’s more, you deserve to be hacked”. While the latter is a tad harsh (we wouldn’t wish a cyber attack on anyone!), the former is certainly true.” If you… Read more »
CompTIA Sec+ | Microsoft MTA Security: Exam prepration and Questions
1. Your manager asks you to implement a system that can filter out unwanted content, such as viruses and unproductive Internet content. The best way to accomplish this would be through a system that implements a:
CompTIA Sec+ | Microsoft MTA Security: Certification Cram Guide & Study Notes
In this cram guide, we would like to give you some short tips on what to study for the Security+ exam to ensure a great score.
CompTIA Sec+ | Microsoft MTA Security: Security Topologies
One of the most essential portions of information security is the design and topology of secure networks. What exactly do we mean by “topology?” Usually, a geographic diagram of a network comes to mind.
CompTIA A+ | Microsoft MTA O/S: Malicious Software (Malware)
Definition – What does Malicious Software (Malware) mean? Malicious software, commonly known as malware, is any software that brings harm to a computer system. Malware can be in the form of worms, viruses, trojans, spyware, adware and rootkits, etc., which steal protected data, delete documents or add software not approved by a user.