CCNP Security 300-206 Implementing Cisco Edge Network Security Solutions Lab Guide

CCNP Security 300-206 Implementing Cisco Edge Network Security Solutions Lab Guide

I am pleased to announce that I have released a lab guide focusing on the CCNP Security 300-206 exam. This lab guide has been created to help candidates prepare for the CCNP Security: Implementing Cisco Edge Network Security certification. Complete with extensive labs that go above and beyond the requirements of the exam, this lab [...]

Working with Certificate Revocation Lists and Cisco ISE

Working with Certificate Revocation Lists and Cisco ISE

Throughout my time working with Cisco ISE, I've come across a few different errors when configuring ISE to perform Certificate Revocation Lists (CRL) lookups using Microsoft's Public Key Infrastructure (PKI). In this article I would like to show you how we can avoid CRL download issues that could ultimately stop an endpoint from authenticating onto [...]

Certifications :: How to Pass the CCNA Security Exam in 5 Steps

Certifications :: How to Pass the CCNA Security Exam in 5 Steps

The CCNA Security certification is an excellent starting point for anybody that may be looking at entering the IT security world, predominately focused on securing and maintaining Cisco devices. But this just isn't any certification, in fact, if you're familiar with Cisco certifications then you'll probably know that Cisco certifications are renowned for being difficult [...]

CCIE Security v5 :: TCP Interception

This article accompanies the demonstration video I have created below. TCP interception is a CCIE Security version 5 blueprint topic. What is TCP interception? TCP interception is a method used to protect against TCP SYN-flooding attacks. This is achieved by intercepting TCP connection requests (SYN packets) and verifying the connection before passing the original TCP SYN packet [...]

Kali Linux :: CAM Table Overflow Attack Demonstration

As part of my on-going studying for the CCNA Security 210 – 260 certification I have been exploring different types of network attacks, one of which is CAM table overflow attacks. In this article I would like to share what I have learnt and provide a demonstration of the attack carried out in a lab [...]

Can RansomFree Protect You Against Ransomware?

  According to ZDNet, the cost of Ransomware hit $1 billion in 2016. Businesses and unsuspecting users were hit with popular ransomware such as Locky and Crylocker and found themselves locked out of their own systems. Many of those affected by ransomware found themselves paying large sums of money to salvage their business critical documents and [...]