Network Services and Network Security both provide answers to all your Networking questions, while challenging you to take your skills to the next level. Read More
This vital Cybersecurity course, Switching Security Features, is led by INE expert instructor Keith Bogart and covers three forms of Network Security you need to know. Read More
When people first start using Azure, they normally do something silly, like accidentally exposing a virtual machine fully to the Internet. Then they find out about Network Security Groups (NSG’s), which act as a basic firewall to block ports, but NSG’s do so much more! Read More
I have learned that by using and implementing best practices, I can keep the department aligned with the overall company strategy. It also makes it easier for other managers, directors and higher level management to buy into the vision and goals for the Information Technology Department as they see how it fits easily into the overall company strategy. There are many best practices in the Information Technology field and it is up to you, as the Certified Information Professional, to use your... Read More
"It happens to all too many tech professionals at some point. Someone clicks, views or opens something that causes a virus to take over their computer. Or a team member chooses a poor password that makes it easy for their email to be hacked into." Read the opening lines of Forbes recent article. These are situations that many of us know all too well. As the end of 2018 approaches we're prompted to review our hits and misses of the year, honing in on ways we can innovate, improve and grow. Could... Read More
Catalyst switch port security is so often recommended. This is because of a couple of important points: There are many attacks that are simple to carry out at Layer 2 There tends to be a gross lack of security at Layer 2 Port Security can guard against so many different types of attacks such as MAC flooding, MAC spoofing, and rouge DHCP and APs, just to name a few I find when it comes to port security, however, many students cannot seem to remember two main points: What in the world is Sticky... Read More
It was a dark, cold night in late December, and Bob, (the optimistic firewall technician), had a single ASA to deploy before going home for the holidays.  The requirements for the firewall were simple.   Bob read them slowly as follows: R1 should be able to ping the server "Radio.INE.com" by name. PC should be able to ping the server "Radio.INE.com" by name. Bob also read the background information to see if this was something he could finish before leaving the office.   Bob read the following: Read More
One of the many skills that you must demonstrate as a CCENT candidate is your ability to configure basic password security on a Cisco router or switch. This blog post walks you through the configurations you must have mastered in order to succeed in this area of the exam. Read More
There are some fundamental processes in network security that you should be aware of as you begin your journey to a Cisco Certified Technician. Some of these processes are obvious, while others are not so obvious. This blog post intends to make each one very simple to understand. Read More
I. Security Fundamentals a. Why Needed? i. A closed network allows no connection to a public network; although security is still an issue due to a majority of attacks coming from inside networks today Read More

Subscribe to INE Blog Updates

New Blog Posts!