Georgia Tech – CS6035 Review
Georgia Tech – CS6035 Review I started a master program a the Georgia Institute of Technology (Georgia Tech) in the spring of 2019. This is a Cybersecurity masters offered through the School of Computer...
Network Nonsense for Networkers
Georgia Tech – CS6035 Review I started a master program a the Georgia Institute of Technology (Georgia Tech) in the spring of 2019. This is a Cybersecurity masters offered through the School of Computer...
Cisco Live 2019 – Tips It’s no secret I love Cisco Live, formerly Cisco Networkers. I have been attending since 2005. Cisco Live 2019 will be in San Diego, CA from June 9th-13th. This...
Comfort Zone Comfort zones are interesting because often times you don’t realize you are in one. You’ve become accustomed to the status quo of life. The status quo is different for everyone. When was...
Data Center Designs The modern data center has been an evolutionary process. As traffic volumes grew so the did the network. In addition to traffic volumes, other concerns such as security, traffic quality, resiliency,...
Reading The Network Reliability Engineer’s Manifesto reminded me I have yet to implement an automation solution. In this post, I am going to get Ansible up and running for use with network automation. This...
Middle Tennessee Network Engineers There is a Nashville Cisco Users Group on LinkedIn that has become stagnant. I started this slack but have yet to advertise it. We have all the talent necessary to...
Security Control 1 – Hardware Inventory The first security control is “Inventory and Control of Hardware Assets open source”. This inventory control focuses on managing all hardware devices on your network. Only allow authorized...
Security Control Posts Series Index In this series of posts I am walking through each of the CIS Information Assurance – 20 Security controls. Basic Controls (1-6) Inventory and Control of Hardware Assets Inventory...
20 Security Controls There are 20 Security controls that are well known and published by the Center for Internet Security (CIS). The design of the security controls is to build the outline of a...
Learning Python In my previous post I mentioned my pivot to security and learning about automation. The first step in that process is to learn python. I have some limited experience with hacking together...
Done with Cisco certs, Pivot to security I am done, finished, finito! I have taken my last Cisco certification exam. Eh? Aren’t you a CCIE/CCDE? Yes. I am a Cisco Certified Internetwork Expert (CCE)...
Recent Comments