What is DHCP Snooping and Dynamic ARP Inspection?

Imagine a scenario where an attacker launches a DDoS (Distributed Denial of Service) attack on your network's Dynamic Host Configuration Protocol (DHCP) infrastructure. At the same time, they poison the Address Resolution Protocol (ARP) entries in your gateway switch, causing significant damage to your entire network. This type of attack could potentially disrupt your network's connectivity, leading to serious consequences such as data loss, service downtime, or even financial losses  🤔

I just dropped a new video on my YouTube Channel, and in this video, you will learn about the effective use of DHCP Snooping and Dynamic ARP Inspection to safeguard your network against DDoS and Man-in-the-Middle (MITM)attacks. The video will guide you through the process of setting up and configuring these security measures, helping you to ensure the safety and reliability of your network infrastructure  😎

Read More
What is Port Security and How to Configure it?

If a hacker walks into your office, they take an Ethernet cable and physically plug it into their laptop. Does that mean you are toast? 🤔

Unfortunately, this is a reality for many organizations today. But this doesn't have to be your fate. I just dropped a new video on my YouTube Channel, and in this video, I show you how to protect yourself against physical infrastructure attacks. I provide a high-level overview of Cisco switch port security, and then I jump directly into the configuration details. All Cybersecurity starts with physical security 😎

Read More
What is AAA Security?

First, I wish you a happy new year. May God make this your most successful year yet filled with peace and happiness.

Second, as cyber threats continue to evolve, AAA in cybersecurity has become more crucial than ever before. In cybersecurity, AAA stands for Authentication, Authorization, and Accounting. It's a security framework that helps control and track user access to a computer network 🔐

I just dropped a new video on my YouTube Channel, and in this video, I provide a high-level overview of AAA. I then walk you through RADIUS and TACACS+, which are both AAA protocols used for network access control. This is all part of Zero Trust Security Architecture 😎

Read More
Cyber Security Defense Techniques (Part 2)

With all these global Cybersecurity threats out there, how do you protect yourself? 🤔

If this thought keeps you up at night, you have come to the right place. In this video, I walk you through various Authentication Mechanisms. I cover topics like Password Policy, Multi-Factor Authentication (MFA), Digital Certificates, and last but not least, Biometric Security. This is all part of Zero Trust Security Architecture 😎

Read More
Cyber Security Defense Techniques (Part 1)

With all these global Cybersecurity threats out there, how do you protect yourself? 🤔

If this thought keeps you up at night, you have come to the right place. In this video, I walk you through various strategies for dealing with Cybersecurity threats. I cover topics like Security Policy, Security Standards, User Awareness and training, and Physical Access Control. Finally, I wrap it up with a concept of Defense-in-Depth. This is all part of Zero Trust Security Architecture 😎

Read More
Most Common Security Threats (Part 3)

Did you know how hackers prey on human vulnerabilities to take networks hostage?  🤔

If this thought keeps you up at night, you have come to the right place. I just dropped a new video on my YouTube Channel, and in this video, I cover various attacks related to the human psyche, such as Social Engineering Attacks and Phishing Attacks. I also talk about Brute Force Attacks and Physical Security Attacks. This is the finale in a 3-Part Series, and I saved the best for the last  👨‍🏫

Read More
Most Common Security Threats (Part 2)

Have you ever wondered how hackers break into networks?  🤔

If this thought keeps you up at night, you have come to the right place. I just dropped a new video on my YouTube Channel, and in this video, I jump right into various types of attacks, such as Reflection and Amplification Attacks, Man-in-the-Middle (MITM) Attacks, and ARP Poisoning. I then define the anatomy of Malware, describing terms like Virus, Worm, Trojan Horse and Ransomware. This is Part 2 of a 3-Part Series. Stay tuned for the next episode  👨‍🏫

Read More
Most Common Security Threats (Part 1)

What are the most common network security threats? 🤔

I am glad you asked.  I just dropped a new video on my YouTube channel, and in this video, I provide a high-level overview of the cybersecurity threat landscape.  I then walk you through address spoofing attacks, DoS attacks & DDoS attacks.  👨‍🏫

Read More
Overview of Network Security

Do you find Cybersecurity complicated and cryptic?  🤔

No doubt, Cybersecurity is a diverse topic covering many aspects of IT security, but it doesn't have to be difficult.  In this video, I demystify Cybersecurity as it relates to securing networks.  First, I provide a high-level overview of Cybersecurity.  I then get into Cybersecurity terminology, covering terms like Vulnerability, Exploit, Threat and Risk.  All that in about 10 minutes  👨‍🏫

Read More
Wildcard Masks: What Are They And How Do They Work?

Have you ever struggled to understand the concept of a Wildcard Mask?  🤔

If you did, you are in luck. I just dropped a new video on my YouTube channel, and in this video, I explain in detail what a Wildcard Mask is and how it relates to a Subnet Mask - in about 5 minutes  👨‍🏫

Read More
Access Control List Explained

ACL stands for Access Control List. ACL either permits or denies traffic. You can think of an ACL as a traffic cop. It inspects every packet coming in and going out of a network device on a per-interface basis and either permits or denies traffic based on a predefined checklist 🤓

I just dropped a new video on my YouTube channel, and in this video, I explain ACLs at a high level.  I also provide an overview of various types of ACLs.  All in about 5 minutes  👨‍🏫

Read More
What does Network Address Translation (NAT) do?

Did you know at home or on a corporate LAN (Local Area Network), we can only use private IP address space defined in RFC 1918?  How can we communicate over the Internet if we can't use public IP addresses on our LAN devices?  🤔

Well, I am glad you asked.  I just dropped a new video on my YouTube channel, and in this video, I explain how NAT (Network Address Translation) allows private IP address devices on the LAN to communicate over the Internet.  I start with a high-level overview of NAT, then jump into NAT concepts and terminology.  By the time you are done watching this video, you'll have a fairly good understanding of the terms like "Inside Local Address," "Inside Global Address," "Outside Global Address," and "Outside Local Address."  🤓

Read More
Quality of Service (QoS): Sales Engineer Perspective

How do you develop a QoS policy? Where do you start? What are the best practices for implementing QoS in the real world?  🤔

I answer these questions and more in this video:

  1. I show you step-by-step how to develop a QoS policy and implement QoS in the real world.

  2. I provide a high-level overview of QoS tools and techniques.

  3. I bring it all together by showing you a best-practice end-to-end QoS design.

Read More
What is Quality of Service (QoS) in Computer Networks?

Do you know how much one-way network delay can a voice packet handle before your voice gets garbled on the other end? 🤔

The answer is Quality of Service or QoS. In this video, I show you how QoS impacts the way traffic is treated within your network. Real-time traffic such as voice & video is sensitive to delay, jitter & packet loss. To ensure your next Zoom meeting goes well, voice & video traffic must get the highest priority on your network. That's where QoS comes in. By adhering to the best practice Voice & Video QoS SLAs or Service Level Agreements, you can protect the most precious traffic on your network. 🤓

Read More
What is FTP and How it Works?

FTP stands for File Transfer Protocol and TFTP stands for Trivial File Transfer Protocol.  Both FTP and TFTP are application layer protocols.  They operate on the Client/Server model.  These protocols allow a client to connect to a server and transfer files.  FTP uses reliable TCP Ports 20 & 21 and TFTP uses an unreliable UDP Port 69  🤔

I just dropped a new video on my YouTube channel.  In this video, I provide a high-level overview of FTP & TFTP in about 5 minutes  🤓

Read More
Secure Shell (SSH) Overview and Configuration

Secure Shell or SSH is a protocol designed for connecting to network devices securely over an IP network. SSH is an application that operates on TCP Port 22 at the network layer (layer 3). It replaces insecure terminal emulation protocol such as Telnet  🤔

I just dropped a new video on my YouTube channel.  In this video, I provide a high-level overview of SSH in about 5 minutes.  I then jump right into the CLI configuration and walk you through how to get SSH setup on any Cisco router/switch from scratch  🤓

Read More
What is Syslog? | Overview & Configuration | Part 1

Do you know how network devices keep track of all the events locally occurring on the device?  🤔

The answer is System Logging or Syslog.  I just dropped a new video on my YouTube channel, and in this video, I provide a high-level overview of Syslog in less than 9 minutes.  Syslog is a logging protocol that allows network devices to generate messages for events and status changes on local devices.  Syslog has been around since the 1980s and was designed by Erica Allman.  Syslog uses UDP port 514.  Syslog messages are generated and stored locally on a network device.  However, Syslog messages can be sent to a centralized Syslog Server  🤓

Read More
SNMP Explained

SNMP stands for Simple Network Management Protocol.  SNMP was first introduced way back in 1988.  SNMP was originally designed to be a network management and network monitoring protocol.  The network management aspect of SNMP never took off, and SNMP, over time, became one of the mainstream network monitoring protocols.  🤔

I just dropped a new video on my YouTube channel, and in this video, I provide a high-level overview of SMTP in less than 7 minutes.  I explain terms like MIB, NMS, Traps, Polling, etc.  If you want to become a network monitoring ninja, you got to watch this video  🤓

Read More