Securing the Switch
Offered By: Pluralsight
Course Description
Overview
This course will describe some of the most severe switch security risks and discuss the mechanisms to help mitigate attacks through the well-known vectors.
Switches are fantastic devices, allowing you to create VLANs, trunks, as well as offer fast and somewhat private communication. In this course, Securing the Switch, you will explore the basic nature of switch operation, as well as the advent of trunk links, VLAN tags, and some backwards compatibility features. First, you will start off by learning about frame double-tagging. Next, you will move onto the native VLAN security issues and DTP. Finally, you will wrap up the course with a demonstration of creating a secure base configuration for a switch. By the end of this course, you will know how to put a secure base configuration on a switch, mitigating many layer 2 attacks against Ethernet.
Switches are fantastic devices, allowing you to create VLANs, trunks, as well as offer fast and somewhat private communication. In this course, Securing the Switch, you will explore the basic nature of switch operation, as well as the advent of trunk links, VLAN tags, and some backwards compatibility features. First, you will start off by learning about frame double-tagging. Next, you will move onto the native VLAN security issues and DTP. Finally, you will wrap up the course with a demonstration of creating a secure base configuration for a switch. By the end of this course, you will know how to put a secure base configuration on a switch, mitigating many layer 2 attacks against Ethernet.
Taught by
Ross Bagurdes
Related Courses
Information Security-3Indian Institute of Technology Madras via Swayam Сетевое администрирование: от теории к практике
Tsinghua University via Coursera CompTIA Network+ N10-007 500+ Questions + Subnetting Review
Udemy Linux Administration & Linux Command Line For Beginners
Udemy The Complete Wireshark Course: Go from Beginner to Advanced!
Udemy