Course Information

Cisco SWITCH 1.0: Minimizing Service Loss and Data Theft
by Skillsoft

In a switched network, a host of attacks can be launched at a switch and its ports. MAC flooding, rogue traffic hopping" from one VLAN to another, spoofing attacks, as well as DHCP and Address Resolution Protocol (ARP) threats can occur at Layer 2. It is important that you implement basic security measures to guard against these types of Layer 2 malicious activities. This course defines the potential vulnerabilities relating to VLANs that can occur within a network. After the vulnerabilities are identified, solutions for each vulnerability are discussed, and configuration commands are defined. This course discusses port security for denial of MAC spoofing and MAC flooding, and the use of private VLANs (PVLANs) and VLAN access control lists (VACLs) to control VLAN traffic. VLAN hopping, DHCP spoofing, Address Resolution Protocol (ARP) spoofing, and Spanning Tree Protocol (STP) attacks are also explained. In addition, potential problems and their solutions, and the method for securing the switch access, with use of vty access control lists (ACLs), and implementing the Secure Shell (SSH) Protocol for secure Telnet access are also covered."

     0 reviews

  • Duration
  •     
  • Instructor
  •     
  • Material
  •     
  • Price
  •     

Write a review

Reviews

Ups.. It seems there are no reviews for this training yet! Go on and be the first to write a review!