CCNA Security Archives - Telecom Academy
Understanding the MAC Address (Media access controller)
Understanding the MAC Address (Media access controller)

MAC Address Hello, and welcome to this lecture on MAC addresses. In the last lecture we looked at ethernet and we also looked at CSMA/CD. In this lecture we’re gonna talk about a layer two concept known as MAC addresses. First up, what is a MAC address? MAC address is a 48-bit address that is […]

Read more
Connection-oriented and Connectionless Protocols
Connection-oriented and Connectionless Protocols

TCP and UDP utilize the two connection types. Connection-oriented and connectionless. TCP is considered connection-oriented. This means it uses a system to provide reliable delivery of traffic. TCP utilizes a system known as the three way handshake to establish connections. Before a connection is considered established both hosts need to send and receive a send packet, and an ACK packet. Technically this could be […]

Read more
What is SSH? How to configure SSH?
What is SSH - How to configure SSH

What is SSH? SSH, or Secure SHell, is a protocol for connecting from one computer to another, usually in order to use the Command-line interface, or Command Shell on a remote system. It’s very widely for system administration such as software update, configuration management, and deployment on Linux and Mac OS X machines. you may also like:   What is telnet? Usage […]

Read more
Explore the OSI model
Explore the OSI model

The Open Systems Interconnection model or OSI model is that standardizes each of the functions of data transformation by breaking it down into layers. Well why is the OSI model important in order to better understand packet analysis. you may also like: Wireshark display and capture filters Explore the OSI model You must understand the way […]

Read more