|
Voice was like that. I'm taking video and the syllabus says something like 40 percent product knowledge.
|
# ? Aug 21, 2015 18:15 |
|
|
# ? Jun 7, 2024 09:59 |
|
As I don't have many friends that work in IT, and my wife just smiles and nods when I try to talk about this, I have to post here just to say how nice it is once subnetting finally just clicks. That's all.
|
# ? Aug 21, 2015 20:01 |
|
Any ever used Linux Academy? Thinking about it as a supplement to the standard RHCSA/RHCE materials, $20/month.
|
# ? Aug 21, 2015 21:06 |
|
Japanese Dating Sim posted:As I don't have many friends that work in IT, and my wife just smiles and nods when I try to talk about this, I have to post here just to say how nice it is once subnetting finally just clicks. That's all. And now you'll never be able to explain how you do it so fast to anyone. You can only do bitwise breakdowns that just make them gloss over. You have ascended. You have made it.
|
# ? Aug 21, 2015 23:09 |
|
Just passed ccna video 200-001. It was much easier than I expected. Didn't really want to take it but had to to begin the ccnp collaboration path. Tough to study for since there was no book, but hands on experience, YouTube videos and product knowledge from work made it not too bad. This was the first Cisco test that I passed every section on and the first I scored over 90 percent. Needed 82 percent to pass. Bigass Moth fucked around with this message at 16:03 on Aug 22, 2015 |
# ? Aug 22, 2015 16:00 |
|
crunk dork posted:Just passed ICND2 by the skin of my teeth... Definitely thought I was going to have to retake it. I don't know what else I could have done to prepare really, it just seemed like a pretty tough exam overall. If you use CBTnuggets, take the "Cisco in the real world" course after you get a CCNA. There's so much more to learn just on the CCNA level on the exam, especially when it comes to architecture. For example: Let's say you have a group of users (let's say 192.168.4.128/25) that needs FTP access to a remote host outside your network. so in your outbound ACL you put something like this: 45 permit tcp 192.168.4.0 0.0.0.127 host 10.10.10.1 eq ftp cool. Then they call you back a day later and say "it doesn't work!" and you look at the ACL and it's like this: 45 permit tcp 192.168.4.0 0.0.0.127 host 10.10.10.1 eq ftp (42432 matches) So you tell the user it must be the other end, must be their workstation, etc. However there's little things that matter. For example, if they were using active ftp, that there are two ports used. One for control commands and one for data to flow. So the ACL should look like this: 45 permit tcp 192.168.4.0 0.0.0.127 host 10.10.10.1 eq ftp ftp-data If they're using passive (mind you half the time they don't even know) the data flow moves to ephemeral so you need something like this: 45 permit tcp 192.168.4.0 0.0.0.127 host 10.10.10.1 eq ftp ftp-data 46 permit tcp any any established If you don't allow established traffic, any time the session wants to jump ports it's going to cut you off.
|
# ? Aug 22, 2015 16:22 |
|
Japanese Dating Sim posted:As I don't have many friends that work in IT, and my wife just smiles and nods when I try to talk about this, I have to post here just to say how nice it is once subnetting finally just clicks. That's all. I'm learning subnetting for my CCENT. If I try to explain to my wife, I don't even get past binary conversion and her eyes gloss over
|
# ? Aug 22, 2015 16:57 |
|
OhDearGodNo posted:If you use CBTnuggets, take the "Cisco in the real world" course after you get a CCNA Is that a separate series of videos than Jeremy's?
|
# ? Aug 22, 2015 19:26 |
|
crunk dork posted:Is that a separate series of videos than Jeremy's? Jeremy does these as well, it's a small series that goes through the theoretical process of creating a small network.
|
# ? Aug 22, 2015 20:26 |
|
OhDearGodNo posted:Jeremy does these as well, it's a small series that goes through the theoretical process of creating a small network. That'd be perfect. I've got a lot of pieces but sometimes have trouble putting them together
|
# ? Aug 22, 2015 21:09 |
|
OhDearGodNo posted:Jeremy does these as well, it's a small series that goes through the theoretical process of creating a small network. Is that the smart design of a network or something?
|
# ? Aug 23, 2015 03:56 |
|
Anyone have any additional tips on GCIA? I did the course and I am pretty sure I'm golden. I'm working on creating an index which is somewhat of a pain in the rear end. Is it worth reading/taking any other texts or am I good with just the coursebooks? Any other tips?
|
# ? Aug 23, 2015 13:55 |
|
Take this also: -man page for tcpdump -man page for snort -man page for whatever netflow application they covered (don't remember what it was) -list of ip protocol numbers in decimal, hex, and binary -as many tcpdump & bpf filter cheat sheets as you can find -ip/tcp/udp header diagrams, fields, bits, etc http://packetlife.net/media/library/12/tcpdump.pdf http://packetlife.net/media/library/13/Wireshark_Display_Filters.pdf http://packetlife.net/media/library/23/common_ports.pdf http://taviso.decsystem.org/files/tcpdump_quickref.pdf http://biot.com/capstats/bpf.html https://ixquick-proxy.com/do/spg/sh...2fa0330d0a56aa2
|
# ? Aug 23, 2015 17:33 |
|
Sweet, thank you. Some great links there. I think I'll print/memorize some common IPs (192.168.x.x etc) and ports in hex too, just to save some time. That's another thing, how tight is the time limit? I rushed my practice test (I really only took it to get an idea of the kinds of questions I'd see) and had time left over. A friend told me his real test was much more difficult than his practice tests, does that ring true for SANS exams or did he just get bad luck on his question selection?
|
# ? Aug 23, 2015 20:17 |
|
I don't recall the test being radically different in tone or difficulty vs the practice tests. You should have two practice attempts. Make use of both of them with the notes, index, and whatever supplemental materials you choose to print out. I took the GCIA in early 2014 and passed with 90% while looking up a lot of the stuff in my notes/book. It's entirely doable.
|
# ? Aug 23, 2015 21:44 |
|
Hey guys, what's your opinion on this?: https://www.certificationkits.com/lab-suggestions/cisco-lab-suggestions/ Has anyone used their materials to study? Or bought a shitton of switches and routers as that article suggests? I don't mind messing around with emulators if it saves me a couple hundred bucks, but I would like some familiarity with the hardware.
|
# ? Aug 24, 2015 02:57 |
|
bicycle posted:Sweet, thank you. Some great links there. I think I'll print/memorize some common IPs (192.168.x.x etc) and ports in hex too, just to save some time. I took GCED and I thought the practice tests were extremely similar to the real deal.
|
# ? Aug 24, 2015 03:11 |
swampcow posted:Hey guys, what's your opinion on this?: Regardless of what they say there, you do not need physical hardware to prep for the CCENT/CCNA. While they're certainly correct that there are things you can only encounter when actually working with the equipment, none of that is relevant to the exam. That said, for the goal of learning beyond simply passing a test, by all means build a small lab. A couple of routers and a switch are easily obtainable for a couple of hundred bucks, tops.
|
|
# ? Aug 24, 2015 03:48 |
|
New manager has just signed me up for the "Oracle IT Architecture Release 3 Certified Architecture Specialist", anybody able to offer an opinion on its difficulty/value? Background I'm a Salesforce developer and my knowledge of Oracle in general sits somewhere between "a character in the matrix" and "that legacy platform the CSRs complain about".
|
# ? Aug 24, 2015 07:58 |
|
echo465 posted:Is anyone thinking about pursuing the CCNA Industrial certification? It was announced at Cisco Live almost 3 months ago, but I'm still not finding a lot of study materials available. Interesting. I'm trying to expand into critical infrastructure security, so I may pick it up. e: Looking over the exam topics, a lot of it is general networking knowledge with specific SCADA protocol knowledge overlaid. If you already have R&S and experience with wireless and security it might be doable just by reading up on the gap areas (PROFINET, CIP, etc.). psydude fucked around with this message at 14:21 on Aug 25, 2015 |
# ? Aug 25, 2015 14:14 |
|
We we're just talking about the CCNA Sec. Heads up, cisco may be updating/retiring the test: https://learningnetwork.cisco.com/thread/87198 TSHOOT scheduled for next Wednesday, and I must say going through Keith Barkers hands on exam prep nugget series has probably been the most fun I've had studying for a test. Lot's of varied issues that get you very intimate with the lab topology.
|
# ? Aug 26, 2015 13:13 |
|
Looks like a refresh and after going through the exam material I understand why. I hope they drop CCP from the exam entirely and test more on actual security concerns in the cli. Last date available for the 640-554 seems to be December 1st if anybody is thinking of scheduling after that date.
|
# ? Aug 26, 2015 13:27 |
|
Judge Schnoopy posted:Looks like a refresh and after going through the exam material I understand why. I hope they drop CCP from the exam entirely and test more on actual security concerns in the cli. Oh god I'm supposed to start studying for this on Monday. Hopefully I can get it done by then. Saw a lot of complaints on various forums that the study materials don't even cover all the concepts included in the exam.
|
# ? Aug 26, 2015 14:06 |
I've been slowly going through the book, and it would be kinda nice to see a refresh. Is CCP even still used widely? I've only worked with ASDM, because I only work on ASAs, but I've never even heard someone reference CCP until I started reading the book.
|
|
# ? Aug 26, 2015 14:23 |
|
Getting every question right on subnettingquestions.com. Starting to not need paper, too. Doing a weird amalgamation of the techniques taught by Keith Barker's subnetting course on CBTNuggets and Lammle's chapter in the CCNA book. It works!
|
# ? Aug 26, 2015 14:24 |
|
Japanese Dating Sim posted:Getting every question right on subnettingquestions.com. Starting to not need paper, too. Doing a weird amalgamation of the techniques taught by Keith Barker's subnetting course on CBTNuggets and Lammle's chapter in the CCNA book. It works! One of us. One of us. Also, I guess I'll keep an eye on that CCNA-Security exam. I'm not too worried about needing to cram to study for it as I should be able to pass it fairly easily, but I would hate to try and line up some of the other certs I want around a date that is no longer possible Any other security goons have cert suggestions a little more targeted than "CEH, then SANS, plan for CISSP in a few years"? I assume a CCNP-Security is fine to want, but haven't seen a lot of buzz in industry for it.
|
# ? Aug 26, 2015 16:13 |
|
ChubbyThePhat posted:One of us. One of us. Heh. Also, while I love everything else about the course, Ciora's subnetting method's not great for me. Spends too much time converting to binary and back. Basically all you need to do binary-wise is knowing what the value of x number of bits in the subnet mask equals, and that's pretty much memorization - 128, 192, 224, 240, 248, etc. Block size is 256 - the "interesting" octet (which I got from Lammle). And then powers of 2, which I count on my fingers like an elementary student because that's how Barker taught me.
|
# ? Aug 26, 2015 16:28 |
|
ChubbyThePhat posted:Any other security goons have cert suggestions a little more targeted than "CEH, then SANS, plan for CISSP in a few years"? I assume a CCNP-Security is fine to want, but haven't seen a lot of buzz in industry for it. I've never seen a job posting that mentions CCNA Security. Honestly SANS has classes in pretty much any area of security you might be interested in. It's expensive but definitely the best regarded. If you're into PenTesting, definitely look at Offensive Security. That's the best cert for it. If you have a specific question I can help more.
|
# ? Aug 26, 2015 16:52 |
|
Mostly looking to steer myself into the security field. Just trying to rough out a long game so that I don't lose sight of what I want and get too complacent or comfortable with where I'm at.
|
# ? Aug 26, 2015 16:57 |
|
ChubbyThePhat posted:Mostly looking to steer myself into the security field. Just trying to rough out a long game so that I don't lose sight of what I want and get too complacent or comfortable with where I'm at. Security is a really broad field so if you can narrow it down between offense, defense, or forensics, it might be easier to make a long term game plan. Also possible: auditing and management.
|
# ? Aug 26, 2015 18:16 |
|
Doug posted:Security is a really broad field so if you can narrow it down between offense, defense, or forensics, it might be easier to make a long term game plan. Also possible: auditing and management. True. I feel like I should be heading myself towards the more defensive side of Security Engineers to play to my strengths. I'm always just behind the ball when attempting aggressive topics like vulnerability research, but I admittedly have basically zero professional experience on either side of that coin. Maybe once I poke around and grab study material for a couple certs I can help focus my search.
|
# ? Aug 26, 2015 18:21 |
|
ChubbyThePhat posted:True. I feel like I should be heading myself towards the more defensive side of Security Engineers to play to my strengths. I'm always just behind the ball when attempting aggressive topics like vulnerability research, but I admittedly have basically zero professional experience on either side of that coin. Maybe once I poke around and grab study material for a couple certs I can help focus my search. Check out Cybrary, it's free security training both cert related and otherwise. That might be a good resource to poke around on. https://www.cybrary.it
|
# ? Aug 26, 2015 20:45 |
|
ChubbyThePhat posted:One of us. One of us. Get R&S. Security engineering is built upon a solid foundation in R&S and layer 7.
|
# ? Aug 27, 2015 03:15 |
|
Doug posted:Security is a really broad field so if you can narrow it down between offense, defense, or forensics, it might be easier to make a long term game plan. Also possible: auditing and management. Could someone possibly break down these areas a little more? I can understand how forensics is different, but not as sure about the differences between the others. I mean, I can assume, but I'd be curious to hear what someone in the field had to say.
|
# ? Aug 27, 2015 03:47 |
|
psydude posted:Get R&S. Security engineering is built upon a solid foundation in R&S and layer 7. I already have my CCNP R&S.
|
# ? Aug 27, 2015 06:20 |
|
ChubbyThePhat posted:I already have my CCNP R&S. Then I wouldn't bother with CCNP: Security and would recommend picking up the CISSP or something similar instead. Most of the technologies covered at this point in the security track are out of date (NAC, IPS, etc.); Cisco needs to do a major overhaul of the exam. If you don't want to grab a policy centered security cert, you'd honestly be better off investing the study time in penetration/exploitation practice, programming, or another area where you aren't quite as strong in order to round out your resume and have some solid non-infrastructure experience for interview questions/problems. psydude fucked around with this message at 15:44 on Aug 27, 2015 |
# ? Aug 27, 2015 15:40 |
|
Barracuda Bang! posted:Could someone possibly break down these areas a little more? I can understand how forensics is different, but not as sure about the differences between the others. I mean, I can assume, but I'd be curious to hear what someone in the field had to say. Offense- Typically related to assessment and consulting but sometimes can be internal. This is "ethical hacking" you're trying to compromise systems, find and exploit vulnerabilties, etc. This can be network testing, wireless testing, webapp testing, physical testing or social engineering to name some popular sub categories. This of this as the "break stuff" role, you're trying to break stuff so you can report on it and your client/employer can fix it. Defense- This could be a position of its own or again could be a consulting position. This is the "fix stuff" role. You're concerned with hardening networks, network and host security, patching vulnerabilities, user awareness training, log review, alarm response, etc. You're trying to build high and strong castle walls to keep out attackers. You want to create a labyrinth inside your network so even if your perimeter is breached your internals are confusing and difficult to traverse with tripwires laid all throughout your network to alert you if something is going awry. Depending on your employer, you may also be able to engage in offensive type testing within your network. Incident response- This can be a job responsibility as a defender, or it's own separate role. You're the first line of response. In some organizations your job starts with reviewing logs and alerts to determine legitimacy of attacks/incidents. If a true incident is occurring then you are the first line of defense. You try to stop the attack if still in progress and then investigate the root cause of the attack. This can involve traffic analysis, reverse engineering malware, or any number of activities trying to answer the "how?" question. You will either remediate or make remediation suggestions to prevent attacks in the future. You also may be involved in bringing any affected assets back into production. Forensics- Generally related to law enforcement and litigation but it's can also be a part of incident response. You're concerned with answering questions like: "Was this employee embezzling money?" "What did this malware do to our network? Where did it come from?" Generally you're going to be digging into the internals of a system to find the answers to these questions. Maybe you're investigating a cell phone of a former employee to see if there was malicious activity. Maybe you're analyzing raw hard drive and memory dumps to find evidence of malware infection. You're basically a digital detective hunting for clues and building a case. Auditing- Auditing is very closely related to offense but generally within the confines of a compliance framework. Organizations like the Payment Card Industry(PCI) create standards for companies that accept payment cards. There are strict guidelines for processes and controls for how things are supposed to work. It's your job to make sure that's happening. Hope this helps and again if I can dive any deeper on anything let me know and I'll be glad to help.
|
# ? Aug 27, 2015 16:08 |
|
That's an incredibly helpful post, I had to pick a focus for WGU and picked security but it's a very broad and shallow program. Nice to see a few areas I could concentrate on in the future.
|
# ? Aug 27, 2015 16:19 |
|
Thanks psydude and Doug. Already having a programmatic background (previous Comp Sci. major), I will continue to look into pen testing in order to shore up my very apparent weaknesses in the area.
|
# ? Aug 27, 2015 16:33 |
|
|
# ? Jun 7, 2024 09:59 |
|
So I'm currently working in an internship in Information Security and I'm looking into more certs. Currently I have Security+. Would it be more worthwhile to go GSEC or CCNA/CCENT? I've noticed a lot of jobs in security want at least one GIAC certification. I'm still at the early stages of picking a focus area so I figure if nothing else GSEC would show I know SOMETHING. Oh I'm also about to finish a Master's in Systems Engineering with a focus in Cyberforensics in December. Any suggestions?
|
# ? Aug 27, 2015 16:50 |