SECOPS: Protocol Header Security
3 Videos | 1h 28m 16s
- Includes Assessment
- Earns a Badge
Discover the important roles protocol headers and their components play in security. How to analyze common Layer 2 security attacks is also covered. This course can be used as part of the preparation for the 210-255: Implementing Cisco Cybersecurity Operations certification exam.
WHAT YOU WILL LEARN
describe the field to store the data portion of the framedescribe the frame type field for an IPv4 packetidentify the attack that causes a switch to flood all framesidentify the length of the destination MAC address fielddefine the requirement for a CAM table exhaustion attackdescribe the symptoms of a CAM table exhaustion attackdescribe the type of attack that involves the hacker poisoning the ARP cache of a device
identify the command to flood a switch with MAC addresseslist the security controls to protect against CAM table exhaustion attacksdescribe how to enable routing on a Kali Linux systemdescribe the command to perform a DHCP DoS attack in Kali Linuxidentify the command to monitor URLs visitedidentify the command to perform an ARP spoof attackidentify the command used to display images found in traffic that was captured
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platformDigital badges are yours to keep, forever.