Chapter 2: Basic Switching Concepts and Configuration
00:10 Interface Statistics (errors)
04:55 2.1.2.6 Troubleshooting Network Access Layer Issues
2.2.1 Secure Remote Access
07:33 2.2.1.1 SSH Operation
09:25 2.2.1.2 Configuring SSH
17:45 2.2.1.3 Verifying SSH
2.2.2 Security Concerns in LANs
18:30 2.2.2.1 MAC Address Flooding
27:52 2.2.2.2 DHCP Spoofing
35:46 2.2.2.3 Leveraging Cisco Discovery Protocol
2.2.3 Security Best Practices
40:41 2.2.3.1 10 Best Practices
41:30 2.2.3.2 Network Security Tools: Options
2.2.4 Switch Port Security
42:52 2.2.4.1 Secure Unused Ports
46:23 2.2.4.2 DHCP Snooping
55:50 2.2.4.3 Port Security: Operation
01:00:40 Port Security: Violation
01:05:28 Port Security: Configuration
01:13:25 Port Security: Violation Recovery
01:19:57 Port Security: Secure MAC Address
01:25:49 Port Security: Sticky MAC Address