• Online, Self-Paced
Course Description

Discover Storm Control and how it can be used to prevent broadcast attacks and use port security to link ports to MAC addresses to prevent unauthorized hardware on a network.

Learning Objectives

{"identify storm-control command options","identify storm control thresholds","identify the commands to set the broadcast threshold"}

Framework Connections