Network security, cybersecurity, and information security are all related concepts, but they have slightly different meanings and scopes. Network security refers to the protection of computer networks from unauthorized access or attacks. It involves the use of various hardware and software technologies to secure networks and prevent intruders from gaining access to sensitive information. NetworkContinue reading “What is the difference between Network, Cyber and Information Security?”
Category Archives: Uncategorized
ISE (Identity Services Engine) Basic Configuration and Commands
Cisco Switch Dot1x Config: Configuring Global AAA Parameters: conf tusername admin privilege 15 secret Cisco123aaa new-modelaaa authentication login default localaaa authentication dot1x default group radiusaaa authorization network default group radiusaaa accounting dot1x default start-stop group radius radius server Our-ISEaddress ipv4 192.168.1.105 auth-port 1812 acct-port 1813key Cisco123automate-tester username testuserexit aaa group server radius Our-Groupserver name Our-ISEexitContinue reading “ISE (Identity Services Engine) Basic Configuration and Commands”
Protected: Etherchannel L2 and L3
There is no excerpt because this is a protected post.
Protected: Subnetting and TCP/IP
There is no excerpt because this is a protected post.
Protected: Common Network Architectures
There is no excerpt because this is a protected post.
Network Security (NetSec), Cyber Security(CyberSec/CyberOps) and Information Security(InfoSec)
Security Advisories: Palo Alto: https://securityadvisories.paloaltonetworks.comCisco: https://tools.cisco.com/security/center/publicationListing.x Cisco Talos Advisories: https://www.talosintelligence.com/vulnerability_reports Microsoft Advisories: https://www.talosintelligence.com/ms_advisory_archive/ms-2023Meraki: https://meraki.cisco.com/blog/cisco-meraki-customer-advisoriesFortinet: https://www.fortiguard.com/psirtCheckpoint: https://www.checkpoint.com/advisories/https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsecurityalerts=#severity=&type=Security+Alerts&product=&version=Juniper: https://kb.juniper.net/InfoCenter/index?page=content&channel=SECURITY_ADVISORIESCISA: https://www.cisa.gov/news-events/cybersecurity-advisoriesUS-CERT: https://www.us-cert.gov/ncas/current-activity EoL links:Cisco: https://www.cisco.com/c/en/us/products/security/asa-5500-series-next-generation-firewalls/eos-eol-notice-listing.htmlhttps://www.curvature.com/resources/cisco-end-of-life-guidePalo Alto: https://www.paloaltonetworks.com/services/support/end-of-life-announcements/end-of-life-summary https://www.paloaltonetworks.com/services/support/end-of-life-announcements/hardware-end-of-life-datesMeraki: https://documentation.meraki.com/zGeneral_Administration/Other_Topics/Product_End-of-Life_(EOL)_PoliciesCheckpoint: https://www.checkpoint.com/support-services/support-life-cycle-policy/ CVE (Common Vulnerabilities and Exposures) and CVSS (Common Vulnerability Scoring System):https://www.cvedetails.com/cvss-score-distribution.phphttps://nvd.nist.gov/vuln-metrics/cvsshttps://cve.mitre.org/ Important Organizations: Gartner Magic Quadrant: NGFWs, SD-WAN and SSE:
HP Switches
HP ProCurve 2810 Switch Series – Restoring the Factory Default