SECOPS: Protocol Header Security

Cisco SECOPS    |    Intermediate
  • 3 Videos | 1h 28m 16s
  • Includes Assessment
  • Earns a Badge
Likes 4 Likes 4
Discover the important roles protocol headers and their components play in security. How to analyze common Layer 2 security attacks is also covered. This course can be used as part of the preparation for the 210-255: Implementing Cisco Cybersecurity Operations certification exam.

WHAT YOU WILL LEARN

  • describe the field to store the data portion of the frame
    describe the frame type field for an IPv4 packet
    identify the attack that causes a switch to flood all frames
    identify the length of the destination MAC address field
    define the requirement for a CAM table exhaustion attack
    describe the symptoms of a CAM table exhaustion attack
    describe the type of attack that involves the hacker poisoning the ARP cache of a device
  • identify the command to flood a switch with MAC addresses
    list the security controls to protect against CAM table exhaustion attacks
    describe how to enable routing on a Kali Linux system
    describe the command to perform a DHCP DoS attack in Kali Linux
    identify the command to monitor URLs visited
    identify the command to perform an ARP spoof attack
    identify the command used to display images found in traffic that was captured

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Likes 3 Likes 3  
Likes 13 Likes 13  
Likes 6 Likes 6