Showing posts with label Cisco Networking Academy. Show all posts
Showing posts with label Cisco Networking Academy. Show all posts

Wednesday, December 11, 2024

Finishing Chapter 7 in the Official Cert Guide for CCNA

Working My Way Through the CCNA Official Cert Guide

A couple of weeks ago, I went ahead and began studying for the Cisco Certified Network Administrator certification. This IT certification is better known by its abbreviation: CCNA. As I mentioned in a previous post on here on my blog, when I worked at the Social Security Administration (SSA) in Woodlawn, MD as a Tier 1 help desk agent, I made an attempt to study for the Network+ certification offered by CompTIA. Due to the sheer volume of information required to know for the certification, I gave up on studying for Network+. I then made an attempt at studying for the CCNA certification. I got as far as either Chapter 9: "Spanning Tree Protocol Concepts" or Chapter 10: "RSTP and EtherChannel Configuration" before stopping. I was having trouble understanding some of the topics in either chapter, so I got bogged down studying. In addition, I went through a period where I got REALLY BUSY with work. It's amazing how that works.

Over the past year, I have been taking online courses via Cisco's Networking Academy. Since I recently completed all four online classes for networking, it seemed like the perfect time to make another attempt to study for (and earn) the CCNA certification from Cisco.

A couple of months ago, I discovered on Cisco's own website that an updated and revised version of the Official Cert Guide for CCNA 200-301 would be published and available for sale in July 2024. Well, the first volume would be available. At the time, the second volume of the Official Cert Guide had been scheduled to be published a month or two after. Even though I was busy working on the online courses at the Cisco Networking Academy, I went ahead and bought the first volume of the new certification guide from Amazon as soon as it was available for purchase.

Since I decided to make another attempt to pass the CCNA certification exam, I quickly made it through Part 1: "Introduction to Networking". Part 1 consists of the following chapters:

  • Chapter 1: Introduction to TCP/IP Networking
  • Chapter 2: Fundamentals of Ethernet LANs
  • Chapter 3: Fundamentals of WANs and IP Routing

To be honest, Part 1: "Introduction to Networking" was a good review of the information covered in the four online networking classes that I had completed.

I then began work on Part 2: "Implementing Ethernet LANs", which consists of the following chapters:

  • Chapter 4: Using the Command-Line Interface
  • Chapter 5: Analyzing Ethernet LAN Switching
  • Chapter 6: Configuring Basic Switch Management
  • Chapter 7: Configuring and Verifying Switch Interfaces

I then made short work reading chapters 4, 5, 6, and 7. Like the chapters in Part 1: "Introduction to Networking", chapters 4, 5, 6, and 7 were another good review. However, using the Cisco IOS to configure different aspects of a network switch is like riding a bike to a certain degree. Part of my plan for studying for the CCNA certification is to use Network Simulator software offered by Pearson Vue. The objective of the Network Simulator tool is to give you experience using Cisco IOS by giving you exercises to work on after reading the corresponding chapter in the Official CCNA Cert Guide. Just know that the Network Simulator tool doesn't have exercises for every chapter in the Official CCNA Cert Guide. It just depends on whether the chapter in the Official CCNA Cert Guide covers new commands for the Cisco IOS.

On the night of December 11, 2024, I completed the exercises in Pearson Vue's Network Simulator tool for Chapter 7: "Configuring and Verifying Interfaces". Surprisingly, there were only three exercises for the chapter.

Before moving on to Part 3: "Implementing VLANs and STP", there are some things that I probably should do first.

In no particular order, here are some things that I should do:

  • Go back and complete the "Do I Know This Already?" quizzes for chapters 4, 5, 6, and 7. The questions are probably very similar to the questions on the official CCNA certification exam. As a result, the more practice I can get with these types of questions, the better.
  • Go to Wendell Odom's Cert Skills blog and work my way through the exercises for chapters 4, 5, 6, and 7. These exercises are similar to the Cisco IOS exercises found on Pearson Vue's Network Simulator. The difference is that Wendell Odom doesn't prompt you or guide you through the exercise. Instead, he gives you the network setup and tells you the changes that need to be made. It's up to you to try to figure out what commands that you need to enter into the Cisco IOS command prompt to complete the exercise. Wendell Odom does give you the answers. The nice thing about the Cisco IOS exercises available on the Cert Skills blog is that the exercises are free. While the exercises were conceived with using just a pen and a piece of paper, you can complete the exercises using Cisco's Packet Tracer application, which is available for free.
Screenshot of Wendell Odom's Cert Skills blog.
Screenshot of Wendell Odom's Cert Skills blog.

  • Create my own User's Guide to the Cisco IOS. That means going through chapters 4, 5, 6, and 7 creating my own tables of all of the Cisco IOS commands. There are also step-by-step instructions on how to configure passwords, for example. Once complete, I can then print out all of the tables and step-by-step guides and then put them into a notebook. Then, it's just a matter of adding additional tables and step-by-step guides as I complete subsequent chapters in the Official CCNA Cert Guide.
Cisco IOS User Guide on Google Docs.
Cisco IOS User Guide on Google Docs.

UPDATE: Over the past week or so, I have been steadily creating my own Cisco IOS user guide over on Google Docs. I created my versions of the tables found in the first seven chapters of the <b>Official CCNA Cert Guide</b>. I am planning on adding to this document as I progress through the book.  
  • Go back through chapters 4, 5, 6, and 7 and write down notes for all of the key topics that MIGHT be on the certification exam. So far, I have written down notes for chapter 4. Since I have completed those four online networking classes from the Cisco Networking Academy, this is largely just another review.
  • Create my own simple networks using Cisco Packet Tracer and then configure all of the devices. The nice thing about this option is that Cisco Packet Tracer is F-R-E-E to download and use. Here on my blog, I wrote a post about other options available, such as Cisco Modeling Labs or GNS3, if you don't want to use Cisco Packet Tracer.
Cisco Packet Tracer exercise.
Cisco Packet Tracer exercise. 

Lastly, is it really necessary to buy your own hardware to study for CCNA? That is, do you need to buy a router, a couple of switches, some Ethernet cable, and a networking cabinet? Not really. If you have the money and space, you most certainly can. Based on my own research, a hardware kit for CCNA study can easily cost several hundreds of dollars, depending on the options you choose. However, it's not necessary to buy all of that equipment. I have a friend and former co-worker at SocialSecurity who earned the CCNA certification by just using Packet Tracer. The main advantage of buying your own CCNA hardware kit is that you gain tactile experience using and configuring hardware. Cisco Packet Tracer was designed for study when hardware is not available or affordable. Besides, the Cisco IOS used on Packet Tracer is largely the same (for the most part) as the Cisco IOS used by actual switches and routers.

Monday, November 4, 2024

New Badge from Cisco Networking Academy...

New Badge from Cisco Networking Academy

I recently earned a new badge from Cisco Networking Academy.

I F-I-N-A-L-L-Ypassed the final exam for the Network Support and Security online course.

The Network Support and Security course is the final online course offered by the Cisco Networking Academy for networking.

The four networking courses are (in order of completion):

  1. Networking Basics
    • Badge issued on January 23, 2024
    • Skills learned: Network Media, Application Layer Services, Network Types, IPv4 Addresses, Wireless Access, Protocols Standards
  2. Networking Devices and Initial Configuration
    • Badge issued on April 18, 2024
    • Skills learned: ARP, Cisco IOS, IPv4 Subnetting, DCHP, Hierarchical Network Design, Cisco Devices, Ethernet Operates, Network Layer Protocols, DNS, Binary Systems, Transport Layer Protocols, Virtualization and Cloud Services
  3. Network Addressing and Basic Troubleshooting
    • Badge issued on July 5, 2024
    • Skills learned: Cisco Routers, IPv6 Addressing, Network Troubleshooting, Cisco Switches, Troubleshooting, Copper and Fiber Cabling
  4. Network Support and Security
    • Badge issued on October 29, 2024
    • Skills learned: Documentation, Support, User Support, Endpoint Devices, Help Desk, Network Troubleshooting

Here are the badges.


Verified Cisco Networking Academy Networking Basics Badge
Verified Cisco Networking Academy Networking Basics Badge

Verified Cisco Networking Academy Networking Devices and Initial Configuration Badge
Verified Cisco Networking Academy Networking Devices and Initial Configuration Badge

Verified Cisco Networking Academy Network Addressing and Basic Troubleshooting Badge
Verified Cisco Networking Academy Network Addressing and Basic Troubleshooting Badge

Verified Cisco Networking Academy Network Support and Security Badge
Verified Cisco Networking Academy Network Support and Security Badge

All of my badges can be found on my public profile page at Credly

In addition, I need to go through and update both my LinkedIn profile page as well as my resume.

Now, it's on to my next learning course.  

I have yet to decide on what my next course should be. It could be CCNA, Python, JavaScript, Microsoft Server, or Microsoft Azure

Friday, October 4, 2024

Types of Firewalls...

It's a Long Slog

For the past few weeks, I have been S-L-O-W-L-Y working my way through the Network Support and Security online class from Cisco Networking Academy.

To be sure, it has been a L-O-N-G slog.

The course contains only three modules:

  • Module 1: Network Support
  • Module 2: Cybersecurity Threats, Vulnerabilities, and Attacks
  • Module 3: Network Security

Like all online classes from Cisco Networking Academy, each module contains several sub-modules. Each sub-module contains numerous definitions, charts, graphics, videos, pull-down menus, lists, and whatnot. If you are trying to take notes as you read each sub-module, it can be a time-consuming process.

When I started the Network Support and Security online course, my initial thought that it would be a quick and easy course to complete.

Boy, I was wrong.

Types of Firewalls

Sub-module 3.5.2 "Types of Firewalls" gives a basic introduction to four different types of firewalls.

The types of firewalls analyzed by the sub-module are:

  • Packet Filtering (Stateless) Firewall
Packet Filtering (Stateless) Firewall
Packet Filtering (Stateless) Firewall 

    • Packet filtering firewalls are usually part of a router firewall, which permits or denies traffic based on Layer 3 and Layer 4 information.
      • Source IP address 
      • Destination IP address
      • Protocol
      • Source port number
      • Destination port number
      • Synchronize/Start (SYN) packet receipt
    • Packet filtering firewalls are stateless firewalls that use a simple policy table look-up that filters traffic based on specific criteria. 
    • There are several advantages of using a packet filtering firewall:
      • Packet filters implement simple "permit or deny" rule sets
      • Packet filters have a low impact on network performance
      • Packet filters are easy to implement and are supported by most routers.
      • Packet filters provide an initial degree of security at the Network layer
      • Packet filters perform almost all the tasks of a high-end firewall at a much lower cost.  
    • There are several disadvantages of using a packet filtering firewall: 
      • Packet filters are susceptible to IP spoofing. Threat actors can send arbitrary packets that meet Access Control List (ACL) criteria and pass through the filter. 
      • Packet filters do not reliably filter fragmented packets
        • Because fragmented IP packets carry the TCP header in the first fragment and packet filters filter on TCP header information, all fragments after the first fragment are passed unconditionally. 
        • Decisions to use packet filters assume that the filter of the first fragment accurately enforces the policy. 
      • Packet filters use complex ACLs, which can be difficult to implement and maintain
      • Packet filters cannot dynamically filter certain services
    • Packet filters are stateless. They examine each packet individually rather than in the context of the state of a connection. 
    • Packet filters do not represent a complete firewall solution, but they are an important element of a firewall security policy. 

  • Stateful Firewall
Stateful Firewall
Stateful Firewall

    • Stateful firewalls are the most versatile and most common firewall technologies in use. 
    • Stateful firewalls provide stateful packet filtering by using connection information maintained in a state table. 
    • Stateful filtering is a firewall architecture that is classified at the Network layer. 
    • Stateful firewalls also analyze traffic at OSI Layer 4 (Transport) and Layer 5 (Session).
    • There are several benefits to using a stateful firewall in a network: 
      • Stateful firewalls are often used as a primary means of defense by filtering unwanted, unnecessary, or undesirable traffic. 
      • Stateful firewalls strengthen packet filtering by providing more stringent control over security. 
      • Stateful firewalls improve performance over packet filters or proxy servers. 
      • Stateful firewalls defend against spoofing and DoS attacks by determining whether packets belong to an existing connection or are from an unauthorized source. 
      • Stateful firewalls provide more log information than a packet filtering firewall. 
    • Stateful firewalls also present some limitations
      • Stateful firewalls cannot prevent Application layer attacks because they do not examine the actual contents of the HTTP connection. 
      • Not all protocols are stateful. For example, UDP and ICMP do not generate connection information for a state table, and, therefore, do not garner as much support for filtering. 
      • It is difficult to track connections that use dynamic port negotiation
        • Some applications open multiple connections. 
        • This requires a whole new range of ports that must be opened to allow this second connection. 
      • Stateful firewalls do not support user authentication

  • Application Gateway Firewall
Application Gateway Firewall
Application Gateway Firewall

    • An application gateway firewall (proxy firewall) filters information at Layers 3, 4, 5, and 7 of the OSI reference model. 
    • Most of the firewall control and filtering is done in software. 
    • When a client needs to access a remote server, it connects to a proxy server. 
    • The proxy server connects to the remote server on behalf of the client. 
    • Therefore, the server only sees a connection from the proxy server. 

  • Next Generation Firewall
Next Generation Firewall
Next Generation Firewall

    • Next generation firewalls (NGFW) go beyond stateful firewalls by providing the following: 
      • Integrated intrusion prevention. 
      • Application awareness and control to see and block risky apps. 
      • Upgrade paths to include future information needs. 
      • Techniques to address evolving security threats. 

Additional types of firewalls include:

  • Host-Based (Personal and Server) Firewall - a PC or server with firewall software running on it. 
  • Transparent Firewall - filters IP traffic between a pair of bridged interfaces. 
  • Hybrid Firewall - a combination of the various firewall types. 

I will come back to this post after I complete Module 3.5 Firewalls and Host-Based Intrusion Prevention.

There is a lot of good information about firewalls.

Additionally, I found some really good information and graphics about the different types of firewalls over at Palo Alto Networks' webpage.

As always, more to follow.

Wednesday, October 2, 2024

Lack of Activity on My Blog...

Explaining the Lack of Activity

There has been a significant lack of activity here on my blog.

As per usual, I have been really busy with all kinds of activity.

Here is a list of things that I have been working on:

  • I have been working concerts at the Arizona Financial Theatre in downtown Phoenix, AZ.
  • I have been working at football games at State Farm Stadium in Glendale, AZ.
  • I have started riding my bike again.
  • I have been focusing a lot of time and energy working on the Network Support and Security online class from Cisco Networking Academy.
  • I have been working out at the gym quite a bit.
  • I have been organizing my photos into collections over on Google Photos.
  • I have been trying to come up with a list of blogging post ideas to write about.
  • I even flirted with the idea of moving my blog here at Blogger on to another platform.

I even fell into the bottomless pit that is Twitter/X.

I spent a lot of energy on two very long posts. Moreover, I was underwhelmed by the reaction I got to those two posts. Disappointment aside, I am writing this blog for myself. If other people are interested, then that's great.

Lack of interest in my blog isn't going to deter me. It just means that my blog has yet to find an audience. That will come as I write more posts.

Thursday, September 12, 2024

Starting Module 3 Network Security...

Starting Module 3 Network Security

The other day, I FINALLY made it to "Module 3: Network Security" in the Network Support and Security online course from Cisco Networking Academy.

Boy, it was a long SLOG to get through "Module 2: Cybersecurity Threats, Vulnerabilites, and Attacks".

I will have more to write about this later.

Module 3: Network Security
Module 3: Network Security


Module Objective: Configure secure user access on a network.

Here are the objectives for Module 3:


Topic Title Topic Objective
Security Foundations Explain foundational security concepts.
Access Control Configure access control.
Defending Systems and Devices Explain cybersecurity processes and procedures that protect systems.
Antimalware Protection Explain methods of mitigating malware.
Firewalls and Host-Based Intrusion Prevention Explain how firewalls operate to filter traffic and recommend endpoint security measures.
Secure Wireless Access Configure basic wireless security on a home router (WPAx).

Sunday, September 8, 2024

Cybersecurity Threats, Vulnerabilities, and Attacks, Part 2...

Cybersecurity Threats, Vulnerabilities, and Attacks, Part 2

I haven't been posting a whole lot here on my blog.

I had completed two rather lengthy posts on my blog. It took a lot of effort to complete those two posts. There are additional lengthy posts in the pipeline.

Recently, I have been busy doing everything else except for posting to my blog.

One thing that I have been spending A LOT of time on is the Network Support and Security online class from Cisco Networking Academy.

For the past couple of weeks, I have been working my way through "Module 2: Cybersecurity Threats, Vulnerabilities, and Attacks". In fact, I wrote a post right here on my blog about beginning the second module of the Network Support and Security online class. You can read that post right here.

To say that my progress through the course has been slow is an understatement.

As I mentioned in a short post that I published on LinkedIn, I have already been exposed to a significant portion of the information about cybersecurity threats due to security briefings I had been given while in was in the Army, worked as a DoD contractor, and as an IT help desk employee at the Social Security Administration. However, it is a lot of information to absorb, so it is a good idea to review the nature of cyber attacks from time to time.

Module 2.0 Introduction
Module 2.0 Introduction

Module 2.1 Common Threats
Module 2.1 Common Threats

Module 2.2 Deception
Module 2.2 Deception

Module 2.3 Cyber Attacks
Module 2.3 Cyber Attacks

Module 2.4 Wireless and Mobile Device Attacks
Module 2.4 Wireless and Mobile Device Attacks

I just started working on "Module 2.5 Application Attacks". It is the last section for Module 2:  Cybersecurity Threats, Vulnerabilities, and Attacks

Module 2.5 Application Attacks
Module 2.5 Application Attacks




Tuesday, August 27, 2024

Cybersecurity Threats, Vulnerabilities, and Attacks

Module 2: Cybersecurity Threats, Vulnerabilities, and Attacks

OK. I F-I-N-A-L-L-Y made it through "Module 1: Network Support" to "Module 2: Cybersecurity Threats, Vulnerabilities, and Attacks" in the Network Support and Security online class available from the Cisco Networking Academy.

Boy, was it a LONG slog. However, "Module 1: Network Support" is complete. I scored a 93% on the 15 question end-of-module exam. I am now moving on to the next module in the class.

Module 2: Cybersecurity Threats, Vulnerabilities, and Attacks
Module 2: Cybersecurity Threats, Vulnerabilities, and Attacks

Here are the Topic Titles and Topic Objectives for Module 2. 


Topic Title Topic Objective
Common Threats Explain the threats, vulnerabilities, and attacks that occur in the various domains.
Deception Describe the different deception methods used by attackers to deceive their victims.
Cyber Attacks Describe common types of network attacks.
Wireless and Mobile Device Attacks Describe common types of wireless and mobile device attacks.
Application Attacks Describe types of application attacks.

Cisco CyberOps Associate

After "Module 2: Cybersecurity Threats, Vulnerabilities, and Attacks", Module 3 covers the topic of network security. As a result, the last two modules of the Network Support and Security online class will have a cybersecurity emphasis.

I recently bought a copy of official study guide for the Cisco CyberOps Associate (CBROPS 200-201) book published by Cisco Press over on Amazon.com. Thus, it will be interesting to see how much of an overlap there is between the online course and Cisco's entry-level cybersecurity certification.


Textbook for Cisco CyberOps Associate
Textbook for Cisco CyberOps Associate


Recently, I have considered putting aside studying for CCNA and focusing on the Cisco CyberOps Associate certification instead. After all, the Cisco CyberOps Associate certification only has one textbook compared to the two volumes needed to study for CCNA. Furthermore, I have a lot of regret about not earning my Security+ certification from CompTIA. After I earned my A+ certification, I should have just started studying for the Security+ certification in order to get me out of working at the Tier 1 IT help desk at the Social Security Administration (SSA). Earning that Security+ certification would have allowed me to work in the Security Operations Center (SOC) for SSA as a cybersecurity analyst. Instead of doing that, I got bogged down studying for the Network+ certification, which is CompTIA's version of CCNA. Why did I start studying for Network+ after A+? Well, the conventional wisdom is to study for Network+ after earning the A+ certification. After earning the Network+ certification, people will then typically study for Security+. The certification model is computer (A+) then network (Network+) then security (Security+). After figuratively banging my head against a brick wall while studying for Network+, I gave up and then started to study for CCNA instead. In hindsight, I should have skipped over networking altogether and focused exclusively on cybersecurity. That said, in order to defend networks from cyberattacks, it does kind of help to know how networks operate and do what they do.

Do I have regrets?

You better believe it.

Possible Change of Mission

Once I finish the Network Support and Security online course, I just MIGHT put aside studying for CCNA and focus on studying for the CyberOps Associate certification instead.The reason? The main reason is that I NEED an IT certification to put on my resume AS SOON AS POSSIBLE.

On the other hand, I just might be able to land an entry-level data center technician job somewhere in the Phoenix area with these badges I have earned from completing the online courses in networking from the Cisco Networking Academy.

We will just have to see what happens next.

Tuesday, August 13, 2024

PuTTY, WireShark, and NMAP

PuTTY, Wireshark, and NMAP

This will be a post about the following IT applications: PuTTY, Wireshark, and NMAP.

As I am working my way through "Module 1: Network Support" in the Network Support and Security online class available at the Cisco Networking Academy, I became reacquainted with the IT applications Wireshark and NMAP. Since I recently wrote about it, I also became reacquainted with the IT application PuTTY.

What is PuTTY?

Due to my recent post about my first IT job, I recently downloaded a copy of the PuTTY application onto my Dell laptop. What does PuTTY do and what is it used for? Here is a good description:

PuTTY is a free and open-source terminal emulator, serial console and network file transfer application. It supports several network protocols, including SCP, SSH, Telnet, rlogin, and raw socket connection. It can also connect to a serial port. The name "PuTTY" has no official meaning.

In so many words, with PuTTY running on your computer (laptop or desktop), you can connect to a switch, a router, or a host and make changes to the configuration.

With PuTTY, you can connect to a host, a router, or a switch using a computer protocol called Telnet. It's not recommended that you use Telnet, however. Telnet does not encrypt user names and passwords. As a result, if someone was monitoring your activity with a packet sniffer, such as Wireshark (see below), he or she would be able to determine your logon credentials. Telnet dates from the 1970s and 1980s when computer security had a low priority since users were U.S. government employees.

As a result of this flaw with Telnet, it is highly recommended that you use a computer protocol known as Secure Shell, or SSH. SSH will encrypt your logon user name and password, making it rather difficult for potentially malignant actors to eavesdrop on your data.

Is there a reason for using PuTTY at home? Well, the main draw with an application like PuTTY is that it is an open-source application that is independent of any software or hardware vendor. Unless you have your own collection of servers and routers at home, such as for studying for Cisco's CCNA certification, you might find that PuTTY is of limited use.

That said, there could be instances where you could use PuTTY at home. This might be a subject worth pursuing at some point.

I am slowly making my way through the Network Support and Security online course from the Cisco Networking Academy. In Section 1.5 "Troubleshoot a Network", there are a couple of hands-on labs that utilize both Wireshark and NMAP.

Screenshot of PuTTY interface.
Screenshot of PuTTY interface.


What is Wireshark?

What is NMAP?

I just downloaded and installed NMAP onto my computer. I cannot wait to try it out.

Screenshot of NMAP using the command prompt option.
Screenshot of NMAP using the command prompt option.

Screenshot of NMAP's graphical user interface (GUI) known as Zenmap.
Screenshot of NMAP's graphical user interface (GUI) known as Zenmap.


More to follow.

UPDATE: I'm going to have to re-write this post. 

Thursday, August 8, 2024

Lack of New Posts to My Blog...

Lack of New Posts to My Blog...

Yes, there has been a lack of new posts to my blog.

Quite simply, I have been rather busy working on some quite complex posts on my blog here at Blogger.

Some of these complex posts that I have been devoting large chunks of time to include the following:

  • A rather lengthy post about my first job in information technology (IT) with a Baltimore, MD area company called Data Networks. Status: Completed
  • A second lengthy post about my recent purchase of the Sea Sucker bike rack. Status: Completed
  • A third lengthy post about the another movie that I saw at the Cine Core Movie Theatre in Seoul, South Korea. Status: Completed
  • A fourth length post about rediscovering that I own a copy of the South Korean version of the animated film "Ghost in the Shell" on DVD. Status: Completed
  • A fifth post about my first hike at Thunderbird Conservation Park in Glendale, AZ. Status: Completed

Most of these posts have been completed. The only post that has NOT been completed is my post about the Cine Core Movie Theatre. I hope to finish that post soon. Really soon.

Meanwhile, I have been working on a new online course about computer networking over at the Cisco Networking Academy website.

I have learned A LOT about the importance of planning out a blog post and sticking to your plan. It's so easy to get lost down a rabbit hole when writing a blog post. Just when I think that I have completed a post, I think of new things to add to the post. Plus, I have the urge to re-write large sections of a post.

Plus, there's all of the normal, day-to-day stuff that comes my way.

It never ends. Things just get more and more complex.

Friday, July 19, 2024

New Cisco Networking Academy Class...

New Cisco Networking Academy Class

This week, I dropped the AI Fundamentals with IBM SkillsBuild online class at the Cisco Networking Academy.

Introduction to Artificial Intelligence with IBM SkillsBuild
Introduction to Artificial Intelligence with IBM SkillsBuild 


I completed the first module, "Introduction to Artificial Intelligence". It was interesting to learn about what artificial intelligence is and what it is not. It was also interesting to learn about the history of artificial intelligence and its different categories. It was also interesting to learn about the different techniques on how machine learning solves problems. As you progress through the class, you eventually work with IBM Watson AI to run a couple of simulations. It's all fascinating. Moreover, while AI may be the latest IT buzzword, AI isn't going away anytime soon. Thus, it's important to learn what it is and what it can do. My understanding is that the newest version of the Official Cert Guide for CCNA from Cisco Press will have a chapter about using AI in regards to networking.

However, since I have one last online course to complete all of the networking courses from Cisco Networking Academy, I made the decision to stop the AI Fundamentals with IBM SkillsBuild online class. Despite my newly found interest in the subject, the course itself is a distraction from my goal of completing the online courses for networking. I will come back and complete the course at a later date.

As a result, I went ahead and started the Network Support and Security online class instead.

Network Support and Security Online Course

While the Network Support and Security online class may only have three training modules, each individual module is quite lengthy.

Here are the three modules:

  • Network Support
  • Cybersecurity Threats, Vulnerabilities, and Attacks
  • Network Security

Plus, as I mentioned in a previous post, I have a long list of online courses at the Cisco Networking Academy that I want to complete.

Time to get studying!!!

Friday, July 12, 2024

Falling Behind on My Blog...

Lack of Updates

In case you weren't aware, I have fallen behind on posting updates to my blog for the past couple of weeks.

Yes, it is true.

As per usual, I have been REALLY busy doing all kinds of stuff.

Last week, I made completing the Final Exam for the Network Addressing and Basic Troublshooting online course from Cisco Networking Academy a top priority.

In addition, I somehow found myself getting involved with working at the State Farm Stadium in Glendale, AZ during public events. Not too sure how that happened, but there it is. As a result, I have been busy completing the online courses for serving alcohol and preparing and serving food.

In the meantime, I have started a new online course with Cisco Networking Academy. I will probably make that into its own blog post.

Plus, I need to keep working on the complex blog posts that I have been working on for the past couple of weeks here on Blogger. Those three posts NEED TO BE completed ASAP.

As per usual, there never is enough hours in the day.

More to follow.

Monday, July 8, 2024

Completed Another Cisco Online Course...

Online Course Complete

On this past Friday, I F-I-N-A-L-L-Y completed the Final Exam for the Network Addressing and Basic Troubleshooting online course over at the Cisco Networking Academy.

Like other online courses I have taken at the Cisco Networking Academy in recent months, the Network Addressing and Basic Troubleshooting course was a long slog. Then again, while taking these online courses, I took serious and exhaustive notes. The notes I took during the online course filled an entire Lemome grid paper notebook. I worked through all of the Cisco Packet Tracer exercises. I also worked through the exercises that did not involve using Cisco Packet Tracer.

During the Final Exam, if I didn't immediately know the answer to a question, I carefully searched for the answer in my notes. Sometimes, it's like looking for a needle in a haystack. Oftentimes, the wording in the question and the answer exactly matches the wording given in the lecture notes. As so often happens in tests for IT subjects, there were one or two questions where the answer is ambiguous, so you have to try to narrow down the most likely answer and hope for the best. All .of that hard work paid off as I scored a 90% on the Final Exam.

Certification Badges on Credly

After getting the result of the Final Exam, I logged into Credly to check on my accomplishment. I now have a verified badge for Network Addressing and Basic Troubleshooting.

Verified Network Addressing and Basic Troubleshooting Badge
Verified Network Addressing and Basic Troubleshooting Badge

As a result, I now have three verified certification badges from Cisco Networking Academy on Credly.

The three verified certification badges that I have earned are:

  • Networking Basics
  • Networking Devices and Initial Configuration
  • Network Addressing and Basic Troubleshooting
Verified Cisco Badges on Credly
Verified Cisco Badges on Credly

Now, I just need to update my resume to reflect these achievements.

Next Courses to Take

With the Network Addressing and Basic Troubleshooting course completed, it's time to move on to the next online course.

Here is my list of online courses at Cisco Networking Academy that I am planning to take:

  • Introduction to Artificial Intelligence
  • JavaScript Essentials 1
  • JavaScript Essentials 2
  • Ethical Hacker
  • Introduction to Cybersecurity
  • Cyber Threat Management
  • Python Essentials 1
  • Python Essentials 2
  • Network Support and Security
  • Network Defense
  • Endpoint Security

It's a long list.

To complete all of the online courses about networking, the next course I should start should be Network Support and Security. However, someone that I recently met via Twitter/X, who is something of an AI-enthusiast, has suggested that I learn about artificial intelligence (AI). As a result, I just might start the Introduction to Artificial Intelligence online course before I tackle the Network Support and Security online course.

From what I can tell, the Introduction to Artificial Intelligence is relatively short online course.

Since I could use a break from networking, I just might do that online course next.

That said, I really want to start the Python Essentials 1 online course.

As always, we'll see.

Friday, June 21, 2024

Cisco Troubleshooting Methods...

Cisco Troubleshooting Methods and Techniques

This week, I started "Module 7: Troubleshoot Common Network Problems" in the Network Addressing and Basic Troubleshooting online course from the Cisco Networking Academy.

Section 7.1 The Troubleshooting Process
Section 7.1 The Troubleshooting Process

Module Objective: Troubleshoot basic network connectivity issues.

Topic Title Topic Objective
The Troubleshooting Process Describe some of the approaches used to troubleshoot networks.
Physical Layer Problems Describe the process of detecting physical layer problems.
Troubleshoot Wireless Issues Troubleshoot a wirless network problem.
Common Internet Connectivity Issues Explain common internet connectivity problems.
Customer Support Explain how to use outside sources and internet resources for troubleshooting.

There will be more content added to this post as I work my way through the module.

Friday, June 14, 2024

Cisco Switches and Routers

Cisco Switches and Routers

For the past week, I have been working on "Module 6: Cisco Switches and Routers" in the Network Addresssing and Basic Troubleshooting online course from Cisco Networking Academy.

Module 6: Cisco Switches and Routers
Module 6: Cisco Switches and Routers

The first half of the module covers Cisco switches.

Cisco Catalyst 9300 Series Switch
Cisco Catalyst 9300 Series Switch

The second half of the module covers Cisco routers.

Cisco 4300 Series Routers
Cisco 4300 Series Routers

Section 6.1 Cisco Switches

Section 6.1 Cisco Switches
Section 6.1 Cisco Switches

As routers and switches evolve, the distinction between them may seem to blur. The main difference between routers and switches:  
  • LAN switches provide connectivity within the local-area networks of the organization.
  • Routers interconnect local networks and are needed in a wide area network (WAN) environment.
  • Definition: A switch is used to connect devices on the same network.
  • Definition: A router is used to connect multiple networks to each other.

Other connectivity options for LANs include include the following:

  • Wireless access points (WAPs) deployed in enterprises enable computers and other devices, such as IP phones, to wirelessly connect to the network, or share broadband connectivity.
  • Firewalls guard against network threats and provide security, network control, and containment.

Key Point: When a LAN network grows to the point where the four Ethernet ports provided by the wireless router are not enough for all of the devices that need to attach to the wired network, it is time to add a LAN switch to the network.

A switch can provide connectivity at the access layer of a network, connecting devices to a LAN.

A switch can allow the network to grow without replacing central devices.

Factors to consider when choosing a switch to use for an enterprise network include:

  • Type of ports
    • When selecting a switch for your LAN, choosing the appropriate number and type of ports is critical.
    • Most lower-cost switches support only copper twisted-pair interface ports.
    • Higher priced switches may have fiber-optic connections.
    • These are used to link the switch to other switches that may be located over long distances.
  • Speed required
    • Ethernet twisted-pair interfaces on a switch have defined speeds.
      • A 10/100 Ethernet port can only function at either 10 megabits per second (Mbps), or at 100 Mbps.
      • What this means is that even if the device that you are connecting to the 10/100 switch interface port is capable of connecting at gigabit speeds, the maximum speed at which it will be able to communicate will be 100 Mbps.
    • Switches may also include gigabit Ethernet ports.
      • If your internet connection is more than 100 Mbps, then a gigabit port is necessary to take advantage of the higher internet bandwidth.
      • Gigabit Ethernet ports will also operate at 10/100 Mbps.
      • Gigabit Ethernet is sometimes represented as 1000 Mbps.
      • Example: The Cisco Catalyst 9300 48S switch has two 40 Gbps uplink ports to provide a fast path for the 48 ports to access the rest of the network and the internet.
    • Similar to a switch port, Ethernet NICs operate at specific bandwidths such as 10/100 or 10/100/1000 Mbps.
    • Key Point: The actual bandwidth of the attached device will be the highest common bandwidth between the NIC on the device and the switch port.
  • Expandability
    • Networking devices come in both fixed and modular physical configurations.
      • Fixed configurations have a specific type and number of ports or interfaces.
      • Modular devices have expansion slots that provide the flexibility to add new modules as required.
    • Example: The Cisco Catalyst 9600 chassis in which you can install different configurations of hardware to address your particular environment.
  • Manageability
    • Many basic, inexpensive switches are not configurable.
    • A managed switch that uses a Cisco operating system enables control over individual ports or over the switch as a whole.
    • Controls include the ability to change the settings for a device, add port security, and monitor performance.
    • Network administrators directly connect to a Cisco Catalyst switch using a console cable.

In addition to switches and routers, there are other connectivity options available for LANs. They include:

  • Wireless Access Points (WAPs) that are deployed in enterprises enable computers and other devices, such as IP phones, to wirelessly connect to the network or share broadband connectivity.
  • Firewalls guard against network threats and provide the following:
    • Security
    • Network control
    • Containment

Section 6.2 Switch Speeds and Forwarding Methods

Section 6.2 Switch Speeds and Forwarding Methods
Section 6.2 Switch Speeds and Forwarding Methods


Section 6.3 Switch Booting Process

Section 6.3 Switch Booting Process
Section 6.3 Switch Booting Process


Section 6.4 Cisco Routers

Section 6.4 Cisco Routers
Section 6.4 Cisco Routers


Section 6.5 Router Boot Process

Section 6.5 Router Boot Process
Section 6.5 Router Boot Process


I am not too pleased with how this post turned out.

I will have to re-write it.

Sorry about that.

Wednesday, June 12, 2024

Lack of New Posts...

No New Posts...

Yes, I know that there haven't been very many blog posts for the past week or so.

As per usual, I got distracted with doing other things.

Plus, I got somewhat carried away with writing and revising this post and this post.

I also got lost in the labrynth that is my Twitter/X feed. Way too many distractions.

As a result, I still have a backlog of blog posts that I need to write for my blog.

  • Posts about hiking trips in the Phoenix, AZ area over the past several months.
  • Additional posts for my series about seeing movies at the Cine Core Movie Theatre in Seoul, South Korea.
  • A lengthy post about the films of Japanese film director Shunji Iwai.
  • Another lengthy post about a CD made by a friend that I am no longer able to find.
  • Posts about various IT subjects as I work my way through online courses from the Cisco Networking Academy.

Of course, that's just a list right off the top of my head.

I have a list of future blog posts somewhere in my Bullet Journal.

I would also like to add some HTML razzledazzle to my future blog posts as well.

Unfortunately, there are only so many hours in a day.

I will notify my Facebook feed as the posts are published to my blog.

Friday, June 7, 2024

Starting Module 6: Cisco Switches and Routers...

Starting New Module

Yesterday, I FINALLY made through both modules for IPv6 addressing in the Network Addressing and Basic Troubleshooting online class from the Cisco Networking Academy.

On my first attempt on the mini-exam for IPv6 addressing, I scored an 80%. I passed the mini-exam, but I was disappointed. After reviewing the results, I retook the mini-exam for IPv6 addressing and then scored a 100%. That was a better result.

Now, I am on to "Module 6: Cisco Switches and Routers".

Module 6: Cisco Switches and Routers
Module 6: Cisco Switches and Routers

More to follow.

Sunday, June 2, 2024

Making and Testing My Own Ethernet Cables (UPDATED)...

Making and Testing my Own Ethernet Cables

Previously on my blog, I have written a couple of posts about making my own Ethernet cables. To get caught up, you can read here, here, and here.

Recently, I bought a LAN Explorer Cable Tester with Remote made by Klein Tools at a Home Depot in Peoria, AZ. After already buying 100 feet of CAT 5e Ethernet cable, a box of RJ-45 connectors, and a Ratcheting Modular Crimper/Stripper/Cutter, also made by Klein Tools. Buying the cable tester was the final piece of the puzzle for making my own Ethernet cables.

LAN Explorer Cable Tester by Klein Tools
LAN Explorer Cable Tester by Klein Tools

Making Straight-Through and Crossover Cables

I made two different types of Ethernet cable. I made a straight-through cable and a crossover cable. Unfortunately, I didn't label or mark either cable.

The first step I did was cut a three-foot length of Ethernet cable, using the cutter feature of the Ratcheting Modular Crimper/Stripper/Cutter.

Step #1: Cutting a length of Cat 5e Ethernet cable
Step #1: Cutting a length of Cat 5e Ethernet cable

The second step I did was strip approximately 2 inches of the outer gray jacket from the Ethernet cable, using the stripper feature of the Ratcheting Modular Crimper/Stripper/Cutter.

Step #2: Stripping two inches from the outer jacket
Step #2: Stripping two inches from the outer jacket


For the third step, I then separated the cables by color (green with green-white, orange with orange-white, blue with blue-white, and brown with brown-white). I then unwrapped the cables and attempted to smooth them out.

Step #3: Separating the cables by color
Step #3: Separating the cables by color

I then aligned the cables by color, following the cabling pinout standards for T-568A (straight-through) and T-568B (crossover) for both ends of the Ethernet cable.

T-568A and T-568B Pinouts
T-568A and T-568B Pinouts

Putting the cables into the correct order
Putting the cables into the correct order

For the fourth step, it can be really difficult to keep the cables in the correct order. The cables will want to move out of order no matter how flat you make them. Once I had the cables in the correct order, either T-568A or T-568B, then trimmed the cables down to approximately one-half inch in length.

Step #4: Trimming the cables
Step #4: Trimming the cables

For the fifth step, you will then want to insert the cables into an RJ-45 connector. After you insert the cables into the RJ-45 connector, you want to make sure that the cables touch the correct contact. You might also have to trim the cables to the correct length. Lastly, make sure that the cables are of a length so that the grey outer layer of the cable goes into the RJ-45 connector.

The sixth step involves inserting the RJ-45 connector into the crimper feature of the Ratcheting Modular Crimper/Stripper/Cutter. Once you do that, you are then ready to squeeze down on the RJ-45 connector. Don't squeeze too hard, however. You will have a difficult time releasing the crimper. You can then remove the RJ-45 connector from the crimper. You have now created an Ethernet cable to either the T-568A or T-568B cabling standard.

Step #6: Crimping the Ethernet cable
Step #6: Crimping the Ethernet cable

Using the Cable Tester

Now, you can use the cable tester to check you work.

Let's see how my Ethernet cables turned out.

I then connected both ends of the Ethernet cable to the RJ-45 jacks on the cable tester. I then pressed the Test button on the cable tester.

For the first Ethernet cable that I tested, I received an OPEN fault indicator. According to the product literature, an OPEN fault indicator will illuminate "if one or more of the conductor wires on the near end are not terminated properly on the far end, or if any of the near-end contact pins are not properly terminated".

Cable Tester Result: OPEN Fault
Cable Tester Result: OPEN Fault

For the second Ethernet cable that I created, I received a different result from the cable tester. This time, the RJ-45 light under PASS illuminated. In addition, under Fault, I received a MISWIRE fault indicator light. According to the product literature, the MISWIRE light will illuminate "if the cable is not wired to one of the cabling standards or if the conductor wire order on the near end do not match the conductor wire order on the opposite end", e.g., Pin 1 on the near end is wired to Pin 2 on the far end.

Cable Tester Result: RJ-45 PASS, MISWIRE Fault

In Conclusion

While the results from the cable tester are disappointing, the results were expected. Like anything else, making your own Ethernet cables takes practice to get it right. Is it important to know how to make your own Ethernet cables? Of course, it is. You just might find yourself in a situation where you are out of Ethernet cables of a certain length, so you need to make your own. Of course, you might have to make your own Ethernet cable due to an emergency. However, according to recent online networking course I took at the Cisco Networking Academy, making your own straight-through or crossover cables will soon be a thing of the past as newer networking equipment no longer requires the creation of either cable type. Technology has made straight-through and crossover cables redundant.