background preloader

Cheat Sheets

Cheat Sheets
Download All (.zip) Wall Posters (36" x 24") Interior Gateway Protocols v1.0 (1 page) Protocols v2.1 (2 pages) v2.1 (1 page) First Hop Redundancy v2.0 (1 page) v2.2 (2 pages) IPsec IPv4 Multicast IPv6 v2.0 (2 pages) v1.2 (1 page) v1.1 (1 page) Spanning Tree Applications scapy tcpdump Wireshark Display Filters Reference Common Ports IOS IPv4 Access Lists IPv4 Subnetting Syntax Markdown MediaWiki Technologies Frame Mode MPLS IOS Zone-Based Firewall QoS VLANs Voice VOIP Basics Miscellaneous Cisco IOS Versions Physical Terminations

Related:  Network+Random NetworkingStudywarush

High Performance Cloud Computing Networks - [Infographic] Explosive Internet growth, beginning in the mid-late 1990’s, has had a dramatic affect on the evolution of computer networking. Some new network technologies and initiatives boomed, but faded rapidly into oblivion. Others, notably Ethernet, invented by Bob Metcalfe at Xerox PARC, became the standard and a commodity.

IP subnetting made easy George Ou explains IP subnetting using his own graphical approach. It's a great primer for students and a nice refresher for others. IP subnetting is a fundamental subject that's critical for any IP network engineer to understand, yet students have traditionally had a difficult time grasping it. Virtual Training Company (VTC) - Software Training Veteran VTC instructor Bobby Rogers guides security professionals through an in-depth review of the Certified Ethical Hacker (CEH) v8 exam (312-50). This course provides step-by-step demonstrations of the different methods and tools needed to master the exam, as well as the concepts and knowledge a professional ethical hacker needs for the real world. The course covers all areas tested on the exam, including system hacking, network attacks, web application hacking, and cryptography. Click on the movie links below to begin learning today. To view other FREE VTC tutorials in this course: To view other FREE VTC tutorials by author Bobby Rogers:

What Is a Packet Sniffer? (with pictures) A packet sniffer is a device or program that allows the user to eavesdrop on traffic traveling between networked computers. The program will capture data that is addressed to other machines, saving it for later analysis. All information that travels across a network is sent in "packets." For example, when an email is sent from one computer to another, it is first broken up into smaller segments. 69 Free or Open Source Tools For Students By Jill Gordon Many Open Source software projects were either started in colleges or started by recent college graduates. Whether it's a coincidence or not, a lot of the available open source software is ideal for college students, either pursuing a bachelor’s degree or master’s degree. Free and Open Source Software Tools for Students With the widespread use of the Internet and the growth of web-based applications, there are also a lot of hybrid forms of software available – free software with APIs (Application Programmer Interfaces) but not truly open source. The following list covers some of the best free and open source software from an average student's perspective. (The list is arranged by software category, with recommended applications and the occasional short list of alternative or supplemental apps.)

Top 5 IT Certifications of 2014 - Infographic To embed this infographic on your site or within a blog post (Copy and paste this code): <a href=" target="_blank"><img src=" border="0" alt="Top 5 IT Certifications of 2014 - Infographic" /></a><p style="text-align:center;"><a href=" to you by Western Governors University</a></p> Did you find this helpful? Check out Top IT Certifications of 2014 Western Governors University is a nonprofit, accredited, online university. WGU offers bachelor's and master's online degree programs in IT.

Routing versus routed protocols and the CCNA Many networking professionals don't really know what a routing protocol is or does. There are those who also couldn't tell you the difference between a routing protocol and a routed protocol. If you are working as a network engineer or preparing to take the CCNA, you need to understand the distinction between routing and routed protocols, as well as how these protocols function on the network. Routing protocols Routing protocols distribute routing information throughout all routers on a network.

Formatting SQL*Plus Reports This chapter explains how to format your query results to produce a finished report. This chapter does not discuss HTML output, but covers the following topics: Read this chapter while sitting at your computer and try out the examples shown. Before beginning, make sure you have access to the HR sample schema described in SQL*Plus Quick Start. Bluesnarfing Bluesnarfing is the unauthorized access of information from a wireless device through a Bluetooth connection, often between phones, desktops, laptops, and PDAs (personal digital assistant.). This allows access to a calendar, contact list, emails and text messages, and on some phones, users can copy pictures and private videos. Both Bluesnarfing and Bluejacking exploit others' Bluetooth connections without their knowledge. While Bluejacking is essentially harmless as it only transmits data to the target device, Bluesnarfing is the theft of information from the target device.

4 Tips for a Strong Executive Summary of a Security Assessment Report A small subset of the audience for which a security assessment report is intended will actually read the whole document. The majority will only have the patience for the first page. That’s why it’s important that the report start with a strong executive summary. Here are 4 tips for writing an executive summary that gets read, understood and (hopefully) acted upon: The summary has to make sense to a non-technical audience. Remember that it’s meant to be read by “executive” managers. CompTIA Network+ Certification for Network Administrators The information technology is ruling the real world quite broadly; these days’ people are using computers, smartphones and other digital devices to perform their professional and personal tasks. One of the most important and effective aspect of IT is computer networking. Today, internet is the most widely used element of IT, countless people use internet to perform several personal and organizational operations and internet itself is a network of networks. But as compare to that organizational computer network is much more simple but effective, these days most enterprises have established their own computer network which allow their employees to share information and communicate with each other securely. Different enterprises have different network requirements for instance if a company have 200 employees so they have to design network keeping physical infrastructure and number of employees in mind. Alice Julia