Clientless SSL VPN with ASDM

cybersecurity Oct 16, 2018
 

If the security track is on your radar, particularly CCNA Security, you need to have a working understanding of configuration and troubleshooting with Cisco's Adaptive Security Device Manager (ASDM).

In this video, I'll walk through the setup of a basic clientless SSL VPN using Cisco's GUI-based ASDM software.

All the best,


Charles Judd - Instructor
CCNA R/S, BS Network Security

Continue Reading...

Network Security Zones

security Oct 09, 2018

Our organizational IT environments are constantly changing, driven by factors such as telecommuting, cloud technologies, and BYOD (Bring Your Own Device) policies. This requires modular and dynamic architectures in place, allowing flexibility while still maintaining a rigid security posture. One of the most foundational ways to accomplish this is through the use of network security zones, which we'll take a look at in this blog post. We'll cover common security zone types, and also zone filtering policy considerations for each.

Network Security Zones

A security zone is a portion of a network that has specific security requirements set. Each zone consists of a single interface or a group of interfaces, to which a security policy is applied. These zones are typically separated using a layer 3 device such as a firewall.

In a very broad sense, a firewall is used to monitor traffic destined to and originating from a network. Traffic is either allowed or denied based on a...

Continue Reading...

Route Redistribution - Part 1

ccie r/s ccnp r/s Sep 25, 2018

Introduction to Route Redistribution 

Until there is one routing protocol to rule them all, there is a need to have multiple routing protocols peacefully coexist on the same network. Perhaps Company A runs OSPF, and Company B runs EIGRP, and the two companies merge. Until the newly combined IT staff agrees on a standard routing protocol to use (if they ever do), routes known to OSPF need to be advertised into the portion of the network running EIGRP, and vice versa.

Such a scenario is possible thanks to route redistribution, and that’s the focus of this blog post. Other reasons you might need to perform route redistribution include: different parts of your own company’s network are under different administrative control; you want to advertise routes to your service provider via BGP; or perhaps you want to connect with the network of a business partner. Consider the following basic topology.

  

In the simple topology show above, we’re wanting OSPF and...

Continue Reading...

Basic Security Lab

cybersecurity Aug 28, 2018
 

I get asked a lot about home lab equipment by those interested in studying cybersecurity, particularly CCNA Cyber Ops and CompTIA CySA+ students. In this new video, I'll give you a look at my setup, and give some recommendations for creating your own basic security lab and why that's important.

All the best,


Charles Judd - Instructor
CCNA R/S, BS Network Security

Continue Reading...

Be Special

cybersecurity Aug 21, 2018

Whenever someone asks me what direction they should focus their IT career, particularly in regard to cybersecurity, my answer is always the same: “It depends.” It’s usually not a very satisfying answer, but it’s an honest one. 

Early in my own career I learned the pitfalls of not specializing in something. While there’s always a place on a support team for someone who seems to know a little bit about everything, this makes for a very poor career move. On the surface it seems like a great idea, but in reality…

 

It’s simply not possible to be an expert in everything. Everyone hits their limits with time, memory, and determination eventually, so we must choose wisely what we want to specialize in. Having no specialty is a recipe for a mediocre career, especially in cybersecurity.

So, if you’re just kicking off your security career, or re-tooling and looking for inspiration, the best place to start is finding a specialty. A few...

Continue Reading...

Cybersecurity Jobs

security Jul 10, 2018

One question that I get asked all the time goes something like this: “How can I break into the cybersecurity field without any experience?” We hear the stats all the time about zero-percent cybersecurity unemployment and over a million job openings, but is it actually possible to get into this sector with little or no real-world exposure?

Just as with many other careers, I think cybersecurity (and IT in general, I would argue) suffers from unrealistic expectations, particularly at the entry level. I’ve had discussions with so many students who are shocked that employers aren’t beating their door down, after they’ve obtained legitimately difficult and prestigious certifications. The truth is that competition is fierce. Degrees and certifications guarantee nothing, in reality. That’s why it’s so important to be well-prepared in every possible way. 

So, the short answer is yes, it is possible to get into the cybersecurity field with...

Continue Reading...

Video of My Cisco Live Presentation

ccie collaboration Jul 03, 2018

Last month I had the privilege of presenting a session at Cisco Live US 2018 (in Orlando Florida). If you couldn't make it to the live event, you can now check out the video of my presentation by clicking HERE.

Note that you have to login to the Cisco Live website. If you don't have an account, no worries, just click the Join Now button on that page to get your free Cisco Live account.

The presentation covers Quality of Service (QoS) toptics. However, please don't let the "CCIE" in the title make you think it's super advanced. In the presentation, we start at the very basics and build to the CCIE level.

Here's the link:  Kevin's Cisco Live Presentation

Enjoy!

Kevin Wallace, CCIEx2 (R/S and Collaboration) #7945

Continue Reading...

Interview with Network Chuck

 

I recently returned from the Cisco Live US 2018 event in Orlando, Florida. It was a great experience, with lots of conversations, sessions, and insight. You can expect more content about what I learned over the coming weeks.

But for now, I'd love for you to checkout an interview I did with Network Chuck. If you're not familiar with Network Chuck, you're in for a treat. He's an instructor at CBT Nuggets, but I've been a fan of his YouTube channel well before that. His enthusiasm for all things IT is contagious, and I'm sure you'll get some valuable insight from him in this interview.

If you'd like to follow Chuck on any of his social media channels, here are his links:

Kevin Wallace, CCIEx2 (R/S and Collaboration) #7945

Continue Reading...

Patch Your Humans

cybersecurity May 15, 2018

I’m afraid we’ve over-romanticized the concept of cyber security in many ways. We imagine ourselves as Mr. Robot, staring at our terminals intensely, valiantly defending against state-sponsored DDOS attacks in real-time. I don’t want to discount the validity of these events, because they can and do happen quite frequently. The problem is, we often neglect to address the biggest and most prevalent vulnerability in our environments – the humans.

Studies consistently reveal that over 60 percent of security breaches are due to some sort of employee error. We’ve reached a saturation point where we’re rarely separated from our devices. Often this means that employees are always within arm’s reach of their corporate networks. Disaster is literally just one click away. There’s almost always a human element to a breach, whether that be malicious intent from a disgruntled employee or a simple oversight by well-intentioned personnel.

Don’t...

Continue Reading...

The Onion Router

cybersecurity May 08, 2018
 

In this video, we'll take a look at The Onion Router, better known as the Tor browser. I'll demonstrate how Tor relays traffic through proxies to anonymize web traffic, and discuss some practical uses for this software.

If you're a security-minded individual, Tor is a tool that you will definitely want to check out for secure browsing.

All the best,


Charles Judd - Instructor
CCNA R/S, BS Network Security

Continue Reading...
1 2 3 4 5 6 7 8 9 10 11 12
Close

50% Complete

Two Step

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.