Securing the Switch

This course will describe some of the most severe switch security risks and discuss the mechanisms to help mitigate attacks through the well-known vectors.
Course info
Level
Intermediate
Updated
Apr 1, 2020
Duration
2h 25m
Table of contents
Description
Course info
Level
Intermediate
Updated
Apr 1, 2020
Duration
2h 25m
Description

Switches are fantastic devices, allowing you to create VLANs, trunks, as well as offer fast and somewhat private communication. In this course, Securing the Switch, you will explore the basic nature of switch operation, as well as the advent of trunk links, VLAN tags, and some backwards compatibility features. First, you will start off by learning about frame double-tagging. Next, you will move onto the native VLAN security issues and DTP. Finally, you will wrap up the course with a demonstration of creating a secure base configuration for a switch. By the end of this course, you will know how to put a secure base configuration on a switch, mitigating many layer 2 attacks against Ethernet.

About the author
About the author

For nearly 20 years, Ross has taught and managed data networks.

More from the author
Building Hardware Labs for CCNA Study
Intermediate
4h 11m
Apr 29, 2020
More courses by Ross Bagurdes
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
[Autogenerated] Hi, everyone. My name is Ross ________ us and welcome to my course, securing the switch. I am a network engineer with 20 years experience, building and managing enterprise networks and teaching people about them. Switches may or may not have been part of the Ethernet vision when either net was being developed in seventies and eighties. However, by the mid to late 19 nineties, switching became an important piece of data networking and has not stopped growing since. Because of this rapid implementation and growth of Ethernet and switching, there was not always an eye focused on security flaws and switch design, especially, and shrunk link operation. In this course, we're gonna cover the native villain and the security issues it creates. Mac address flooding of a switch and switch port port security, which is a mechanism we can use to prevent some security issues. By the end of this course, you'll know how to put a secure base configuration on an Ethernet switch, mitigating many layer two attacks against either net before beginning the course. You should be familiar with switching the lands and V land trunk ng. From here, you should feel comfortable diving into the rest of the CCN A series. I hope you'll join me on this journey to learn. Switch security with the securing the switch course at portal site.