The Network Design Cookbook is a guide that provides a structured process that you, as a network engineer or a consultant, can use to meet your critical technical objectives while keeping within the parameters of industry best practices. While it primarily deals with Cisco equipment, the Network Design Cookbook lays out a design process that allows for the incorporation of products from other vendors.
Analyze your organization’s traffic using Wireshark
Large Scale Network Design LiveLessons takes you through the concepts behind stable, scalable, elegant network design, including modularity, resilience, layering, and security principles. This livelesson will focus on traditional distributed link state, distance vector, and path vector routing protocols, as well as the basic principles of centralized control planes (such as OpenFlow). A special point will be made of sorting out the relationship between policy and reachability, and where they can best be managed in a large scale network.
This is the first of a four-part series designed to help you prepare for the International Council of E-Commerce Consultant's Certified Ethical Hacker (CEH) exam. This course focuses on several key areas of knowledge tested in that exam: You will learn how to perform reconnaissance on companies, networks, systems, and people; how to conduct footprinting; how to exercise resource enumeration; how to sniff networks and scan them in order to better understand the attack landscape; and how to ethically gain access to systems, networks and data.
In this Network Technology and Security Fundamentals training course, expert author David Miller teaches you how to secure and protect information as it flows across an enterprise network.
If you share resources across your network or the cloud, you need a firm grasp of all of the security implications. In this Learning Path, you’ll get hands-on experience securing your infrastructure while learning about risk assessment and management, sensitive data, computer forensics, penetration testing, and much more. By the end of this course, you’ll know how to secure your data and keep it that way.
Secure your network with ease by leveraging this step-by-step tutorial on the powerful Wireshark 2.