Posts

Showing posts from February, 2018

7 TIPS TO GRASP THE UTMOST FROM YOUR CISSP MENTOR RELATIONSHIP

Image
Deciding to take the plunge and study for your CISSP qualification can be a big step. It’s often been a few years since they were a student for some who take this decision and returning to study is not always easy when jobs and family commitments are also in the mix. Codec Networks is the best place for CISSP Certification in Delhi. Finding the right course that fits around your work and lifestyle often comes down to online training and this is where the role of, and your relationship with, your mentor becomes important throughout your study and exam preparation training. Here are our 7 tips to help you get the most out of your CISSP mentor relationship. Introduce yourself openly and break the ice As a good ice breaker when you’ve been allocated a CISSP mentor, send him (or her) an introduction email and include your location, your current progress in your CISSP study, a list of any books that you have sourced and/or read, and the level of support you are looking to gain from

Administrative Configurations of Router

Image
There are three configurations a network administrator should apply to a newly provisioned switch or router. Although application of these configurations may seem like common sense, 90% of devices I see are missing at least one of these settings, and about 75% are missing two or more. Use this checklist as an action item to verify your existing devices have these settings, at minimum, and integrate these in to any templates or provisioning documents you use. You'll appreciate the results of the consistency this adds to your network management and monitoring. I’m going to guide you through configuring specific commands that are particularly helpful when administering your network and Cisco Certification. You can configure the following administrative functions on a router and switch: Hostnames Banners Passwords Remember, none of these will make your routers or switches work better or faster, but trust me, your life will be a whole lot better if you just take the time to s

ROADMAP WITH PYTHON - WHATS YOUR NEXT STEP?

Image
Python is one of the most popular programming languages used today because of its’ simple syntax, and because it is a general purpose programming language. You see Python used in many areas: Web app development Ai and ML (machine learning) Server operations Data sciences Robotics New programmers have many choices in terms of Python programming careers. But Python alone is not enough for most of these career options, they all require supporting skills. For example, if you wanted to get into web development with Python, besides having to learn a Python web framework like Django or Flask, you will need to learn HTML, CSS and JavaScript. The good thing is that learning the web languages (HTML, CSS, JavaScript,) will be pretty easy for properly trained Python programmers. Each of the above mentioned Python specializations (AI, web development, data sciences etc.) all require different skills, and so each has their own career path to follow. To go ahead with Python, there are

What is foot-printing in ethical hacking?

Image
The goal of Certified Ethical Hacker (CEH) course is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You walk out the door with ethical hacking skills that are highly in demand, as well as the internationally recognized Certified Ethical Hacker certification! This course prepares you for EC-Council Certified Ethical Hacker exam 312-50. We provide  Certified Ethical Hacker (CEH) Courses |  Training , and Exam & Giving Certification in Delhi, India. FOOTPRINTING In ethical hacking training footprinting is the first and a vital module. Footprinting  (also known as reconnaissance) is the technique used for gathering information about computer systems and the entities they belong to. To get this information, an ethical hacker might use various tools and technologies. This information is very useful to an ethical hacker who is trying to crack a whole system. Footprinting is basically the first step where hacke