Many people ask me what technology (e.g. route/switch, collaboration, data center, etc.) they should pursue, based on industry demand. For years, my response has been, “There’s demand in all of those areas. Just pick the one you’re most interested in, because you’re going to spend a lot of time studying and working with that technology.” While I still contend that’s sound advice, I’ve got to admit there is one technology forecasted to be disproportionately in demand. That technology is cybersecurity.
It was a recurring theme at Cisco Live this year (Las Vegas, 2017); the demand for cybersecurity professionals is massive. Former Symantec CEO Michael Brown projected 6 million cybersecurity jobs by 2019, with a whopping 1.5 million of those jobs being unfilled. In the United States, the average salary for a cybersecurity professional is $67,000. However, with a few years of experience, cybersecurity professionals in the aerospace, defense,...
A BGP-speaking router, by default, will not advertise an Internal BGP (iBGP) route to an iBGP neighbor. One solution for this issue is to create a full mesh of neighborships within an Autonomous System (AS). However, that approach doesn’t scale well.
A more scalable solution is to use a BGP Route Reflector. That’s the focus of this new video I created for you. You’ll see the issue BGP has with iBGP-learned routes and how to overcome that issue with a BGP Route Reflector configuration.
Enjoy the video!
Kevin Wallace, CCIEx2 (R/S and Collaboration) #7945
We’ve all heard the saying, “Hindsight is 20/20.” However, a lack of clairvoyance about the future shouldn’t prevent us from boldly taking our next career step.
Steve Jobs told us, “You can't connect the dots looking forward; you can only connect them looking backwards. So you have to trust that the dots will somehow connect in your future.”
Looking back on the dots of my career (thus far), I feel blessed that they have connected as they have. Of course, I made (and learned from) many mistakes along the way. In this blog post, I want to share three of my biggest mistakes in the hopes that my cautionary tale will help you avoid similar missteps.
I attended the University of Kentucky and earned my Bachelor of Science in Electrical Engineering (BSEE) degree. As I went through my college career, my assumption was that after earning my degree I would have my pick from...
In June of 2017, I had the honor of presenting at CiscoLive for the first time. It was a great experience, and I thought you might enjoy checking it out. The session is on a Collaboration topic and is entitled Number Globalization and Localization for CCIE Collaboration Candidates. However, please don't let CCIE in the title keep you from watching if you don't happen to be at that level yet. Anyone studying the Collaboration track (at any level) can benefit from the presentation.
The amazing thing about the CiscoLive site is that you can watch previous presentations for free. You just need to setup a free account if you don't already have one.
Just visit my session's page by clicking HERE, and then click Session Video.
I hope you enjoy the session!
Kevin Wallace, CCIEx2 (R/S and Collaboration) #7945
Cisco recently introduced their Catalyst 9000 Series switches. One unique feature of these switches is their ability to support containers. This podcast episode explains the concept of containers and how they can be more efficient that virtual machines (VMs).
This podcast episode is from The Broadcast Storm podcast. Following are the links you can use to subscribe to the podcast, so you don't miss an episode:
Subscribe via iTunes: http://kwtrain.com/podcast
Subscribe to RSS Feed: http://kwtrain.com/rss
Malware poses an increasing threat to network devices. Recently, malware has been used to install ransomware on computers, which encrypts data on the computers' hard drives and demands money for the data to be decrypted (essentially holding a computer’s data hostage and demanding a ransom). A logical response to help mitigate such threats is to have a network-based device analyze traffic flows for those offending packets.
However, what if the malware concealed itself to avoid detection? For example, some malware uses TLS-based encryption (where TLS stands for Transport Layer Security), thus preventing traditional network-based threat scanners from inspecting it. Interestingly, malware’s use of TLS-based encryption is growing rapidly. Consider that in August 2015, only 2.21 percent of malware attacks used TLS, while the percentage of malware attacks using TLS in May 2017 had grown to 21.44 percent.
This increasing threat begs the question, “How do we protected...
Recently, I bought the book Deep Work, by Cal Newport. The book gives us a strategy for becoming much more productive. In hopes that you’ll read the book too and really apply it in your work, let me tell you about a time I implemented what it teaches.
As part of my Network Programmability Fundamentals video course (which comes out in October 2017), I was trying to figure out a chunk of Python code that came from the Cisco DevNet site. The struggle was real for me every time I spent a few minutes trying to figure out what some of the lines of code were doing, and how everything worked together. So, I decided to use what I’d been reading about in Deep Work. First, let me give you an overview of the book. Then, I share with you how I used it.
The author begins by pointing out how in today’s technological world, we have many interruptions. Think about your day. Your sitting at your desk, and you receive a text or an e-mail that interrupts your...
Back in my high school days, I took a class in mythology, and one of the stories that really stands out to me is the story of the Sirens. These Sirens were alluring creatures, with amazing voices, and they made beautiful music. They lived on islands, and they would sing out to sailors sailing pass their islands. Upon seeing the beauty of the Sirens and hearing their music, the sailors would steer their ships toward the islands, only to have their ships destroyed by the rocks surrounding the islands.
Today, we use the term Siren call to refer to something that looks appealing but is actually dangerous, and I think that is a great description of brain dumps. You’ve probably heard of these brain dumps, where people take an exam and post online the exact questions they saw on the exam. However, it’s not just individuals posting these questions from their short term memory, there are also companies with collections of actual exam questions that they sell on the Internet....
Studying for your CCNA R/S (200-125) exam? If so, a perusal of the exam topics list can be daunting. Clearly, you’re going to spend a significant amount of time getting at least a passing familiarity with the myriad of topics. However, your focus should not be spread evenly over all topics. Rather, there are some topics that need a disproportionately large amount of study.
That’s the focus of this blog post, identifying 3 of the topics likely to appear multiple times on your 200-125 exam. These topics won’t come as any surprise, but I hope this will be a reminder to expend that extra measure of effort when reviewing “the big 3.” Let’s check out the list:
To be prepared for IP addressing questions on the CCNA R/S exam, you need several skills, including: