• Online, Self-Paced
Course Description

Explore the use of Storm Control on a Cisco switch, the Layer 2 threat it prevents, and how to configure and verify it. Discover port-based authentication, including its requirements, usage, and configuration.

Learning Objectives

SWITCH 2.0 : Storm Control and Port-Based Authentication

  • describe Storm Control on a Cisco switch, the Layer 2 threat it prevents, and configure and verify Storm Control
  • describe port-based authentication, including its requirements, usage, and configuration

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.