Telegram Web
@ciscoAcademy "IGP vs. EGP Routing Protocols"
@ciscoAcademy "Routing Protocol Metrics"
@ciscoAcademy "Default Administrative Distance"
Malware can be classified as follows:

- Virus (self replicates by attaching to another program or file)
- Worm (replicates independently of another program)
- Trojan Horse (masquerades as a legitimate file or program)
- Rootkit (gains privileged access to a machine while concealing itself)
- Spyware (collects information from a target system)
- Adware (delivers advertisements with or without consent)
- Bot (waits for commands from the hacker)
- Ransomware (holds a computer system or data captive until payment is received) @ciscoAcademy
BGP Packet Types @CiscoAcademy
Common BGP Address Families and Subaddress Families @CiscoAcademy
BGP best path selection @ciscoAcademy
@CiscoAcademy "Here is a list of common firewall types"
@CiscoAcademy "Protecting Against Malware"
@CiscoAcademy "Botnet"
@CiscoAcademy "The Kill Chain in Cyberdefense"
Student PT Manual v1.1.pdf
2 MB
CCNA Security , Student PT Manual

@ciscoAcademy
midyear-security-report-2016.pdf
14.6 MB
"Midyear Cybersecurity Report - Cisco 2016"

#CISCO #Report #2016

@ciscoAcademy
2017 biggest threats,

some quotes from top managers about their view of perceived threats

"large-scale IoT security breach will occur in 2017

continued rise in popularity of connected products results in an increase in the number of back doors open to an adversary, and IoT devices will become a target for ransomware

DDoS attacks, internet shutdowns powered by cheap, insecure IoT devices will become more common

Successful attacks on IoT sensors are difficult to detect because of the limited access to the device's system state, insufficient computing power for endpoint protection software to be installed on them, and lack of security compliance standards for IoT security best practices."

#Security #2017
@ciscoAcademy
2
"از این اسکریپت EEM برای مخفی کردن هر کانفیگی که دوست دارید استفاده کنید"
event manager applet HideMyConfig
event cli pattern "show run" sync yes
action 100 cli command "enable"
action 105 cli command "show run | excl applet|event|action|username"
action 110 puts "$_cli_result"
action 115 set _exit_status "0"
@ciscoAcademy
Network Communication Protocols.png
2.5 MB
Network Communication Protocols Map

@ciscoAcademy
👍2
The higher the privilege level, the more router access a user has. Commands that are available at lower privilege levels are also executable at higher levels. @ciscoAcademy
2025/07/09 22:05:59
Back to Top
HTML Embed Code: