Brandon HitzelApr 26, 202016 minNetwork Design Scenario #3: Remote Access VPN DesignNetwork Design covering Remote Access Client based VPNs aka SSL VPN
Brandon HitzelNov 26, 201910 minTroubleshooting with Wireshark: The Case of the TCP Challenge ACK Troubleshooting an issue where the server replies with an ACK only instead of SYN/ACK. Also I will show a few simple Wireshark tips.
Brandon HitzelSep 25, 201913 min5 Easy Router Protection Techniques - includes Attack and Packet Analysis Executing attacks against a router using Kali Linux with Wireshark and the 5 easy steps to protect against them.
Brandon HitzelMar 20, 20197 minNetwork Design Scenario #2: DMZ DesignThis scenario covers the network Demilitarized zone or DMZ. Network segmentation is key for network defense. This post will discuss various
Brandon HitzelSep 28, 20186 minCertification Comparison: SSCP vs. CCNA SecurityCisco Certified Network Associate - Security vs. ISC2 Systems Security Certified Practitioner The Cyber security industry is hot right...
Brandon HitzelSep 3, 20183 minHow to Disable Password Recovery on Cisco DevicesThis article covers how to disable password recovery for certain cisco routers and switches.
Brandon HitzelSep 1, 20183 minKnowledge is power - lots of linksHere is a large list of technology links I have bookmarked over time. "Give a man a fish, and you feed him for a day. Teach a man to...
Brandon HitzelAug 30, 20183 minHello World: Internet Plumbing & Data Conservation This is a quick introduction to my new "Network Defense Blog" Welcome So I decided to start a blog. It seems so cliche when i think about...