• Online, Self-Paced
Course Description

Explore Layer 2 attacks, security best practices, and how to identify some common Layer 2 attacks. Examine port security on a Cisco switch, how to configure it, and how to verify the configuration.

Learning Objectives

SWITCH 2.0 : L2 Attacks and Port Security

  • describe Layer 2 attacks and related security best practices
  • describe port security on a Cisco switch and configure and verify port security

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.