SWITCH 2.0: L2 Attacks & Port Security

Cisco SWITCH 2.0    |    Expert
  • 2 Videos | 45m 31s
  • Includes Assessment
  • Earns a Badge
Likes 13 Likes 13
Explore Layer 2 attacks, security best practices, and how to identify some common Layer 2 attacks. Examine port security on a Cisco switch, how to configure it, and how to verify the configuration. This course can be used to prepare for the 300-115: Implementing Cisco IP Switched Networks 2.0 certification exam.

WHAT YOU WILL LEARN

  • identify the type of Layer 2 attack that uses root guard and BPDU guar to mitigate attacks
    specify the Layer 2 attack type known as a ‘double-tagging attack’
    recognize Layer 2 attacks
    identify considerations for MAC address flooding attack configurations
  • recognize the syntax used to configure a port to use its first learned MAC address
    recognize the syntax used in interface configuration mode to configure a port for multiple MAC addresses
    identify the syntax used to provide information on protected switch ports and determine the result of a violation
    identify the port security violation in a given scenario

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Likes 8 Likes 8  
Likes 4 Likes 4  

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 11 Likes 11  
Likes 29 Likes 29