Interaction / UC2NSE101

Interaction / UC2NSE101

In previous courses we all have not been performing our best in the department of interaction with our peers. We can gain a lot from this, and especially in the networking class I felt this were important. Since network is one of those topics you don`t get to play...
Wild Cards / UC2NSE101

Wild Cards / UC2NSE101

One part that I struggled to understand was the implementation of wild cards in subnet masks. Or to be more precise, how you could calculate them. But before I explain how they work, I will explain what they are used for. Lets say you have big network with a massive...
Access Lists / UC2NSE101

Access Lists / UC2NSE101

So far in the course it seems that most people are struggling with managing the access lists (ACL). At first this seemed kind of advanced, but the theory surrounding were quite simple to understand. ACLs really just is another level of enforcing the AAA triad...
CIA / UC2NSE101

CIA / UC2NSE101

The CIA triad are an important aspect of information security, raising the concerns of Confidentiality, Integrity and Availability. In my opinion this can sometimes be compromising each other, more of one can mean less of another. But instead of me spending my time...
AAA / UC2NSE101

AAA / UC2NSE101

One of the triads that are important in information security is the Authentication, Authorization and Accounting (AAA). In this post I will explain in short terms what this is and my reflections on why it is important. Authentication: An important aspect of...
PT: Hardware / UC2NSE101

PT: Hardware / UC2NSE101

We have started working with Cisco Packet Tracer again, which I am happy about. The tool is a great way to learn networking and try out many of the aspects of network setup and security. One of which is the hardware itself, although it is not really all that up to...