Cisco

Vembu now supports Hyper-V Cluster

With the release of Version 4.0, Vembu now extends support to Hyper-V cluster. Vembu already supports both physical and virtual environments, covering all your needs for backups and disaster recovery. Please check their website at https://www.vembu.com, and requested a demo to experience the different features here:¬†https://www.vembu.com/vembu-product-demo/. There are a couple of new interesting features in… Continue reading Vembu now supports Hyper-V Cluster

Cisco

CCNA Cyber Ops – SECOPS 1.0

I started the study guide for the first part of this certification last year. You can check it out here. After some great feedback, I’ve decided to start the Study Guide for the second part of the certification, Implementing Cisco Cybersecurity Operations (SECOPS).¬† I also was accepted on cohort 7 for the scholarship. The scholarship… Continue reading CCNA Cyber Ops – SECOPS 1.0

Cisco

CCNA Cyber Ops – 6.0 Attack Methods

This is the last of a series of posts about the CCNA Cyber Ops certification, you can find the fifth part here. 6.1 Compare and contrast an attack surface and vulnerability: The attack surface of a software environment is the sum of the different points (the “attack vectors”) where an unauthorized user (the “attacker”) can… Continue reading CCNA Cyber Ops – 6.0 Attack Methods

Cisco

CCNA Cyber Ops – 5.0 Security Monitoring

This is part five of a series of posts about the CCNA Cyber Ops certification, you can find the fourth part here. This post presents a few concepts used to help us secure our systems. 5.1 Identify the types of data provided by these technologies 5.1.a TCP Dump: a tool that displays network traffic 5.1.b… Continue reading CCNA Cyber Ops – 5.0 Security Monitoring

Cisco

CCNA Cyber Ops – 3.0 Cryptography

This is part three of a series of posts about the CCNA Cyber Ops certification, you can find the second part here. Essentially in this post, we summarize the basic concepts about cryptography, hash, signatures and algorithms. 3.1 Describe the uses of a hash algorithm A hash function is any function that can be used… Continue reading CCNA Cyber Ops – 3.0 Cryptography

Cisco

UCS B-Series Configuration using the UCS SDK and Python

The Cisco UCS B-Series is a powerful system. I admit that it has a little learning curve to it, but in time I’ve learned to appreciate the way it works. The thing is that after a few deployments you wonder, when are the Cisco engineers going to take usability into consideration? Well, luckily there is… Continue reading UCS B-Series Configuration using the UCS SDK and Python

Cisco

CCNA Cyber Ops – 2.0 Security Concepts

This is part two of a series of posts about the CCNA Cyber Ops certification, you can find the first part here. Essentially in this post, we summarize the basic security concepts needed to understand and become competent with this topic. 2.0 Security Concepts 2.1 Describe the principles of the defense in depth strategy: Defense… Continue reading CCNA Cyber Ops – 2.0 Security Concepts