Category: Learning

0

January 2017 Study Schedule

Happy new year everyone, I hope you have had a fantastic end to the year and you are looking forward to all the possibilities 2017 has to bring. I have kicked off my year by...

0

CIA Triad :: Overview

C.I.A, important letters in the world of information security and you will find it in many books and articles when studying for certifications. So what is the CIA triad and how does it fit...

0

2017 Certification Plan

This year has been crazy! I have graduated University with a 1st class honours, attained the CCNA Routing & Switching certification and been offered a job with Cisco Systems. All that hasn’t been easy...

0

Cisco Global Cyber Security Scholarship

Having applied for the Global Cyber Security Scholarship with Cisco a good few months ago I really thought I had a good chance of being accepted onto the program but an email from Cisco has...

0

Password Protecting Folders in Windows 10

I’ve been looking around at ways to password protect folders on my machine without software and I found out that Windows 10 has features that allow for this. I thought it would be worth sharing...

0

Packet Tracer Troubleshooting Activity : 102

Hello everyone, I thought it would be a great idea to produce and deliver another troubleshooting exercise for those keen net-workers out there. This is another CCNA level network and I have tried to...

0

Packet Tracer Troubleshooting Activity :101

This activity has been created by myself to test those studying for the CCNA exam. Due to the requests I keep getting on YouTube to keep updating the link, I have decided to put together...

0

Investigating HSRP

Hot Standby Router Protocol (HSRP) is a Cisco propitiatory router protocol that provides first-hop redundancy for IP hosts on a LAN. It enables a set of router interfaces once configured to present a single...

0

Lightning Talk: UTM’s

Earlier this week I delivered a presentation about UTM’s to businesses on the Isle of Man. This lightning presentation was aimed to give a brief overview of Unified Threat Management solutions and the considerations...