CCNA Security Topics | 2.1.b Configure Secure Network Management Lab
Follow me on Twitter:
https://twitter.com/CCNADailyTIPS
My strategy to pass CCNA Security in 6 MONTHS:
https://www.youtube.com/watch?v=TRqDGTBsPM4
Video 1:
https://www.youtube.com/watch?v=loUUWQRTzlQ
Video 2:
https://www.youtube.com/watch?v=qv-mm9m0-QU
Video 3:
https://www.youtube.com/watch?v=LKhP2NkYfP8
Video 4:
https://youtu.be/NK7uaqr2fgM
Video 5:
https://youtu.be/FBCfrWImz2E
Video 6:
https://youtu.be/kb7lgscxt4A
Video 7:
https://youtu.be/av381O7mEVA
Video 8:
https://youtu.be/vKaFfvc1Xm0
SSH:
Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network. Typical applications include remote command-line login and remote command execution, but any network service can be secured with SSH.
Telnet
Telnet is a protocol used on the Internet or local area network to provide a bidirectional interactive text-oriented communication facility using a virtual terminal connection.
SHA
In cryptography, SHA-1 (Secure Hash Algorithm 1) is a cryptographic hash function which takes an input and produces a 160-bit (20-byte) hash value known as a message digest – typically rendered as a hexadecimal number, 40 digits long.