Security Concepts is an introductory security course, meant for those at the CCNA level. This 5 hour course is taught by Gabe Rivas and is a great prep course for those who are studying for the 210-260 IINS Exam.
This course is the first of an 8 course CCNA Security Certification Curriculum.At INE, We believe that breaking the course up into smaller topics makes it easier to manage and digest your learning experience.
In this introductory course, we will walk you through basic security concepts that are meant to build a solid network security foundation and help you dive into more practical and advanced topics. We will start by helping you understand the meaning of Asset, Vulnerability, Threat, Risk, and Countermeasure terms. Then we will break down the CIA triad and show how it helps organizations develop sound security policies. We will also cover monitoring tools that assist in detecting events in real-time as well as cover concepts about common security zones. As we move forward, we will cover social engineering topics, network attacks, different kinds of malware found in today’s networks, data loss, cryptography and hashing, and finally we will go over common network topologies Continue reading
When you migrate to SD-WAN, do you still need a branch router? On today's Weekly Show with sponsor Silver Peak, we examine the business drivers for getting rid of branch routers, and look at the architectural and operational implications.
The post Weekly Show 403: Ditching Your Branch Router With SD-WAN (Sponsored) appeared first on Packet Pushers.
XCloud Networks taps SDN and NFV for custom networking. And the startup won Innova as its second customer to replace its existing data center infrastructure.
Nyansa Voyance already integrates and correlates data from a number of data sources and vendor systems including Cisco, GE, and Microsoft.
The custom kernel provides up to 25 percent faster network throughput and a 23 percent drop in average latency for on-demand instances.
This is an interesting take on where we are in the data networking world—
There are things here I agree with, and things I don’t agree with.
Tech is commoditizing. I’ve talked about this before; I think networking is commoditizing at the device level, and the days of appliance based networking are behind us. But are networks themselves a commodity? Not any more than any other system.
We are running out of useful features, so vendors are losing feature differentiation. This one is going to take a little longer… When I first started in Continue reading
The open data center effort added Packet’s CEO as a board member and will soon sell Open19 compliant servers on its online marketplace.

A few days ago, Cloudflare — along with the rest of the world — learned of a "practical" cache poisoning attack. In this post I’ll walk through the attack and explain how Cloudflare mitigated it for our customers. While any web cache is vulnerable to this attack, Cloudflare is uniquely able to take proactive steps to defend millions of customers.
In addition to the steps we’ve taken, we strongly recommend that customers update their origin web servers to mitigate vulnerabilities. Some popular vendors have applied patches that can be installed right away, including Drupal, Symfony, and Zend.
Say a user requests a cacheable file, index.html. We first check if it’s in cache, and if it’s not not, we fetch it from the origin and store it. Subsequent users can request that file from our cache until it expires or gets evicted.
Although contents of a response can vary slightly between requests, customers may want to cache a single version of the file to improve performance:

(See this support page for more info about how to cache HTML with Cloudflare.)
How do we know it’s the same file? We create something Continue reading
This eBrief from SDxCentral takes a look at some of the security issues facing serverless and containers and delves into some of the tools and methodologies available to overcome these challenges.
That was quick: The new Malaysian government has repealed a fake news law passed earlier this year, The Hill reports. The past government had used the law to charge several opposition leaders. The maximum penalty for violating the law was six years in prison and a fine of about US$128,000.
They love us: A community-run ISP in Chattanooga, Tennessee, is the highest-rated broadband provider in the United States in a Consumer Reports survey, notes Motherboard. The community-run service gets high ranks for speed, reliability, and value, the story says.
Legislating backdoors: The Australian government is targeting companies like Facebook, Google, and WhatsApp in a proposal that would require tech companies to decrypt customer communications on demand, CNet reports. The details of the draft proposal are unclear, but the government would require tech companies to provide more assistance to law enforcement agencies, The Register says.
AI doesn’t want your job: Workers don’t need to worry about Artificial Intelligence taking their jobs, Forbes says. AI will replace boring tasks, but generally not replace whole positions, according to one group of AI experts.
97 and counting: The Kashmir region of India has seen 97 Internet shutdowns in six years after and 11-hour Continue reading