Basic Security Lab

cybersecurity Aug 28, 2018
 

I get asked a lot about home lab equipment by those interested in studying cybersecurity, particularly CCNA Cyber Ops and CompTIA CySA+ students. In this new video, I'll give you a look at my setup, and give some recommendations for creating your own basic security lab and why that's important.

All the best,


Charles Judd - Instructor
CCNA R/S, BS Network Security

Continue Reading...

Be Special

cybersecurity Aug 21, 2018

Whenever someone asks me what direction they should focus their IT career, particularly in regard to cybersecurity, my answer is always the same: “It depends.” It’s usually not a very satisfying answer, but it’s an honest one. 

Early in my own career I learned the pitfalls of not specializing in something. While there’s always a place on a support team for someone who seems to know a little bit about everything, this makes for a very poor career move. On the surface it seems like a great idea, but in reality…

 

It’s simply not possible to be an expert in everything. Everyone hits their limits with time, memory, and determination eventually, so we must choose wisely what we want to specialize in. Having no specialty is a recipe for a mediocre career, especially in cybersecurity.

So, if you’re just kicking off your security career, or re-tooling and looking for inspiration, the best place to start is finding a specialty. A few...

Continue Reading...

Cybersecurity Jobs

security Jul 10, 2018

One question that I get asked all the time goes something like this: “How can I break into the cybersecurity field without any experience?” We hear the stats all the time about zero-percent cybersecurity unemployment and over a million job openings, but is it actually possible to get into this sector with little or no real-world exposure?

Just as with many other careers, I think cybersecurity (and IT in general, I would argue) suffers from unrealistic expectations, particularly at the entry level. I’ve had discussions with so many students who are shocked that employers aren’t beating their door down, after they’ve obtained legitimately difficult and prestigious certifications. The truth is that competition is fierce. Degrees and certifications guarantee nothing, in reality. That’s why it’s so important to be well-prepared in every possible way. 

So, the short answer is yes, it is possible to get into the cybersecurity field with...

Continue Reading...

Video of My Cisco Live Presentation

ccie collaboration Jul 03, 2018

Last month I had the privilege of presenting a session at Cisco Live US 2018 (in Orlando Florida). If you couldn't make it to the live event, you can now check out the video of my presentation by clicking HERE.

Note that you have to login to the Cisco Live website. If you don't have an account, no worries, just click the Join Now button on that page to get your free Cisco Live account.

The presentation covers Quality of Service (QoS) toptics. However, please don't let the "CCIE" in the title make you think it's super advanced. In the presentation, we start at the very basics and build to the CCIE level.

Here's the link:  Kevin's Cisco Live Presentation

Enjoy!

Kevin Wallace, CCIEx2 (R/S and Collaboration) #7945

Continue Reading...

Interview with Network Chuck

 

I recently returned from the Cisco Live US 2018 event in Orlando, Florida. It was a great experience, with lots of conversations, sessions, and insight. You can expect more content about what I learned over the coming weeks.

But for now, I'd love for you to checkout an interview I did with Network Chuck. If you're not familiar with Network Chuck, you're in for a treat. He's an instructor at CBT Nuggets, but I've been a fan of his YouTube channel well before that. His enthusiasm for all things IT is contagious, and I'm sure you'll get some valuable insight from him in this interview.

If you'd like to follow Chuck on any of his social media channels, here are his links:

Kevin Wallace, CCIEx2 (R/S and Collaboration) #7945

Continue Reading...

Patch Your Humans

cybersecurity May 15, 2018

I’m afraid we’ve over-romanticized the concept of cyber security in many ways. We imagine ourselves as Mr. Robot, staring at our terminals intensely, valiantly defending against state-sponsored DDOS attacks in real-time. I don’t want to discount the validity of these events, because they can and do happen quite frequently. The problem is, we often neglect to address the biggest and most prevalent vulnerability in our environments – the humans.

Studies consistently reveal that over 60 percent of security breaches are due to some sort of employee error. We’ve reached a saturation point where we’re rarely separated from our devices. Often this means that employees are always within arm’s reach of their corporate networks. Disaster is literally just one click away. There’s almost always a human element to a breach, whether that be malicious intent from a disgruntled employee or a simple oversight by well-intentioned personnel.

Don’t...

Continue Reading...

The Onion Router

cybersecurity May 08, 2018
 

In this video, we'll take a look at The Onion Router, better known as the Tor browser. I'll demonstrate how Tor relays traffic through proxies to anonymize web traffic, and discuss some practical uses for this software.

If you're a security-minded individual, Tor is a tool that you will definitely want to check out for secure browsing.

All the best,


Charles Judd - Instructor
CCNA R/S, BS Network Security

Continue Reading...

Network Defense Best Practices

network plus Apr 17, 2018

Today's networks face many security threats. The good news is, even without being security experts there are some best practices we can put into place to better protect our networks.

In the latest episode of my podcast, called The Broadcast Storm, you'll learn about a collection of common network threats and best practices to defend our networks.

The specific network threats and mitigations discussed in this episode come from topics CompTIA identified that we need to know for the latest version of their Network+ certification. If you'd like to check out my new Network+ (N10-007) Complete Video Course , it's available for pre-sale at the following link:

http://netpluscourse.kevin.live

Also, use Coupon Code WALLACE50 to take 50% off the price!

By the way, if you're not already a regular listener of The Broadcast Storm, you can subscribe via Apple's iTunes or Spotify using the links below:

The Broadcast Storm on Apple iTunes

The Broadcast Storm on Spotify

...

Continue Reading...

Wireless LAN Security

ccna r/s network plus Apr 06, 2018
 

In this new video, you'll learn the need for wireless LAN (WLAN) security, along with multiple approaches and protocols for better securing your wireless LANs.

Topics include:

  • War Driving
  • MAC Filtering
  • Geofencing
  • Wired Equivalent Privacy (WEP)
  • Initialization Vector (IV)
  • RC4 Encryption
  • Pre-Shared Key (PSK) Mode
  • Enterprise Mode
  • IEEE 802.1X
  • Temporal Key Integrity Protocol (TKIP)
  • Message Integrity Check (MIC)
  • Advanced Encryption Standard (AES)
  • Counter Mode with Cipher Block Chaining Message Authentication Code (CCMP)
  • Wi-Fi Protected Access (WPA)
  • WPA2
  • WPA3
  • Extensible Authentication Protocol (EAP)
  • EAP-TLS
  • EAP-FAST
  • PEAP

This video is a sample from Kevin's new CompTIA Network+ (N10-007) Complete Video Course. To save 50% on your purchase of the video course, use the Coupon Code WALLACE50 during checkout HERE.

Kevin Wallace, CCIEx2 (R/S and Collaboration) #7945

Continue Reading...

Cisco CCNA Cyber Ops Webinar Replay (March 2018)

Uncategorized Apr 03, 2018
 

One of the hottest topics in IT is Cyber Security. It's estimated that by 2019 or 2020, there will be 6 million jobs in cyber security, with 25 percent of those jobs (i.e. 1.5 million jobs) vacant. That's why we at kwtrain.com are so adamant about helping IT professionals earn their CCNA Cyber Ops certification.

In this webinar replay, Kevin Wallace Training's security expert, Charles Judd, leads you through the discussion of the following cyber security topics (including lots of demos):

  • Reconnaissance
    • Passive
    • Active
  • Network Segmentation
    • System Isolation
    • Jump Box (Jump Server)
  • Honeypots and Honeynets

At the end of the video, we introduce a brand new membership program from Kevin Wallace Training, Diver Down - Security - LIVE.

Check out the end of the video for all the details on that exciting new offering, and then click HERE to join.

Kevin Wallace, CCIEx2 (R/S and Collaboration) #7945

Continue Reading...
1 2 3 4 5 6 7 8 9 10 11 12
Close

50% Complete

Two Step

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.