Course details
In this course the student will learn important skill of how to filter unwanted routes from the routing tables. This skill will also help the student to keep the routing tables clean in an organization, thus keeping the network safe from malicious injected networks.
Follow the author as he goes through the steps below
1. Building Topology to simulate a routing map.
2. Four cases are created that will show step by step filtering of the routes using Prefix-lists.
- JavaScript Full stack web developer virtual internship Virtual Bootcamp + Internship at LaimoonAED 1,449Duration: Upto 30 Hours
- Cyber Security Advanced Academy for Health & FitnessUSD 13Duration: Upto 4 Hours
- IT Network Security Engineer- CPD Certified Academy for Health & FitnessUSD 218Duration: Upto 85 Hours