Cybersecurity

Configuring Windows Firewall Rules using netsh

Windows Firewall allows you to control the traffic entering and leaving your system through various rules. You can create and configure firewall rules to permit or block specific network activities. Below are some examples of Windows Firewall rules, including inbound and outbound rules: Example 1: Allow Inbound Traffic on a Specific Port (e.g., HTTP – […]

Configuring Windows Firewall Rules using netsh Read More »

What are some examples of Physical Layer Threats in Networking?

A great question in my two day Security class recently. The physical layer (Layer 1) of the layered model is responsible for the transmission of raw data bits over a communication medium. Although it is often considered more secure due to its reliance on physical components, it is still vulnerable to a variety of threats.

What are some examples of Physical Layer Threats in Networking? Read More »

440px Internet2

View Historical Web Pages with Wayback!

Let’s say you wanted to view our site back in 2001.  Could you do it?  The answer is yes! That’s right, someone has been crawling the web called the Wayback Machine (https://web.archive.org). The Wayback Machine is a digital archive of the World Wide Web and other information on the Internet created by the Internet Archive,

View Historical Web Pages with Wayback! Read More »

CSI-HO-035 – Wi-Fi 6 and Wi-Fi Security in the Wireless LAN

   CellStream, Inc. – Telecom Consulting and Training!             2-Day Instructor Led Hands On Lab Class Available in either Web Based delivery or On-Site Delivery Minimum 10 students – Maximum 20 students Course Description: Knowing the fundamentals of Wi-Fi 6 and Security as these subjects pertain to Wi-Fi/Wireless LAN Operations is

CSI-HO-035 – Wi-Fi 6 and Wi-Fi Security in the Wireless LAN Read More »

Best Practices for Securing your WLAN/Wi-Fi Network at Home or Small Business

If you have attended any of my presentations of WLAN/Wi-Fi Security or even my Security Courses,you know that the design of WLAN/Wi-Fi networks leaves a lot to be desired when it comes to security.  This is also evidenced by the law suit against Amazon with hackers allegedly controlling Ring cameras.   I have always said that

Best Practices for Securing your WLAN/Wi-Fi Network at Home or Small Business Read More »

CSI-HO-029 – Hands-On Security in IP Networks/Protocols

CellStream, Inc. – Telecom Consulting and Training!  2-Day Instructor Led Hands On Lab Class Available in either Web Based delivery or On-Site Delivery Minimum 10 students – Maximum 16 students Course Description: Having a good knowledge of Network Security in Wireless and TCP/IP networks is extremely important for anyone in the service provider business.  Knowledge

CSI-HO-029 – Hands-On Security in IP Networks/Protocols Read More »

CSI-HO-030 – Hands-On Understanding Security in WLAN/Wi-Fi Networks

   CellStream, Inc. – Telecom Consulting and Training!             2-Day Instructor Led Hands On Lab Class Available in either Web Based delivery or On-Site Delivery Minimum 10 students – Maximum 20 students Course Description: Having a solid understanding of Network Security in WLAN/Wi-Fi networks is extremely important for anyone in networking,

CSI-HO-030 – Hands-On Understanding Security in WLAN/Wi-Fi Networks Read More »

Contact Us Here


Please verify.
Validation complete :)
Validation failed :(
 
Your contact request has been received. We usually respond within an hour, but please be patient. We will get back to you very soon.
Scroll to Top