SWITCH 2.0: L2 Attacks & Port Security

Cisco SWITCH 2.0    |    Expert
  • 2 Videos | 45m 31s
  • Includes Assessment
  • Earns a Badge
Likes 13 Likes 13
Explore Layer 2 attacks, security best practices, and how to identify some common Layer 2 attacks. Examine port security on a Cisco switch, how to configure it, and how to verify the configuration. This course can be used to prepare for the 300-115: Implementing Cisco IP Switched Networks 2.0 certification exam.

WHAT YOU WILL LEARN

  • identify the type of Layer 2 attack that uses root guard and BPDU guar to mitigate attacks
    recognize Layer 2 attacks
    specify the Layer 2 attack type known as a ‘double-tagging attack’
    identify considerations for MAC address flooding attack configurations
  • identify the port security violation in a given scenario
    identify the syntax used to provide information on protected switch ports and determine the result of a violation
    recognize the syntax used in interface configuration mode to configure a port for multiple MAC addresses
    recognize the syntax used to configure a port to use its first learned MAC address

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Likes 17 Likes 17  
Likes 122 Likes 122  

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 11 Likes 11  
Likes 37 Likes 37  
Likes 22 Likes 22