2020欧洲杯直播平台Data networks require an understanding of IT security and the risks involved with deploying systems. In this course, Basic Security Concepts for Cisco Networks, you will learn the distinction and interrelatedness of threats, vulnerabilities, and exploits in IT systems. First, you will learn some simple policies to prevent an attacker exploiting vulnerabilities. Next, you will discover how users have been poorly trained to create quality passwords, the benefits of physical security, and how we use AAA to secure systems with a username and password. Finally, you will explore two attacks and how to mitigate them. When you're finished with this course, you will have the skills and knowledge necessary to understand how modified ARP messages could allow an attacker access to your data, and implement Dynamic ARP inspection to prevent the attack.
Course Overview 2020欧洲杯直播平台[Autogenerated] Hi, everyone. My name is Ross, but Curtis and welcome to my course basic security concepts for Cisco Networks. I'm a network engineer with more than 20 years experience building enterprise networks and teaching people about them. Securing I T assets has become an important part of every I t professionals Role and Maur. So it's part of every employee's role at an organization. It's wise for every engineer to understand the principles of security in order to prevent unauthorized access to both personal and corporate assets. This course will introduce the key components of security for I T systems, focusing on security concepts required for the CCN a exam. These include discussing the importance of an I T security program for educating staff, distinguishing a threat, vulnerability and exploit understanding how Triple A is used to authenticate and log user activity, as well as explaining effective password policies. In addition to understanding these concepts. By the end of this course, you'll also be able to implement D H CP snooping and dynamic AARP inspection on a Cisco switch in order to mitigate certain types of man in the middle attacks, which make use of R and D. H. C p Before beginning this course, you should be familiar with I P Routing and Encapsulation Switch Configuration V Lands Drunk ING and D H CP operation. I hope you'll join me on this journey to learn important security concepts with the basic security concepts for Cisco Networks course at plural site.