S3SS10N Wednesday – Network Devices Part 2

Join Cybrary

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATION
Already a Member Login Here
< Back to S3SS10NS

S3SS10N Wednesday – Network Devices Part 2

Published: September 7, 2016 | By: Kelly Handerhan | Views: 5528
save
This post has been saved to your profile

This Weeks S3SS10N Wednesday


This session picks up where the previous session left off and layers upon the information that was previously given about network devices. The last section specifically discussed hubs, switches and routers. This session discusses the VLAN. A VLAN (Virtual Local Area Network) is a special operating feature on a switch which isolates broadcasts but it doesn’t have knowledge of IP addressing. Layer 3 switches are also discussed in this session and the important role they play in business networking.

< Back to S3SS10NS

About This S3SS10N Wednesday's Contributor

Kelly Handerhan
Skilled and certified in CISSP, CASP, and PMP, SME Kelly has taught several courses on Cybrary and is highly praised for her ability to effectively communicate important information in a relate-able and understandable way.
Enjoy this S3SS10N Wednesday? Want more Cybytes?
Invite a Friend
and share now
Facebook Twitter LinkedIn Email
Join Cybrary
10 Comments
  1. Excellent info, very well explained. Will be on the lookout for more of your videos.

  2. Thank you Kelly, this was really informative.

  3. Nice 😉 informative and well presented.

    Thank you Kelly

  4. Thanks Kelly, you broke down the information nicely.

  5. Thanks Kelly. Good information.

Page 2 of 2«12
Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel