Routing Issues

My explanation begins by having students to look at the logs on the router!
To expand on Trevor's answer about looking at the logs; investigate the routing issue by determining the scope of the problem. Expand on this by using ping and traceroute. Can users connect to some networks (sites) but not others? Statics are often used in two scenarios. #1 when the network is really simple and the architect wants to dictate the traffic path (think about a simple home /office router or a network with one ISP connection). Another use case is when the network is more complex and multiple paths (multiple ISPs) exist between two networks. In this case you might want to override or backup the route discovered via a routing protocol. And this is where route weighting comes in to the discussion.

Penetration testing tools

I've found that students often struggle with practical applications of pentesting tools. One way I make this easier is by using Kali Linux labs to demonstrate real-world scenarios. For example, I set up a vulnerable machine using Metasploitable and have students practice using Nmap for network discovery and Metasploit for exploitation. I also encourage them to experiment with EvilPDF for embedding payloads into PDFs, which ties in nicely with social engineering topics. Does anyone have tips on simulating phishing attacks for teaching purposes?

CompTIA Tech+ FC0-U71 TTT Session 2:

Who Owns Data on Social Media?
–Social media sites own your data
§Safely Using Social Media
–Adjust privacy settings
–Be mindful of what you share
–Review and clean up your friends list
–Be cautious of quizzes and games
–Check and understand the platform's privacy policy
–Regularly review your activity
  • Like
Reactions: precious

Filter