Cisco CCNA DHCP Server with Inter Vlan routing

Posted filed under Cisco CCNA.

Cisco CCNA DHCP sevrer with Router on stick

Follow @ASM_Educational   Using DHCP Server with Inter-Vlan Routing (Router on stick) On Last Video we talked about the router on stick  that is we made sure that client from Network 10.10.10.0 can communicate with Network 20.20.20.0

Cisco CCNA VLAN Configuration

Posted filed under Cisco CCNA.

VLan Config

Follow @ASM_Educational Setting up VLAN’s On a new switch, all the ports are in VLAN 1 by default.  We just plug in the Ethernet cables and the devices can communicate.  Furthermore, all the ports are in the up/up (administratively up) mode.

CISSP Telecommunications and Network-Tunneling Protocols

Posted filed under CISSP.

Tunneling is a method of transferring data from one network to another by encapsulating the packets  in an additional header. The additional header provides routing information so that the encapsulating payload traverse the intermediate networks.

CISSP Telecommunications and Network Security-IPSec

Posted filed under CISSP.

 IPSec IPSec is an architecture or framework for security services for IP networks. It works at the Network Layer of the OSI Model. It is actually a standard for secure data transmission. It provides mechanisms for authentication and encryption. Defined by RFC 4301 and carries a set of functions, it is mandatory in IPv6. IPSec… Read more »

CISSP WANS and Their Components

Posted filed under CISSP.

WANS and Their Components Wide area networks (WANs) are considerably different than LANs. Organizations usually own their own LANs, but WAN services are typically leased; it’s not feasible to have your network guy run a cable from New York to Dallas.

Cisco CCNA Router on Stick

Posted filed under Cisco CCNA.

Router on stick

Follow @ASM_Educational Cisco CCNA-Router on Stick Inter VLAN Communication (Router on Stick) Earlier we built and tested the following topology:

CompTIA Sec+ | Microsoft MTA Security: Types of Wireless Attacks Part 2

Posted filed under CompTIA Security+, MICROSOFT MTA SECURITY.

The Types of Wireless Attacks Part 2 CompTIA Security+ Objective 1.2 WPS Attacks Wi-Fi Protected Setup (WPS) allows users to configure a wireless network without typing in the passphrase. Instead, users can configure devices by pressing buttons or by entering a short personal identification number (PIN). For example, a user can configure a new wireless… Read more »

CompTIA and Immersive Labs Issue A Pen Test Challenge

Posted filed under CompTIA Security+, MICROSOFT MTA SECURITY.

CompTIA and Immersive Labs are challenging cybersecurity professionals in the United States and United Kingdom to test their penetration testing skills this month. The two organizations launched the pen test challenge on the opening day of RSA® Conference 2019. “Penetration testing, if done right, is a proven and valuable activity that all organizations should engage… Read more »

CompTIA Sec+ | Microsoft MTA Security: Most Common Application/Service Attacks Part 2

Posted filed under CompTIA Security+, MICROSOFT MTA SECURITY.

   The nature of cyberattacks is constantly in flux, always evolving to keep pace with the times. Hacking of websites, theft of credit card information and other personal information has become an almost daily occurrence, along with illegal remittances via Internet banking. Recent years have witnessed the accelerating dissemination of new technologies such as IoT… Read more »

CompTIA A+ | Microsoft MTA O/S: Malicious Software (Malware)

Posted filed under CompTIA A+, MICROSOFT MTA O/S.

Definition – What does Malicious Software (Malware) mean? Malicious software, commonly known as malware, is any software that brings harm to a computer system. Malware can be in the form of worms, viruses, trojans, spyware, adware and rootkits, etc., which steal protected data, delete documents or add software not approved by a user.