We may earn an affiliate commission when you visit our partners.
Ross Bagurdes

This course will describe some of the most severe switch security risks and discuss the mechanisms to help mitigate attacks through the well-known vectors.

Read more

This course will describe some of the most severe switch security risks and discuss the mechanisms to help mitigate attacks through the well-known vectors.

Switches are fantastic devices, allowing you to create VLANs, trunks, as well as offer fast and somewhat private communication. In this course, Securing the Switch, you will explore the basic nature of switch operation, as well as the advent of trunk links, VLAN tags, and some backwards compatibility features. First, you will start off by learning about frame double-tagging. Next, you will move onto the native VLAN security issues and DTP. Finally, you will wrap up the course with a demonstration of creating a secure base configuration for a switch. By the end of this course, you will know how to put a secure base configuration on a switch, mitigating many layer 2 attacks against Ethernet.

Enroll now

Here's a deal for you

We found an offer that may be relevant to this course.
Save money when you learn. All coupon codes, vouchers, and discounts are applied automatically unless otherwise noted.

What's inside

Syllabus

Course Overview
The Native VLAN
Dynamic Trunking Protocol (DTP)
Switchport Port Security
Read more
Check Your Knowledge

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Examines switch security risks and mitigation mechanisms, which are essential knowledge for network administrators
Taught by Ross Bagurdes, who is recognized for his work in network security
Provides a strong foundation for beginners in network security
Covers the basics of switch operation, trunk links, VLAN tags, and backwards compatibility features
Includes a demonstration of creating a secure base configuration for a switch
Requires learners to have a basic understanding of networking concepts

Save this course

Save Securing the Switch to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Securing the Switch with these activities:
Review VLAN Trunking Protocols
Refresh your knowledge of VLAN trunking protocols before starting the course.
Browse courses on Networking Concepts
Show steps
  • Revisit your notes or textbooks on VLAN trunking protocols.
Review Network Terminology
Review network terms to build a stronger foundation before beginning the course.
Show steps
  • Read an overview of network terminology.
Create a Mind Map of Switch Security
Visualize and reinforce your understanding by creating a mind map of switch security concepts.
Browse courses on Switch Security
Show steps
  • Brainstorm and write down key topics related to switch security.
  • Organize the topics into a hierarchical mind map.
Four other activities
Expand to see all activities and additional details
Show all seven activities
Explore Cisco Switch Configuration Guides
Supplement your learning by following guided tutorials from Cisco.
Show steps
  • Access Cisco's official Switch Configuration Guides.
  • Choose a relevant guide and follow its instructions.
  • Experiment with different settings and observe the results.
Analyze Sample Switch Configurations
Practice analyzing different switch configurations to strengthen your understanding.
Browse courses on Switch Configuration
Show steps
  • Review the provided sample configurations.
  • Identify different parameters and settings.
  • Analyze the impact of various configurations on switch behavior.
Configure a Virtual Switch
Reinforce your learning by configuring a virtual switch in a lab environment.
Browse courses on Switch Configuration
Show steps
  • Set up a virtual environment.
  • Install and configure a virtual switch.
  • Apply security measures to the virtual switch.
  • Test the functionality of the virtual switch.
Participate in an Open Networking Project
Contribute to open source projects related to networking to gain practical experience.
Show steps
  • Identify open source networking projects that interest you.
  • Review the project documentation and choose an area to contribute to.
  • Create or review code, documentation, or other project materials.

Career center

Learners who complete Securing the Switch will develop knowledge and skills that may be useful to these careers:
Network Administrator
Network Administrators are the backbone of every IT organization. They install, maintain, and troubleshoot computer networks. Their work is essential to keeping businesses running smoothly. This course will help you build a foundation in network security, which is a critical skill for Network Administrators. The course will teach you about the different types of network security threats and how to protect your networks from them.
Information Security Analyst
Information Security Analysts are responsible for protecting the confidentiality, integrity, and availability of information. They work with a variety of technologies, including firewalls, intrusion detection systems, and security information and event management (SIEM) systems. This course will give you a strong foundation in network security, which is essential for Information Security Analysts. The course will teach you about the different types of network security threats and how to protect your networks from them.
Network Engineer
Network Engineers design, implement, and maintain computer networks. They work with a variety of technologies, including routers, switches, and firewalls. This course will give you a strong foundation in network security, which is essential for Network Engineers. The course will teach you about the different types of network security threats and how to protect your networks from them.
Security Analyst
Security Analysts are responsible for protecting computer networks from unauthorized access, use, disclosure, disruption, modification, or destruction. They work with a variety of technologies, including firewalls, intrusion detection systems, and security information and event management (SIEM) systems. This course will give you a strong foundation in network security, which is essential for Security Analysts. The course will teach you about the different types of network security threats and how to protect your networks from them.
Cybersecurity Analyst
Cybersecurity Analysts are responsible for protecting computer networks and systems from cyberattacks. They work with a variety of technologies, including firewalls, intrusion detection systems, and security information and event management (SIEM) systems. This course will give you a strong foundation in network security, which is essential for Cybersecurity Analysts. The course will teach you about the different types of network security threats and how to protect your networks from them.
IT Security Specialist
IT Security Specialists are responsible for protecting the confidentiality, integrity, and availability of information. They work with a variety of technologies, including firewalls, intrusion detection systems, and security information and event management (SIEM) systems. This course will give you a strong foundation in network security, which is essential for IT Security Specialists. The course will teach you about the different types of network security threats and how to protect your networks from them.
Chief Information Security Officer (CISO)
Chief Information Security Officers (CISOs) are responsible for the overall security of an organization's information systems. They work with a variety of stakeholders, including the CEO, CIO, and board of directors. This course will give you a strong foundation in network security, which is essential for CISOs. The course will teach you about the different types of network security threats and how to protect your networks from them.
Ethical Hacker
Ethical Hackers are hired to penetrate an organization's networks and systems to find vulnerabilities. They work with a variety of technologies, including firewalls, intrusion detection systems, and security information and event management (SIEM) systems. This course will give you a strong foundation in network security, which is essential for Ethical Hackers. The course will teach you about the different types of network security threats and how to protect your networks from them.
Security Consultant
Security Consultants help organizations to assess and improve their security posture. They work with a variety of clients, including businesses, governments, and non-profit organizations. This course will give you a strong foundation in network security, which is essential for Security Consultants. The course will teach you about the different types of network security threats and how to protect your networks from them.
Cloud Security Engineer
Cloud Security Engineers are responsible for the security of cloud computing environments. They work with a variety of technologies, including firewalls, intrusion detection systems, and security information and event management (SIEM) systems. This course will give you a strong foundation in network security, which is essential for Cloud Security Engineers. The course will teach you about the different types of network security threats and how to protect your networks from them.
Penetration Tester
Penetration Testers are responsible for testing the security of computer networks and systems. They work with a variety of technologies, including firewalls, intrusion detection systems, and security information and event management (SIEM) systems. This course will give you a strong foundation in network security, which is essential for Penetration Testers. The course will teach you about the different types of network security threats and how to protect your networks from them.
DevSecOps Engineer
DevSecOps Engineers are responsible for integrating security into the software development process. They work with a variety of technologies, including firewalls, intrusion detection systems, and security information and event management (SIEM) systems. This course will give you a strong foundation in network security, which is essential for DevSecOps Engineers. The course will teach you about the different types of network security threats and how to protect your networks from them.
IT Manager
IT Managers are responsible for the planning, implementation, and management of computer systems. They work with a variety of technologies, including servers, storage devices, and networks. This course will give you a strong foundation in network security, which is essential for IT Managers. The course will teach you about the different types of network security threats and how to protect your networks from them.
Security Architect
Security Architects design and implement security solutions for organizations. They work with a variety of technologies, including firewalls, intrusion detection systems, and security information and event management (SIEM) systems. This course will give you a strong foundation in network security, which is essential for Security Architects. The course will teach you about the different types of network security threats and how to protect your networks from them.
Systems Administrator
Systems Administrators are responsible for the day-to-day operation of computer systems. They work with a variety of technologies, including servers, storage devices, and networks. This course will give you a strong foundation in network security, which is essential for Systems Administrators. The course will teach you about the different types of network security threats and how to protect your networks from them.

Reading list

We've selected 12 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Securing the Switch.
This is an autobiography of one of the most famous hackers in the world. It provides a unique perspective on the world of computer security and hacking.
Provides insights into the human element of security. It covers a wide range of topics, including social engineering, phishing, and identity theft.
Provides practical guidance on how to build secure software applications. It covers a wide range of topics, and will provide additional insights into the topics covered in this course.
Provides a comprehensive overview of security engineering principles. It covers a wide range of topics, and will provide additional depth and context to the topics covered in this course.
This widely-used textbook on cryptography and network security. It covers a comprehensive range of topics, and will provide additional depth and context to the topics covered in this course.
Detailed guide to securing switches. It covers a wide range of topics, including network segmentation, VLANs, and access control lists. This book will provide additional depth and context to the topics covered in this course.
This classic work on network security, providing a comprehensive overview of the field. It covers a wide range of topics, and will provide additional background context for this course.
This widely-used textbook for undergraduate computer networking courses. It covers a comprehensive range of topics, and will provide additional depth and context to the topics covered in this course.
This is an introductory textbook on network security, providing a comprehensive overview of the field. It covers a wide range of topics, and will provide additional background context for this course.
This comprehensive textbook on computer security, covering a wide range of topics. It will provide additional background context for this course.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Securing the Switch.
VLAN Operation and Configuration
Most relevant
STP and EtherChannel Operation and Configuration
Most relevant
Identity Management, Authentication, and Access Control...
Introduction to Cisco Networking
Introduction to Cisco Automation and Software Defined...
Cisco Enterprise Networks: VLANs and Trunking
SharePoint Security End to End
Secure Software Development: Requirements, Design, and...
Parametrize Queries to Protect Against Injections with...
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser