Networks Training

  • About
  • My Books
  • SUGGESTED TRAINING

10 Best Hardware Firewalls for Home and Small Business Networks (2021)

On this website I have written tens of articles about enterprise level firewalls (especially Cisco ASA) but many people are interested to learn about the best hardware firewalls for home or small business networks, so this is what I’ll focus in this article. Firewalls are designed to monitor incoming and outgoing traffic, helping to keep […]

Filed Under: Network Security, Product Reviews

12 Best Open Source Firewalls Comparable to Commercial Solutions

Usually, in the world of network security, when we talk about Firewalls we mean the devices that help protect your computer systems and networks from attacks and provide a “wall” in front of servers and IT resources. The above concept of a “Firewall” refers to the classic network hardware firewall such as the Cisco ASA, […]

Filed Under: Network Security

Network based Firewall vs Host based Firewall-Discussion and Comparison

A “Firewall” is one of the most popular computer and network security devices that professionals use to protect their enterprise IT assets and networks. Just like a fire-resistant door in buildings which protects rooms from a possible fire and stops the spreading of flames within the building, the security firewall has a similar function to […]

Filed Under: Network Security

Comparison and Differences Between IPS vs IDS vs Firewall vs WAF

There are so many acronyms in the networking and security field that can drive you crazy. The terms IPS, IDS, WAF etc might be known acronyms in the field of network security but many beginner professionals sometimes have difficulty to understand the concept behind these technologies, how they compare etc. In this article I’ll do […]

Filed Under: Network Security

What Are the Biggest Cybersecurity Threats in 2021? (And How Can You Deal With Them?)

The Internet Crime Complaint Center (IC3) of the FBI has reported that the cost of cybercrimes doubled last year to a whopping $2.7 billion. What’s more? The IC3 reported that most of the complaints included personal data breaches, extortion, non-payment/non-delivery scams, and romance or confidence fraud. What does that mean for your business? With cybersecurity […]

Filed Under: Network Security

What is a Network Security Key in Home Wireless Networks?

It is fair to say that there are few things more important to your daily security than the security of your Internet connection and hence your privacy and sensitive data. Everyone has heard horror stories of their information being stolen via covert means online, and nobody wants to be subject to the nightmares that can […]

Filed Under: Network Security

7 Types of Firewalls in I.T and Computer Networks Explained

The firewall is the cornerstone of security in computer networks and I.T in general. In this website I have been talking extensively about the Cisco ASA firewall which is a classic example of a hardware network firewall. However, there are some other types of firewalls used in large enterprises, SMB or even home networks. Some […]

Filed Under: Network Security

Scanning and Fixing the BlueKeep (CVE-2019-0708) RDP Vulnerability

Whenever Microsoft releases security patches even for unsupported Operating Systems (such as Windows XP, Vista etc) then you must act immediately (as a company or administrator) because it’s always a serious issue. This is what happened in May 14 when Microsoft released security patches for a critical software vulnerability affecting the Remote Desktop Protocol (RDP). […]

Filed Under: Network Security

NMAP Commands Cheat Sheet and Tutorial with Examples (Download PDF)

NMAP (Network Mapper) is the de facto open source network scanner used by almost all security professionals to enumerate open ports and find live hosts in a network (and much more really). One of my responsibilities in my job is to perform white hat penetration testing and security assessments in corporate systems to evaluate their […]

Filed Under: Network Security

What is QUIC – This new Google Protocol makes Firewalls Blind

QUIC (Quick UDP Internet Connections) is a new generation Internet protocol that speeds online web applications that are susceptible to delay, such as searching, video streaming etc., by reducing the round-trip time (RTT) needed to connect to a server. By replacing TCP with UDP and encrypting most of its payload, QUIC reduces the time it […]

Filed Under: Network Security

How I Use NMAP in Penetration Testing Engagements

As a network security engineer, among tens of other tasks, I run also security assessment and penetration testing projects. One of the most popular and widely used network scanning tool is NMAP. This is one of the tools that I use at the beginning of a penetration testing engagement and helps tremendously in identifying targets, […]

Filed Under: Network Security

KRACK WiFi Vulnerability – WPA2 has been breached

On October 16, 2017 a serious security vulnerability has been published by researchers from KU Leuven, a university in Belgium. This has to do with WPA2 protection in WiFi networks, which is the modern security standard considered to be very safe so far. This vulnerability has to do with the WPA2 technology itself and is […]

Filed Under: Network Security

How to Scan your Network for MS17-010 SMB Eternalblue Vulnerability

Last week the whole world, and especially the information security community, has been buzzing around the massive ransomware attacks that infected thousands of computers in hundreds of countries. But how did all started? Many of you know the story, but let’s summarize it once again: NSA had developed some secret exploits that took advantage of […]

Filed Under: Network Security

Next Page »

Categories

About Networks Training

We Provide Technical Tutorials and Configuration Examples about TCP/IP Networks with focus on Cisco Products and Technologies. This blog entails my own thoughts and ideas, which may not represent the thoughts of Cisco Systems Inc. This blog is NOT affiliated or endorsed by Cisco Systems Inc. All product names, logos and artwork are copyrights/trademarks of their respective owners.

Amazon Disclosure

As an Amazon Associate I earn from qualifying purchases.
Amazon and the Amazon logo are trademarks of Amazon.com, Inc. or its affiliates.

Search

Suggested Cisco Training

CISCO CERTIFICATION TRAINING
CISCO CCNA 200-120 TRAINING
CCNA SECURITY 640-554 TRAINING
CCENT ICND1 TRAINING
CISCO ICND2 TRAINING
CISCO CCNP TRAINING

BLOGROLL

Tech21Century
Firewall.cx

Copyright © 2021 | Privacy Policy | Terms and Conditions | Hire Me | Contact | Amazon Disclaimer | Delivery Policy