Network Security on the Cisco Certified Network Associate (CCNA)
In this episode we are going to look at VPN Overview.We will be discussing Virtual Private Networks and VPN Benefits.Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).Once again, I'm Kevin and this is KevTechify. Let's get this adventure started.All my details and contact information can be found on my website, https://KevTechify.com-------------------------------------------------------Cisco Certified Network Associate (CCNA)Network Security v1 (NetSec)Episode 18 - VPNsPart A - VPN OverviewPodcast Number: 71-------------------------------------------------------Equipment I like.Home Lab ►► https://kit.co/KevTechify/home-labNetworking Tools ►► https://kit.co/KevTechify/networking-toolsStudio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at Applications and Impacts of Cryptography.We will be discussing PKI Applications, Encrypted Network Transactions, and Encryption and Security Monitoring.Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).Once again, I'm Kevin and this is KevTechify. Let's get this adventure started.All my details and contact information can be found on my website, https://KevTechify.com-------------------------------------------------------Cisco Certified Network Associate (CCNA)Network Security v1 (NetSec)Episode 17 - Public Key CryptographyPart C - Applications and Impacts of CryptographyPodcast Number: 70-------------------------------------------------------Equipment I like.Home Lab ►► https://kit.co/KevTechify/home-labNetworking Tools ►► https://kit.co/KevTechify/networking-toolsStudio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at ZPF Operation.We will be discussing ZPF Actions, Rules for Transit Traffic, and Rules for Traffic to the Self Zone.Thank you so much for listening to this episode of my series on Network Security.Once again, I'm Kevin and this is KevTechify. Let's get this adventure started.All my details and contact information can be found on my website, https://KevTechify.com-------------------------------------------------------Network Security v1Episode 10 - Zone-Based Policy FirewallsPart B- ZPF OperationPodcast Number: 41-------------------------------------------------------Equipment I like.Home Lab ►► https://kit.co/KevTechify/home-labNetworking Tools ►► https://kit.co/KevTechify/networking-toolsStudio Equipment ►► https://kit.co/KevTechify/studio-equipment
Greetings to all my Tech Heads out there in the KevTechify Nation and if you are new here, welcome.In this episode we are going to look at Common Network Attacks - Reconnaissance, Access, and Social Engineering.We will be discussing Types of Network Attacks, Reconnaissance Attacks, Reconnaissance Attacks, Access Attacks, Access and Social Engineering Attacks, Social Engineering Attacks, Strengthening the Weakest Link, Social Engineering, , , , , ,.Thank you so much for watching this episode of my series on Network Security.Once again, I'm Kevin and this is KevTechify. Let's get this adventure started.http://KevTechify.com***********************************Network Security v1Episode 2 - Network ThreatsPart D- Common Network Attacks - Reconnaissance, Access, and Social EngineeringPodcast Number: 6
In this episode we are going to look at ZPF Overview.We will be discussing Benefits of a ZPF and ZPF Design.Thank you so much for listening to this episode of my series on Network Security.Once again, I'm Kevin and this is KevTechify. Let's get this adventure started.All my details and contact information can be found on my website, https://KevTechify.com-------------------------------------------------------Network Security v1Episode 10 - Zone-Based Policy FirewallsPart A- ZPF OverviewPodcast Number: 40-------------------------------------------------------Equipment I like.Home Lab ►► https://kit.co/KevTechify/home-labNetworking Tools ►► https://kit.co/KevTechify/networking-toolsStudio Equipment ►► https://kit.co/KevTechify/studio-equipment
Greetings to all my Tech Heads out there in the KevTechify Nation and if you are new here, welcome.In this episode we are going to look at Malware.We will be discussing Types of Malware, Viruses, Trojan Horses, Trojan Horse Classification, Worms, Worm Components, Ransomware, Other Malware, and Common Malware Behaviors.Thank you so much for watching this episode of my series on Network Security.Once again, I'm Kevin and this is KevTechify. Let's get this adventure started.http://KevTechify.com***********************************Network Security v1Episode 2 - Network ThreatsPart C- MalwarePodcast Number: 5
In this episode we are going to look at Firewalls in Network Design.We will be discussing Common Security Architectures, Layered Defense, Network Security Design Concepts, and Identify Packet Flow.Thank you so much for listening to this episode of my series on Network Security.Once again, I'm Kevin and this is KevTechify. Let's get this adventure started.All my details and contact information can be found on my website, https://KevTechify.com-------------------------------------------------------Network Security v1Episode 9 - Firewall TechnologiesPart B- Firewalls in Network DesignPodcast Number: 39-------------------------------------------------------Equipment I like.Home Lab ►► https://kit.co/KevTechify/home-labNetworking Tools ►► https://kit.co/KevTechify/networking-toolsStudio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at Authorities and the PKI Trust System.We will be discussing Public Key Management, The Public Key Infrastructure, The PKI Authorities System, The PKI Trust System, Interoperability of Different PKI Vendors, Certificate Enrollment, Authentication, and Revocation, and finally Certificate Authority Stores.Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).Once again, I'm Kevin and this is KevTechify. Let's get this adventure started.All my details and contact information can be found on my website, https://KevTechify.com-------------------------------------------------------Cisco Certified Network Associate (CCNA)Network Security v1 (NetSec)Episode 17 - Public Key CryptographyPart B - Authorities and the PKI Trust SystemPodcast Number: 69-------------------------------------------------------Equipment I like.Home Lab ►► https://kit.co/KevTechify/home-labNetworking Tools ►► https://kit.co/KevTechify/networking-toolsStudio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at Secure Networks with Firewalls.We will be discussing Firewalls, Types of Firewalls, Packet Filtering Firewall Benefits and Limitations, and Stateful Firewall Benefits and Limitations.Thank you so much for listening to this episode of my series on Network Security.Once again, I'm Kevin and this is KevTechify. Let's get this adventure started.All my details and contact information can be found on my website, https://KevTechify.com-------------------------------------------------------Network Security v1Episode 9 - Firewall TechnologiesPart A- Secure Networks with FirewallsPodcast Number: 38-------------------------------------------------------Equipment I like.Home Lab ►► https://kit.co/KevTechify/home-labNetworking Tools ►► https://kit.co/KevTechify/networking-toolsStudio Equipment ►► https://kit.co/KevTechify/studio-equipment
Greetings to all my Tech Heads out there in the KevTechify Nation and if you are new here, welcome.In this episode we are going to look at Threat Actor Tools.We will be discussing Introduction of Attack Tools, Evolution of Security Tools, and Categories of Attacks.Thank you so much for watching this episode of my series on Network Security.Once again, I'm Kevin and this is KevTechify. Let's get this adventure started.http://KevTechify.com***********************************Network Security v1Episode 2 - Network ThreatsPart B- Threat Actor ToolsPodcast Number: 4
Greetings to all my Tech Heads out there in the KevTechify Nation and if you are new here, welcome.In this episode we are going to look at Who is Attacking Our Network?.We will be discussing Threat, Vulnerability, and Risk, Hacker vs. Threat Actor, Evolution of Threat Actors, Cybercriminals, Cybersecurity Tasks, Cyber Threat Indicators, Threat Sharing and Building Cybersecurity Awareness.Thank you so much for watching this episode of my series on Network Security.Once again, I'm Kevin and this is KevTechify. Let's get this adventure started.http://KevTechify.com***********************************Network Security v1Episode 2 - Network ThreatsPart A- Who is Attacking Our Network?Podcast Number: 3
In this episode we are going to look at IPv6 ACLs.We will be discussing IPv6 ACL Overview, IPv6 ACL Syntax, Configure IPv6 ACLs, and Configure IPv6 ACLs.Thank you so much for listening to this episode of my series on Network Security.Once again, I'm Kevin and this is KevTechify. Let's get this adventure started.All my details and contact information can be found on my website, https://KevTechify.com-------------------------------------------------------Network Security v1Episode 8 - Access Control ListsPart G- IPv6 ACLsPodcast Number: 37-------------------------------------------------------Equipment I like.Home Lab ►► https://kit.co/KevTechify/home-labNetworking Tools ►► https://kit.co/KevTechify/networking-toolsStudio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at Public Key Cryptography with Digital Signatures.We will be discussing Digital Signature Overview, Digital Signatures for Code Signing, and Digital Signatures for Digital Certificates.Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).Once again, I'm Kevin and this is KevTechify. Let's get this adventure started.All my details and contact information can be found on my website, https://KevTechify.com-------------------------------------------------------Cisco Certified Network Associate (CCNA)Network Security v1 (NetSec)Episode 17 - Public Key CryptographyPart A - Public Key Cryptography with Digital SignaturesPodcast Number: 68-------------------------------------------------------Equipment I like.Home Lab ►► https://kit.co/KevTechify/home-labNetworking Tools ►► https://kit.co/KevTechify/networking-toolsStudio Equipment ►► https://kit.co/KevTechify/studio-equipment
Greetings to all my Tech Heads out there in the KevTechify Nation and if you are new here, welcome.In this episode we are going to look at Network Topology Overview.We will be discussing Campus Area Networks, Small Office and Home Office Networks, Wide Area Networks, Data Center Networks, Cloud Networks and Virtualization, and The Evolving Network Border.Thank you so much for watching this episode of my series on Network Security.Once again, I'm Kevin and this is KevTechify. Let's get this adventure started.http://KevTechify.com***********************************Network Security v1Episode 1 - Securing NetworksPart B- Network Topology OverviewPodcast Number: 2
In this episode we are going to look at Mitigate Attacks with ACLs.We will be discussing Mitigate Spoofing Attacks, Permit Necessary Traffic through a Firewall, Mitigate ICMP Attacks, Mitigate SNMP Attacks, and Configure IP ACLs to Mitigate Attacks.Thank you so much for listening to this episode of my series on Network Security.Once again, I'm Kevin and this is KevTechify. Let's get this adventure started.http://KevTechify.com***********************************Network Security v1Episode 8 - Access Control ListsPart F- Mitigate Attacks with ACLsPodcast Number: 36
In this episode we are going to look at Confidentiality.We will be discussing Data Confidentiality, Symmetric Encryption, Asymmetric Encryption, Confidentiality, Authentication, Integrity, Diffie-Hellman, Cryptography, Classify the Encryption Algorithms, and finally Encrypting and Decrypting Data Using OpenSSL.Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).Once again, I'm Kevin and this is KevTechify. Let's get this adventure started.All my details and contact information can be found on my website, https://KevTechify.com-------------------------------------------------------Cisco Certified Network Associate (CCNA)Network Security v1 (NetSec)Episode 16 - Basic Integrity and AuthenticityPart C - ConfidentialityPodcast Number: 67-------------------------------------------------------Equipment I like.Home Lab ►► https://kit.co/KevTechify/home-labNetworking Tools ►► https://kit.co/KevTechify/networking-toolsStudio Equipment ►► https://kit.co/KevTechify/studio-equipment
Greetings to all my Tech Heads out there in the KevTechify Nation and if you are new here, welcome.In this episode we are going to look at Current State of Affairs.We will be discussing Networks Are Targets, Reasons for Network Security, Vectors of Network Attacks, Data Loss, and Anatomy of an Attack.Thank you so much for watching this episode of my series on Network Security.Once again, I'm Kevin and this is KevTechify. Let's get this adventure started.http://KevTechify.com***********************************Network Security v1Episode 1 - Securing NetworksPart A- Current State of AffairsVideo Number: 1
In this episode we are going to look at Implement ACLs.We will be discussing ACL Configuration Guidelines, Apply an ACL, Where to Place ACLs, Standard ACL Placement Example, Configure Named Standard IPv4 ACLs, Configure Numbered Standard IPv4 ACLs, and Extended ACL Placement Example.Thank you so much for listening to this episode of my series on Network Security.Once again, I'm Kevin and this is KevTechify. Let's get this adventure started.http://KevTechify.com***********************************Network Security v1Episode 8 - Access Control ListsPart E- Implement ACLsPodcast Number: 35
In this episode we are going to look at Modify ACLs.We will be discussing Two Methods to Modify an ACL, Text Editor Method, Sequence Number Method, Syntax Checker - Modify IPv4 ACLs, , , , , , , , , ,.Thank you so much for listening to this episode of my series on Network Security.Once again, I'm Kevin and this is KevTechify. Let's get this adventure started.http://KevTechify.com***********************************Network Security v1Episode 8 - Access Control ListsPart D- Modify ACLsPodcast Number: 34
In this episode we are going to look at Configure ACLs.We will be discussing Creating an ACL, Numbered Standard IPv4 ACL Syntax, Named Standard IPv4 ACL Syntax, Numbered Extended IPv4 ACL Syntax, Protocols and Port Numbers, TCP Established Extended ACL, and Named Extended IPv4 ACL Syntax.Thank you so much for listening to this episode of my series on Network Security.Once again, I'm Kevin and this is KevTechify. Let's get this adventure started.http://KevTechify.com***********************************Network Security v1Episode 8 - Access Control ListsPart C- Configure ACLsPodcast Number: 33
In this episode we are going to look at Key Management.We will be discussing Characteristics of Key Management, Key Length and Keyspace, the Keyspace, Types of Cryptographic Keys, and Choice of Cryptographic Keys.Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).Once again, I'm Kevin and this is KevTechify. Let's get this adventure started.All my details and contact information can be found on my website, https://KevTechify.com-------------------------------------------------------Cisco Certified Network Associate (CCNA)Network Security v1 (NetSec)Episode 16 - Basic Integrity and AuthenticityPart B - Key ManagementPodcast Number: 66-------------------------------------------------------Equipment I like.Home Lab ►► https://kit.co/KevTechify/home-labNetworking Tools ►► https://kit.co/KevTechify/networking-toolsStudio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at Wildcard Masking.We will be discussing Wildcard Mask Overview, Wildcard Mask Types, Wildcard Mask Calculation, and Wildcard Mask Keywords.Thank you so much for listening to this episode of my series on Network Security.Once again, I'm Kevin and this is KevTechify. Let's get this adventure started.http://KevTechify.com***********************************Network Security v1Episode 8 - Access Control ListsPart B- Wildcard MaskingPodcast Number: 32
In this episode we are going to look at Integrity and Authenticity.We will be discussing Secure Communications, Cryptographic Hash Functions, Cryptographic Hash Operation, MD5 and SHA, and Origin Authentication.Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).Once again, I'm Kevin and this is KevTechify. Let's get this adventure started.All my details and contact information can be found on my website, https://KevTechify.com-------------------------------------------------------Cisco Certified Network Associate (CCNA)Network Security v1 (NetSec)Episode 16 - Basic Integrity and AuthenticityPart A - Integrity and AuthenticityPodcast Number: 65-------------------------------------------------------Equipment I like.Home Lab ►► https://kit.co/KevTechify/home-labNetworking Tools ►► https://kit.co/KevTechify/networking-toolsStudio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at Introduction to Access Control Lists.We will be discussing What is an ACL?, Packet Filtering, Numbered and Named ACLs, ACL Operation, and an ACL Demonstration.Thank you so much for listening to this episode of my series on Network Security.Once again, I'm Kevin and this is KevTechify. Let's get this adventure started.http://KevTechify.com***********************************Network Security v1Episode 8 - Access Control ListsPart A- Introduction to Access Control ListsPodcast Number: 31
In this episode we are going to look at Cryptology.We will be discussing Making and Breaking Secret Codes, Cryptanalysts, The Secret is in the Keys, Cryptology Terminology, and Explore Encryption Methods.Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).Once again, I'm Kevin and this is KevTechify. Let's get this adventure started.All my details and contact information can be found on my website, https://KevTechify.com-------------------------------------------------------Cisco Certified Network Associate (CCNA)Network Security v1 (NetSec)Episode 15 - Cryptographic ServicesPart D - CryptologyPodcast Number: 64-------------------------------------------------------Equipment I like.Home Lab ►► https://kit.co/KevTechify/home-labNetworking Tools ►► https://kit.co/KevTechify/networking-toolsStudio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at Configure Server-Based Authorization and Accounting.We will be discussing Introduction to Server-Based AAA Authorization, AAA Authorization Configuration, Introduction to Server-Based AAA Accounting, and AAA Accounting Configuration.Thank you so much for listening to this episode of my series on Network Security.Once again, I'm Kevin and this is KevTechify. Let's get this adventure started.http://KevTechify.com***********************************Network Security v1Episode 7 - Authentication, Authorization, and Accounting (AAA)Part E- Configure Server-Based Authorization and AccountingPodcast Number: 30
In this episode we are going to look at Cryptanalysis.We will be discussing Cracking Code, Methods of Cracking Code, and a Cracking Code Example.Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).Once again, I'm Kevin and this is KevTechify. Let's get this adventure started.All my details and contact information can be found on my website, https://KevTechify.com-------------------------------------------------------Cisco Certified Network Associate (CCNA)Network Security v1 (NetSec)Episode 15 - Cryptographic ServicesPart C - CryptanalysisPodcast Number: 63-------------------------------------------------------Equipment I like.Home Lab ►► https://kit.co/KevTechify/home-labNetworking Tools ►► https://kit.co/KevTechify/networking-toolsStudio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at Configure Server-Based Authentication.We will be discussing Steps to Configure Server-Based AAA Authentication, Configure TACACS+ Servers, Configure RADIUS Servers, and Authenticate to the AAA Server Configuration Commands, .Thank you so much for listening to this episode of my series on Network Security.Once again, I'm Kevin and this is KevTechify. Let's get this adventure started.http://KevTechify.com***********************************Network Security v1Episode 7 - Authentication, Authorization, and Accounting (AAA)Part D- Configure Server-Based AuthenticationPodcast Number: 29
In this episode we are going to look at Server-Based AAA Characteristics and Protocols.We will be discussing Compare Local AAA and Server-Based AAA Implementations, Cisco Identity Services Engine (ISE), The TACACS+ and RADIUS Protocols, TACACS+ Authentication, and RADIUS Authentication.Thank you so much for listening to this episode of my series on Network Security.Once again, I'm Kevin and this is KevTechify. Let's get this adventure started.http://KevTechify.com***********************************Network Security v1Episode 7 - Authentication, Authorization, and Accounting (AAA)Part C- Server-Based AAA Characteristics and ProtocolsPodcast Number: 28
In this episode we are going to look at Network Security Testing Tools.We will be discussing Network Testing Tools, and looking at Nmap and Zenmap, SuperScan, SIEM.Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).Once again, I'm Kevin and this is KevTechify. Let's get this adventure started.All my details and contact information can be found on my website, https://KevTechify.com-------------------------------------------------------Cisco Certified Network Associate (CCNA)Network Security v1 (NetSec)Episode 22 - Network Security TestingPart B - Network Security Testing ToolsPodcast Number: 92-------------------------------------------------------Equipment I like.Home Lab ►► https://kit.co/KevTechify/home-labNetworking Tools ►► https://kit.co/KevTechify/networking-toolsStudio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at Cryptography.We will be discussing Creating Cipher Text, Transposition Ciphers, Substitution Ciphers, A More Complex Substitution Cipher, and One-Time Pad Ciphers.Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).Once again, I'm Kevin and this is KevTechify. Let's get this adventure started.All my details and contact information can be found on my website, https://KevTechify.com-------------------------------------------------------Cisco Certified Network Associate (CCNA)Network Security v1 (NetSec)Episode 15 - Cryptographic ServicesPart B - CryptographyPodcast Number: 62-------------------------------------------------------Equipment I like.Home Lab ►► https://kit.co/KevTechify/home-labNetworking Tools ►► https://kit.co/KevTechify/networking-toolsStudio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at Configure Local AAA Authentication.We will be discussing Authenticate Administrative Access, Authentication Methods, Default and Named Methods, Fine-Tuning the Authentication Configuration, Configure Local AAA Authentication, and Configure Local AAA for Console and VTY Access.Thank you so much for listening to this episode of my series on Network Security.Once again, I'm Kevin and this is KevTechify. Let's get this adventure started.http://KevTechify.com***********************************Network Security v1Episode 7 - Authentication, Authorization, and Accounting (AAA)Part B- Configure Local AAA AuthenticationPodcast Number: 27
In this episode we are going to look at Secure Communications.We will be discussing Authentication, Integrity, and Confidentiality, Authentication, Data Integrity, and Data Confidentiality.Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).Once again, I'm Kevin and this is KevTechify. Let's get this adventure started.All my details and contact information can be found on my website, https://KevTechify.com-------------------------------------------------------Cisco Certified Network Associate (CCNA)Network Security v1 (NetSec)Episode 15 - Cryptographic ServicesPart A - Secure CommunicationsPodcast Number: 61-------------------------------------------------------Equipment I like.Home Lab ►► https://kit.co/KevTechify/home-labNetworking Tools ►► https://kit.co/KevTechify/networking-toolsStudio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at Network Security Testing Techniques.We will be discussing Operations Security, Testing and Evaluating Network Security, Types of Network Tests, and finally Applying Network Test Results.Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).Once again, I'm Kevin and this is KevTechify. Let's get this adventure started.All my details and contact information can be found on my website, https://KevTechify.com-------------------------------------------------------Cisco Certified Network Associate (CCNA)Network Security v1 (NetSec)Episode 22 - Network Security TestingPart A - Network Security Testing TechniquesPodcast Number: 91-------------------------------------------------------Equipment I like.Home Lab ►► https://kit.co/KevTechify/home-labNetworking Tools ►► https://kit.co/KevTechify/networking-toolsStudio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at Service Policies on an ASA.We will be discussing an Overview of MPF, Configure Class Maps, Define and Activate a Policy, Configure ASA Basic Settings and Firewall Using the CLI, and finally Configure ASA Network Services, Routing, and DMZ with ACLs Using CLI.Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).Once again, I'm Kevin and this is KevTechify. Let's get this adventure started.All my details and contact information can be found on my website, https://KevTechify.com-------------------------------------------------------Cisco Certified Network Associate (CCNA)Network Security v1 (NetSec)Episode 21 - ASA Firewall ConfigurationPart G - Service Policies on an ASAPodcast Number: 89-------------------------------------------------------Equipment I like.Home Lab ►► https://kit.co/KevTechify/home-labNetworking Tools ►► https://kit.co/KevTechify/networking-toolsStudio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at Mitigate Spanning Tree Protocol (STP) Attacks.We will be discussing Spanning Tree Protocol (STP) Attack, Mitigating STP Attacks, Configure PortFast, Configure BPDU Guard, Configure Root Guard, Configure Loop Guard, Configure STP Security, Implement STP Security, and Layer 2 VLAN Security.Thank you so much for listening to this episode of my series on Network Security.Once again, I'm Kevin and this is KevTechify. Let's get this adventure started.All my details and contact information can be found on my website, https://KevTechify.com-------------------------------------------------------Network Security v1Episode 14 - Layer 2 Security ConsiderationsPart I - Mitigate STP AttacksPodcast Number: 60-------------------------------------------------------Equipment I like.Home Lab ►► https://kit.co/KevTechify/home-labNetworking Tools ►► https://kit.co/KevTechify/networking-toolsStudio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at AAA Characteristics.We will be discussing Authentication without AAA, AAA Components, Authentication Modes, Authorization, and Accounting.Thank you so much for listening to this episode of my series on Network Security.Once again, I'm Kevin and this is KevTechify. Let's get this adventure started.http://KevTechify.com***********************************Network Security v1Episode 7 - Authentication, Authorization, and Accounting (AAA)Part A- AAA CharacteristicsPodcast Number: 26
In this episode we are going to look at Spanning Tree Protocol (STP).We will be discussing Spanning Tree Protocol (STP), STP Recalculation, Layer 2 Loops, STP Port Roles, STP Root Bridge, STP Path Cost, Select the Root Bridge, Observe STP Operation, and Investigate STP Loop Prevention.Thank you so much for listening to this episode of my series on Network Security.Once again, I'm Kevin and this is KevTechify. Let's get this adventure started.All my details and contact information can be found on my website, https://KevTechify.com-------------------------------------------------------Network Security v1Episode 14 - Layer 2 Security ConsiderationsPart H - Spanning Tree ProtocolPodcast Number: 59-------------------------------------------------------Equipment I like.Home Lab ►► https://kit.co/KevTechify/home-labNetworking Tools ►► https://kit.co/KevTechify/networking-toolsStudio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at Mitigate Address Spoofing Attacks.We will be discussing Address Spoofing Attacks, Address Spoofing Attack Mitigation, and Configure IP Source Guard.Thank you so much for listening to this episode of my series on Network Security.Once again, I'm Kevin and this is KevTechify. Let's get this adventure started.All my details and contact information can be found on my website, https://KevTechify.com-------------------------------------------------------Network Security v1Episode 14 - Layer 2 Security ConsiderationsPart G - Mitigate Address Spoofing AttacksPodcast Number: 58-------------------------------------------------------Equipment I like.Home Lab ►► https://kit.co/KevTechify/home-labNetworking Tools ►► https://kit.co/KevTechify/networking-toolsStudio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at SNMP Configuration.We will be discussing Introduction to SNMP, SNMP Operation, Management Information Base (MIB), SNMP Versions, SNMP Vulnerabilities, SNMPv3, SNMPv3 Security Configuration, and Configure Cisco Devices for Syslog, NTP, and SSH Operations.Thank you so much for listening to this episode of my series on Network Security.Once again, I'm Kevin and this is KevTechify. Let's get this adventure started.http://KevTechify.com***********************************Network Security v1Episode 6 - Device Monitoring and ManagementPart G- SNMP ConfigurationPodcast Number: 25
In this episode we are going to look at Mitigate Address Resolution Protocol (ARP) Attacks.We will be discussing Address Resolution Protocol (ARP) Attacks, ARP Spoofing, Dynamic ARP Inspection, Dynamic ARP Inspection (DAI) Implementation Guidelines, and an DAI Configuration Example.Thank you so much for listening to this episode of my series on Network Security.Once again, I'm Kevin and this is KevTechify. Let's get this adventure started.All my details and contact information can be found on my website, https://KevTechify.com-------------------------------------------------------Network Security v1Episode 14 - Layer 2 Security ConsiderationsPart F - Mitigate ARP AttacksPodcast Number: 57-------------------------------------------------------Equipment I like.Home Lab ►► https://kit.co/KevTechify/home-labNetworking Tools ►► https://kit.co/KevTechify/networking-toolsStudio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at AAA.We will be discussing AAA Review, Local Database and Servers, and finally AAA Configuration.Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).Once again, I'm Kevin and this is KevTechify. Let's get this adventure started.All my details and contact information can be found on my website, https://KevTechify.com-------------------------------------------------------Cisco Certified Network Associate (CCNA)Network Security v1 (NetSec)Episode 21 - ASA Firewall ConfigurationPart F - AAAPodcast Number: 88-------------------------------------------------------Equipment I like.Home Lab ►► https://kit.co/KevTechify/home-labNetworking Tools ►► https://kit.co/KevTechify/networking-toolsStudio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at NTP Configuration.We will be discussing Time and Calendar Services, NTP Operation, and Configure and Verify NTP.Thank you so much for listening to this episode of my series on Network Security.Once again, I'm Kevin and this is KevTechify. Let's get this adventure started.http://KevTechify.com***********************************Network Security v1Episode 6 - Device Monitoring and ManagementPart F- NTP ConfigurationPodcast Number: 24
In this episode we are going to look at Mitigate Dynamic Host Configuration Protocol (DHCP) Attacks.We will be discussing DHCP Attacks, DHCP Attacks Mitigation, Steps to Implement DHCP Snooping, and an DHCP Snooping Configuration Example.Thank you so much for listening to this episode of my series on Network Security.Once again, I'm Kevin and this is KevTechify. Let's get this adventure started.All my details and contact information can be found on my website, https://KevTechify.com-------------------------------------------------------Network Security v1Episode 14 - Layer 2 Security ConsiderationsPart E - Mitigate DHCP AttacksPodcast Number: 56-------------------------------------------------------Equipment I like.Home Lab ►► https://kit.co/KevTechify/home-labNetworking Tools ►► https://kit.co/KevTechify/networking-toolsStudio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at Network Security Using Syslog.We will be discussing Introduction to Syslog, Syslog Operation, Syslog Message Format, Syslog Facilities, Configure Syslog Timestamps, Syslog Systems, and Syslog Configuration.Thank you so much for listening to this episode of my series on Network Security.Once again, I'm Kevin and this is KevTechify. Let's get this adventure started.http://KevTechify.com***********************************Network Security v1Episode 6 - Device Monitoring and ManagementPart E- Network Security Using SyslogPodcast Number: 23
In this episode we are going to look at NAT Services on an ASA.We will be discussing ASA NAT Overview, Configure Dynamic NAT, Configure Dynamic PAT, and Configure Static NAT.Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).Once again, I'm Kevin and this is KevTechify. Let's get this adventure started.All my details and contact information can be found on my website, https://KevTechify.com-------------------------------------------------------Cisco Certified Network Associate (CCNA)Network Security v1 (NetSec)Episode 21 - ASA Firewall ConfigurationPart E - NAT Services on an ASAPodcast Number: 87-------------------------------------------------------Equipment I like.Home Lab ►► https://kit.co/KevTechify/home-labNetworking Tools ►► https://kit.co/KevTechify/networking-toolsStudio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at Secure Management and Reporting.We will be discussing Types of Management Access and Out-of-Band and In-Band Access.Thank you so much for listening to this episode of my series on Network Security.Once again, I'm Kevin and this is KevTechify. Let's get this adventure started.http://KevTechify.com***********************************Network Security v1Episode 6 - Device Monitoring and ManagementPart D- Secure Management and ReportingPodcast Number: 22
In this episode we are going to look at Mitigate VLAN Attacks.We will be discussing VLAN Hopping Attacks, VLAN Double-Tagging Attack, Mitigating VLAN Hopping Attacks, Syntax Checker - Mitigate VLAN Hopping Attacks, Private VLANs, Private Virtual LAN (PVLAN) Edge Feature, Configure PVLAN Edge, and Private VLAN Tutorial and Demonstration.Thank you so much for listening to this episode of my series on Network Security.Once again, I'm Kevin and this is KevTechify. Let's get this adventure started.All my details and contact information can be found on my website, https://KevTechify.com-------------------------------------------------------Network Security v1Episode 14 - Layer 2 Security ConsiderationsPart D - Mitigate VLAN AttacksPodcast Number: 55-------------------------------------------------------Equipment I like.Home Lab ►► https://kit.co/KevTechify/home-labNetworking Tools ►► https://kit.co/KevTechify/networking-toolsStudio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at ASA ACLs.We will be discussing Types of ASA ACL Filtering, Types of ASA ACLs, Syntax for Configuring an ASA ACL, Syntax for Applying an ASA ACL, ASA ACL Examples, ACLs and Object Groups, and finally ACL Using Object Groups Examples.Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).Once again, I'm Kevin and this is KevTechify. Let's get this adventure started.All my details and contact information can be found on my website, https://KevTechify.com-------------------------------------------------------Cisco Certified Network Associate (CCNA)Network Security v1 (NetSec)Episode 21 - ASA Firewall ConfigurationPart D - ASA ACLsPodcast Number: 86-------------------------------------------------------Equipment I like.Home Lab ►► https://kit.co/KevTechify/home-labNetworking Tools ►► https://kit.co/KevTechify/networking-toolsStudio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at Mitigate MAC Table Attacks.We will be discussing Secure Unused Ports, Mitigate MAC Address Table Attacks, Enable Port Security, Limit and Learn MAC Addresses, Port Security Aging, Port Security Violation Modes, Ports in error-disabled State, Verify Port Security, SNMP MAC Address Notification, and Implement Port Security.Thank you so much for listening to this episode of my series on Network Security.Once again, I'm Kevin and this is KevTechify. Let's get this adventure started.All my details and contact information can be found on my website, https://KevTechify.com-------------------------------------------------------Network Security v1Episode 14 - Layer 2 Security ConsiderationsPart C - Mitigate MAC Table AttacksPodcast Number: 54-------------------------------------------------------Equipment I like.Home Lab ►► https://kit.co/KevTechify/home-labNetworking Tools ►► https://kit.co/KevTechify/networking-toolsStudio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at Routing Protocol Authentication.We will be discussing Dynamic Routing Protocols, Routing Protocol Spoofing, OSPF MD5 Routing Protocol Authentication, OSPF SHA Routing Protocol Authentication, Syntax Checker- OSPF SHA Routing Protocol Authentication, Basic Device Configuration and OSPF Authentication, Configure OSPF Authentication, , , , , , ,.Thank you so much for listening to this episode of my series on Network Security.Once again, I'm Kevin and this is KevTechify. Let's get this adventure started.http://KevTechify.com***********************************Network Security v1Episode 6 - Device Monitoring and ManagementPart C- Routing Protocol AuthenticationPodcast Number: 21