Cisco

CCNA Cyber Ops – 6.0 Attack Methods

This is the last of a series of posts about the CCNA Cyber Ops certification, you can find the fifth part here. 6.1 Compare and contrast an attack surface and vulnerability: The attack surface of a software environment is the sum of the different points (the “attack vectors”) where an unauthorized user (the “attacker”) can… Continue reading CCNA Cyber Ops – 6.0 Attack Methods

Cisco

CCNA Cyber Ops – 5.0 Security Monitoring

This is part five of a series of posts about the CCNA Cyber Ops certification, you can find the fourth part here. This post presents a few concepts used to help us secure our systems. 5.1 Identify the types of data provided by these technologies 5.1.a TCP Dump: a tool that displays network traffic 5.1.b… Continue reading CCNA Cyber Ops – 5.0 Security Monitoring

Cisco

CCNA Cyber Ops – 3.0 Cryptography

This is part three of a series of posts about the CCNA Cyber Ops certification, you can find the second part here. Essentially in this post, we summarize the basic concepts about cryptography, hash, signatures and algorithms. 3.1 Describe the uses of a hash algorithm A hash function is any function that can be used… Continue reading CCNA Cyber Ops – 3.0 Cryptography