The purpose of a “hack back” is to identify an attacker and possibly recover stolen data in a retaliatory manner. Learn if there is a legal precedent to "hacking back."
As is sometimes the case, the idea for this article originated with a student question I received during one of the Securing Networks with ASA Fundamentals classes I have taught this summer. The course material mentions a simple scenario whereby IP Telephony traffic...
As is frequently the case these days, I get a brainstorm for an article during a Cisco Security training class I conduct. This summer I taught the Securing Networks with ASA Fundamentals class, which concentrates heavily on the Adaptive Security Device Manager (ASDM)...
Routers and switches make up the bulk of the network infrastructure and are vulnerable to attack. In a previous article, I talked about some of the different ways of hardening your network devices. In this blog, I’d like to specifically examine the routing protocols used on the major Cisco network operating systems.
Course Code: 831181
Exclusive – Clear, effective writing is one of the most powerful skills in the workplace—and one of the most overlooked. The quality of your writing directly shapes how your ideas are understood, how decisions are made, and how quickly others act. In this highly practical one da...
Prep for Over 40 Microsoft Certifications with GK Polaris Subscription. GK Polaris, delivers a continual payload of skills to ensure mission success.
We will discuss some of the top steps that you should take immediately to prepare your employees and protect your organization from cybersecurity risks.
Course Code: 2520
Whether you are building software systems for others, or someone is building them for you, it is imperative that the software does what the end users need it to do.
Course Code: 899006
In this course, we discuss challenges with data integration and the need for a data integration platform (middleware). We then discuss how Cloud Data Fusion can help to effectively integrate data from a variety of sources and formats and generate insights. We take a...
Course Code: 899020
This course is designed for business users, business leaders, and decision makers who want to understand the transformative potential of generative AI and its impact on their organizations. You'll gain a comprehensive understanding of this technology, learn how it ca...