Skip to content

Paying it forward to the next generation of IT.

  • Home
  • Certification
    • Cisco CyberOps Associate
    • CySA+
  • About
    • Guest Appearances
Twitter Linkedin
Close Menu
  • Home
  • Certification
    • Cisco CyberOps Associate
    • CySA+
  • About
    • Guest Appearances
A graphical depiction of the cyber kill chain model.
  • Blog
  • CCNA CyberOps
  • Certification
  • cisco

CCNA CyberOps SECOPS – Objective 5.1CCNA CyberOps SECOPS – Objective 5.1

August 29, 2019August 29, 2019| 0 Comments| Ben StoryBen Story| 10:00 am

Classify intrusion events into these categories as defined by the Cyber Kill Chain Model Implementing Cisco Cybersecurity Operations (210-255) The...

Read MoreRead More
Photo by Skitterphoto from Pexels
  • Blog
  • CCNA CyberOps
  • Certification
  • cisco

CCNA CyberOps SECOPS – Objective 4.10CCNA CyberOps SECOPS – Objective 4.10

August 28, 2019August 28, 2019| 0 Comments| Ben StoryBen Story| 9:00 am

Compare and contrast deterministic and probabilistic analysis Implementing Cisco Cybersecurity Operations (210-255) Deterministic Analysis Deterministic analysis uses data that is...

Read MoreRead More
Photo by Oleksandr Pidvalnyi from Pexels
  • Blog
  • CCNA CyberOps
  • Certification
  • cisco

CCNA CyberOps SECOPS – Objective 4.9CCNA CyberOps SECOPS – Objective 4.9

August 27, 2019August 27, 2019| 0 Comments| Ben StoryBen Story| 11:00 am

Identify a correlation rule to distinguish the most significant alert from a given set of events from multiple data sources...

Read MoreRead More
Photo by Lex Photography from Pexels
  • Blog
  • CCNA CyberOps
  • Certification
  • cisco

CCNA CyberOps SECOPS – Objectives 4.7 and 4.8CCNA CyberOps SECOPS – Objectives 4.7 and 4.8

August 26, 2019August 26, 2019| 0 Comments| Ben StoryBen Story| 10:00 am

Map DNS logs and HTTP logs together to find a threat actor Implementing Cisco Cybersecurity Operations (210-255) Map DNS, HTTP,...

Read MoreRead More

Posts pagination

Previous 1 … 16 17 18 … 41 Next

Follow Me

  • X
  • LinkedIn
  • Facebook
  • Email
  • RSS Feed
Ben Story @ntwrk80

Ben Story @ntwrk80

Ben Story is a network security engineer for a solution provider. He has been working with networking since 1998, his Freshman year at Truman State University, when he worked for a small dial-up ISP managing their Shiva LanRover modem bank. His random bits and bytes can be found on his blog at https://packitforwarding.com or on Twitter @ntwrk80.

Verified Services

View Full Profile →

Recent Posts

  • AIOps Fatigue Is Real, And It’s Your Vendor’s Fault, Not Yours
  • Try Before You Buy: Nokia Is Taking Validated Designs Seriously (And That’s Rarer Than You Think)
  • But It Works in the Lab!
  • AI Is Going to Kill Jobs!
  • Southwest Airlines Customer of Size Policy
Cisco IT Blog Awards Winner Most Inspirational
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.

To find out more, including how to control cookies, see here: Cookie Policy
  1. Scott Williams on AIOps Fatigue Is Real, And It’s Your Vendor’s Fault, Not YoursApril 21, 2026

    Ben, Great summary of some of the new tools out there for Network monitoring and diagnostics. Being out of the…

  2. Ben Story on Intel 7260 Mini PCI-Express Hardware HackFebruary 5, 2026

    You can use a piece of tape if you cut it narrow and place it right.

  3. Rod on Intel 7260 Mini PCI-Express Hardware HackOctober 6, 2025

    Well I am worried about using this method on my Toshiba L355-S7907 Satellite. On windows 10 it just refuses to…

    IT Company WordPress Theme Benjamin Story

    Go to mobile version