Drop us a line and you’ll discover one other key differentiator: Our follow through.

6 + 4 =

Contact Info

Insights

I have a lot of solid practice lab walkthroughs videos coming up over the next few months. CCNA lab videos,
@JuniperCertify JNCIA-Junos labs, and a new series, Cisco vs. Juniper...where cover how to configure the same services on both vendors. @JBC_SEC

https://t.co/VIdRxlYp9R

If you're into hacking & pen test tools, check out my new video on the @Hak5 Key Croc🐊

We do an overview, unboxing, testing, review of loot, and talk about how to protect against tools like this.

Thanks again @hak5darren for the hookup on the Key Croc!

So far 3 awesome TCP Handshakes Chats w/ @InfoSecMBz @capital_sb @blar51 🙏

One coming out next week w/ @Djax_Alpha 🔥

More coming soon with @ccieby30 @marcusjcarey @showipintbri @mcohmi @DAEnergizer4 @_jayprimo

Come be part of the conversation👇
https://t.co/gSaw9xvJDd

Title

January 7, 2018

Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.

View [wp-svg-icons icon=”arrow-right-2″ wrap=”i”]

Insights

I have a lot of solid practice lab walkthroughs videos coming up over the next few months. CCNA lab videos,
@JuniperCertify JNCIA-Junos labs, and a new series, Cisco vs. Juniper...where cover how to configure the same services on both vendors. @JBC_SEC

https://t.co/VIdRxlYp9R

If you're into hacking & pen test tools, check out my new video on the @Hak5 Key Croc🐊

We do an overview, unboxing, testing, review of loot, and talk about how to protect against tools like this.

Thanks again @hak5darren for the hookup on the Key Croc!

So far 3 awesome TCP Handshakes Chats w/ @InfoSecMBz @capital_sb @blar51 🙏

One coming out next week w/ @Djax_Alpha 🔥

More coming soon with @ccieby30 @marcusjcarey @showipintbri @mcohmi @DAEnergizer4 @_jayprimo

Come be part of the conversation👇
https://t.co/gSaw9xvJDd

I have a lot of solid practice lab walkthroughs videos coming up over the next few months. CCNA lab videos,
@JuniperCertify JNCIA-Junos labs, and a new series, Cisco vs. Juniper...where cover how to configure the same services on both vendors. @JBC_SEC

https://t.co/VIdRxlYp9R

If you're into hacking & pen test tools, check out my new video on the @Hak5 Key Croc🐊

We do an overview, unboxing, testing, review of loot, and talk about how to protect against tools like this.

Thanks again @hak5darren for the hookup on the Key Croc!

So far 3 awesome TCP Handshakes Chats w/ @InfoSecMBz @capital_sb @blar51 🙏

One coming out next week w/ @Djax_Alpha 🔥

More coming soon with @ccieby30 @marcusjcarey @showipintbri @mcohmi @DAEnergizer4 @_jayprimo

Come be part of the conversation👇
https://t.co/gSaw9xvJDd

Press Releases

Network Knowledge: #30DaysofJuniper Part 1

Network Knowledge: #30DaysofJuniper Part 1

Today’s blog post is the first part of our #30DaysofJuniper information sharing campaign. For the past month, we have been posting daily tips on Juniper configurations to help novice and experienced engineers alike. This is our second campaign like this, as we...

read more
Screen Crab: The Favorite Tool of Bothan Spies

Screen Crab: The Favorite Tool of Bothan Spies

This is our second review article of the Hak5 pentesting tools. After previously covering the Shark Jack, today we will be focusing on the Screen Crab. Hak5 bills the Screen Crab as a "stealthy video man-in-the-middle implant." It sits inline between an end device and...

read more
Network Knowledge: #30DaysofCisco Part 2

Network Knowledge: #30DaysofCisco Part 2

Today's blog post is the second and final part of our #30DaysofCisco information sharing campaign. For a little over the past month, we have been posting daily tips on Cisco configurations to help novice and experienced engineers alike. This campaign was inspired by...

read more
Shark Jack: The Baby Yoda of Network Attack Tools

Shark Jack: The Baby Yoda of Network Attack Tools

This past Black Friday, I went on a bit of a hacking tools shopping spree at Hak5. Today, I'm going to give a brief rundown of their Linux based network attack tool call Shark Jack (and why it's similar to Baby Yoda). Shark Jack is to be used in environments where you...

read more
Network Knowledge: #30DaysofCisco Part 1

Network Knowledge: #30DaysofCisco Part 1

Today's blog post is in a different format than our normal articles. This past month, there has been as a great information sharing campaign on Twitter that was created by Arielle Hale (@WhutTheHale) called #30DaysofThreads. The purpose of this campaign is to get...

read more
Network Security Basics: Access Control Lists

Network Security Basics: Access Control Lists

So far we've covered two basic tenets to network security: documentation and network segmentation and isolation. Network access control layers nicely on top of those. You are taking the defined data flows (what devices are allowed to communicate over specific ports...

read more
Network Security Basics: Network Segmentation & Isolation

Network Security Basics: Network Segmentation & Isolation

When it comes to building and securing a network, the most impactful thing that can be done is planning your network design in an efficient and protective manner. Understanding and implementing a segmented and layered architecture will establish a clear precedent for...

read more
Network Security Basics: Documentation

Network Security Basics: Documentation

The foundation of good network security is understanding what makes up your environment, where it's located, what it does, and why it's there. In essence, the Five W's (Who, What, When, Where, and Why) play a critical role in understanding and safeguarding your...

read more
Network Security Basics: Intro to the Fab Five

Network Security Basics: Intro to the Fab Five

This is the first of a six-part series discussing five basic network security principles (The Fab Five) that when implemented properly can significantly improve the security posture of any IT environment. The reality is, no matter how simple something is, it doesn't...

read more
My Favorite SIEM That Is Not a SIEM

My Favorite SIEM That Is Not a SIEM

The purpose of this article is to go into depth a bit on Tenable's Log Correlation Engine (LCE) and how to utilize it with Security Center to be the focal point of monitoring events in your environment. I'm a big fan (and user) of the Tenable suite of products, and...

read more

Title

January 7, 2018

Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.

View [wp-svg-icons icon=”arrow-right-2″ wrap=”i”]

Title

January 7, 2018

Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.

View [wp-svg-icons icon=”arrow-right-2″ wrap=”i”]