Cisco Cybersecurity Essentials 1.5.3.6 Communicating in a Cyber World | Packet Tracer demonstration

Cisco Cybersecurity Essentials 1.5.3.6 Communicating in a Cyber World | Packet Tracer demonstration

How to Communicate in a Cyber World: A Lab Exercise

Introduction to the Lab Exercise

  • The video demonstrates a lab exercise from Cisco's Cyber Security Essentials course, focusing on various communication methods in a cyber environment.
  • The presenter encourages viewers to subscribe for more content and invites questions in the comments section.

Sending Emails Between Users

  • The first task involves sending an email from one user to another across different networks. An email is sent from Mike to Sally with the subject "urgent call me."
  • Successful email communication is confirmed as Sally receives the message, demonstrating effective inter-network communication.

Using FTP for File Transfer

  • The next step involves using FTP (File Transfer Protocol). A packet sniffer is opened to capture traffic during this process.
  • Mary connects to the Metropolis Bank network via FTP, logging in with her credentials (username: mary, password: cisco123).
  • After successfully connecting, Mary uploads a file named "new_clients.txt" and verifies its presence on the server.

Analyzing FTP Traffic

  • The packet sniffer captures all traffic data during the FTP session, including login credentials and IP addresses.
  • Specific packets are examined, revealing sensitive information such as usernames and passwords due to unencrypted access.

Telnet Access Demonstration

  • The presenter switches focus to Telnet by pinging an enterprise server and confirming connectivity.
  • Logging into the server via Telnet with admin credentials (username: admin, password: cisco123), they execute commands like "show users."

SSH for Secure Access

  • Following Telnet access, SSH (Secure Shell) is demonstrated as a more secure alternative.
  • After logging in through SSH with similar credentials, global configuration mode is accessed securely by setting an enable secret password.

Security Analysis of Communication Methods

  • The packet sniffer reveals that Telnet transmits data unencrypted; thus sensitive information can be intercepted easily.
  • In contrast, SSH provides encrypted connections making it safer for remote access compared to Telnet.
Video description

🟥 Subscribe ☑️ Like ✒️ Comment Write in the comments any question about the exercise, packet tracer, networking or linux. Like if the video was helpful 👍 Cisco Cybersecurity Essentials 1.5.3.6 Communicating in a Cyber World Packet Tracer Lab Exercise Objectives Part 1: Send Email between Users Part 2: Upload and Download Files using FTP Part 3: Remotely Access an Enterprise Router using Telnet Part 4: Remotely Access an Enterprise Router using SSH In this activity, you will communicate across remote networks using common network services. The IP addressing, network configuration, and service configurations are already complete. You will use the client devices in the differing geographic regions to connect to both servers and other client devices. ***** Other exercises 1.5.3.5 Creating a Cyber World https://youtu.be/t34Ku3fdU14 1.5.3.6 Communicating in a Cyber World https://youtu.be/ql3HTPwVRSw 3.3.2.7 WEP/WPA2 PSK/WPA2 RADIUS https://youtu.be/YZD7oofSkB0 4.3.3.3 Configuring VPN Transport Mode https://youtu.be/Yf_LIZWqDPs 4.3.3.4 Configuring VPN Tunnel Mode https://youtu.be/YtFDMEZDRxA 6.2.3.8 Router and Switch Redundancy https://youtu.be/p8Pjg_McZ7E 6.2.4.4 Router and Switch Resilience https://youtu.be/YWr5Ttuj2u0 7.4.2.4 Server Firewalls and Router ACLs https://youtu.be/zehDPIEP7Rw 8.3.1.3 Skills Integrated Challenge https://youtu.be/cxbAEKyvAkc Linux 2.5.2.5 Authentication, Authorization and Accounting https://youtu.be/ciSIUwrc8mg 3.3.1.9 Detecting Threats and Vulnerabilities https://youtu.be/MGm71Z6qikA 4.3.2.3 Using Steganography https://youtu.be/wP6CNdpoEUg 5.1.2.4 Password Cracking https://youtu.be/G-aNvZ8nKeo 7.1.1.6 Hardening a Linux System https://youtu.be/M8jXbJujpfw ***** Related Content Cisco Packet Tracer demonstrations https://bit.ly/3agQyCJ Linux OS tutorials and reviews https://bit.ly/3odVU6G CISCO Cybersecurity Essentials Lab exercises https://bit.ly/39Kui4S (playlist) Lab exercises https://bit.ly/39T3iQU (blog post) Questions and Answers for the quiz https://bit.ly/3aw1V9O (playlist) Questions and Answers for the quiz https://bit.ly/3tzZNX9 (blog post) Exercícios em Português https://bit.ly/39My0en (playlist) ***** EM PORTUGUÊS Demonstração dos exercícios do curso Essenciais de Cibersegurança da Cisco 1.5.3.5 Creating a Cyber World https://youtu.be/a-OH5sMA-fE 1.5.3.6 Communicating in a Cyber World https://youtu.be/tcE3NDryKAs 3.3.2.7 WEP/WPA2 PSK/WPA2 RADIUS https://youtu.be/ugmJzmJDA08 4.3.3.3 Configuring VPN Transport Mode https://youtu.be/GZ-RduoHCPo 4.3.3.4 Configuring VPN Tunnel Mode https://youtu.be/8WDG0WRF0I8 6.2.3.8 Router and Switch Redundancy https://youtu.be/S3GZLQPcFZw 6.2.4.4 Router and Switch Resilience https://youtu.be/qhzHHAVKJKQ 7.4.2.4 Server Firewalls and Router ACLs https://youtu.be/Lof2uUMPrgQ 8.3.1.3 Skills Integrated Challenge https://youtu.be/kVZLdzrSNe8 2.5.2.5 Authentication, Authorization and Accounting https://youtu.be/i-_FP2K5zXU 3.3.1.9 Detecting Threats and Vulnerabilities https://youtu.be/-we-sLQTkQ4 4.3.2.3 Using Steganography https://youtu.be/H5bQmio0hxM 5.1.2.4 Password Cracking https://youtu.be/-SOWntE_UM0 7.1.1.6 Hardening a Linux System https://youtu.be/xN40BgbZ0EU ***** Other playlists 🥼 Research Projects https://bit.ly/3980JdU 🛠️ Tutorials https://bit.ly/3pUruIr 💾 Linux operating system https://bit.ly/3odVU6G 📚 Computer Networking Course https://bit.ly/2Hq5tjv 💻 Cisco Packet Tracer https://bit.ly/3agQyCJ 📲 Augmented & Virtual Reality https://bit.ly/3rlUIjl 🚦 Colors changing mood light https://bit.ly/3t5tYWd 🚨 Strobe lights https://bit.ly/3kYTwid 🕑 Time counters up to 12 hours https://bit.ly/394DwbU ⏳ Countdown timers with alarm https://bit.ly/36ZMkgR 🎨 Generative Design https://bit.ly/3nUDhEB 🏳️ Flags of countries in 8K https://bit.ly/39mFC7M 🌈 Colors in fullscreen 8K https://bit.ly/2IPVjJL 🔊 Sound noise to sleep https://bit.ly/3ougMa4 😵 Hypnosis https://bit.ly/3kW2s84 🚗 Dashcam Portugal https://bit.ly/396Hb9G 📦 Unboxing https://bit.ly/397O3Ua 🕹️ Gaming https://bit.ly/3m7sAy8 Social Instagram https://instagram.com/jomirife Youtube https://youtube.com/jomirife Twitter https://twitter.com/jomirife Facebook https://facebook.com/JomirifeMedia Blog https://jomirife.blogspot.com 🌎 Cisco cyber security course laboratory exercise demonstration. Demonstração de exercícios de laboratório do curso de segurança cibernética da Cisco. Demonstratie van Cisco-cyberbeveiligingscursus laboratoriumoefening. Démonstration d'exercices de laboratoire de cours de cybersécurité Cisco. Demonstration der Laborübungen im Cisco Cyber ​​Security-Kurs. Dimostrazione dell'esercizio in laboratorio del corso di sicurezza informatica Cisco. Демонстрация лабораторных упражнений курса Cisco по кибербезопасности. Demostración de ejercicios de laboratorio del curso de seguridad cibernética de Cisco. 思科网络安全课程实验室练习演示。 シスコサイバーセキュリティコースのラボ演習のデモンストレーション。 सिस्को साइबर सुरक्षा पाठ्यक्रम प्रयोगशाला व्यायाम प्रदर्शन।. عرض تمرين معملي لدورة Cisco للأمن السيبراني.