Certifications :: How to Pass the CCNA Security Exam in 5 Steps

Certifications :: How to Pass the CCNA Security Exam in 5 Steps

The CCNA Security certification is an excellent starting point for anybody that may be looking at entering the IT security world, predominately focused on securing and maintaining Cisco devices. But this just isn't any certification, in fact, if you're familiar with Cisco certifications then you'll probably know that Cisco certifications are renowned for being difficult [...]

CCIE Security v5 :: TCP Interception

This article accompanies the demonstration video I have created below. TCP interception is a CCIE Security version 5 blueprint topic. What is TCP interception? TCP interception is a method used to protect against TCP SYN-flooding attacks. This is achieved by intercepting TCP connection requests (SYN packets) and verifying the connection before passing the original TCP SYN packet [...]

Kali Linux :: CAM Table Overflow Attack Demonstration

As part of my on-going studying for the CCNA Security 210 – 260 certification I have been exploring different types of network attacks, one of which is CAM table overflow attacks. In this article I would like to share what I have learnt and provide a demonstration of the attack carried out in a lab [...]

Can RansomFree Protect You Against Ransomware?

  According to ZDNet, the cost of Ransomware hit $1 billion in 2016. Businesses and unsuspecting users were hit with popular ransomware such as Locky and Crylocker and found themselves locked out of their own systems. Many of those affected by ransomware found themselves paying large sums of money to salvage their business critical documents and [...]