Network Security on the Cisco Certified Network Associate (CCNA)
The podcast Network Security with KevTechify on the Cisco Certified Network Associate (CCNA) is created by KevTechify. The podcast and the artwork on this page are embedded on this page using the public podcast feed (RSS).
In this episode we are going to look at Network Security Testing Tools.
We will be discussing Network Testing Tools, and looking at Nmap and Zenmap, SuperScan, SIEM.
Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
All my details and contact information can be found on my website, https://KevTechify.com
-------------------------------------------------------
Cisco Certified Network Associate (CCNA)
Network Security v1 (NetSec)
Episode 22 - Network Security Testing
Part B - Network Security Testing Tools
Podcast Number: 92
-------------------------------------------------------
Equipment I like.
Home Lab ►► https://kit.co/KevTechify/home-lab
Networking Tools ►► https://kit.co/KevTechify/networking-tools
Studio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at Network Security Testing Techniques.
We will be discussing Operations Security, Testing and Evaluating Network Security, Types of Network Tests, and finally Applying Network Test Results.
Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
All my details and contact information can be found on my website, https://KevTechify.com
-------------------------------------------------------
Cisco Certified Network Associate (CCNA)
Network Security v1 (NetSec)
Episode 22 - Network Security Testing
Part A - Network Security Testing Techniques
Podcast Number: 91
-------------------------------------------------------
Equipment I like.
Home Lab ►► https://kit.co/KevTechify/home-lab
Networking Tools ►► https://kit.co/KevTechify/networking-tools
Studio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at Service Policies on an ASA.
We will be discussing an Overview of MPF, Configure Class Maps, Define and Activate a Policy, Configure ASA Basic Settings and Firewall Using the CLI, and finally Configure ASA Network Services, Routing, and DMZ with ACLs Using CLI.
Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
All my details and contact information can be found on my website, https://KevTechify.com
-------------------------------------------------------
Cisco Certified Network Associate (CCNA)
Network Security v1 (NetSec)
Episode 21 - ASA Firewall Configuration
Part G - Service Policies on an ASA
Podcast Number: 89
-------------------------------------------------------
Equipment I like.
Home Lab ►► https://kit.co/KevTechify/home-lab
Networking Tools ►► https://kit.co/KevTechify/networking-tools
Studio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at AAA.
We will be discussing AAA Review, Local Database and Servers, and finally AAA Configuration.
Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
All my details and contact information can be found on my website, https://KevTechify.com
-------------------------------------------------------
Cisco Certified Network Associate (CCNA)
Network Security v1 (NetSec)
Episode 21 - ASA Firewall Configuration
Part F - AAA
Podcast Number: 88
-------------------------------------------------------
Equipment I like.
Home Lab ►► https://kit.co/KevTechify/home-lab
Networking Tools ►► https://kit.co/KevTechify/networking-tools
Studio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at NAT Services on an ASA.
We will be discussing ASA NAT Overview, Configure Dynamic NAT, Configure Dynamic PAT, and Configure Static NAT.
Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
All my details and contact information can be found on my website, https://KevTechify.com
-------------------------------------------------------
Cisco Certified Network Associate (CCNA)
Network Security v1 (NetSec)
Episode 21 - ASA Firewall Configuration
Part E - NAT Services on an ASA
Podcast Number: 87
-------------------------------------------------------
Equipment I like.
Home Lab ►► https://kit.co/KevTechify/home-lab
Networking Tools ►► https://kit.co/KevTechify/networking-tools
Studio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at ASA ACLs.
We will be discussing Types of ASA ACL Filtering, Types of ASA ACLs, Syntax for Configuring an ASA ACL, Syntax for Applying an ASA ACL, ASA ACL Examples, ACLs and Object Groups, and finally ACL Using Object Groups Examples.
Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
All my details and contact information can be found on my website, https://KevTechify.com
-------------------------------------------------------
Cisco Certified Network Associate (CCNA)
Network Security v1 (NetSec)
Episode 21 - ASA Firewall Configuration
Part D - ASA ACLs
Podcast Number: 86
-------------------------------------------------------
Equipment I like.
Home Lab ►► https://kit.co/KevTechify/home-lab
Networking Tools ►► https://kit.co/KevTechify/networking-tools
Studio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at Object Groups.
We will be discussing Introduction to Objects and Object Groups, Configure Network Objects, Configure Service Objects, and Object Groups, Configure Common Object Groups.
Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
All my details and contact information can be found on my website, https://KevTechify.com
-------------------------------------------------------
Cisco Certified Network Associate (CCNA)
Network Security v1 (NetSec)
Episode 21 - ASA Firewall Configuration
Part C - Object Groups
Podcast Number: 85
-------------------------------------------------------
Equipment I like.
Home Lab ►► https://kit.co/KevTechify/home-lab
Networking Tools ►► https://kit.co/KevTechify/networking-tools
Studio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at Configure Management Settings and Services.
We will be discussing Enter Global Configuration Mode, Configure Basic Settings, Configure a Default Static Route, Configure Remote Access Services, Configure ASA Basic Settings Using the CLI, Configure Network Time Protocol Services, and finally Configure DHCP Services.
Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
All my details and contact information can be found on my website, https://KevTechify.com
-------------------------------------------------------
Cisco Certified Network Associate (CCNA)
Network Security v1 (NetSec)
Episode 21 - ASA Firewall Configuration
Part B - Configure Management Settings and Services
Podcast Number: 84
-------------------------------------------------------
Equipment I like.
Home Lab ►► https://kit.co/KevTechify/home-lab
Networking Tools ►► https://kit.co/KevTechify/networking-tools
Studio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at Basic ASA Firewall Configuration.
We will be discussing Basic ASA Settings, ASA Default Configuration, and ASA Interactive Setup Initialization Wizard.
Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
All my details and contact information can be found on my website, https://KevTechify.com
-------------------------------------------------------
Cisco Certified Network Associate (CCNA)
Network Security v1 (NetSec)
Episode 21 - ASA Firewall Configuration
Part A - Basic ASA Firewall Configuration
Podcast Number: 83
-------------------------------------------------------
Equipment I like.
Home Lab ►► https://kit.co/KevTechify/home-lab
Networking Tools ►► https://kit.co/KevTechify/networking-tools
Studio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at The ASA 5506-X with FirePOWER Services.
We will be discussing an Overview of ASA 5506-X, ASA Security Levels, and ASA 5506-X Deployment Scenarios.
Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
All my details and contact information can be found on my website, https://KevTechify.com
-------------------------------------------------------
Cisco Certified Network Associate (CCNA)
Network Security v1 (NetSec)
Episode 20 - Introduction to the ASA
Part B - The ASA 5506-X with FirePOWER Services
Podcast Number: 82
-------------------------------------------------------
Equipment I like.
Home Lab ►► https://kit.co/KevTechify/home-lab
Networking Tools ►► https://kit.co/KevTechify/networking-tools
Studio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at ASA Solutions.
We will be discussing ASA Firewall Models, Cisco ASA Next-Generation Firewall Appliances, Advanced ASA Firewall Features, Cisco Firepower Series, Cisco FTD: Threat Centric NGFW, Review of Firewalls in Network Design, ASA Firewall Modes of Operation, and finally ASA Licensing Requirements.
Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
All my details and contact information can be found on my website, https://KevTechify.com
-------------------------------------------------------
Cisco Certified Network Associate (CCNA)
Network Security v1 (NetSec)
Episode 20 - Introduction to the ASA
Part A - ASA Solutions
Podcast Number: 81
-------------------------------------------------------
Equipment I like.
Home Lab ►► https://kit.co/KevTechify/home-lab
Networking Tools ►► https://kit.co/KevTechify/networking-tools
Studio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at IPsec VPN.
We will be discussing Send Interesting Traffic, Verify the ISAKMP and IPsec Tunnels, Site-to-Site IPsec VPN Configuration, Configure and Verify a Site-to-Site IPsec VPN, and finally Configure a Site-to-Site VPN.
Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
All my details and contact information can be found on my website, https://KevTechify.com
-------------------------------------------------------
Cisco Certified Network Associate (CCNA)
Network Security v1 (NetSec)
Episode 19 - Implement Site-to-Site IPsec VPNs
Part E - IPsec VPN
Podcast Number: 80
-------------------------------------------------------
Equipment I like.
Home Lab ►► https://kit.co/KevTechify/home-lab
Networking Tools ►► https://kit.co/KevTechify/networking-tools
Studio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at Crypto Map.
We will be discussing Syntax to Configure a Crypto Map, Crypto Map Configuration, and finally Apply and Verify the Crypto Map.
Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
All my details and contact information can be found on my website, https://KevTechify.com
-------------------------------------------------------
Cisco Certified Network Associate (CCNA)
Network Security v1 (NetSec)
Episode 19 - Implement Site-to-Site IPsec VPNs
Part D - Crypto Map
Podcast Number: 79
-------------------------------------------------------
Equipment I like.
Home Lab ►► https://kit.co/KevTechify/home-lab
Networking Tools ►► https://kit.co/KevTechify/networking-tools
Studio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at IPsec Policy.
We will be discussing Define Interesting Traffic and Configure IPsec Transform Set.
Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
All my details and contact information can be found on my website, https://KevTechify.com
-------------------------------------------------------
Cisco Certified Network Associate (CCNA)
Network Security v1 (NetSec)
Episode 19 - Implement Site-to-Site IPsec VPNs
Part C - IPsec Policy
Podcast Number: 78
-------------------------------------------------------
Equipment I like.
Home Lab ►► https://kit.co/KevTechify/home-lab
Networking Tools ►► https://kit.co/KevTechify/networking-tools
Studio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at ISAKMP Policy.
We will be discussing the Default ISAKMP Policies, Syntax to Configure a New ISAKMP Policy, ISAKMP Policy Configuration, and finally Pre-Shared Key Configuration.
Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
All my details and contact information can be found on my website, https://KevTechify.com
-------------------------------------------------------
Cisco Certified Network Associate (CCNA)
Network Security v1 (NetSec)
Episode 19 - Implement Site-to-Site IPsec VPNs
Part B - ISAKMP Policy
Podcast Number: 77
-------------------------------------------------------
Equipment I like.
Home Lab ►► https://kit.co/KevTechify/home-lab
Networking Tools ►► https://kit.co/KevTechify/networking-tools
Studio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at Configure a Site-to-Site IPsec VPN.
We will be discussing IPsec Negotiation, Site-to-Site IPsec VPN Topology, IPsec VPN Configuration Tasks, Existing ACL Configurations, and finally Handling Broadcast and Multicast Traffic.
Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
All my details and contact information can be found on my website, https://KevTechify.com
-------------------------------------------------------
Cisco Certified Network Associate (CCNA)
Network Security v1 (NetSec)
Episode 19 - Implement Site-to-Site IPsec VPNs
Part A - Configure a Site-to-Site IPsec VPN
Podcast Number: 76
-------------------------------------------------------
Equipment I like.
Home Lab ►► https://kit.co/KevTechify/home-lab
Networking Tools ►► https://kit.co/KevTechify/networking-tools
Studio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at Internet Key Exchange.
We will be discussing the IKE Protocol, Phase 1 and 2 Key Negotiation, Phase 2: Negotiating SAs, and finally IKE Phase 1 and Phase 2.
Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
All my details and contact information can be found on my website, https://KevTechify.com
-------------------------------------------------------
Cisco Certified Network Associate (CCNA)
Network Security v1 (NetSec)
Episode 18 - VPNs
Part E - Internet Key Exchange
Podcast Number: 75
-------------------------------------------------------
Equipment I like.
Home Lab ►► https://kit.co/KevTechify/home-lab
Networking Tools ►► https://kit.co/KevTechify/networking-tools
Studio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at IPsec Protocols.
We will be discussing IPsec Protocol Overview, Authentication Header, Encapsulation Security Protocol, ESP Encrypts and Authenticates, and finally Transport and Tunnel Modes.
Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
All my details and contact information can be found on my website, https://KevTechify.com
-------------------------------------------------------
Cisco Certified Network Associate (CCNA)
Network Security v1 (NetSec)
Episode 18 - VPNs
Part D - IPsec Protocols
Podcast Number: 74
-------------------------------------------------------
Equipment I like.
Home Lab ►► https://kit.co/KevTechify/home-lab
Networking Tools ►► https://kit.co/KevTechify/networking-tools
Studio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at IPsec Overview.
We will be discussing IPsec Concepts, IPsec Technologies, IPsec Protocol Encapsulation, Confidentiality, Integrity, Authentication, Secure Key Exchange with Diffie-Hellman, and finally IPsec Transport and Tunnel Modes.
Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
All my details and contact information can be found on my website, https://KevTechify.com
-------------------------------------------------------
Cisco Certified Network Associate (CCNA)
Network Security v1 (NetSec)
Episode 18 - VPNs
Part C - IPsec Overview
Podcast Number: 73
-------------------------------------------------------
Equipment I like.
Home Lab ►► https://kit.co/KevTechify/home-lab
Networking Tools ►► https://kit.co/KevTechify/networking-tools
Studio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at VPN Topologies.
We will be discussing Site-to-Site and Remote-Access VPNs, Remote-Access VPNs, SSL VPNs, and Site-to-Site IPsec VPNs.
Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
All my details and contact information can be found on my website, https://KevTechify.com
-------------------------------------------------------
Cisco Certified Network Associate (CCNA)
Network Security v1 (NetSec)
Episode 18 - VPNs
Part B - VPN Topologies
Podcast Number: 72
-------------------------------------------------------
Equipment I like.
Home Lab ►► https://kit.co/KevTechify/home-lab
Networking Tools ►► https://kit.co/KevTechify/networking-tools
Studio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at VPN Overview.
We will be discussing Virtual Private Networks and VPN Benefits.
Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
All my details and contact information can be found on my website, https://KevTechify.com
-------------------------------------------------------
Cisco Certified Network Associate (CCNA)
Network Security v1 (NetSec)
Episode 18 - VPNs
Part A - VPN Overview
Podcast Number: 71
-------------------------------------------------------
Equipment I like.
Home Lab ►► https://kit.co/KevTechify/home-lab
Networking Tools ►► https://kit.co/KevTechify/networking-tools
Studio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at Applications and Impacts of Cryptography.
We will be discussing PKI Applications, Encrypted Network Transactions, and Encryption and Security Monitoring.
Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
All my details and contact information can be found on my website, https://KevTechify.com
-------------------------------------------------------
Cisco Certified Network Associate (CCNA)
Network Security v1 (NetSec)
Episode 17 - Public Key Cryptography
Part C - Applications and Impacts of Cryptography
Podcast Number: 70
-------------------------------------------------------
Equipment I like.
Home Lab ►► https://kit.co/KevTechify/home-lab
Networking Tools ►► https://kit.co/KevTechify/networking-tools
Studio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at Authorities and the PKI Trust System.
We will be discussing Public Key Management, The Public Key Infrastructure, The PKI Authorities System, The PKI Trust System, Interoperability of Different PKI Vendors, Certificate Enrollment, Authentication, and Revocation, and finally Certificate Authority Stores.
Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
All my details and contact information can be found on my website, https://KevTechify.com
-------------------------------------------------------
Cisco Certified Network Associate (CCNA)
Network Security v1 (NetSec)
Episode 17 - Public Key Cryptography
Part B - Authorities and the PKI Trust System
Podcast Number: 69
-------------------------------------------------------
Equipment I like.
Home Lab ►► https://kit.co/KevTechify/home-lab
Networking Tools ►► https://kit.co/KevTechify/networking-tools
Studio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at Public Key Cryptography with Digital Signatures.
We will be discussing Digital Signature Overview, Digital Signatures for Code Signing, and Digital Signatures for Digital Certificates.
Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
All my details and contact information can be found on my website, https://KevTechify.com
-------------------------------------------------------
Cisco Certified Network Associate (CCNA)
Network Security v1 (NetSec)
Episode 17 - Public Key Cryptography
Part A - Public Key Cryptography with Digital Signatures
Podcast Number: 68
-------------------------------------------------------
Equipment I like.
Home Lab ►► https://kit.co/KevTechify/home-lab
Networking Tools ►► https://kit.co/KevTechify/networking-tools
Studio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at Confidentiality.
We will be discussing Data Confidentiality, Symmetric Encryption, Asymmetric Encryption, Confidentiality, Authentication, Integrity, Diffie-Hellman, Cryptography, Classify the Encryption Algorithms, and finally Encrypting and Decrypting Data Using OpenSSL.
Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
All my details and contact information can be found on my website, https://KevTechify.com
-------------------------------------------------------
Cisco Certified Network Associate (CCNA)
Network Security v1 (NetSec)
Episode 16 - Basic Integrity and Authenticity
Part C - Confidentiality
Podcast Number: 67
-------------------------------------------------------
Equipment I like.
Home Lab ►► https://kit.co/KevTechify/home-lab
Networking Tools ►► https://kit.co/KevTechify/networking-tools
Studio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at Key Management.
We will be discussing Characteristics of Key Management, Key Length and Keyspace, the Keyspace, Types of Cryptographic Keys, and Choice of Cryptographic Keys.
Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
All my details and contact information can be found on my website, https://KevTechify.com
-------------------------------------------------------
Cisco Certified Network Associate (CCNA)
Network Security v1 (NetSec)
Episode 16 - Basic Integrity and Authenticity
Part B - Key Management
Podcast Number: 66
-------------------------------------------------------
Equipment I like.
Home Lab ►► https://kit.co/KevTechify/home-lab
Networking Tools ►► https://kit.co/KevTechify/networking-tools
Studio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at Integrity and Authenticity.
We will be discussing Secure Communications, Cryptographic Hash Functions, Cryptographic Hash Operation, MD5 and SHA, and Origin Authentication.
Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
All my details and contact information can be found on my website, https://KevTechify.com
-------------------------------------------------------
Cisco Certified Network Associate (CCNA)
Network Security v1 (NetSec)
Episode 16 - Basic Integrity and Authenticity
Part A - Integrity and Authenticity
Podcast Number: 65
-------------------------------------------------------
Equipment I like.
Home Lab ►► https://kit.co/KevTechify/home-lab
Networking Tools ►► https://kit.co/KevTechify/networking-tools
Studio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at Cryptology.
We will be discussing Making and Breaking Secret Codes, Cryptanalysts, The Secret is in the Keys, Cryptology Terminology, and Explore Encryption Methods.
Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
All my details and contact information can be found on my website, https://KevTechify.com
-------------------------------------------------------
Cisco Certified Network Associate (CCNA)
Network Security v1 (NetSec)
Episode 15 - Cryptographic Services
Part D - Cryptology
Podcast Number: 64
-------------------------------------------------------
Equipment I like.
Home Lab ►► https://kit.co/KevTechify/home-lab
Networking Tools ►► https://kit.co/KevTechify/networking-tools
Studio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at Cryptanalysis.
We will be discussing Cracking Code, Methods of Cracking Code, and a Cracking Code Example.
Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
All my details and contact information can be found on my website, https://KevTechify.com
-------------------------------------------------------
Cisco Certified Network Associate (CCNA)
Network Security v1 (NetSec)
Episode 15 - Cryptographic Services
Part C - Cryptanalysis
Podcast Number: 63
-------------------------------------------------------
Equipment I like.
Home Lab ►► https://kit.co/KevTechify/home-lab
Networking Tools ►► https://kit.co/KevTechify/networking-tools
Studio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at Cryptography.
We will be discussing Creating Cipher Text, Transposition Ciphers, Substitution Ciphers, A More Complex Substitution Cipher, and One-Time Pad Ciphers.
Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
All my details and contact information can be found on my website, https://KevTechify.com
-------------------------------------------------------
Cisco Certified Network Associate (CCNA)
Network Security v1 (NetSec)
Episode 15 - Cryptographic Services
Part B - Cryptography
Podcast Number: 62
-------------------------------------------------------
Equipment I like.
Home Lab ►► https://kit.co/KevTechify/home-lab
Networking Tools ►► https://kit.co/KevTechify/networking-tools
Studio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at Secure Communications.
We will be discussing Authentication, Integrity, and Confidentiality, Authentication, Data Integrity, and Data Confidentiality.
Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
All my details and contact information can be found on my website, https://KevTechify.com
-------------------------------------------------------
Cisco Certified Network Associate (CCNA)
Network Security v1 (NetSec)
Episode 15 - Cryptographic Services
Part A - Secure Communications
Podcast Number: 61
-------------------------------------------------------
Equipment I like.
Home Lab ►► https://kit.co/KevTechify/home-lab
Networking Tools ►► https://kit.co/KevTechify/networking-tools
Studio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at Mitigate Spanning Tree Protocol (STP) Attacks.
We will be discussing Spanning Tree Protocol (STP) Attack, Mitigating STP Attacks, Configure PortFast, Configure BPDU Guard, Configure Root Guard, Configure Loop Guard, Configure STP Security, Implement STP Security, and Layer 2 VLAN Security.
Thank you so much for listening to this episode of my series on Network Security.
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
All my details and contact information can be found on my website, https://KevTechify.com
-------------------------------------------------------
Network Security v1
Episode 14 - Layer 2 Security Considerations
Part I - Mitigate STP Attacks
Podcast Number: 60
-------------------------------------------------------
Equipment I like.
Home Lab ►► https://kit.co/KevTechify/home-lab
Networking Tools ►► https://kit.co/KevTechify/networking-tools
Studio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at Spanning Tree Protocol (STP).
We will be discussing Spanning Tree Protocol (STP), STP Recalculation, Layer 2 Loops, STP Port Roles, STP Root Bridge, STP Path Cost, Select the Root Bridge, Observe STP Operation, and Investigate STP Loop Prevention.
Thank you so much for listening to this episode of my series on Network Security.
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
All my details and contact information can be found on my website, https://KevTechify.com
-------------------------------------------------------
Network Security v1
Episode 14 - Layer 2 Security Considerations
Part H - Spanning Tree Protocol
Podcast Number: 59
-------------------------------------------------------
Equipment I like.
Home Lab ►► https://kit.co/KevTechify/home-lab
Networking Tools ►► https://kit.co/KevTechify/networking-tools
Studio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at Mitigate Address Spoofing Attacks.
We will be discussing Address Spoofing Attacks, Address Spoofing Attack Mitigation, and Configure IP Source Guard.
Thank you so much for listening to this episode of my series on Network Security.
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
All my details and contact information can be found on my website, https://KevTechify.com
-------------------------------------------------------
Network Security v1
Episode 14 - Layer 2 Security Considerations
Part G - Mitigate Address Spoofing Attacks
Podcast Number: 58
-------------------------------------------------------
Equipment I like.
Home Lab ►► https://kit.co/KevTechify/home-lab
Networking Tools ►► https://kit.co/KevTechify/networking-tools
Studio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at Mitigate Address Resolution Protocol (ARP) Attacks.
We will be discussing Address Resolution Protocol (ARP) Attacks, ARP Spoofing, Dynamic ARP Inspection, Dynamic ARP Inspection (DAI) Implementation Guidelines, and an DAI Configuration Example.
Thank you so much for listening to this episode of my series on Network Security.
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
All my details and contact information can be found on my website, https://KevTechify.com
-------------------------------------------------------
Network Security v1
Episode 14 - Layer 2 Security Considerations
Part F - Mitigate ARP Attacks
Podcast Number: 57
-------------------------------------------------------
Equipment I like.
Home Lab ►► https://kit.co/KevTechify/home-lab
Networking Tools ►► https://kit.co/KevTechify/networking-tools
Studio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at Mitigate Dynamic Host Configuration Protocol (DHCP) Attacks.
We will be discussing DHCP Attacks, DHCP Attacks Mitigation, Steps to Implement DHCP Snooping, and an DHCP Snooping Configuration Example.
Thank you so much for listening to this episode of my series on Network Security.
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
All my details and contact information can be found on my website, https://KevTechify.com
-------------------------------------------------------
Network Security v1
Episode 14 - Layer 2 Security Considerations
Part E - Mitigate DHCP Attacks
Podcast Number: 56
-------------------------------------------------------
Equipment I like.
Home Lab ►► https://kit.co/KevTechify/home-lab
Networking Tools ►► https://kit.co/KevTechify/networking-tools
Studio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at Mitigate VLAN Attacks.
We will be discussing VLAN Hopping Attacks, VLAN Double-Tagging Attack, Mitigating VLAN Hopping Attacks, Syntax Checker - Mitigate VLAN Hopping Attacks, Private VLANs, Private Virtual LAN (PVLAN) Edge Feature, Configure PVLAN Edge, and Private VLAN Tutorial and Demonstration.
Thank you so much for listening to this episode of my series on Network Security.
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
All my details and contact information can be found on my website, https://KevTechify.com
-------------------------------------------------------
Network Security v1
Episode 14 - Layer 2 Security Considerations
Part D - Mitigate VLAN Attacks
Podcast Number: 55
-------------------------------------------------------
Equipment I like.
Home Lab ►► https://kit.co/KevTechify/home-lab
Networking Tools ►► https://kit.co/KevTechify/networking-tools
Studio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at Mitigate MAC Table Attacks.
We will be discussing Secure Unused Ports, Mitigate MAC Address Table Attacks, Enable Port Security, Limit and Learn MAC Addresses, Port Security Aging, Port Security Violation Modes, Ports in error-disabled State, Verify Port Security, SNMP MAC Address Notification, and Implement Port Security.
Thank you so much for listening to this episode of my series on Network Security.
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
All my details and contact information can be found on my website, https://KevTechify.com
-------------------------------------------------------
Network Security v1
Episode 14 - Layer 2 Security Considerations
Part C - Mitigate MAC Table Attacks
Podcast Number: 54
-------------------------------------------------------
Equipment I like.
Home Lab ►► https://kit.co/KevTechify/home-lab
Networking Tools ►► https://kit.co/KevTechify/networking-tools
Studio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at MAC Table Attacks.
We will be discussing Switch Fundamentals, Switch Learning and Forwarding, Filtering Frames, MAC Address Table Flooding, MAC Address Table Attack Mitigation, , , , , , , , ,.
Thank you so much for listening to this episode of my series on Network Security.
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
All my details and contact information can be found on my website, https://KevTechify.com
-------------------------------------------------------
Network Security v1
Episode 14 - Layer 2 Security Considerations
Part B - MAC Table Attacks
Podcast Number: 53
-------------------------------------------------------
Equipment I like.
Home Lab ►► https://kit.co/KevTechify/home-lab
Networking Tools ►► https://kit.co/KevTechify/networking-tools
Studio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at Layer 2 Security Threats.
We will be discussing Describe Layer 2 Vulnerabilities, and Switch Attack Categories.
Thank you so much for listening to this episode of my series on Network Security.
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
All my details and contact information can be found on my website, https://KevTechify.com
-------------------------------------------------------
Network Security v1
Episode 14 - Layer 2 Security Considerations
Part A - Layer 2 Security Threats
Podcast Number: 52
-------------------------------------------------------
Equipment I like.
Home Lab ►► https://kit.co/KevTechify/home-lab
Networking Tools ►► https://kit.co/KevTechify/networking-tools
Studio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at 802.1X Authentication.
We will be discussing Security Using 802.1X Port-Based Authentication, Control the 802.1X Authorization State, and 802.1X Configuration.
Thank you so much for listening to this episode of my series on Network Security.
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
All my details and contact information can be found on my website, https://KevTechify.com
-------------------------------------------------------
Network Security v1
Episode 13 - Endpoint Security
Part B - 802.1X Authentication
Podcast Number: 51
-------------------------------------------------------
Equipment I like.
Home Lab ►► https://kit.co/KevTechify/home-lab
Networking Tools ►► https://kit.co/KevTechify/networking-tools
Studio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at Endpoint Security Overview.
We will be discussing Local Area Network (LAN) Elements Security, Traditional Endpoint Security, The Borderless Network, Security for Endpoints in the Borderless Network, Network-Based Malware Protection, Hardware and Software Encryption of Local Data, Network Access Control, NAC Functions, , , , , ,.
Thank you so much for listening to this episode of my series on Network Security.
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
All my details and contact information can be found on my website, https://KevTechify.com
-------------------------------------------------------
Network Security v1
Episode 13 - Endpoint Security
Part A - Endpoint Security Overview
Podcast Number: 50
-------------------------------------------------------
Equipment I like.
Home Lab ►► https://kit.co/KevTechify/home-lab
Networking Tools ►► https://kit.co/KevTechify/networking-tools
Studio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at Configure Snort Intrusion Prevention System (IPS).
We will be discussing Snort Intrusion Prevention System (IPS) Configuration Steps, Step 1. Download the Snort OVA File, Step 2. Install the Snort OVA File, Step 3. Configure Virtual Port Group Interfaces, Step 4. Activate Virtual Services, Step 5. Configure Snort Specifics, Step 6. Enable IPS Globally or on Desired Interfaces, and Step 7. Verify Snort IPS.
Thank you so much for listening to this episode of my series on Network Security.
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
All my details and contact information can be found on my website, https://KevTechify.com
-------------------------------------------------------
Network Security v1
Episode 12 - IPS Operation and Implementation
Part C - Configure Snort IPS
Podcast Number: 49
-------------------------------------------------------
Equipment I like.
Home Lab ►► https://kit.co/KevTechify/home-lab
Networking Tools ►► https://kit.co/KevTechify/networking-tools
Studio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at Cisco Snort Intrusion Prevention System (IPS).
We will be discussing Intrusion Prevention System (IPS) Service Options, NGIPS, Snort IPS, Snort Components and Rules, ISR Container Applications, Snort IPS Rule Alarms, Snort IPS Rule Actions, Snort IPS Header Rule Options, and Snort IPS Operation.
Thank you so much for listening to this episode of my series on Network Security.
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
All my details and contact information can be found on my website, https://KevTechify.com
-------------------------------------------------------
Network Security v1
Episode 12 - IPS Operation and Implementation
Part B - Cisco Snort IPS
Podcast Number: 48
-------------------------------------------------------
Equipment I like.
Home Lab ►► https://kit.co/KevTechify/home-lab
Networking Tools ►► https://kit.co/KevTechify/networking-tools
Studio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at IPS Signatures.
We will be discussing Intrusion Prevention System (IPS) Signature Attributes, Types of Signatures, IPS Signature Alarms, IPS Signature Actions, and Evaluating Alerts.
Thank you so much for listening to this episode of my series on Network Security.
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
All my details and contact information can be found on my website, https://KevTechify.com
-------------------------------------------------------
Network Security v1
Episode 12 - IPS Operation and Implementation
Part A - IPS Signatures
Podcast Number: 47
-------------------------------------------------------
Equipment I like.
Home Lab ►► https://kit.co/KevTechify/home-lab
Networking Tools ►► https://kit.co/KevTechify/networking-tools
Studio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at Cisco Switched Port Analyzer (SPAN).
We will be discussing Network Monitoring Methods, Network Taps, Traffic Mirroring and Cisco Switched Port Analyzer (SPAN), Configure Cisco SPAN, and Implement a Local SPAN.
Thank you so much for listening to this episode of my series on Network Security.
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
All my details and contact information can be found on my website, https://KevTechify.com
-------------------------------------------------------
Network Security v1
Episode 11 - IPS Technologies
Part D - Cisco Switched Port Analyzer
Podcast Number: 46
-------------------------------------------------------
Equipment I like.
Home Lab ►► https://kit.co/KevTechify/home-lab
Networking Tools ►► https://kit.co/KevTechify/networking-tools
Studio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at Intrusion Prevention System (IPS) on Cisco Integrated Services Routers (ISRs).
We will be discussing Intrusion Prevention System (IPS) Components, Cisco IOS IPS, Snort IPS, Snort Operation, Snort Features, and Snort System Requirements.
Thank you so much for listening to this episode of my series on Network Security.
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
All my details and contact information can be found on my website, https://KevTechify.com
-------------------------------------------------------
Network Security v1
Episode 11 - IPS Technologies
Part C - IPS on Cisco ISRs
Podcast Number: 45
-------------------------------------------------------
Equipment I like.
Home Lab ►► https://kit.co/KevTechify/home-lab
Networking Tools ►► https://kit.co/KevTechify/networking-tools
Studio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at Intrusion Prevention System (IPS) Implementations.
We will be discussing Types of IPS, Network-Based IPS, and Modes of Deployment.
Thank you so much for listening to this episode of my series on Network Security.
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
All my details and contact information can be found on my website, https://KevTechify.com
-------------------------------------------------------
Network Security v1
Episode 11 - IPS Technologies
Part B - IPS Implementations
Podcast Number: 44
-------------------------------------------------------
Equipment I like.
Home Lab ►► https://kit.co/KevTechify/home-lab
Networking Tools ►► https://kit.co/KevTechify/networking-tools
Studio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at Intrusion Detection Systems (IDS) and Intrusion Prevention System (IPS) Characteristics.
We will be discussing Zero-Day Attacks, Monitor for Attacks, Intrusion Prevention and Detection Devices, and finally Advantages and Disadvantages of IDS and IPS.
Thank you so much for listening to this episode of my series on Network Security.
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
All my details and contact information can be found on my website, https://KevTechify.com
-------------------------------------------------------
Network Security v1
Episode 11 - IPS Technologies
Part A - IDS and IPS Characteristics
Podcast Number: 43
-------------------------------------------------------
Equipment I like.
Home Lab ►► https://kit.co/KevTechify/home-lab
Networking Tools ►► https://kit.co/KevTechify/networking-tools
Studio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at Configure a ZPF.
We will be discussing Configure a ZPF, Create the Zones, Identify Traffic, Define an Action, Identify a Zone-Pair and Match to a Policy, Assign Zones to Interfaces, Verify a ZPF Configuration, Configure a ZPF, and ZPF Configuration Considerations.
Thank you so much for listening to this episode of my series on Network Security.
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
All my details and contact information can be found on my website, https://KevTechify.com
-------------------------------------------------------
Network Security v1
Episode 10 - Zone-Based Policy Firewalls
Part C- Configure a ZPF
Podcast Number: 42
-------------------------------------------------------
Equipment I like.
Home Lab ►► https://kit.co/KevTechify/home-lab
Networking Tools ►► https://kit.co/KevTechify/networking-tools
Studio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at ZPF Operation.
We will be discussing ZPF Actions, Rules for Transit Traffic, and Rules for Traffic to the Self Zone.
Thank you so much for listening to this episode of my series on Network Security.
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
All my details and contact information can be found on my website, https://KevTechify.com
-------------------------------------------------------
Network Security v1
Episode 10 - Zone-Based Policy Firewalls
Part B- ZPF Operation
Podcast Number: 41
-------------------------------------------------------
Equipment I like.
Home Lab ►► https://kit.co/KevTechify/home-lab
Networking Tools ►► https://kit.co/KevTechify/networking-tools
Studio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at ZPF Overview.
We will be discussing Benefits of a ZPF and ZPF Design.
Thank you so much for listening to this episode of my series on Network Security.
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
All my details and contact information can be found on my website, https://KevTechify.com
-------------------------------------------------------
Network Security v1
Episode 10 - Zone-Based Policy Firewalls
Part A- ZPF Overview
Podcast Number: 40
-------------------------------------------------------
Equipment I like.
Home Lab ►► https://kit.co/KevTechify/home-lab
Networking Tools ►► https://kit.co/KevTechify/networking-tools
Studio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at Firewalls in Network Design.
We will be discussing Common Security Architectures, Layered Defense, Network Security Design Concepts, and Identify Packet Flow.
Thank you so much for listening to this episode of my series on Network Security.
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
All my details and contact information can be found on my website, https://KevTechify.com
-------------------------------------------------------
Network Security v1
Episode 9 - Firewall Technologies
Part B- Firewalls in Network Design
Podcast Number: 39
-------------------------------------------------------
Equipment I like.
Home Lab ►► https://kit.co/KevTechify/home-lab
Networking Tools ►► https://kit.co/KevTechify/networking-tools
Studio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at Secure Networks with Firewalls.
We will be discussing Firewalls, Types of Firewalls, Packet Filtering Firewall Benefits and Limitations, and Stateful Firewall Benefits and Limitations.
Thank you so much for listening to this episode of my series on Network Security.
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
All my details and contact information can be found on my website, https://KevTechify.com
-------------------------------------------------------
Network Security v1
Episode 9 - Firewall Technologies
Part A- Secure Networks with Firewalls
Podcast Number: 38
-------------------------------------------------------
Equipment I like.
Home Lab ►► https://kit.co/KevTechify/home-lab
Networking Tools ►► https://kit.co/KevTechify/networking-tools
Studio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at IPv6 ACLs.
We will be discussing IPv6 ACL Overview, IPv6 ACL Syntax, Configure IPv6 ACLs, and Configure IPv6 ACLs.
Thank you so much for listening to this episode of my series on Network Security.
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
All my details and contact information can be found on my website, https://KevTechify.com
-------------------------------------------------------
Network Security v1
Episode 8 - Access Control Lists
Part G- IPv6 ACLs
Podcast Number: 37
-------------------------------------------------------
Equipment I like.
Home Lab ►► https://kit.co/KevTechify/home-lab
Networking Tools ►► https://kit.co/KevTechify/networking-tools
Studio Equipment ►► https://kit.co/KevTechify/studio-equipment
In this episode we are going to look at Mitigate Attacks with ACLs.
We will be discussing Mitigate Spoofing Attacks, Permit Necessary Traffic through a Firewall, Mitigate ICMP Attacks, Mitigate SNMP Attacks, and Configure IP ACLs to Mitigate Attacks.
Thank you so much for listening to this episode of my series on Network Security.
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
http://KevTechify.com
***********************************
Network Security v1
Episode 8 - Access Control Lists
Part F- Mitigate Attacks with ACLs
Podcast Number: 36
In this episode we are going to look at Implement ACLs.
We will be discussing ACL Configuration Guidelines, Apply an ACL, Where to Place ACLs, Standard ACL Placement Example, Configure Named Standard IPv4 ACLs, Configure Numbered Standard IPv4 ACLs, and Extended ACL Placement Example.
Thank you so much for listening to this episode of my series on Network Security.
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
http://KevTechify.com
***********************************
Network Security v1
Episode 8 - Access Control Lists
Part E- Implement ACLs
Podcast Number: 35
In this episode we are going to look at Modify ACLs.
We will be discussing Two Methods to Modify an ACL, Text Editor Method, Sequence Number Method, Syntax Checker - Modify IPv4 ACLs, , , , , , , , , ,.
Thank you so much for listening to this episode of my series on Network Security.
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
http://KevTechify.com
***********************************
Network Security v1
Episode 8 - Access Control Lists
Part D- Modify ACLs
Podcast Number: 34
In this episode we are going to look at Configure ACLs.
We will be discussing Creating an ACL, Numbered Standard IPv4 ACL Syntax, Named Standard IPv4 ACL Syntax, Numbered Extended IPv4 ACL Syntax, Protocols and Port Numbers, TCP Established Extended ACL, and Named Extended IPv4 ACL Syntax.
Thank you so much for listening to this episode of my series on Network Security.
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
http://KevTechify.com
***********************************
Network Security v1
Episode 8 - Access Control Lists
Part C- Configure ACLs
Podcast Number: 33
In this episode we are going to look at Wildcard Masking.
We will be discussing Wildcard Mask Overview, Wildcard Mask Types, Wildcard Mask Calculation, and Wildcard Mask Keywords.
Thank you so much for listening to this episode of my series on Network Security.
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
http://KevTechify.com
***********************************
Network Security v1
Episode 8 - Access Control Lists
Part B- Wildcard Masking
Podcast Number: 32
In this episode we are going to look at Introduction to Access Control Lists.
We will be discussing What is an ACL?, Packet Filtering, Numbered and Named ACLs, ACL Operation, and an ACL Demonstration.
Thank you so much for listening to this episode of my series on Network Security.
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
http://KevTechify.com
***********************************
Network Security v1
Episode 8 - Access Control Lists
Part A- Introduction to Access Control Lists
Podcast Number: 31
In this episode we are going to look at Configure Server-Based Authorization and Accounting.
We will be discussing Introduction to Server-Based AAA Authorization, AAA Authorization Configuration, Introduction to Server-Based AAA Accounting, and AAA Accounting Configuration.
Thank you so much for listening to this episode of my series on Network Security.
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
http://KevTechify.com
***********************************
Network Security v1
Episode 7 - Authentication, Authorization, and Accounting (AAA)
Part E- Configure Server-Based Authorization and Accounting
Podcast Number: 30
In this episode we are going to look at Configure Server-Based Authentication.
We will be discussing Steps to Configure Server-Based AAA Authentication, Configure TACACS+ Servers, Configure RADIUS Servers, and Authenticate to the AAA Server Configuration Commands, .
Thank you so much for listening to this episode of my series on Network Security.
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
http://KevTechify.com
***********************************
Network Security v1
Episode 7 - Authentication, Authorization, and Accounting (AAA)
Part D- Configure Server-Based Authentication
Podcast Number: 29
In this episode we are going to look at Server-Based AAA Characteristics and Protocols.
We will be discussing Compare Local AAA and Server-Based AAA Implementations, Cisco Identity Services Engine (ISE), The TACACS+ and RADIUS Protocols, TACACS+ Authentication, and RADIUS Authentication.
Thank you so much for listening to this episode of my series on Network Security.
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
http://KevTechify.com
***********************************
Network Security v1
Episode 7 - Authentication, Authorization, and Accounting (AAA)
Part C- Server-Based AAA Characteristics and Protocols
Podcast Number: 28
In this episode we are going to look at Configure Local AAA Authentication.
We will be discussing Authenticate Administrative Access, Authentication Methods, Default and Named Methods, Fine-Tuning the Authentication Configuration, Configure Local AAA Authentication, and Configure Local AAA for Console and VTY Access.
Thank you so much for listening to this episode of my series on Network Security.
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
http://KevTechify.com
***********************************
Network Security v1
Episode 7 - Authentication, Authorization, and Accounting (AAA)
Part B- Configure Local AAA Authentication
Podcast Number: 27
In this episode we are going to look at AAA Characteristics.
We will be discussing Authentication without AAA, AAA Components, Authentication Modes, Authorization, and Accounting.
Thank you so much for listening to this episode of my series on Network Security.
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
http://KevTechify.com
***********************************
Network Security v1
Episode 7 - Authentication, Authorization, and Accounting (AAA)
Part A- AAA Characteristics
Podcast Number: 26
In this episode we are going to look at SNMP Configuration.
We will be discussing Introduction to SNMP, SNMP Operation, Management Information Base (MIB), SNMP Versions, SNMP Vulnerabilities, SNMPv3, SNMPv3 Security Configuration, and Configure Cisco Devices for Syslog, NTP, and SSH Operations.
Thank you so much for listening to this episode of my series on Network Security.
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
http://KevTechify.com
***********************************
Network Security v1
Episode 6 - Device Monitoring and Management
Part G- SNMP Configuration
Podcast Number: 25
In this episode we are going to look at NTP Configuration.
We will be discussing Time and Calendar Services, NTP Operation, and Configure and Verify NTP.
Thank you so much for listening to this episode of my series on Network Security.
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
http://KevTechify.com
***********************************
Network Security v1
Episode 6 - Device Monitoring and Management
Part F- NTP Configuration
Podcast Number: 24
In this episode we are going to look at Network Security Using Syslog.
We will be discussing Introduction to Syslog, Syslog Operation, Syslog Message Format, Syslog Facilities, Configure Syslog Timestamps, Syslog Systems, and Syslog Configuration.
Thank you so much for listening to this episode of my series on Network Security.
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
http://KevTechify.com
***********************************
Network Security v1
Episode 6 - Device Monitoring and Management
Part E- Network Security Using Syslog
Podcast Number: 23
In this episode we are going to look at Secure Management and Reporting.
We will be discussing Types of Management Access and Out-of-Band and In-Band Access.
Thank you so much for listening to this episode of my series on Network Security.
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
http://KevTechify.com
***********************************
Network Security v1
Episode 6 - Device Monitoring and Management
Part D- Secure Management and Reporting
Podcast Number: 22
In this episode we are going to look at Routing Protocol Authentication.
We will be discussing Dynamic Routing Protocols, Routing Protocol Spoofing, OSPF MD5 Routing Protocol Authentication, OSPF SHA Routing Protocol Authentication, Syntax Checker- OSPF SHA Routing Protocol Authentication, Basic Device Configuration and OSPF Authentication, Configure OSPF Authentication, , , , , , ,.
Thank you so much for listening to this episode of my series on Network Security.
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
http://KevTechify.com
***********************************
Network Security v1
Episode 6 - Device Monitoring and Management
Part C- Routing Protocol Authentication
Podcast Number: 21
In this episode we are going to look at Lock Down a Router Using AutoSecure.
We will be discussing Discovery Protocols CDP and LLDP, Settings for Protocols and Services, Cisco AutoSecure, Cisco AutoSecure Configuration Example, and Configure Automated Security Features.
Thank you so much for listening to this episode of my series on Network Security.
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
http://KevTechify.com
***********************************
Network Security v1
Episode 6 - Device Monitoring and Management
Part B- Lock Down a Router Using AutoSecure
Podcast Number: 20
In this episode we are going to look at Secure Cisco IOS Image and Configuration Files.
We will be discussing Cisco IOS Resilient Configuration Feature, Enable the IOS Image Resilience Feature, The Primary Bootset Image, Configure Secure Copy, and Recover a Router Password.
Thank you so much for listening to this episode of my series on Network Security.
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
http://KevTechify.com
***********************************
Network Security v1
Episode 6 - Device Monitoring and Management
Part A- Secure Cisco IOS Image and Configuration Files
Podcast Number: 19
In this episode we are going to look at Configure Role-Based CLI.
We will be discussing Role-Based CLI Access, Configure Role-Based Views, Configure Administrative Roles, and Configure Role-Based CLI Superviews.
Thank you so much for listening to this episode of my series on Network Security.
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
http://KevTechify.com
***********************************
Network Security v1
Episode 5 - Assigning Administrative Roles
Part B- Configure Role-Based CLI
Podcast Number: 18
In this episode we are going to look at Configure Privilege Levels.
We will be discussing Limiting Command Availability, Configuring and Assigning Privilege Levels, and Limitations of Privilege Levels.
Thank you so much for listening to this episode of my series on Network Security.
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
http://KevTechify.com
***********************************
Network Security v1
Episode 5 - Assigning Administrative Roles
Part A- Configure Privilege Levels
Podcast Number: 17
Greetings to all my Tech Heads out there in the KevTechify Nation and if you are new here, welcome.
In this episode we are going to look at Configure SSH.
We will be discussing The Need for SSH, Enable SSH, Enhance SSH Login Security, Syntax Checker - Enable SSH on R2, Connect a Router to an SSH-Enabled Router, Connect a Host to an SSH-Enabled Router, Configure Secure Administrative Access, Configure Secure Passwords and SSH, and Configure Network Devices with SSH.
Thank you so much for listening to this episode of my series on Network Security.
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
http://KevTechify.com
***********************************
Network Security v1
Episode 4 - Secure Device Access
Part D- Configure SSH
Podcast Number: 16
Greetings to all my Tech Heads out there in the KevTechify Nation and if you are new here, welcome.
In this episode we are going to look at Configure Enhanced Security for Virtual Logins.
We will be discussing Enhance the Login Process, Configure Login Enhancement Features, Enable Login Enhancements, and Log Failed Attempts.
Thank you so much for listening to this episode of my series on Network Security.
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
http://KevTechify.com
***********************************
Network Security v1
Episode 4 - Secure Device Access
Part C- Configure Enhanced Security for Virtual Logins
Podcast Number: 15
Greetings to all my Tech Heads out there in the KevTechify Nation and if you are new here, welcome.
In this episode we are going to look at Configure Secure Administrative Access.
We will be discussing Passwords, Configure Passwords, Encrypt Passwords, Additional Password Security, and Secret Password Algorithms.
Thank you so much for listening to this episode of my series on Network Security.
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
http://KevTechify.com
***********************************
Network Security v1
Episode 4 - Secure Device Access
Part B- Configure Secure Administrative Access
Podcast Number: 14
Greetings to all my Tech Heads out there in the KevTechify Nation and if you are new here, welcome.
In this episode we are going to look at Secure the Edge Router.
We will be discussing Secure the Network Infrastructure, Edge Router Security Approaches, Three Areas of Router Security, Secure Administrative Access, and Secure Local and Remote Access.
Thank you so much for listening to this episode of my series on Network Security.
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
http://KevTechify.com
***********************************
Network Security v1
Episode 4 - Secure Device Access
Part A- Secure the Edge Router
Podcast Number: 13
Greetings to all my Tech Heads out there in the KevTechify Nation and if you are new here, welcome.
In this episode we are going to look at Cisco Network Foundation Protection Framework.
We will be discussing NFP Framework, Securing the Control Plane, Securing the Management Plane, and Securing the Data Plane.
Thank you so much for listening to this episode of my series on Network Security.
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
http://KevTechify.com
***********************************
Network Security v1
Episode 3 - Mitigating Threats
Part E- Cisco Network Foundation Protection Framework
Podcast Number: 12
Greetings to all my Tech Heads out there in the KevTechify Nation and if you are new here, welcome.
In this episode we are going to look at Security Tools, Platforms, and Services.
We will be discussing The Security Onion and The Security Artichoke, Security Testing Tools, Data Security Platforms, Cisco SecureX Demonstration, and Security Services.
Thank you so much for listening to this episode of my series on Network Security.
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
http://KevTechify.com
***********************************
Network Security v1
Episode 3 - Mitigating Threats
Part C- Security Tools, Platforms, and Services
Podcast Number: 10
Greetings to all my Tech Heads out there in the KevTechify Nation and if you are new here, welcome.
In this episode we are going to look at Mitigating Common Network Attacks.
We will be discussing Defending the Network, Mitigating Malware, Mitigating Worms, Mitigating Reconnaissance Attacks, Mitigating Access Attacks, and Mitigating DoS Attacks.
Thank you so much for listening to this episode of my series on Network Security.
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
http://KevTechify.com
***********************************
Network Security v1
Episode 3 - Mitigating Threats
Part D- Mitigating Common Network Attacks
Podcast Number: 11
Greetings to all my Tech Heads out there in the KevTechify Nation and if you are new here, welcome.
In this episode we are going to look at Network Security Policies.
We will be discussing Network Security Domains, Business Policies, Security Policy, BYOD Policies, and Regulatory and Standards Compliance.
Thank you so much for listening to this episode of my series on Network Security.
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
http://KevTechify.com
***********************************
Network Security v1
Episode 3 - Mitigating Threats
Part B- Network Security Policies
Podcast Number: 9
Greetings to all my Tech Heads out there in the KevTechify Nation and if you are new here, welcome.
In this episode we are going to look at Defending the Network.
We will be discussing Network Security Professionals, Network Intelligence Communities, Network Security Certifications, and Communications Security: CIA.
Thank you so much for listening to this episode of my series on Network Security.
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
http://KevTechify.com
***********************************
Network Security v1
Episode 3 - Mitigating Threats
Part A- Defending the Network
Podcast Number: 8
Greetings to all my Tech Heads out there in the KevTechify Nation and if you are new here, welcome.
In this episode we are going to look at Network Attacks - Denial of Service, Buffer Overflows, and Evasion.
We will be discussing Denial of Service Attacks, DoS and DDoS Attacks, Components of DDoS Attacks, Mirai Botnet, Buffer Overflow Attack, and Evasion Methods.
Thank you so much for watching this episode of my series on Network Security.
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
http://KevTechify.com
***********************************
Network Security v1
Episode 2 - Network Threats
Part E- Network Attacks - Denial of Service, Buffer Overflows, and Evasion
Podcast Number: 7
Greetings to all my Tech Heads out there in the KevTechify Nation and if you are new here, welcome.
In this episode we are going to look at Common Network Attacks - Reconnaissance, Access, and Social Engineering.
We will be discussing Types of Network Attacks, Reconnaissance Attacks, Reconnaissance Attacks, Access Attacks, Access and Social Engineering Attacks, Social Engineering Attacks, Strengthening the Weakest Link, Social Engineering, , , , , ,.
Thank you so much for watching this episode of my series on Network Security.
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
http://KevTechify.com
***********************************
Network Security v1
Episode 2 - Network Threats
Part D- Common Network Attacks - Reconnaissance, Access, and Social Engineering
Podcast Number: 6
Greetings to all my Tech Heads out there in the KevTechify Nation and if you are new here, welcome.
In this episode we are going to look at Malware.
We will be discussing Types of Malware, Viruses, Trojan Horses, Trojan Horse Classification, Worms, Worm Components, Ransomware, Other Malware, and Common Malware Behaviors.
Thank you so much for watching this episode of my series on Network Security.
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
http://KevTechify.com
***********************************
Network Security v1
Episode 2 - Network Threats
Part C- Malware
Podcast Number: 5
Greetings to all my Tech Heads out there in the KevTechify Nation and if you are new here, welcome.
In this episode we are going to look at Threat Actor Tools.
We will be discussing Introduction of Attack Tools, Evolution of Security Tools, and Categories of Attacks.
Thank you so much for watching this episode of my series on Network Security.
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
http://KevTechify.com
***********************************
Network Security v1
Episode 2 - Network Threats
Part B- Threat Actor Tools
Podcast Number: 4
Greetings to all my Tech Heads out there in the KevTechify Nation and if you are new here, welcome.
In this episode we are going to look at Who is Attacking Our Network?.
We will be discussing Threat, Vulnerability, and Risk, Hacker vs. Threat Actor, Evolution of Threat Actors, Cybercriminals, Cybersecurity Tasks, Cyber Threat Indicators, Threat Sharing and Building Cybersecurity Awareness.
Thank you so much for watching this episode of my series on Network Security.
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
http://KevTechify.com
***********************************
Network Security v1
Episode 2 - Network Threats
Part A- Who is Attacking Our Network?
Podcast Number: 3
Greetings to all my Tech Heads out there in the KevTechify Nation and if you are new here, welcome.
In this episode we are going to look at Network Topology Overview.
We will be discussing Campus Area Networks, Small Office and Home Office Networks, Wide Area Networks, Data Center Networks, Cloud Networks and Virtualization, and The Evolving Network Border.
Thank you so much for watching this episode of my series on Network Security.
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
http://KevTechify.com
***********************************
Network Security v1
Episode 1 - Securing Networks
Part B- Network Topology Overview
Podcast Number: 2
Greetings to all my Tech Heads out there in the KevTechify Nation and if you are new here, welcome.
In this episode we are going to look at Current State of Affairs.
We will be discussing Networks Are Targets, Reasons for Network Security, Vectors of Network Attacks, Data Loss, and Anatomy of an Attack.
Thank you so much for watching this episode of my series on Network Security.
Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.
http://KevTechify.com
***********************************
Network Security v1
Episode 1 - Securing Networks
Part A- Current State of Affairs
Video Number: 1
En liten tjänst av I'm With Friends. Finns även på engelska.