Pack IT Forwarding

Pack IT Forwarding

Paying it forward by sharing knowledge

Menu
  • Home
  • Certification
    • Cisco CyberOps Associate
    • CySA+
  • About
    • Guest Appearances

Category: Blog

CCNA CyberOps SECFND Objective 5.3 – 5.5

No Comments
| Blog, CCNA CyberOps, Certification, cisco
Microscope

5.3 Describe these concepts as they relate to security monitoring Access Control List: ACLs are used to filter traffic based on source and/or destination. Logs created by ACLs can be useful to monitor for certain types of traffic. NAT/PAT: Network Address Translation and Port Address Translation hide internal addresses behind public IP addresses. For security […]

Read More »

CCNA CyberOps SECFND Objective 5.2

No Comments
| Blog, CCNA CyberOps, Certification, cisco

Describe these types of data used in security monitoring: Full packet capture, session data, transaction data, statistical data, extracted content, alert data Understanding Cisco Cybersecurity Fundamentals (210-250) Full Packet Capture Full packet capture data can be very useful in analyzing what occurred on a network. Unfortunately to capture everything is very expensive in terms of […]

Read More »

CCNA CyberOps SECFND Objective 5.1

No Comments
| Blog, CCNA CyberOps, Certification, cisco

Identify the types of data provided by these technologies: TCP Dump, NetFlow, Next-Gen firewall, Traditional stateful firewall, Application visibility and control, web content filtering and email content filtering. Understanding Cisco Cybersecurity Fundamentals (210-250) TCP Dump The application tcpdump is a command line packet capture tool. An example of a packet displayed in the default console […]

Read More »

CCNA CyberOps SECFND Objective 4.0

No Comments
| Blog, CCNA CyberOps, Certification, cisco

4.1 Define these terms as they pertain to Microsoft Windows Processes: a program that the system is running Job: a group of processes Threads: basic units that an OS applies processing time to, spawned by a process which may have multiple threads Thread Pool: a group of asynchronous threads that report back to the application […]

Read More »

Posts pagination

Previous 1 … 24 25 26 … 34 Next

Follow Me

  • X
  • LinkedIn
  • Facebook
  • Email
  • RSS Feed
Ben Story @ntwrk80

Ben Story @ntwrk80

Ben Story is a network security engineer for a solution provider. He has been working with networking since 1998, his Freshman year at Truman State University, when he worked for a small dial-up ISP managing their Shiva LanRover modem bank. His random bits and bytes can be found on his blog at https://packitforwarding.com or on Twitter @ntwrk80.

Verified Services

View Full Profile →

Recent Posts

  • HPE Tech Jam 2025
  • Standards, Who Needs Standards!
  • Captive Portals and Not So Captive Portals
  • AI RRM It’s What’s On the Air
  • PCNSA 3.6

Archives

  • March 2025
  • June 2023
  • February 2023
  • March 2022
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • December 2020
  • November 2020
  • October 2020
  • August 2020
  • July 2020
  • June 2020
  • April 2020
  • March 2020
  • February 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • August 2011
Cisco IT Blog Awards Winner Most Inspirational
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy

© Ben Story 2025.

© Pack IT Forwarding 2025. Powered by WordPress

Go to mobile version