Course details
In this course the student will learn important skill of how to filter unwanted routes from the routing tables. This skill will also help the student to keep the routing tables clean in an organization, thus keeping the network safe from malicious injected networks.
Follow the author as he goes through the steps below
1. Building Topology to simulate a routing map.
2. Four cases are created that will show step by step filtering of the routes using Prefix-lists.
Networking and Security Related Questions
- JavaScript Full stack web developer virtual internship Virtual Bootcamp + Internship at LaimoonAED 1,449Duration: Upto 30 Hours
- Learn Ethical Hacking & Cyber Security Course LineAED 89Duration: Upto 4 Hours
- Security Management Officer JanetsAED 37Duration: Upto 2 Weeks