<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:podcast="https://podcastindex.org/namespace/1.0">
    <channel>
        <generator>RedCircle VERIFY_TOKEN_54180805-85e2-4677-9802-b19fdc0a3591  -- Rendered At Thu, 07 May 2026 19:22:02 &#43;0000</generator>
        <title>Network Security with KevTechify on the Cisco Certified Network Associate (CCNA)</title>
        <link>https://redcircle.com/shows/network-security</link>
        <language>en-US</language>
        <copyright>All rights reserved.</copyright>
        <itunes:author>KevTechify</itunes:author>
        <itunes:summary>Network Security on the Cisco Certified Network Associate (CCNA)</itunes:summary>
        <podcast:guid>54180805-85e2-4677-9802-b19fdc0a3591</podcast:guid>
        
        <description><![CDATA[<p>Network Security on the Cisco Certified Network Associate (CCNA)</p>]]></description>
        
        <itunes:type>episodic</itunes:type>
        <podcast:locked>no</podcast:locked>
        <itunes:owner>
            <itunes:name>KevTechify</itunes:name>
            <itunes:email>PodNetSec@mauitech.net</itunes:email>
        </itunes:owner>
        
        <itunes:image href="https://media.redcircle.com/images/2022/3/14/22/1cd623e4-ce9f-4117-ac38-6b0566caf126_e6f27008-7473-4ba0-b2e3-6539fe7be39c_podnetsec.jpg"/>
        
        
        
            
            <itunes:category text="Technology" />

            

        
        

        
        <itunes:explicit>no</itunes:explicit>
        
        
        
        
        
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Network Security Testing Tools - Network Security Testing - Network Security - CCNA - KevTechify | Podcast 92</itunes:title>
                <title>Network Security Testing Tools - Network Security Testing - Network Security - CCNA - KevTechify | Podcast 92</title>

                <itunes:episode>92</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>In this episode we are going to look at Network Security Testing Tools.</p><p>We will be discussing Network Testing Tools, and looking at Nmap and Zenmap, SuperScan, SIEM.</p><p>Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>All my details and contact information can be found on my website, <a href="https://kevtechify.com/" rel="nofollow">https://KevTechify.com</a></p><p><span>-------------------------------------------------------</span></p><p><span>Cisco Certified Network Associate (CCNA)</span></p><p>Network Security v1 (NetSec)</p><p>Episode 22 - Network Security Testing</p><p>Part B - Network Security Testing Tools</p><p>Podcast Number: 92</p><p><span>-------------------------------------------------------</span></p><p>Equipment I like.</p><p>Home Lab <span>►►</span> <a href="https://kit.co/KevTechify/home-lab" rel="nofollow">https://kit.co/KevTechify/home-lab</a></p><p>Networking Tools <span>►►</span> <a href="https://kit.co/KevTechify/networking-tools" rel="nofollow">https://kit.co/KevTechify/networking-tools</a></p><p>Studio Equipment <span>►► </span><a href="https://kit.co/KevTechify/studio-equipment" rel="nofollow">https://kit.co/KevTechify/studio-equipment</a></p><p> </p>]]></description>
                <content:encoded>&lt;p&gt;In this episode we are going to look at Network Security Testing Tools.&lt;/p&gt;&lt;p&gt;We will be discussing Network Testing Tools, and looking at Nmap and Zenmap, SuperScan, SIEM.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;All my details and contact information can be found on my website, &lt;a href=&#34;https://kevtechify.com/&#34; rel=&#34;nofollow&#34;&gt;https://KevTechify.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Cisco Certified Network Associate (CCNA)&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Network Security v1 (NetSec)&lt;/p&gt;&lt;p&gt;Episode 22 - Network Security Testing&lt;/p&gt;&lt;p&gt;Part B - Network Security Testing Tools&lt;/p&gt;&lt;p&gt;Podcast Number: 92&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Equipment I like.&lt;/p&gt;&lt;p&gt;Home Lab &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/home-lab&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/home-lab&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Networking Tools &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/networking-tools&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/networking-tools&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Studio Equipment &lt;span&gt;►► &lt;/span&gt;&lt;a href=&#34;https://kit.co/KevTechify/studio-equipment&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/studio-equipment&lt;/a&gt;&lt;/p&gt;&lt;p&gt; &lt;/p&gt;</content:encoded>
                
                <enclosure length="8824372" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/f3228567-4b84-4106-b17d-80899061a0a9/stream.mp3"/>
                
                <guid isPermaLink="false">cd1c415b-7a59-4b8d-9f45-41c81666cac6</guid>
                <link>https://KevTechify.com</link>
                <pubDate>Tue, 03 May 2022 08:00:00 &#43;0000</pubDate>
                <itunes:duration>551</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Network Security Testing Techniques - Network Security Testing - Network Security - CCNA - KevTechify | Podcast 91</itunes:title>
                <title>Network Security Testing Techniques - Network Security Testing - Network Security - CCNA - KevTechify | Podcast 91</title>

                <itunes:episode>91</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>In this episode we are going to look at Network Security Testing Techniques.</p><p>We will be discussing Operations Security, Testing and Evaluating Network Security, Types of Network Tests, and finally Applying Network Test Results.</p><p>Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>All my details and contact information can be found on my website, <a href="https://kevtechify.com/" rel="nofollow">https://KevTechify.com</a></p><p><span>-------------------------------------------------------</span></p><p><span>Cisco Certified Network Associate (CCNA)</span></p><p>Network Security v1 (NetSec)</p><p>Episode 22 - Network Security Testing</p><p>Part A - Network Security Testing Techniques</p><p>Podcast Number: 91</p><p><span>-------------------------------------------------------</span></p><p>Equipment I like.</p><p>Home Lab <span>►►</span> <a href="https://kit.co/KevTechify/home-lab" rel="nofollow">https://kit.co/KevTechify/home-lab</a></p><p>Networking Tools <span>►►</span> <a href="https://kit.co/KevTechify/networking-tools" rel="nofollow">https://kit.co/KevTechify/networking-tools</a></p><p>Studio Equipment <span>►► </span><a href="https://kit.co/KevTechify/studio-equipment" rel="nofollow">https://kit.co/KevTechify/studio-equipment</a></p><p> </p>]]></description>
                <content:encoded>&lt;p&gt;In this episode we are going to look at Network Security Testing Techniques.&lt;/p&gt;&lt;p&gt;We will be discussing Operations Security, Testing and Evaluating Network Security, Types of Network Tests, and finally Applying Network Test Results.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;All my details and contact information can be found on my website, &lt;a href=&#34;https://kevtechify.com/&#34; rel=&#34;nofollow&#34;&gt;https://KevTechify.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Cisco Certified Network Associate (CCNA)&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Network Security v1 (NetSec)&lt;/p&gt;&lt;p&gt;Episode 22 - Network Security Testing&lt;/p&gt;&lt;p&gt;Part A - Network Security Testing Techniques&lt;/p&gt;&lt;p&gt;Podcast Number: 91&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Equipment I like.&lt;/p&gt;&lt;p&gt;Home Lab &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/home-lab&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/home-lab&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Networking Tools &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/networking-tools&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/networking-tools&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Studio Equipment &lt;span&gt;►► &lt;/span&gt;&lt;a href=&#34;https://kit.co/KevTechify/studio-equipment&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/studio-equipment&lt;/a&gt;&lt;/p&gt;&lt;p&gt; &lt;/p&gt;</content:encoded>
                
                <enclosure length="5937946" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/6f91a8a8-89b2-4206-bee8-5bca1f518108/stream.mp3"/>
                
                <guid isPermaLink="false">5c313f0a-acf3-4986-b7ee-73b412911b77</guid>
                <link>https://KevTechify.com</link>
                <pubDate>Mon, 02 May 2022 08:00:00 &#43;0000</pubDate>
                <itunes:duration>371</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Service Policies on an ASA - ASA Firewall Configuration - Network Security - CCNA - KevTechify | Podcast 89</itunes:title>
                <title>Service Policies on an ASA - ASA Firewall Configuration - Network Security - CCNA - KevTechify | Podcast 89</title>

                <itunes:episode>89</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>In this episode we are going to look at Service Policies on an ASA.</p><p>We will be discussing an Overview of MPF, Configure Class Maps, Define and Activate a Policy, Configure ASA Basic Settings and Firewall Using the CLI, and finally Configure ASA Network Services, Routing, and DMZ with ACLs Using CLI.</p><p>Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>All my details and contact information can be found on my website, <a href="https://kevtechify.com/" rel="nofollow">https://KevTechify.com</a></p><p><span>-------------------------------------------------------</span></p><p><span>Cisco Certified Network Associate (CCNA)</span></p><p>Network Security v1 (NetSec)</p><p>Episode 21 - ASA Firewall Configuration</p><p>Part G - Service Policies on an ASA</p><p>Podcast Number: 89</p><p><span>-------------------------------------------------------</span></p><p>Equipment I like.</p><p>Home Lab <span>►►</span> <a href="https://kit.co/KevTechify/home-lab" rel="nofollow">https://kit.co/KevTechify/home-lab</a></p><p>Networking Tools <span>►►</span> <a href="https://kit.co/KevTechify/networking-tools" rel="nofollow">https://kit.co/KevTechify/networking-tools</a></p><p>Studio Equipment <span>►► </span><a href="https://kit.co/KevTechify/studio-equipment" rel="nofollow">https://kit.co/KevTechify/studio-equipment</a></p><p> </p>]]></description>
                <content:encoded>&lt;p&gt;In this episode we are going to look at Service Policies on an ASA.&lt;/p&gt;&lt;p&gt;We will be discussing an Overview of MPF, Configure Class Maps, Define and Activate a Policy, Configure ASA Basic Settings and Firewall Using the CLI, and finally Configure ASA Network Services, Routing, and DMZ with ACLs Using CLI.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;All my details and contact information can be found on my website, &lt;a href=&#34;https://kevtechify.com/&#34; rel=&#34;nofollow&#34;&gt;https://KevTechify.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Cisco Certified Network Associate (CCNA)&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Network Security v1 (NetSec)&lt;/p&gt;&lt;p&gt;Episode 21 - ASA Firewall Configuration&lt;/p&gt;&lt;p&gt;Part G - Service Policies on an ASA&lt;/p&gt;&lt;p&gt;Podcast Number: 89&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Equipment I like.&lt;/p&gt;&lt;p&gt;Home Lab &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/home-lab&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/home-lab&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Networking Tools &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/networking-tools&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/networking-tools&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Studio Equipment &lt;span&gt;►► &lt;/span&gt;&lt;a href=&#34;https://kit.co/KevTechify/studio-equipment&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/studio-equipment&lt;/a&gt;&lt;/p&gt;&lt;p&gt; &lt;/p&gt;</content:encoded>
                
                <enclosure length="7002070" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/5888f7df-d67e-43e5-8a01-28a8f3c22a0d/stream.mp3"/>
                
                <guid isPermaLink="false">aa61ac7b-8ebe-454d-937c-a3455cb8dcdb</guid>
                <link>https://KevTechify.com</link>
                <pubDate>Sun, 01 May 2022 08:00:00 &#43;0000</pubDate>
                <itunes:duration>437</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>AAA - ASA Firewall Configuration - Network Security - CCNA - KevTechify | Podcast 88</itunes:title>
                <title>AAA - ASA Firewall Configuration - Network Security - CCNA - KevTechify | Podcast 88</title>

                <itunes:episode>88</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>In this episode we are going to look at AAA.</p><p>We will be discussing AAA Review, Local Database and Servers, and finally AAA Configuration.</p><p>Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>All my details and contact information can be found on my website, <a href="https://kevtechify.com/" rel="nofollow">https://KevTechify.com</a></p><p><span>-------------------------------------------------------</span></p><p><span>Cisco Certified Network Associate (CCNA)</span></p><p>Network Security v1 (NetSec)</p><p>Episode 21 - ASA Firewall Configuration</p><p>Part F - AAA</p><p>Podcast Number: 88</p><p><span>-------------------------------------------------------</span></p><p>Equipment I like.</p><p>Home Lab <span>►►</span> <a href="https://kit.co/KevTechify/home-lab" rel="nofollow">https://kit.co/KevTechify/home-lab</a></p><p>Networking Tools <span>►►</span> <a href="https://kit.co/KevTechify/networking-tools" rel="nofollow">https://kit.co/KevTechify/networking-tools</a></p><p>Studio Equipment <span>►► </span><a href="https://kit.co/KevTechify/studio-equipment" rel="nofollow">https://kit.co/KevTechify/studio-equipment</a></p><p> </p>]]></description>
                <content:encoded>&lt;p&gt;In this episode we are going to look at AAA.&lt;/p&gt;&lt;p&gt;We will be discussing AAA Review, Local Database and Servers, and finally AAA Configuration.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;All my details and contact information can be found on my website, &lt;a href=&#34;https://kevtechify.com/&#34; rel=&#34;nofollow&#34;&gt;https://KevTechify.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Cisco Certified Network Associate (CCNA)&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Network Security v1 (NetSec)&lt;/p&gt;&lt;p&gt;Episode 21 - ASA Firewall Configuration&lt;/p&gt;&lt;p&gt;Part F - AAA&lt;/p&gt;&lt;p&gt;Podcast Number: 88&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Equipment I like.&lt;/p&gt;&lt;p&gt;Home Lab &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/home-lab&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/home-lab&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Networking Tools &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/networking-tools&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/networking-tools&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Studio Equipment &lt;span&gt;►► &lt;/span&gt;&lt;a href=&#34;https://kit.co/KevTechify/studio-equipment&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/studio-equipment&lt;/a&gt;&lt;/p&gt;&lt;p&gt; &lt;/p&gt;</content:encoded>
                
                <enclosure length="5534197" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/119052dc-8767-4ec8-9ed4-d94de72c313b/stream.mp3"/>
                
                <guid isPermaLink="false">09efb0a8-0400-43de-a988-0e82c06228aa</guid>
                <link>https://KevTechify.com</link>
                <pubDate>Sat, 30 Apr 2022 08:00:00 &#43;0000</pubDate>
                <itunes:duration>345</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>NAT Services on an ASA - ASA Firewall Configuration - Network Security - CCNA - KevTechify | Podcast 87</itunes:title>
                <title>NAT Services on an ASA - ASA Firewall Configuration - Network Security - CCNA - KevTechify | Podcast 87</title>

                <itunes:episode>87</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>In this episode we are going to look at NAT Services on an ASA.</p><p>We will be discussing ASA NAT Overview, Configure Dynamic NAT, Configure Dynamic PAT, and Configure Static NAT.</p><p>Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>All my details and contact information can be found on my website, <a href="https://kevtechify.com/" rel="nofollow">https://KevTechify.com</a></p><p><span>-------------------------------------------------------</span></p><p><span>Cisco Certified Network Associate (CCNA)</span></p><p>Network Security v1 (NetSec)</p><p>Episode 21 - ASA Firewall Configuration</p><p>Part E - NAT Services on an ASA</p><p>Podcast Number: 87</p><p><span>-------------------------------------------------------</span></p><p>Equipment I like.</p><p>Home Lab <span>►►</span> <a href="https://kit.co/KevTechify/home-lab" rel="nofollow">https://kit.co/KevTechify/home-lab</a></p><p>Networking Tools <span>►►</span> <a href="https://kit.co/KevTechify/networking-tools" rel="nofollow">https://kit.co/KevTechify/networking-tools</a></p><p>Studio Equipment <span>►► </span><a href="https://kit.co/KevTechify/studio-equipment" rel="nofollow">https://kit.co/KevTechify/studio-equipment</a></p><p> </p>]]></description>
                <content:encoded>&lt;p&gt;In this episode we are going to look at NAT Services on an ASA.&lt;/p&gt;&lt;p&gt;We will be discussing ASA NAT Overview, Configure Dynamic NAT, Configure Dynamic PAT, and Configure Static NAT.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;All my details and contact information can be found on my website, &lt;a href=&#34;https://kevtechify.com/&#34; rel=&#34;nofollow&#34;&gt;https://KevTechify.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Cisco Certified Network Associate (CCNA)&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Network Security v1 (NetSec)&lt;/p&gt;&lt;p&gt;Episode 21 - ASA Firewall Configuration&lt;/p&gt;&lt;p&gt;Part E - NAT Services on an ASA&lt;/p&gt;&lt;p&gt;Podcast Number: 87&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Equipment I like.&lt;/p&gt;&lt;p&gt;Home Lab &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/home-lab&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/home-lab&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Networking Tools &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/networking-tools&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/networking-tools&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Studio Equipment &lt;span&gt;►► &lt;/span&gt;&lt;a href=&#34;https://kit.co/KevTechify/studio-equipment&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/studio-equipment&lt;/a&gt;&lt;/p&gt;&lt;p&gt; &lt;/p&gt;</content:encoded>
                
                <enclosure length="10987311" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/6d4c708f-cda8-46cb-bb57-4ed39f5a4a3e/stream.mp3"/>
                
                <guid isPermaLink="false">83630233-6062-47af-b928-dbaf34890ddd</guid>
                <link>https://KevTechify.com</link>
                <pubDate>Fri, 29 Apr 2022 08:00:00 &#43;0000</pubDate>
                <itunes:duration>686</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>ASA ACLs - ASA Firewall Configuration - Network Security - CCNA - KevTechify | Podcast 86</itunes:title>
                <title>ASA ACLs - ASA Firewall Configuration - Network Security - CCNA - KevTechify | Podcast 86</title>

                <itunes:episode>86</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>In this episode we are going to look at ASA ACLs.</p><p>We will be discussing Types of ASA ACL Filtering, Types of ASA ACLs, Syntax for Configuring an ASA ACL, Syntax for Applying an ASA ACL, ASA ACL Examples, ACLs and Object Groups, and finally ACL Using Object Groups Examples.</p><p>Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>All my details and contact information can be found on my website, <a href="https://kevtechify.com/" rel="nofollow">https://KevTechify.com</a></p><p><span>-------------------------------------------------------</span></p><p><span>Cisco Certified Network Associate (CCNA)</span></p><p>Network Security v1 (NetSec)</p><p>Episode 21 - ASA Firewall Configuration</p><p>Part D - ASA ACLs</p><p>Podcast Number: 86</p><p><span>-------------------------------------------------------</span></p><p>Equipment I like.</p><p>Home Lab <span>►►</span> <a href="https://kit.co/KevTechify/home-lab" rel="nofollow">https://kit.co/KevTechify/home-lab</a></p><p>Networking Tools <span>►►</span> <a href="https://kit.co/KevTechify/networking-tools" rel="nofollow">https://kit.co/KevTechify/networking-tools</a></p><p>Studio Equipment <span>►► </span><a href="https://kit.co/KevTechify/studio-equipment" rel="nofollow">https://kit.co/KevTechify/studio-equipment</a></p><p> </p>]]></description>
                <content:encoded>&lt;p&gt;In this episode we are going to look at ASA ACLs.&lt;/p&gt;&lt;p&gt;We will be discussing Types of ASA ACL Filtering, Types of ASA ACLs, Syntax for Configuring an ASA ACL, Syntax for Applying an ASA ACL, ASA ACL Examples, ACLs and Object Groups, and finally ACL Using Object Groups Examples.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;All my details and contact information can be found on my website, &lt;a href=&#34;https://kevtechify.com/&#34; rel=&#34;nofollow&#34;&gt;https://KevTechify.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Cisco Certified Network Associate (CCNA)&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Network Security v1 (NetSec)&lt;/p&gt;&lt;p&gt;Episode 21 - ASA Firewall Configuration&lt;/p&gt;&lt;p&gt;Part D - ASA ACLs&lt;/p&gt;&lt;p&gt;Podcast Number: 86&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Equipment I like.&lt;/p&gt;&lt;p&gt;Home Lab &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/home-lab&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/home-lab&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Networking Tools &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/networking-tools&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/networking-tools&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Studio Equipment &lt;span&gt;►► &lt;/span&gt;&lt;a href=&#34;https://kit.co/KevTechify/studio-equipment&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/studio-equipment&lt;/a&gt;&lt;/p&gt;&lt;p&gt; &lt;/p&gt;</content:encoded>
                
                <enclosure length="26521182" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/30ed0a79-2511-402e-9995-ad6b8dece2e4/stream.mp3"/>
                
                <guid isPermaLink="false">fb3f18cb-13b4-461f-bec5-31c5f9385943</guid>
                <link>https://KevTechify.com</link>
                <pubDate>Thu, 28 Apr 2022 08:00:00 &#43;0000</pubDate>
                <itunes:duration>1657</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Object Groups - ASA Firewall Configuration - Network Security - CCNA - KevTechify | Podcast 85</itunes:title>
                <title>Object Groups - ASA Firewall Configuration - Network Security - CCNA - KevTechify | Podcast 85</title>

                <itunes:episode>85</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>In this episode we are going to look at Object Groups.</p><p>We will be discussing Introduction to Objects and Object Groups, Configure Network Objects, Configure Service Objects, and Object Groups, Configure Common Object Groups.</p><p>Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>All my details and contact information can be found on my website, <a href="https://kevtechify.com/" rel="nofollow">https://KevTechify.com</a></p><p><span>-------------------------------------------------------</span></p><p><span>Cisco Certified Network Associate (CCNA)</span></p><p>Network Security v1 (NetSec)</p><p>Episode 21 - ASA Firewall Configuration</p><p>Part C - Object Groups</p><p>Podcast Number: 85</p><p><span>-------------------------------------------------------</span></p><p>Equipment I like.</p><p>Home Lab <span>►►</span> <a href="https://kit.co/KevTechify/home-lab" rel="nofollow">https://kit.co/KevTechify/home-lab</a></p><p>Networking Tools <span>►►</span> <a href="https://kit.co/KevTechify/networking-tools" rel="nofollow">https://kit.co/KevTechify/networking-tools</a></p><p>Studio Equipment <span>►► </span><a href="https://kit.co/KevTechify/studio-equipment" rel="nofollow">https://kit.co/KevTechify/studio-equipment</a></p><p> </p>]]></description>
                <content:encoded>&lt;p&gt;In this episode we are going to look at Object Groups.&lt;/p&gt;&lt;p&gt;We will be discussing Introduction to Objects and Object Groups, Configure Network Objects, Configure Service Objects, and Object Groups, Configure Common Object Groups.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;All my details and contact information can be found on my website, &lt;a href=&#34;https://kevtechify.com/&#34; rel=&#34;nofollow&#34;&gt;https://KevTechify.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Cisco Certified Network Associate (CCNA)&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Network Security v1 (NetSec)&lt;/p&gt;&lt;p&gt;Episode 21 - ASA Firewall Configuration&lt;/p&gt;&lt;p&gt;Part C - Object Groups&lt;/p&gt;&lt;p&gt;Podcast Number: 85&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Equipment I like.&lt;/p&gt;&lt;p&gt;Home Lab &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/home-lab&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/home-lab&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Networking Tools &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/networking-tools&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/networking-tools&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Studio Equipment &lt;span&gt;►► &lt;/span&gt;&lt;a href=&#34;https://kit.co/KevTechify/studio-equipment&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/studio-equipment&lt;/a&gt;&lt;/p&gt;&lt;p&gt; &lt;/p&gt;</content:encoded>
                
                <enclosure length="14517812" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/a2c91aa9-8af4-4133-8289-59ad45485734/stream.mp3"/>
                
                <guid isPermaLink="false">8b6d1cd9-aa08-4159-8c91-c6f121381aca</guid>
                <link>https://KevTechify.com</link>
                <pubDate>Wed, 27 Apr 2022 08:00:00 &#43;0000</pubDate>
                <itunes:duration>907</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Configure Management Settings and Services - ASA Firewall Configuration - Network Security - CCNA - KevTechify | Podcast 84</itunes:title>
                <title>Configure Management Settings and Services - ASA Firewall Configuration - Network Security - CCNA - KevTechify | Podcast 84</title>

                <itunes:episode>84</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>In this episode we are going to look at Configure Management Settings and Services.</p><p>We will be discussing Enter Global Configuration Mode, Configure Basic Settings, Configure a Default Static Route, Configure Remote Access Services, Configure ASA Basic Settings Using the CLI, Configure Network Time Protocol Services, and finally Configure DHCP Services.</p><p>Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>All my details and contact information can be found on my website, <a href="https://kevtechify.com/" rel="nofollow">https://KevTechify.com</a></p><p><span>-------------------------------------------------------</span></p><p><span>Cisco Certified Network Associate (CCNA)</span></p><p>Network Security v1 (NetSec)</p><p>Episode 21 - ASA Firewall Configuration</p><p>Part B - Configure Management Settings and Services</p><p>Podcast Number: 84</p><p><span>-------------------------------------------------------</span></p><p>Equipment I like.</p><p>Home Lab <span>►►</span> <a href="https://kit.co/KevTechify/home-lab" rel="nofollow">https://kit.co/KevTechify/home-lab</a></p><p>Networking Tools <span>►►</span> <a href="https://kit.co/KevTechify/networking-tools" rel="nofollow">https://kit.co/KevTechify/networking-tools</a></p><p>Studio Equipment <span>►► </span><a href="https://kit.co/KevTechify/studio-equipment" rel="nofollow">https://kit.co/KevTechify/studio-equipment</a></p><p> </p>]]></description>
                <content:encoded>&lt;p&gt;In this episode we are going to look at Configure Management Settings and Services.&lt;/p&gt;&lt;p&gt;We will be discussing Enter Global Configuration Mode, Configure Basic Settings, Configure a Default Static Route, Configure Remote Access Services, Configure ASA Basic Settings Using the CLI, Configure Network Time Protocol Services, and finally Configure DHCP Services.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;All my details and contact information can be found on my website, &lt;a href=&#34;https://kevtechify.com/&#34; rel=&#34;nofollow&#34;&gt;https://KevTechify.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Cisco Certified Network Associate (CCNA)&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Network Security v1 (NetSec)&lt;/p&gt;&lt;p&gt;Episode 21 - ASA Firewall Configuration&lt;/p&gt;&lt;p&gt;Part B - Configure Management Settings and Services&lt;/p&gt;&lt;p&gt;Podcast Number: 84&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Equipment I like.&lt;/p&gt;&lt;p&gt;Home Lab &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/home-lab&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/home-lab&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Networking Tools &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/networking-tools&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/networking-tools&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Studio Equipment &lt;span&gt;►► &lt;/span&gt;&lt;a href=&#34;https://kit.co/KevTechify/studio-equipment&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/studio-equipment&lt;/a&gt;&lt;/p&gt;&lt;p&gt; &lt;/p&gt;</content:encoded>
                
                <enclosure length="28986305" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/daa47131-f153-4545-a813-cbd7e54deea1/stream.mp3"/>
                
                <guid isPermaLink="false">71a79612-d505-4d9d-95c2-c67607a3f402</guid>
                <link>https://KevTechify.com</link>
                <pubDate>Tue, 26 Apr 2022 08:00:00 &#43;0000</pubDate>
                <itunes:duration>1811</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Basic ASA Firewall Configuration - ASA Firewall Configuration - Network Security - CCNA - KevTechify | Podcast 83</itunes:title>
                <title>Basic ASA Firewall Configuration - ASA Firewall Configuration - Network Security - CCNA - KevTechify | Podcast 83</title>

                <itunes:episode>83</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>In this episode we are going to look at Basic ASA Firewall Configuration.</p><p>We will be discussing Basic ASA Settings, ASA Default Configuration, and ASA Interactive Setup Initialization Wizard.</p><p>Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>All my details and contact information can be found on my website, <a href="https://kevtechify.com/" rel="nofollow">https://KevTechify.com</a></p><p><span>-------------------------------------------------------</span></p><p><span>Cisco Certified Network Associate (CCNA)</span></p><p>Network Security v1 (NetSec)</p><p>Episode 21 - ASA Firewall Configuration</p><p>Part A - Basic ASA Firewall Configuration</p><p>Podcast Number: 83</p><p><span>-------------------------------------------------------</span></p><p>Equipment I like.</p><p>Home Lab <span>►►</span> <a href="https://kit.co/KevTechify/home-lab" rel="nofollow">https://kit.co/KevTechify/home-lab</a></p><p>Networking Tools <span>►►</span> <a href="https://kit.co/KevTechify/networking-tools" rel="nofollow">https://kit.co/KevTechify/networking-tools</a></p><p>Studio Equipment <span>►► </span><a href="https://kit.co/KevTechify/studio-equipment" rel="nofollow">https://kit.co/KevTechify/studio-equipment</a></p><p> </p>]]></description>
                <content:encoded>&lt;p&gt;In this episode we are going to look at Basic ASA Firewall Configuration.&lt;/p&gt;&lt;p&gt;We will be discussing Basic ASA Settings, ASA Default Configuration, and ASA Interactive Setup Initialization Wizard.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;All my details and contact information can be found on my website, &lt;a href=&#34;https://kevtechify.com/&#34; rel=&#34;nofollow&#34;&gt;https://KevTechify.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Cisco Certified Network Associate (CCNA)&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Network Security v1 (NetSec)&lt;/p&gt;&lt;p&gt;Episode 21 - ASA Firewall Configuration&lt;/p&gt;&lt;p&gt;Part A - Basic ASA Firewall Configuration&lt;/p&gt;&lt;p&gt;Podcast Number: 83&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Equipment I like.&lt;/p&gt;&lt;p&gt;Home Lab &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/home-lab&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/home-lab&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Networking Tools &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/networking-tools&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/networking-tools&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Studio Equipment &lt;span&gt;►► &lt;/span&gt;&lt;a href=&#34;https://kit.co/KevTechify/studio-equipment&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/studio-equipment&lt;/a&gt;&lt;/p&gt;&lt;p&gt; &lt;/p&gt;</content:encoded>
                
                <enclosure length="7980094" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/680dc140-ad0c-434f-a1ce-c04a25195341/stream.mp3"/>
                
                <guid isPermaLink="false">4a542457-b543-4fb0-93b9-3ef44e9f543f</guid>
                <link>https://KevTechify.com</link>
                <pubDate>Mon, 25 Apr 2022 08:00:00 &#43;0000</pubDate>
                <itunes:duration>498</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>The ASA 5506-X with FirePOWER Services - Introduction to the ASA - Network Security - CCNA - KevTechify | Podcast 82</itunes:title>
                <title>The ASA 5506-X with FirePOWER Services - Introduction to the ASA - Network Security - CCNA - KevTechify | Podcast 82</title>

                <itunes:episode>82</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>In this episode we are going to look at The ASA 5506-X with FirePOWER Services.</p><p>We will be discussing an Overview of ASA 5506-X, ASA Security Levels, and ASA 5506-X Deployment Scenarios.</p><p>Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>All my details and contact information can be found on my website, <a href="https://kevtechify.com/" rel="nofollow">https://KevTechify.com</a></p><p><span>-------------------------------------------------------</span></p><p><span>Cisco Certified Network Associate (CCNA)</span></p><p>Network Security v1 (NetSec)</p><p>Episode 20 - Introduction to the ASA</p><p>Part B - The ASA 5506-X with FirePOWER Services</p><p>Podcast Number: 82</p><p><span>-------------------------------------------------------</span></p><p>Equipment I like.</p><p>Home Lab <span>►►</span> <a href="https://kit.co/KevTechify/home-lab" rel="nofollow">https://kit.co/KevTechify/home-lab</a></p><p>Networking Tools <span>►►</span> <a href="https://kit.co/KevTechify/networking-tools" rel="nofollow">https://kit.co/KevTechify/networking-tools</a></p><p>Studio Equipment <span>►► </span><a href="https://kit.co/KevTechify/studio-equipment" rel="nofollow">https://kit.co/KevTechify/studio-equipment</a></p><p> </p><p> </p>]]></description>
                <content:encoded>&lt;p&gt;In this episode we are going to look at The ASA 5506-X with FirePOWER Services.&lt;/p&gt;&lt;p&gt;We will be discussing an Overview of ASA 5506-X, ASA Security Levels, and ASA 5506-X Deployment Scenarios.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;All my details and contact information can be found on my website, &lt;a href=&#34;https://kevtechify.com/&#34; rel=&#34;nofollow&#34;&gt;https://KevTechify.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Cisco Certified Network Associate (CCNA)&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Network Security v1 (NetSec)&lt;/p&gt;&lt;p&gt;Episode 20 - Introduction to the ASA&lt;/p&gt;&lt;p&gt;Part B - The ASA 5506-X with FirePOWER Services&lt;/p&gt;&lt;p&gt;Podcast Number: 82&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Equipment I like.&lt;/p&gt;&lt;p&gt;Home Lab &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/home-lab&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/home-lab&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Networking Tools &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/networking-tools&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/networking-tools&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Studio Equipment &lt;span&gt;►► &lt;/span&gt;&lt;a href=&#34;https://kit.co/KevTechify/studio-equipment&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/studio-equipment&lt;/a&gt;&lt;/p&gt;&lt;p&gt; &lt;/p&gt;&lt;p&gt; &lt;/p&gt;</content:encoded>
                
                <enclosure length="10902047" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/a60fcc58-c2b0-4a04-822c-a7bf40761837/stream.mp3"/>
                
                <guid isPermaLink="false">dea7f7af-0409-41a7-850d-1db00c7cba82</guid>
                <link>https://KevTechify.com</link>
                <pubDate>Sun, 24 Apr 2022 08:00:00 &#43;0000</pubDate>
                <itunes:duration>681</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>ASA Solutions - Introduction to the ASA - Network Security - CCNA - KevTechify | Podcast 81</itunes:title>
                <title>ASA Solutions - Introduction to the ASA - Network Security - CCNA - KevTechify | Podcast 81</title>

                <itunes:episode>81</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>In this episode we are going to look at ASA Solutions.</p><p>We will be discussing ASA Firewall Models, Cisco ASA Next-Generation Firewall Appliances, Advanced ASA Firewall Features, Cisco Firepower Series, Cisco FTD: Threat Centric NGFW, Review of Firewalls in Network Design, ASA Firewall Modes of Operation, and finally ASA Licensing Requirements.</p><p>Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>All my details and contact information can be found on my website, <a href="https://kevtechify.com/" rel="nofollow">https://KevTechify.com</a></p><p><span>-------------------------------------------------------</span></p><p><span>Cisco Certified Network Associate (CCNA)</span></p><p>Network Security v1 (NetSec)</p><p>Episode 20 - Introduction to the ASA</p><p>Part A - ASA Solutions</p><p>Podcast Number: 81</p><p><span>-------------------------------------------------------</span></p><p>Equipment I like.</p><p>Home Lab <span>►►</span> <a href="https://kit.co/KevTechify/home-lab" rel="nofollow">https://kit.co/KevTechify/home-lab</a></p><p>Networking Tools <span>►►</span> <a href="https://kit.co/KevTechify/networking-tools" rel="nofollow">https://kit.co/KevTechify/networking-tools</a></p><p>Studio Equipment <span>►► </span><a href="https://kit.co/KevTechify/studio-equipment" rel="nofollow">https://kit.co/KevTechify/studio-equipment</a></p><p> </p>]]></description>
                <content:encoded>&lt;p&gt;In this episode we are going to look at ASA Solutions.&lt;/p&gt;&lt;p&gt;We will be discussing ASA Firewall Models, Cisco ASA Next-Generation Firewall Appliances, Advanced ASA Firewall Features, Cisco Firepower Series, Cisco FTD: Threat Centric NGFW, Review of Firewalls in Network Design, ASA Firewall Modes of Operation, and finally ASA Licensing Requirements.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;All my details and contact information can be found on my website, &lt;a href=&#34;https://kevtechify.com/&#34; rel=&#34;nofollow&#34;&gt;https://KevTechify.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Cisco Certified Network Associate (CCNA)&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Network Security v1 (NetSec)&lt;/p&gt;&lt;p&gt;Episode 20 - Introduction to the ASA&lt;/p&gt;&lt;p&gt;Part A - ASA Solutions&lt;/p&gt;&lt;p&gt;Podcast Number: 81&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Equipment I like.&lt;/p&gt;&lt;p&gt;Home Lab &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/home-lab&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/home-lab&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Networking Tools &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/networking-tools&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/networking-tools&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Studio Equipment &lt;span&gt;►► &lt;/span&gt;&lt;a href=&#34;https://kit.co/KevTechify/studio-equipment&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/studio-equipment&lt;/a&gt;&lt;/p&gt;&lt;p&gt; &lt;/p&gt;</content:encoded>
                
                <enclosure length="20666827" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/04679035-b058-47cc-9b4c-f23c23a5cd5c/stream.mp3"/>
                
                <guid isPermaLink="false">eb7563c8-5612-4938-877b-fe39e2fc3a45</guid>
                <link>https://KevTechify.com</link>
                <pubDate>Sat, 23 Apr 2022 08:00:00 &#43;0000</pubDate>
                <itunes:duration>1291</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>IPsec VPN - Implement Site-to-Site IPsec VPNs - Network Security - CCNA - KevTechify | Podcast 80</itunes:title>
                <title>IPsec VPN - Implement Site-to-Site IPsec VPNs - Network Security - CCNA - KevTechify | Podcast 80</title>

                <itunes:episode>80</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>In this episode we are going to look at IPsec VPN.</p><p>We will be discussing Send Interesting Traffic, Verify the ISAKMP and IPsec Tunnels, Site-to-Site IPsec VPN Configuration, Configure and Verify a Site-to-Site IPsec VPN, and finally Configure a Site-to-Site VPN.</p><p>Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>All my details and contact information can be found on my website, <a href="https://kevtechify.com/" rel="nofollow">https://KevTechify.com</a></p><p><span>-------------------------------------------------------</span></p><p><span>Cisco Certified Network Associate (CCNA)</span></p><p>Network Security v1 (NetSec)</p><p>Episode 19 - Implement Site-to-Site IPsec VPNs</p><p>Part E - IPsec VPN</p><p>Podcast Number: 80</p><p><span>-------------------------------------------------------</span></p><p>Equipment I like.</p><p>Home Lab <span>►►</span> <a href="https://kit.co/KevTechify/home-lab" rel="nofollow">https://kit.co/KevTechify/home-lab</a></p><p>Networking Tools <span>►►</span> <a href="https://kit.co/KevTechify/networking-tools" rel="nofollow">https://kit.co/KevTechify/networking-tools</a></p><p>Studio Equipment <span>►► </span><a href="https://kit.co/KevTechify/studio-equipment" rel="nofollow">https://kit.co/KevTechify/studio-equipment</a></p><p> </p>]]></description>
                <content:encoded>&lt;p&gt;In this episode we are going to look at IPsec VPN.&lt;/p&gt;&lt;p&gt;We will be discussing Send Interesting Traffic, Verify the ISAKMP and IPsec Tunnels, Site-to-Site IPsec VPN Configuration, Configure and Verify a Site-to-Site IPsec VPN, and finally Configure a Site-to-Site VPN.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;All my details and contact information can be found on my website, &lt;a href=&#34;https://kevtechify.com/&#34; rel=&#34;nofollow&#34;&gt;https://KevTechify.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Cisco Certified Network Associate (CCNA)&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Network Security v1 (NetSec)&lt;/p&gt;&lt;p&gt;Episode 19 - Implement Site-to-Site IPsec VPNs&lt;/p&gt;&lt;p&gt;Part E - IPsec VPN&lt;/p&gt;&lt;p&gt;Podcast Number: 80&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Equipment I like.&lt;/p&gt;&lt;p&gt;Home Lab &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/home-lab&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/home-lab&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Networking Tools &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/networking-tools&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/networking-tools&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Studio Equipment &lt;span&gt;►► &lt;/span&gt;&lt;a href=&#34;https://kit.co/KevTechify/studio-equipment&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/studio-equipment&lt;/a&gt;&lt;/p&gt;&lt;p&gt; &lt;/p&gt;</content:encoded>
                
                <enclosure length="3008888" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/7e45b24f-0378-4866-96b4-a67dda36d148/stream.mp3"/>
                
                <guid isPermaLink="false">5e429768-00e7-45d2-bcd8-514dc8ed26bf</guid>
                <link>https://KevTechify.com</link>
                <pubDate>Fri, 22 Apr 2022 08:00:00 &#43;0000</pubDate>
                <itunes:duration>188</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Crypto Map - Implement Site-to-Site IPsec VPNs - Network Security - CCNA - KevTechify | Podcast 79</itunes:title>
                <title>Crypto Map - Implement Site-to-Site IPsec VPNs - Network Security - CCNA - KevTechify | Podcast 79</title>

                <itunes:episode>79</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>In this episode we are going to look at Crypto Map.</p><p>We will be discussing Syntax to Configure a Crypto Map, Crypto Map Configuration, and finally Apply and Verify the Crypto Map.</p><p>Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>All my details and contact information can be found on my website, <a href="https://kevtechify.com/" rel="nofollow">https://KevTechify.com</a></p><p><span>-------------------------------------------------------</span></p><p><span>Cisco Certified Network Associate (CCNA)</span></p><p>Network Security v1 (NetSec)</p><p>Episode 19 - Implement Site-to-Site IPsec VPNs</p><p>Part D - Crypto Map</p><p>Podcast Number: 79</p><p><span>-------------------------------------------------------</span></p><p>Equipment I like.</p><p>Home Lab <span>►►</span> <a href="https://kit.co/KevTechify/home-lab" rel="nofollow">https://kit.co/KevTechify/home-lab</a></p><p>Networking Tools <span>►►</span> <a href="https://kit.co/KevTechify/networking-tools" rel="nofollow">https://kit.co/KevTechify/networking-tools</a></p><p>Studio Equipment <span>►► </span><a href="https://kit.co/KevTechify/studio-equipment" rel="nofollow">https://kit.co/KevTechify/studio-equipment</a></p><p> </p>]]></description>
                <content:encoded>&lt;p&gt;In this episode we are going to look at Crypto Map.&lt;/p&gt;&lt;p&gt;We will be discussing Syntax to Configure a Crypto Map, Crypto Map Configuration, and finally Apply and Verify the Crypto Map.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;All my details and contact information can be found on my website, &lt;a href=&#34;https://kevtechify.com/&#34; rel=&#34;nofollow&#34;&gt;https://KevTechify.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Cisco Certified Network Associate (CCNA)&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Network Security v1 (NetSec)&lt;/p&gt;&lt;p&gt;Episode 19 - Implement Site-to-Site IPsec VPNs&lt;/p&gt;&lt;p&gt;Part D - Crypto Map&lt;/p&gt;&lt;p&gt;Podcast Number: 79&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Equipment I like.&lt;/p&gt;&lt;p&gt;Home Lab &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/home-lab&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/home-lab&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Networking Tools &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/networking-tools&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/networking-tools&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Studio Equipment &lt;span&gt;►► &lt;/span&gt;&lt;a href=&#34;https://kit.co/KevTechify/studio-equipment&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/studio-equipment&lt;/a&gt;&lt;/p&gt;&lt;p&gt; &lt;/p&gt;</content:encoded>
                
                <enclosure length="7594318" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/7ae3ad58-4ad1-47cb-9333-53923db487c7/stream.mp3"/>
                
                <guid isPermaLink="false">287f06d2-a509-4a21-9180-c2b1129b523e</guid>
                <link>https://KevTechify.com</link>
                <pubDate>Thu, 21 Apr 2022 08:00:00 &#43;0000</pubDate>
                <itunes:duration>474</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>IPsec Policy - Implement Site-to-Site IPsec VPNs - Network Security - CCNA - KevTechify | Podcast 78</itunes:title>
                <title>IPsec Policy - Implement Site-to-Site IPsec VPNs - Network Security - CCNA - KevTechify | Podcast 78</title>

                <itunes:episode>78</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>In this episode we are going to look at IPsec Policy.</p><p>We will be discussing Define Interesting Traffic and Configure IPsec Transform Set.</p><p>Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>All my details and contact information can be found on my website, <a href="https://kevtechify.com/" rel="nofollow">https://KevTechify.com</a></p><p><span>-------------------------------------------------------</span></p><p><span>Cisco Certified Network Associate (CCNA)</span></p><p>Network Security v1 (NetSec)</p><p>Episode 19 - Implement Site-to-Site IPsec VPNs</p><p>Part C - IPsec Policy</p><p>Podcast Number: 78</p><p><span>-------------------------------------------------------</span></p><p>Equipment I like.</p><p>Home Lab <span>►►</span> <a href="https://kit.co/KevTechify/home-lab" rel="nofollow">https://kit.co/KevTechify/home-lab</a></p><p>Networking Tools <span>►►</span> <a href="https://kit.co/KevTechify/networking-tools" rel="nofollow">https://kit.co/KevTechify/networking-tools</a></p><p>Studio Equipment <span>►► </span><a href="https://kit.co/KevTechify/studio-equipment" rel="nofollow">https://kit.co/KevTechify/studio-equipment</a></p><p> </p>]]></description>
                <content:encoded>&lt;p&gt;In this episode we are going to look at IPsec Policy.&lt;/p&gt;&lt;p&gt;We will be discussing Define Interesting Traffic and Configure IPsec Transform Set.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;All my details and contact information can be found on my website, &lt;a href=&#34;https://kevtechify.com/&#34; rel=&#34;nofollow&#34;&gt;https://KevTechify.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Cisco Certified Network Associate (CCNA)&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Network Security v1 (NetSec)&lt;/p&gt;&lt;p&gt;Episode 19 - Implement Site-to-Site IPsec VPNs&lt;/p&gt;&lt;p&gt;Part C - IPsec Policy&lt;/p&gt;&lt;p&gt;Podcast Number: 78&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Equipment I like.&lt;/p&gt;&lt;p&gt;Home Lab &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/home-lab&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/home-lab&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Networking Tools &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/networking-tools&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/networking-tools&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Studio Equipment &lt;span&gt;►► &lt;/span&gt;&lt;a href=&#34;https://kit.co/KevTechify/studio-equipment&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/studio-equipment&lt;/a&gt;&lt;/p&gt;&lt;p&gt; &lt;/p&gt;</content:encoded>
                
                <enclosure length="5321874" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/d553b216-0307-4bf4-ac60-b3121233d1c8/stream.mp3"/>
                
                <guid isPermaLink="false">29148868-1c1f-4e54-9795-5d95ffeff61b</guid>
                <link>https://KevTechify.com</link>
                <pubDate>Wed, 20 Apr 2022 08:00:00 &#43;0000</pubDate>
                <itunes:duration>332</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>ISAKMP Policy - Implement Site-to-Site IPsec VPNs - Network Security - CCNA - KevTechify | Podcast 77</itunes:title>
                <title>ISAKMP Policy - Implement Site-to-Site IPsec VPNs - Network Security - CCNA - KevTechify | Podcast 77</title>

                <itunes:episode>77</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>In this episode we are going to look at ISAKMP Policy.</p><p>We will be discussing the Default ISAKMP Policies, Syntax to Configure a New ISAKMP Policy, ISAKMP Policy Configuration, and finally Pre-Shared Key Configuration.</p><p>Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>All my details and contact information can be found on my website, <a href="https://kevtechify.com/" rel="nofollow">https://KevTechify.com</a></p><p><span>-------------------------------------------------------</span></p><p><span>Cisco Certified Network Associate (CCNA)</span></p><p>Network Security v1 (NetSec)</p><p>Episode 19 - Implement Site-to-Site IPsec VPNs</p><p>Part B - ISAKMP Policy</p><p>Podcast Number: 77</p><p><span>-------------------------------------------------------</span></p><p>Equipment I like.</p><p>Home Lab <span>►►</span> <a href="https://kit.co/KevTechify/home-lab" rel="nofollow">https://kit.co/KevTechify/home-lab</a></p><p>Networking Tools <span>►►</span> <a href="https://kit.co/KevTechify/networking-tools" rel="nofollow">https://kit.co/KevTechify/networking-tools</a></p><p>Studio Equipment <span>►► </span><a href="https://kit.co/KevTechify/studio-equipment" rel="nofollow">https://kit.co/KevTechify/studio-equipment</a></p><p> </p>]]></description>
                <content:encoded>&lt;p&gt;In this episode we are going to look at ISAKMP Policy.&lt;/p&gt;&lt;p&gt;We will be discussing the Default ISAKMP Policies, Syntax to Configure a New ISAKMP Policy, ISAKMP Policy Configuration, and finally Pre-Shared Key Configuration.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;All my details and contact information can be found on my website, &lt;a href=&#34;https://kevtechify.com/&#34; rel=&#34;nofollow&#34;&gt;https://KevTechify.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Cisco Certified Network Associate (CCNA)&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Network Security v1 (NetSec)&lt;/p&gt;&lt;p&gt;Episode 19 - Implement Site-to-Site IPsec VPNs&lt;/p&gt;&lt;p&gt;Part B - ISAKMP Policy&lt;/p&gt;&lt;p&gt;Podcast Number: 77&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Equipment I like.&lt;/p&gt;&lt;p&gt;Home Lab &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/home-lab&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/home-lab&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Networking Tools &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/networking-tools&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/networking-tools&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Studio Equipment &lt;span&gt;►► &lt;/span&gt;&lt;a href=&#34;https://kit.co/KevTechify/studio-equipment&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/studio-equipment&lt;/a&gt;&lt;/p&gt;&lt;p&gt; &lt;/p&gt;</content:encoded>
                
                <enclosure length="8051983" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/824ae468-3d38-4e9c-89f2-49cc27b91b0e/stream.mp3"/>
                
                <guid isPermaLink="false">f00711d0-81d9-419b-afe5-8f780cbd364c</guid>
                <link>https://KevTechify.com</link>
                <pubDate>Tue, 19 Apr 2022 08:00:00 &#43;0000</pubDate>
                <itunes:duration>503</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Configure a Site-to-Site IPsec VPN - Implement Site-to-Site IPsec VPNs - Network Security - CCNA - KevTechify | Podcast 76</itunes:title>
                <title>Configure a Site-to-Site IPsec VPN - Implement Site-to-Site IPsec VPNs - Network Security - CCNA - KevTechify | Podcast 76</title>

                <itunes:episode>76</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>In this episode we are going to look at Configure a Site-to-Site IPsec VPN.</p><p>We will be discussing IPsec Negotiation, Site-to-Site IPsec VPN Topology, IPsec VPN Configuration Tasks, Existing ACL Configurations, and finally Handling Broadcast and Multicast Traffic.</p><p>Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>All my details and contact information can be found on my website, <a href="https://kevtechify.com/" rel="nofollow">https://KevTechify.com</a></p><p><span>-------------------------------------------------------</span></p><p><span>Cisco Certified Network Associate (CCNA)</span></p><p>Network Security v1 (NetSec)</p><p>Episode 19 - Implement Site-to-Site IPsec VPNs</p><p>Part A - Configure a Site-to-Site IPsec VPN</p><p>Podcast Number: 76</p><p><span>-------------------------------------------------------</span></p><p>Equipment I like.</p><p>Home Lab <span>►►</span> <a href="https://kit.co/KevTechify/home-lab" rel="nofollow">https://kit.co/KevTechify/home-lab</a></p><p>Networking Tools <span>►►</span> <a href="https://kit.co/KevTechify/networking-tools" rel="nofollow">https://kit.co/KevTechify/networking-tools</a></p><p>Studio Equipment <span>►► </span><a href="https://kit.co/KevTechify/studio-equipment" rel="nofollow">https://kit.co/KevTechify/studio-equipment</a></p><p> </p>]]></description>
                <content:encoded>&lt;p&gt;In this episode we are going to look at Configure a Site-to-Site IPsec VPN.&lt;/p&gt;&lt;p&gt;We will be discussing IPsec Negotiation, Site-to-Site IPsec VPN Topology, IPsec VPN Configuration Tasks, Existing ACL Configurations, and finally Handling Broadcast and Multicast Traffic.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;All my details and contact information can be found on my website, &lt;a href=&#34;https://kevtechify.com/&#34; rel=&#34;nofollow&#34;&gt;https://KevTechify.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Cisco Certified Network Associate (CCNA)&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Network Security v1 (NetSec)&lt;/p&gt;&lt;p&gt;Episode 19 - Implement Site-to-Site IPsec VPNs&lt;/p&gt;&lt;p&gt;Part A - Configure a Site-to-Site IPsec VPN&lt;/p&gt;&lt;p&gt;Podcast Number: 76&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Equipment I like.&lt;/p&gt;&lt;p&gt;Home Lab &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/home-lab&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/home-lab&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Networking Tools &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/networking-tools&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/networking-tools&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Studio Equipment &lt;span&gt;►► &lt;/span&gt;&lt;a href=&#34;https://kit.co/KevTechify/studio-equipment&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/studio-equipment&lt;/a&gt;&lt;/p&gt;&lt;p&gt; &lt;/p&gt;</content:encoded>
                
                <enclosure length="7040940" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/2f97f0df-ab55-4274-b8b8-ab57b2e20574/stream.mp3"/>
                
                <guid isPermaLink="false">c38439b5-28f8-4122-894a-908a4f5c913c</guid>
                <link>https://KevTechify.com</link>
                <pubDate>Mon, 18 Apr 2022 08:00:00 &#43;0000</pubDate>
                <itunes:duration>440</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Internet Key Exchange - VPNs - Network Security - CCNA - KevTechify | Podcast 75</itunes:title>
                <title>Internet Key Exchange - VPNs - Network Security - CCNA - KevTechify | Podcast 75</title>

                <itunes:episode>75</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>In this episode we are going to look at Internet Key Exchange.</p><p>We will be discussing the IKE Protocol, Phase 1 and 2 Key Negotiation, Phase 2: Negotiating SAs, and finally IKE Phase 1 and Phase 2.</p><p>Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>All my details and contact information can be found on my website, <a href="https://kevtechify.com/" rel="nofollow">https://KevTechify.com</a></p><p><span>-------------------------------------------------------</span></p><p><span>Cisco Certified Network Associate (CCNA)</span></p><p>Network Security v1 (NetSec)</p><p>Episode 18 - VPNs</p><p>Part E - Internet Key Exchange</p><p>Podcast Number: 75</p><p><span>-------------------------------------------------------</span></p><p>Equipment I like.</p><p>Home Lab <span>►►</span> <a href="https://kit.co/KevTechify/home-lab" rel="nofollow">https://kit.co/KevTechify/home-lab</a></p><p>Networking Tools <span>►►</span> <a href="https://kit.co/KevTechify/networking-tools" rel="nofollow">https://kit.co/KevTechify/networking-tools</a></p><p>Studio Equipment <span>►► </span><a href="https://kit.co/KevTechify/studio-equipment" rel="nofollow">https://kit.co/KevTechify/studio-equipment</a></p><p> </p>]]></description>
                <content:encoded>&lt;p&gt;In this episode we are going to look at Internet Key Exchange.&lt;/p&gt;&lt;p&gt;We will be discussing the IKE Protocol, Phase 1 and 2 Key Negotiation, Phase 2: Negotiating SAs, and finally IKE Phase 1 and Phase 2.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;All my details and contact information can be found on my website, &lt;a href=&#34;https://kevtechify.com/&#34; rel=&#34;nofollow&#34;&gt;https://KevTechify.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Cisco Certified Network Associate (CCNA)&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Network Security v1 (NetSec)&lt;/p&gt;&lt;p&gt;Episode 18 - VPNs&lt;/p&gt;&lt;p&gt;Part E - Internet Key Exchange&lt;/p&gt;&lt;p&gt;Podcast Number: 75&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Equipment I like.&lt;/p&gt;&lt;p&gt;Home Lab &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/home-lab&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/home-lab&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Networking Tools &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/networking-tools&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/networking-tools&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Studio Equipment &lt;span&gt;►► &lt;/span&gt;&lt;a href=&#34;https://kit.co/KevTechify/studio-equipment&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/studio-equipment&lt;/a&gt;&lt;/p&gt;&lt;p&gt; &lt;/p&gt;</content:encoded>
                
                <enclosure length="10368313" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/5167f33e-f8ab-4449-9df1-d079982f3fe1/stream.mp3"/>
                
                <guid isPermaLink="false">3ad2446a-93ab-4bba-9b34-712fdcf55c9b</guid>
                <link>https://KevTechify.com</link>
                <pubDate>Sun, 17 Apr 2022 08:00:00 &#43;0000</pubDate>
                <itunes:duration>648</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>IPsec Protocols - VPNs - Network Security - CCNA - KevTechify | Podcast 74</itunes:title>
                <title>IPsec Protocols - VPNs - Network Security - CCNA - KevTechify | Podcast 74</title>

                <itunes:episode>74</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>In this episode we are going to look at IPsec Protocols.</p><p>We will be discussing IPsec Protocol Overview, Authentication Header, Encapsulation Security Protocol, ESP Encrypts and Authenticates, and finally Transport and Tunnel Modes.</p><p>Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>All my details and contact information can be found on my website, <a href="https://kevtechify.com/" rel="nofollow">https://KevTechify.com</a></p><p><span>-------------------------------------------------------</span></p><p><span>Cisco Certified Network Associate (CCNA)</span></p><p>Network Security v1 (NetSec)</p><p>Episode 18 - VPNs</p><p>Part D - IPsec Protocols</p><p>Podcast Number: 74</p><p><span>-------------------------------------------------------</span></p><p>Equipment I like.</p><p>Home Lab <span>►►</span> <a href="https://kit.co/KevTechify/home-lab" rel="nofollow">https://kit.co/KevTechify/home-lab</a></p><p>Networking Tools <span>►►</span> <a href="https://kit.co/KevTechify/networking-tools" rel="nofollow">https://kit.co/KevTechify/networking-tools</a></p><p>Studio Equipment <span>►► </span><a href="https://kit.co/KevTechify/studio-equipment" rel="nofollow">https://kit.co/KevTechify/studio-equipment</a></p><p> </p>]]></description>
                <content:encoded>&lt;p&gt;In this episode we are going to look at IPsec Protocols.&lt;/p&gt;&lt;p&gt;We will be discussing IPsec Protocol Overview, Authentication Header, Encapsulation Security Protocol, ESP Encrypts and Authenticates, and finally Transport and Tunnel Modes.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;All my details and contact information can be found on my website, &lt;a href=&#34;https://kevtechify.com/&#34; rel=&#34;nofollow&#34;&gt;https://KevTechify.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Cisco Certified Network Associate (CCNA)&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Network Security v1 (NetSec)&lt;/p&gt;&lt;p&gt;Episode 18 - VPNs&lt;/p&gt;&lt;p&gt;Part D - IPsec Protocols&lt;/p&gt;&lt;p&gt;Podcast Number: 74&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Equipment I like.&lt;/p&gt;&lt;p&gt;Home Lab &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/home-lab&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/home-lab&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Networking Tools &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/networking-tools&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/networking-tools&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Studio Equipment &lt;span&gt;►► &lt;/span&gt;&lt;a href=&#34;https://kit.co/KevTechify/studio-equipment&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/studio-equipment&lt;/a&gt;&lt;/p&gt;&lt;p&gt; &lt;/p&gt;</content:encoded>
                
                <enclosure length="7180956" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/d3c65415-cec3-4626-b127-8feb6c6f99f3/stream.mp3"/>
                
                <guid isPermaLink="false">5325cd25-1c57-45ec-bf6c-4e1bd4a145a8</guid>
                <link>https://KevTechify.com</link>
                <pubDate>Sat, 16 Apr 2022 08:00:00 &#43;0000</pubDate>
                <itunes:duration>448</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>IPsec Overview - VPNs - Network Security - CCNA - KevTechify | Podcast 73</itunes:title>
                <title>IPsec Overview - VPNs - Network Security - CCNA - KevTechify | Podcast 73</title>

                <itunes:episode>73</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>In this episode we are going to look at IPsec Overview.</p><p>We will be discussing IPsec Concepts, IPsec Technologies, IPsec Protocol Encapsulation, Confidentiality, Integrity, Authentication, Secure Key Exchange with Diffie-Hellman, and finally IPsec Transport and Tunnel Modes.</p><p>Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>All my details and contact information can be found on my website, <a href="https://kevtechify.com/" rel="nofollow">https://KevTechify.com</a></p><p><span>-------------------------------------------------------</span></p><p><span>Cisco Certified Network Associate (CCNA)</span></p><p>Network Security v1 (NetSec)</p><p>Episode 18 - VPNs</p><p>Part C - IPsec Overview</p><p>Podcast Number: 73</p><p><span>-------------------------------------------------------</span></p><p>Equipment I like.</p><p>Home Lab <span>►►</span> <a href="https://kit.co/KevTechify/home-lab" rel="nofollow">https://kit.co/KevTechify/home-lab</a></p><p>Networking Tools <span>►►</span> <a href="https://kit.co/KevTechify/networking-tools" rel="nofollow">https://kit.co/KevTechify/networking-tools</a></p><p>Studio Equipment <span>►► </span><a href="https://kit.co/KevTechify/studio-equipment" rel="nofollow">https://kit.co/KevTechify/studio-equipment</a></p><p> </p>]]></description>
                <content:encoded>&lt;p&gt;In this episode we are going to look at IPsec Overview.&lt;/p&gt;&lt;p&gt;We will be discussing IPsec Concepts, IPsec Technologies, IPsec Protocol Encapsulation, Confidentiality, Integrity, Authentication, Secure Key Exchange with Diffie-Hellman, and finally IPsec Transport and Tunnel Modes.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;All my details and contact information can be found on my website, &lt;a href=&#34;https://kevtechify.com/&#34; rel=&#34;nofollow&#34;&gt;https://KevTechify.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Cisco Certified Network Associate (CCNA)&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Network Security v1 (NetSec)&lt;/p&gt;&lt;p&gt;Episode 18 - VPNs&lt;/p&gt;&lt;p&gt;Part C - IPsec Overview&lt;/p&gt;&lt;p&gt;Podcast Number: 73&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Equipment I like.&lt;/p&gt;&lt;p&gt;Home Lab &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/home-lab&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/home-lab&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Networking Tools &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/networking-tools&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/networking-tools&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Studio Equipment &lt;span&gt;►► &lt;/span&gt;&lt;a href=&#34;https://kit.co/KevTechify/studio-equipment&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/studio-equipment&lt;/a&gt;&lt;/p&gt;&lt;p&gt; &lt;/p&gt;</content:encoded>
                
                <enclosure length="22372937" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/79fbf329-f3e4-4f5c-ba13-9a1201fd6793/stream.mp3"/>
                
                <guid isPermaLink="false">e96d6d23-e618-4d57-ac03-f471478e7838</guid>
                <link>https://KevTechify.com</link>
                <pubDate>Fri, 15 Apr 2022 08:00:00 &#43;0000</pubDate>
                <itunes:duration>1398</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>VPN Topologies - VPNs - Network Security - CCNA - KevTechify | Podcast 72</itunes:title>
                <title>VPN Topologies - VPNs - Network Security - CCNA - KevTechify | Podcast 72</title>

                <itunes:episode>72</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>In this episode we are going to look at VPN Topologies.</p><p>We will be discussing Site-to-Site and Remote-Access VPNs, Remote-Access VPNs, SSL VPNs, and Site-to-Site IPsec VPNs.</p><p>Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>All my details and contact information can be found on my website, <a href="https://kevtechify.com/" rel="nofollow">https://KevTechify.com</a></p><p><span>-------------------------------------------------------</span></p><p><span>Cisco Certified Network Associate (CCNA)</span></p><p>Network Security v1 (NetSec)</p><p>Episode 18 - VPNs</p><p>Part B - VPN Topologies</p><p>Podcast Number: 72</p><p><span>-------------------------------------------------------</span></p><p>Equipment I like.</p><p>Home Lab <span>►►</span> <a href="https://kit.co/KevTechify/home-lab" rel="nofollow">https://kit.co/KevTechify/home-lab</a></p><p>Networking Tools <span>►►</span> <a href="https://kit.co/KevTechify/networking-tools" rel="nofollow">https://kit.co/KevTechify/networking-tools</a></p><p>Studio Equipment <span>►► </span><a href="https://kit.co/KevTechify/studio-equipment" rel="nofollow">https://kit.co/KevTechify/studio-equipment</a></p><p> </p>]]></description>
                <content:encoded>&lt;p&gt;In this episode we are going to look at VPN Topologies.&lt;/p&gt;&lt;p&gt;We will be discussing Site-to-Site and Remote-Access VPNs, Remote-Access VPNs, SSL VPNs, and Site-to-Site IPsec VPNs.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;All my details and contact information can be found on my website, &lt;a href=&#34;https://kevtechify.com/&#34; rel=&#34;nofollow&#34;&gt;https://KevTechify.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Cisco Certified Network Associate (CCNA)&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Network Security v1 (NetSec)&lt;/p&gt;&lt;p&gt;Episode 18 - VPNs&lt;/p&gt;&lt;p&gt;Part B - VPN Topologies&lt;/p&gt;&lt;p&gt;Podcast Number: 72&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Equipment I like.&lt;/p&gt;&lt;p&gt;Home Lab &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/home-lab&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/home-lab&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Networking Tools &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/networking-tools&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/networking-tools&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Studio Equipment &lt;span&gt;►► &lt;/span&gt;&lt;a href=&#34;https://kit.co/KevTechify/studio-equipment&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/studio-equipment&lt;/a&gt;&lt;/p&gt;&lt;p&gt; &lt;/p&gt;</content:encoded>
                
                <enclosure length="10312724" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/feffe68c-7846-46d8-9676-429abc0e8f8d/stream.mp3"/>
                
                <guid isPermaLink="false">5e689a7c-58a3-4ec6-80df-bd758dfaa109</guid>
                <link>https://KevTechify.com</link>
                <pubDate>Thu, 14 Apr 2022 08:00:00 &#43;0000</pubDate>
                <itunes:duration>644</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>VPN Overview - VPNs - Network Security - CCNA - KevTechify | Podcast 71</itunes:title>
                <title>VPN Overview - VPNs - Network Security - CCNA - KevTechify | Podcast 71</title>

                <itunes:episode>71</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>In this episode we are going to look at VPN Overview.</p><p>We will be discussing Virtual Private Networks and VPN Benefits.</p><p>Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>All my details and contact information can be found on my website, <a href="https://kevtechify.com/" rel="nofollow">https://KevTechify.com</a></p><p><span>-------------------------------------------------------</span></p><p><span>Cisco Certified Network Associate (CCNA)</span></p><p>Network Security v1 (NetSec)</p><p>Episode 18 - VPNs</p><p>Part A - VPN Overview</p><p>Podcast Number: 71</p><p><span>-------------------------------------------------------</span></p><p>Equipment I like.</p><p>Home Lab <span>►►</span> <a href="https://kit.co/KevTechify/home-lab" rel="nofollow">https://kit.co/KevTechify/home-lab</a></p><p>Networking Tools <span>►►</span> <a href="https://kit.co/KevTechify/networking-tools" rel="nofollow">https://kit.co/KevTechify/networking-tools</a></p><p>Studio Equipment <span>►► </span><a href="https://kit.co/KevTechify/studio-equipment" rel="nofollow">https://kit.co/KevTechify/studio-equipment</a></p><p> </p>]]></description>
                <content:encoded>&lt;p&gt;In this episode we are going to look at VPN Overview.&lt;/p&gt;&lt;p&gt;We will be discussing Virtual Private Networks and VPN Benefits.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;All my details and contact information can be found on my website, &lt;a href=&#34;https://kevtechify.com/&#34; rel=&#34;nofollow&#34;&gt;https://KevTechify.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Cisco Certified Network Associate (CCNA)&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Network Security v1 (NetSec)&lt;/p&gt;&lt;p&gt;Episode 18 - VPNs&lt;/p&gt;&lt;p&gt;Part A - VPN Overview&lt;/p&gt;&lt;p&gt;Podcast Number: 71&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Equipment I like.&lt;/p&gt;&lt;p&gt;Home Lab &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/home-lab&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/home-lab&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Networking Tools &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/networking-tools&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/networking-tools&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Studio Equipment &lt;span&gt;►► &lt;/span&gt;&lt;a href=&#34;https://kit.co/KevTechify/studio-equipment&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/studio-equipment&lt;/a&gt;&lt;/p&gt;&lt;p&gt; &lt;/p&gt;</content:encoded>
                
                <enclosure length="4753031" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/a41deafb-4035-4b26-91a4-2ed2a3a66daf/stream.mp3"/>
                
                <guid isPermaLink="false">7b9f32ac-84ed-439c-9478-78a0996a8c35</guid>
                <link>https://KevTechify.com</link>
                <pubDate>Wed, 13 Apr 2022 08:00:00 &#43;0000</pubDate>
                <itunes:duration>297</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Applications and Impacts of Cryptography - Public Key Cryptography - Network Security - CCNA - KevTechify | Podcast 70</itunes:title>
                <title>Applications and Impacts of Cryptography - Public Key Cryptography - Network Security - CCNA - KevTechify | Podcast 70</title>

                <itunes:episode>70</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>In this episode we are going to look at Applications and Impacts of Cryptography.</p><p>We will be discussing PKI Applications, Encrypted Network Transactions, and Encryption and Security Monitoring.</p><p>Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>All my details and contact information can be found on my website, <a href="https://kevtechify.com/" rel="nofollow">https://KevTechify.com</a></p><p><span>-------------------------------------------------------</span></p><p><span>Cisco Certified Network Associate (CCNA)</span></p><p>Network Security v1 (NetSec)</p><p>Episode 17 - Public Key Cryptography</p><p>Part C - Applications and Impacts of Cryptography</p><p>Podcast Number: 70</p><p><span>-------------------------------------------------------</span></p><p>Equipment I like.</p><p>Home Lab <span>►►</span> <a href="https://kit.co/KevTechify/home-lab" rel="nofollow">https://kit.co/KevTechify/home-lab</a></p><p>Networking Tools <span>►►</span> <a href="https://kit.co/KevTechify/networking-tools" rel="nofollow">https://kit.co/KevTechify/networking-tools</a></p><p>Studio Equipment <span>►► </span><a href="https://kit.co/KevTechify/studio-equipment" rel="nofollow">https://kit.co/KevTechify/studio-equipment</a></p><p> </p>]]></description>
                <content:encoded>&lt;p&gt;In this episode we are going to look at Applications and Impacts of Cryptography.&lt;/p&gt;&lt;p&gt;We will be discussing PKI Applications, Encrypted Network Transactions, and Encryption and Security Monitoring.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;All my details and contact information can be found on my website, &lt;a href=&#34;https://kevtechify.com/&#34; rel=&#34;nofollow&#34;&gt;https://KevTechify.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Cisco Certified Network Associate (CCNA)&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Network Security v1 (NetSec)&lt;/p&gt;&lt;p&gt;Episode 17 - Public Key Cryptography&lt;/p&gt;&lt;p&gt;Part C - Applications and Impacts of Cryptography&lt;/p&gt;&lt;p&gt;Podcast Number: 70&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Equipment I like.&lt;/p&gt;&lt;p&gt;Home Lab &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/home-lab&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/home-lab&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Networking Tools &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/networking-tools&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/networking-tools&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Studio Equipment &lt;span&gt;►► &lt;/span&gt;&lt;a href=&#34;https://kit.co/KevTechify/studio-equipment&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/studio-equipment&lt;/a&gt;&lt;/p&gt;&lt;p&gt; &lt;/p&gt;</content:encoded>
                
                <enclosure length="5128777" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/48965edb-eb27-47c5-9384-30e0657daa08/stream.mp3"/>
                
                <guid isPermaLink="false">79860071-a940-4a6e-959d-9b7d16bc85de</guid>
                <link>https://KevTechify.com</link>
                <pubDate>Tue, 12 Apr 2022 08:00:00 &#43;0000</pubDate>
                <itunes:duration>320</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Authorities and the PKI Trust System - Public Key Cryptography - Network Security - CCNA - KevTechify | Podcast 69</itunes:title>
                <title>Authorities and the PKI Trust System - Public Key Cryptography - Network Security - CCNA - KevTechify | Podcast 69</title>

                <itunes:episode>69</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>In this episode we are going to look at Authorities and the PKI Trust System.</p><p>We will be discussing Public Key Management, The Public Key Infrastructure, The PKI Authorities System, The PKI Trust System, Interoperability of Different PKI Vendors, Certificate Enrollment, Authentication, and Revocation, and finally Certificate Authority Stores.</p><p>Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>All my details and contact information can be found on my website, <a href="https://kevtechify.com/" rel="nofollow">https://KevTechify.com</a></p><p><span>-------------------------------------------------------</span></p><p><span>Cisco Certified Network Associate (CCNA)</span></p><p>Network Security v1 (NetSec)</p><p>Episode 17 - Public Key Cryptography</p><p>Part B - Authorities and the PKI Trust System</p><p>Podcast Number: 69</p><p><span>-------------------------------------------------------</span></p><p>Equipment I like.</p><p>Home Lab <span>►►</span> <a href="https://kit.co/KevTechify/home-lab" rel="nofollow">https://kit.co/KevTechify/home-lab</a></p><p>Networking Tools <span>►►</span> <a href="https://kit.co/KevTechify/networking-tools" rel="nofollow">https://kit.co/KevTechify/networking-tools</a></p><p>Studio Equipment <span>►► </span><a href="https://kit.co/KevTechify/studio-equipment" rel="nofollow">https://kit.co/KevTechify/studio-equipment</a></p><p> </p>]]></description>
                <content:encoded>&lt;p&gt;In this episode we are going to look at Authorities and the PKI Trust System.&lt;/p&gt;&lt;p&gt;We will be discussing Public Key Management, The Public Key Infrastructure, The PKI Authorities System, The PKI Trust System, Interoperability of Different PKI Vendors, Certificate Enrollment, Authentication, and Revocation, and finally Certificate Authority Stores.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;All my details and contact information can be found on my website, &lt;a href=&#34;https://kevtechify.com/&#34; rel=&#34;nofollow&#34;&gt;https://KevTechify.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Cisco Certified Network Associate (CCNA)&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Network Security v1 (NetSec)&lt;/p&gt;&lt;p&gt;Episode 17 - Public Key Cryptography&lt;/p&gt;&lt;p&gt;Part B - Authorities and the PKI Trust System&lt;/p&gt;&lt;p&gt;Podcast Number: 69&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Equipment I like.&lt;/p&gt;&lt;p&gt;Home Lab &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/home-lab&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/home-lab&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Networking Tools &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/networking-tools&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/networking-tools&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Studio Equipment &lt;span&gt;►► &lt;/span&gt;&lt;a href=&#34;https://kit.co/KevTechify/studio-equipment&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/studio-equipment&lt;/a&gt;&lt;/p&gt;&lt;p&gt; &lt;/p&gt;</content:encoded>
                
                <enclosure length="12384130" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/13701a33-ac3a-4c3d-a22e-6d8e82eed7a3/stream.mp3"/>
                
                <guid isPermaLink="false">bd5470f1-cfc0-476a-9d50-a435c56cb295</guid>
                <link>https://KevTechify.com</link>
                <pubDate>Mon, 11 Apr 2022 08:00:00 &#43;0000</pubDate>
                <itunes:duration>774</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Public Key Cryptography with Digital Signatures - Public Key Cryptography - Network Security - CCNA - KevTechify | Podcast 68</itunes:title>
                <title>Public Key Cryptography with Digital Signatures - Public Key Cryptography - Network Security - CCNA - KevTechify | Podcast 68</title>

                <itunes:episode>68</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>In this episode we are going to look at Public Key Cryptography with Digital Signatures.</p><p>We will be discussing Digital Signature Overview, Digital Signatures for Code Signing, and Digital Signatures for Digital Certificates.</p><p>Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>All my details and contact information can be found on my website, <a href="https://kevtechify.com/" rel="nofollow">https://KevTechify.com</a></p><p><span>-------------------------------------------------------</span></p><p><span>Cisco Certified Network Associate (CCNA)</span></p><p>Network Security v1 (NetSec)</p><p>Episode 17 - Public Key Cryptography</p><p>Part A - Public Key Cryptography with Digital Signatures</p><p>Podcast Number: 68</p><p><span>-------------------------------------------------------</span></p><p>Equipment I like.</p><p>Home Lab <span>►►</span> <a href="https://kit.co/KevTechify/home-lab" rel="nofollow">https://kit.co/KevTechify/home-lab</a></p><p>Networking Tools <span>►►</span> <a href="https://kit.co/KevTechify/networking-tools" rel="nofollow">https://kit.co/KevTechify/networking-tools</a></p><p>Studio Equipment <span>►► </span><a href="https://kit.co/KevTechify/studio-equipment" rel="nofollow">https://kit.co/KevTechify/studio-equipment</a></p><p> </p>]]></description>
                <content:encoded>&lt;p&gt;In this episode we are going to look at Public Key Cryptography with Digital Signatures.&lt;/p&gt;&lt;p&gt;We will be discussing Digital Signature Overview, Digital Signatures for Code Signing, and Digital Signatures for Digital Certificates.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;All my details and contact information can be found on my website, &lt;a href=&#34;https://kevtechify.com/&#34; rel=&#34;nofollow&#34;&gt;https://KevTechify.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Cisco Certified Network Associate (CCNA)&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Network Security v1 (NetSec)&lt;/p&gt;&lt;p&gt;Episode 17 - Public Key Cryptography&lt;/p&gt;&lt;p&gt;Part A - Public Key Cryptography with Digital Signatures&lt;/p&gt;&lt;p&gt;Podcast Number: 68&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Equipment I like.&lt;/p&gt;&lt;p&gt;Home Lab &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/home-lab&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/home-lab&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Networking Tools &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/networking-tools&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/networking-tools&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Studio Equipment &lt;span&gt;►► &lt;/span&gt;&lt;a href=&#34;https://kit.co/KevTechify/studio-equipment&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/studio-equipment&lt;/a&gt;&lt;/p&gt;&lt;p&gt; &lt;/p&gt;</content:encoded>
                
                <enclosure length="8263471" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/fbf2ecdb-bd9d-4380-8cf6-c5c23313a173/stream.mp3"/>
                
                <guid isPermaLink="false">a726a856-0e96-4bad-82c9-d2d362139a16</guid>
                <link>https://KevTechify.com</link>
                <pubDate>Sun, 10 Apr 2022 08:00:00 &#43;0000</pubDate>
                <itunes:duration>516</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Confidentiality - Basic Integrity and Authenticity - Network Security - CCNA - KevTechify | Podcast 67</itunes:title>
                <title>Confidentiality - Basic Integrity and Authenticity - Network Security - CCNA - KevTechify | Podcast 67</title>

                <itunes:episode>67</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>In this episode we are going to look at Confidentiality.</p><p>We will be discussing Data Confidentiality, Symmetric Encryption, Asymmetric Encryption, Confidentiality, Authentication, Integrity, Diffie-Hellman, Cryptography, Classify the Encryption Algorithms, and finally Encrypting and Decrypting Data Using OpenSSL.</p><p>Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>All my details and contact information can be found on my website, <a href="https://kevtechify.com/" rel="nofollow">https://KevTechify.com</a></p><p><span>-------------------------------------------------------</span></p><p><span>Cisco Certified Network Associate (CCNA)</span></p><p>Network Security v1 (NetSec)</p><p>Episode 16 - Basic Integrity and Authenticity</p><p>Part C - Confidentiality</p><p>Podcast Number: 67</p><p><span>-------------------------------------------------------</span></p><p>Equipment I like.</p><p>Home Lab <span>►►</span> <a href="https://kit.co/KevTechify/home-lab" rel="nofollow">https://kit.co/KevTechify/home-lab</a></p><p>Networking Tools <span>►►</span> <a href="https://kit.co/KevTechify/networking-tools" rel="nofollow">https://kit.co/KevTechify/networking-tools</a></p><p>Studio Equipment <span>►► </span><a href="https://kit.co/KevTechify/studio-equipment" rel="nofollow">https://kit.co/KevTechify/studio-equipment</a></p><p> </p><p> </p>]]></description>
                <content:encoded>&lt;p&gt;In this episode we are going to look at Confidentiality.&lt;/p&gt;&lt;p&gt;We will be discussing Data Confidentiality, Symmetric Encryption, Asymmetric Encryption, Confidentiality, Authentication, Integrity, Diffie-Hellman, Cryptography, Classify the Encryption Algorithms, and finally Encrypting and Decrypting Data Using OpenSSL.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;All my details and contact information can be found on my website, &lt;a href=&#34;https://kevtechify.com/&#34; rel=&#34;nofollow&#34;&gt;https://KevTechify.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Cisco Certified Network Associate (CCNA)&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Network Security v1 (NetSec)&lt;/p&gt;&lt;p&gt;Episode 16 - Basic Integrity and Authenticity&lt;/p&gt;&lt;p&gt;Part C - Confidentiality&lt;/p&gt;&lt;p&gt;Podcast Number: 67&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Equipment I like.&lt;/p&gt;&lt;p&gt;Home Lab &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/home-lab&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/home-lab&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Networking Tools &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/networking-tools&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/networking-tools&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Studio Equipment &lt;span&gt;►► &lt;/span&gt;&lt;a href=&#34;https://kit.co/KevTechify/studio-equipment&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/studio-equipment&lt;/a&gt;&lt;/p&gt;&lt;p&gt; &lt;/p&gt;&lt;p&gt; &lt;/p&gt;</content:encoded>
                
                <enclosure length="23457123" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/78baefc8-d8e1-4b72-a2f6-d9ca650b17ac/stream.mp3"/>
                
                <guid isPermaLink="false">453f4110-b228-4855-8851-e386bb3233ca</guid>
                <link>https://KevTechify.com</link>
                <pubDate>Sat, 09 Apr 2022 08:00:00 &#43;0000</pubDate>
                <itunes:duration>1466</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Key Management - Basic Integrity and Authenticity - Network Security - CCNA - KevTechify | Podcast 66</itunes:title>
                <title>Key Management - Basic Integrity and Authenticity - Network Security - CCNA - KevTechify | Podcast 66</title>

                <itunes:episode>66</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>In this episode we are going to look at Key Management.</p><p>We will be discussing Characteristics of Key Management, Key Length and Keyspace, the Keyspace, Types of Cryptographic Keys, and Choice of Cryptographic Keys.</p><p>Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>All my details and contact information can be found on my website, <a href="https://kevtechify.com/" rel="nofollow">https://KevTechify.com</a></p><p><span>-------------------------------------------------------</span></p><p><span>Cisco Certified Network Associate (CCNA)</span></p><p>Network Security v1 (NetSec)</p><p>Episode 16 - Basic Integrity and Authenticity</p><p>Part B - Key Management</p><p>Podcast Number: 66</p><p><span>-------------------------------------------------------</span></p><p>Equipment I like.</p><p>Home Lab <span>►►</span> <a href="https://kit.co/KevTechify/home-lab" rel="nofollow">https://kit.co/KevTechify/home-lab</a></p><p>Networking Tools <span>►►</span> <a href="https://kit.co/KevTechify/networking-tools" rel="nofollow">https://kit.co/KevTechify/networking-tools</a></p><p>Studio Equipment <span>►► </span><a href="https://kit.co/KevTechify/studio-equipment" rel="nofollow">https://kit.co/KevTechify/studio-equipment</a></p><p> </p><p> </p>]]></description>
                <content:encoded>&lt;p&gt;In this episode we are going to look at Key Management.&lt;/p&gt;&lt;p&gt;We will be discussing Characteristics of Key Management, Key Length and Keyspace, the Keyspace, Types of Cryptographic Keys, and Choice of Cryptographic Keys.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;All my details and contact information can be found on my website, &lt;a href=&#34;https://kevtechify.com/&#34; rel=&#34;nofollow&#34;&gt;https://KevTechify.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Cisco Certified Network Associate (CCNA)&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Network Security v1 (NetSec)&lt;/p&gt;&lt;p&gt;Episode 16 - Basic Integrity and Authenticity&lt;/p&gt;&lt;p&gt;Part B - Key Management&lt;/p&gt;&lt;p&gt;Podcast Number: 66&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Equipment I like.&lt;/p&gt;&lt;p&gt;Home Lab &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/home-lab&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/home-lab&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Networking Tools &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/networking-tools&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/networking-tools&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Studio Equipment &lt;span&gt;►► &lt;/span&gt;&lt;a href=&#34;https://kit.co/KevTechify/studio-equipment&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/studio-equipment&lt;/a&gt;&lt;/p&gt;&lt;p&gt; &lt;/p&gt;&lt;p&gt; &lt;/p&gt;</content:encoded>
                
                <enclosure length="12000862" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/af849795-812f-430f-bc16-d0aebd690b9f/stream.mp3"/>
                
                <guid isPermaLink="false">3a0d7bc1-bdfb-4101-b05a-0df8160cdd81</guid>
                <link>https://KevTechify.com</link>
                <pubDate>Fri, 08 Apr 2022 08:00:00 &#43;0000</pubDate>
                <itunes:duration>750</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Integrity and Authenticity - Basic Integrity and Authenticity - Network Security - CCNA - KevTechify | Podcast 65</itunes:title>
                <title>Integrity and Authenticity - Basic Integrity and Authenticity - Network Security - CCNA - KevTechify | Podcast 65</title>

                <itunes:episode>65</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>In this episode we are going to look at Integrity and Authenticity.</p><p>We will be discussing Secure Communications, Cryptographic Hash Functions, Cryptographic Hash Operation, MD5 and SHA, and Origin Authentication.</p><p>Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>All my details and contact information can be found on my website, <a href="https://kevtechify.com/" rel="nofollow">https://KevTechify.com</a></p><p><span>-------------------------------------------------------</span></p><p><span>Cisco Certified Network Associate (CCNA)</span></p><p>Network Security v1 (NetSec)</p><p>Episode 16 - Basic Integrity and Authenticity</p><p>Part A - Integrity and Authenticity</p><p>Podcast Number: 65</p><p><span>-------------------------------------------------------</span></p><p>Equipment I like.</p><p>Home Lab <span>►►</span> <a href="https://kit.co/KevTechify/home-lab" rel="nofollow">https://kit.co/KevTechify/home-lab</a></p><p>Networking Tools <span>►►</span> <a href="https://kit.co/KevTechify/networking-tools" rel="nofollow">https://kit.co/KevTechify/networking-tools</a></p><p>Studio Equipment <span>►► </span><a href="https://kit.co/KevTechify/studio-equipment" rel="nofollow">https://kit.co/KevTechify/studio-equipment</a></p><p> </p><p> </p>]]></description>
                <content:encoded>&lt;p&gt;In this episode we are going to look at Integrity and Authenticity.&lt;/p&gt;&lt;p&gt;We will be discussing Secure Communications, Cryptographic Hash Functions, Cryptographic Hash Operation, MD5 and SHA, and Origin Authentication.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;All my details and contact information can be found on my website, &lt;a href=&#34;https://kevtechify.com/&#34; rel=&#34;nofollow&#34;&gt;https://KevTechify.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Cisco Certified Network Associate (CCNA)&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Network Security v1 (NetSec)&lt;/p&gt;&lt;p&gt;Episode 16 - Basic Integrity and Authenticity&lt;/p&gt;&lt;p&gt;Part A - Integrity and Authenticity&lt;/p&gt;&lt;p&gt;Podcast Number: 65&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Equipment I like.&lt;/p&gt;&lt;p&gt;Home Lab &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/home-lab&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/home-lab&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Networking Tools &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/networking-tools&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/networking-tools&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Studio Equipment &lt;span&gt;►► &lt;/span&gt;&lt;a href=&#34;https://kit.co/KevTechify/studio-equipment&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/studio-equipment&lt;/a&gt;&lt;/p&gt;&lt;p&gt; &lt;/p&gt;&lt;p&gt; &lt;/p&gt;</content:encoded>
                
                <enclosure length="11598785" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/5801e6ed-4e2a-469c-8ec0-83ca0218566b/stream.mp3"/>
                
                <guid isPermaLink="false">6aa14c11-4f99-4dd7-96d0-2a28141f8082</guid>
                <link>https://KevTechify.com</link>
                <pubDate>Thu, 07 Apr 2022 08:00:00 &#43;0000</pubDate>
                <itunes:duration>724</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Cryptology - Cryptographic Services - Network Security - CCNA - KevTechify | Podcast 64</itunes:title>
                <title>Cryptology - Cryptographic Services - Network Security - CCNA - KevTechify | Podcast 64</title>

                <itunes:episode>64</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>In this episode we are going to look at Cryptology.</p><p>We will be discussing Making and Breaking Secret Codes, Cryptanalysts, The Secret is in the Keys, Cryptology Terminology, and Explore Encryption Methods.</p><p>Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>All my details and contact information can be found on my website, <a href="https://kevtechify.com/" rel="nofollow">https://KevTechify.com</a></p><p><span>-------------------------------------------------------</span></p><p><span>Cisco Certified Network Associate (CCNA)</span></p><p>Network Security v1 (NetSec)</p><p>Episode 15 - Cryptographic Services</p><p>Part D - Cryptology</p><p>Podcast Number: 64</p><p><span>-------------------------------------------------------</span></p><p>Equipment I like.</p><p>Home Lab <span>►►</span> <a href="https://kit.co/KevTechify/home-lab" rel="nofollow">https://kit.co/KevTechify/home-lab</a></p><p>Networking Tools <span>►►</span> <a href="https://kit.co/KevTechify/networking-tools" rel="nofollow">https://kit.co/KevTechify/networking-tools</a></p><p>Studio Equipment <span>►► </span><a href="https://kit.co/KevTechify/studio-equipment" rel="nofollow">https://kit.co/KevTechify/studio-equipment</a></p><p> </p><p> </p>]]></description>
                <content:encoded>&lt;p&gt;In this episode we are going to look at Cryptology.&lt;/p&gt;&lt;p&gt;We will be discussing Making and Breaking Secret Codes, Cryptanalysts, The Secret is in the Keys, Cryptology Terminology, and Explore Encryption Methods.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;All my details and contact information can be found on my website, &lt;a href=&#34;https://kevtechify.com/&#34; rel=&#34;nofollow&#34;&gt;https://KevTechify.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Cisco Certified Network Associate (CCNA)&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Network Security v1 (NetSec)&lt;/p&gt;&lt;p&gt;Episode 15 - Cryptographic Services&lt;/p&gt;&lt;p&gt;Part D - Cryptology&lt;/p&gt;&lt;p&gt;Podcast Number: 64&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Equipment I like.&lt;/p&gt;&lt;p&gt;Home Lab &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/home-lab&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/home-lab&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Networking Tools &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/networking-tools&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/networking-tools&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Studio Equipment &lt;span&gt;►► &lt;/span&gt;&lt;a href=&#34;https://kit.co/KevTechify/studio-equipment&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/studio-equipment&lt;/a&gt;&lt;/p&gt;&lt;p&gt; &lt;/p&gt;&lt;p&gt; &lt;/p&gt;</content:encoded>
                
                <enclosure length="5279660" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/1547c7ea-1235-429c-92c3-00dde1e7db6a/stream.mp3"/>
                
                <guid isPermaLink="false">3004ce26-eea1-4437-9d75-c594529cdd97</guid>
                <link>https://KevTechify.com</link>
                <pubDate>Wed, 06 Apr 2022 08:00:00 &#43;0000</pubDate>
                <itunes:duration>329</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Cryptanalysis - Cryptographic Services - Network Security - CCNA - KevTechify | Podcast 63</itunes:title>
                <title>Cryptanalysis - Cryptographic Services - Network Security - CCNA - KevTechify | Podcast 63</title>

                <itunes:episode>63</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>In this episode we are going to look at Cryptanalysis.</p><p>We will be discussing Cracking Code, Methods of Cracking Code, and a Cracking Code Example.</p><p>Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>All my details and contact information can be found on my website, <a href="https://kevtechify.com/" rel="nofollow">https://KevTechify.com</a></p><p><span>-------------------------------------------------------</span></p><p><span>Cisco Certified Network Associate (CCNA)</span></p><p>Network Security v1 (NetSec)</p><p>Episode 15 - Cryptographic Services</p><p>Part C - Cryptanalysis</p><p>Podcast Number: 63</p><p><span>-------------------------------------------------------</span></p><p>Equipment I like.</p><p>Home Lab <span>►►</span> <a href="https://kit.co/KevTechify/home-lab" rel="nofollow">https://kit.co/KevTechify/home-lab</a></p><p>Networking Tools <span>►►</span> <a href="https://kit.co/KevTechify/networking-tools" rel="nofollow">https://kit.co/KevTechify/networking-tools</a></p><p>Studio Equipment <span>►► </span><a href="https://kit.co/KevTechify/studio-equipment" rel="nofollow">https://kit.co/KevTechify/studio-equipment</a></p><p> </p><p> </p>]]></description>
                <content:encoded>&lt;p&gt;In this episode we are going to look at Cryptanalysis.&lt;/p&gt;&lt;p&gt;We will be discussing Cracking Code, Methods of Cracking Code, and a Cracking Code Example.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;All my details and contact information can be found on my website, &lt;a href=&#34;https://kevtechify.com/&#34; rel=&#34;nofollow&#34;&gt;https://KevTechify.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Cisco Certified Network Associate (CCNA)&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Network Security v1 (NetSec)&lt;/p&gt;&lt;p&gt;Episode 15 - Cryptographic Services&lt;/p&gt;&lt;p&gt;Part C - Cryptanalysis&lt;/p&gt;&lt;p&gt;Podcast Number: 63&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Equipment I like.&lt;/p&gt;&lt;p&gt;Home Lab &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/home-lab&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/home-lab&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Networking Tools &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/networking-tools&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/networking-tools&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Studio Equipment &lt;span&gt;►► &lt;/span&gt;&lt;a href=&#34;https://kit.co/KevTechify/studio-equipment&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/studio-equipment&lt;/a&gt;&lt;/p&gt;&lt;p&gt; &lt;/p&gt;&lt;p&gt; &lt;/p&gt;</content:encoded>
                
                <enclosure length="5799601" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/e4c03909-fa92-4a42-a593-fcf198aa552d/stream.mp3"/>
                
                <guid isPermaLink="false">52e35ad5-6149-422d-a266-26597ac353cd</guid>
                <link>https://KevTechify.com</link>
                <pubDate>Tue, 05 Apr 2022 20:00:00 &#43;0000</pubDate>
                <itunes:duration>362</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Cryptography - Cryptographic Services - Network Security - CCNA - KevTechify | Podcast 62</itunes:title>
                <title>Cryptography - Cryptographic Services - Network Security - CCNA - KevTechify | Podcast 62</title>

                <itunes:episode>62</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>In this episode we are going to look at Cryptography.</p><p>We will be discussing Creating Cipher Text, Transposition Ciphers, Substitution Ciphers, A More Complex Substitution Cipher, and One-Time Pad Ciphers.</p><p>Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>All my details and contact information can be found on my website, <a href="https://kevtechify.com/" rel="nofollow">https://KevTechify.com</a></p><p><span>-------------------------------------------------------</span></p><p><span>Cisco Certified Network Associate (CCNA)</span></p><p>Network Security v1 (NetSec)</p><p>Episode 15 - Cryptographic Services</p><p>Part B - Cryptography</p><p>Podcast Number: 62</p><p><span>-------------------------------------------------------</span></p><p>Equipment I like.</p><p>Home Lab <span>►►</span> <a href="https://kit.co/KevTechify/home-lab" rel="nofollow">https://kit.co/KevTechify/home-lab</a></p><p>Networking Tools <span>►►</span> <a href="https://kit.co/KevTechify/networking-tools" rel="nofollow">https://kit.co/KevTechify/networking-tools</a></p><p>Studio Equipment <span>►► </span><a href="https://kit.co/KevTechify/studio-equipment" rel="nofollow">https://kit.co/KevTechify/studio-equipment</a></p><p> </p><p> </p>]]></description>
                <content:encoded>&lt;p&gt;In this episode we are going to look at Cryptography.&lt;/p&gt;&lt;p&gt;We will be discussing Creating Cipher Text, Transposition Ciphers, Substitution Ciphers, A More Complex Substitution Cipher, and One-Time Pad Ciphers.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;All my details and contact information can be found on my website, &lt;a href=&#34;https://kevtechify.com/&#34; rel=&#34;nofollow&#34;&gt;https://KevTechify.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Cisco Certified Network Associate (CCNA)&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Network Security v1 (NetSec)&lt;/p&gt;&lt;p&gt;Episode 15 - Cryptographic Services&lt;/p&gt;&lt;p&gt;Part B - Cryptography&lt;/p&gt;&lt;p&gt;Podcast Number: 62&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Equipment I like.&lt;/p&gt;&lt;p&gt;Home Lab &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/home-lab&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/home-lab&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Networking Tools &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/networking-tools&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/networking-tools&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Studio Equipment &lt;span&gt;►► &lt;/span&gt;&lt;a href=&#34;https://kit.co/KevTechify/studio-equipment&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/studio-equipment&lt;/a&gt;&lt;/p&gt;&lt;p&gt; &lt;/p&gt;&lt;p&gt; &lt;/p&gt;</content:encoded>
                
                <enclosure length="10364969" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/30e86bca-d09c-42ff-a173-e8f2b171e312/stream.mp3"/>
                
                <guid isPermaLink="false">3deec151-dc7f-425d-8ef1-ccf3df0b8fe6</guid>
                <link>https://KevTechify.com</link>
                <pubDate>Mon, 04 Apr 2022 08:00:00 &#43;0000</pubDate>
                <itunes:duration>647</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Secure Communications - Cryptographic Services - Network Security - CCNA - KevTechify | Podcast 61</itunes:title>
                <title>Secure Communications - Cryptographic Services - Network Security - CCNA - KevTechify | Podcast 61</title>

                <itunes:episode>61</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>In this episode we are going to look at Secure Communications.</p><p>We will be discussing Authentication, Integrity, and Confidentiality, Authentication, Data Integrity, and Data Confidentiality.</p><p>Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>All my details and contact information can be found on my website, <a href="https://kevtechify.com/" rel="nofollow">https://KevTechify.com</a></p><p><span>-------------------------------------------------------</span></p><p><span>Cisco Certified Network Associate (CCNA)</span></p><p>Network Security v1 (NetSec)</p><p>Episode 15 - Cryptographic Services</p><p>Part A - Secure Communications</p><p>Podcast Number: 61</p><p><span>-------------------------------------------------------</span></p><p>Equipment I like.</p><p>Home Lab <span>►►</span> <a href="https://kit.co/KevTechify/home-lab" rel="nofollow">https://kit.co/KevTechify/home-lab</a></p><p>Networking Tools <span>►►</span> <a href="https://kit.co/KevTechify/networking-tools" rel="nofollow">https://kit.co/KevTechify/networking-tools</a></p><p>Studio Equipment <span>►► </span><a href="https://kit.co/KevTechify/studio-equipment" rel="nofollow">https://kit.co/KevTechify/studio-equipment</a></p><p> </p><p> </p>]]></description>
                <content:encoded>&lt;p&gt;In this episode we are going to look at Secure Communications.&lt;/p&gt;&lt;p&gt;We will be discussing Authentication, Integrity, and Confidentiality, Authentication, Data Integrity, and Data Confidentiality.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security for the Cisco Certified Network Associate (CCNA).&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;All my details and contact information can be found on my website, &lt;a href=&#34;https://kevtechify.com/&#34; rel=&#34;nofollow&#34;&gt;https://KevTechify.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Cisco Certified Network Associate (CCNA)&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Network Security v1 (NetSec)&lt;/p&gt;&lt;p&gt;Episode 15 - Cryptographic Services&lt;/p&gt;&lt;p&gt;Part A - Secure Communications&lt;/p&gt;&lt;p&gt;Podcast Number: 61&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Equipment I like.&lt;/p&gt;&lt;p&gt;Home Lab &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/home-lab&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/home-lab&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Networking Tools &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/networking-tools&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/networking-tools&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Studio Equipment &lt;span&gt;►► &lt;/span&gt;&lt;a href=&#34;https://kit.co/KevTechify/studio-equipment&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/studio-equipment&lt;/a&gt;&lt;/p&gt;&lt;p&gt; &lt;/p&gt;&lt;p&gt; &lt;/p&gt;</content:encoded>
                
                <enclosure length="5898657" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/5d9841a7-c0bf-47f9-aa7b-e0f18b3d577c/stream.mp3"/>
                
                <guid isPermaLink="false">92e1ab81-67a8-4cf0-9d03-a535a9985a70</guid>
                <link>https://KevTechify.com</link>
                <pubDate>Sun, 03 Apr 2022 08:00:00 &#43;0000</pubDate>
                <itunes:duration>368</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Mitigate Spanning Tree Protocol (STP) Attacks - Layer 2 Security Considerations - Network Security - KevTechify | Podcast 60</itunes:title>
                <title>Mitigate Spanning Tree Protocol (STP) Attacks - Layer 2 Security Considerations - Network Security - KevTechify | Podcast 60</title>

                <itunes:episode>60</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>In this episode we are going to look at Mitigate Spanning Tree Protocol (STP) Attacks.</p><p>We will be discussing Spanning Tree Protocol (STP) Attack, Mitigating STP Attacks, Configure PortFast, Configure BPDU Guard, Configure Root Guard, Configure Loop Guard, Configure STP Security, Implement STP Security, and Layer 2 VLAN Security.</p><p>Thank you so much for listening to this episode of my series on Network Security.</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>All my details and contact information can be found on my website, <a href="https://kevtechify.com/" rel="nofollow">https://KevTechify.com</a></p><p>-------------------------------------------------------</p><p>Network Security v1</p><p>Episode 14 - Layer 2 Security Considerations</p><p>Part I - Mitigate STP Attacks</p><p>Podcast Number: 60</p><p>-------------------------------------------------------</p><p>Equipment I like.</p><p>Home Lab ►► <a href="https://kit.co/KevTechify/home-lab" rel="nofollow">https://kit.co/KevTechify/home-lab</a></p><p>Networking Tools ►► <a href="https://kit.co/KevTechify/networking-tools" rel="nofollow">https://kit.co/KevTechify/networking-tools</a></p><p>Studio Equipment ►► <a href="https://kit.co/KevTechify/studio-equipment" rel="nofollow">https://kit.co/KevTechify/studio-equipment</a></p><p> </p>]]></description>
                <content:encoded>&lt;p&gt;In this episode we are going to look at Mitigate Spanning Tree Protocol (STP) Attacks.&lt;/p&gt;&lt;p&gt;We will be discussing Spanning Tree Protocol (STP) Attack, Mitigating STP Attacks, Configure PortFast, Configure BPDU Guard, Configure Root Guard, Configure Loop Guard, Configure STP Security, Implement STP Security, and Layer 2 VLAN Security.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security.&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;All my details and contact information can be found on my website, &lt;a href=&#34;https://kevtechify.com/&#34; rel=&#34;nofollow&#34;&gt;https://KevTechify.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;-------------------------------------------------------&lt;/p&gt;&lt;p&gt;Network Security v1&lt;/p&gt;&lt;p&gt;Episode 14 - Layer 2 Security Considerations&lt;/p&gt;&lt;p&gt;Part I - Mitigate STP Attacks&lt;/p&gt;&lt;p&gt;Podcast Number: 60&lt;/p&gt;&lt;p&gt;-------------------------------------------------------&lt;/p&gt;&lt;p&gt;Equipment I like.&lt;/p&gt;&lt;p&gt;Home Lab ►► &lt;a href=&#34;https://kit.co/KevTechify/home-lab&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/home-lab&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Networking Tools ►► &lt;a href=&#34;https://kit.co/KevTechify/networking-tools&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/networking-tools&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Studio Equipment ►► &lt;a href=&#34;https://kit.co/KevTechify/studio-equipment&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/studio-equipment&lt;/a&gt;&lt;/p&gt;&lt;p&gt; &lt;/p&gt;</content:encoded>
                
                <enclosure length="8344137" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/46e6032b-79fe-46e4-b6f0-b343e0d81166/stream.mp3"/>
                
                <guid isPermaLink="false">c13a76d3-b630-430b-bb02-3a35cbeb9c3c</guid>
                <link>https://KevTechify.com</link>
                <pubDate>Sat, 02 Apr 2022 08:00:00 &#43;0000</pubDate>
                <itunes:duration>521</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Spanning Tree Protocol (STP) - Layer 2 Security Considerations - Network Security - KevTechify | Podcast 59</itunes:title>
                <title>Spanning Tree Protocol (STP) - Layer 2 Security Considerations - Network Security - KevTechify | Podcast 59</title>

                <itunes:episode>59</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>In this episode we are going to look at Spanning Tree Protocol (STP).</p><p>We will be discussing Spanning Tree Protocol (STP), STP Recalculation, Layer 2 Loops, STP Port Roles, STP Root Bridge, STP Path Cost, Select the Root Bridge, Observe STP Operation, and Investigate STP Loop Prevention.</p><p>Thank you so much for listening to this episode of my series on Network Security.</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>All my details and contact information can be found on my website, <a href="https://kevtechify.com/" rel="nofollow">https://KevTechify.com</a></p><p>-------------------------------------------------------</p><p>Network Security v1</p><p>Episode 14 - Layer 2 Security Considerations</p><p>Part H - Spanning Tree Protocol</p><p>Podcast Number: 59</p><p>-------------------------------------------------------</p><p>Equipment I like.</p><p>Home Lab ►► <a href="https://kit.co/KevTechify/home-lab" rel="nofollow">https://kit.co/KevTechify/home-lab</a></p><p>Networking Tools ►► <a href="https://kit.co/KevTechify/networking-tools" rel="nofollow">https://kit.co/KevTechify/networking-tools</a></p><p>Studio Equipment ►► <a href="https://kit.co/KevTechify/studio-equipment" rel="nofollow">https://kit.co/KevTechify/studio-equipment</a></p><p> </p>]]></description>
                <content:encoded>&lt;p&gt;In this episode we are going to look at Spanning Tree Protocol (STP).&lt;/p&gt;&lt;p&gt;We will be discussing Spanning Tree Protocol (STP), STP Recalculation, Layer 2 Loops, STP Port Roles, STP Root Bridge, STP Path Cost, Select the Root Bridge, Observe STP Operation, and Investigate STP Loop Prevention.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security.&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;All my details and contact information can be found on my website, &lt;a href=&#34;https://kevtechify.com/&#34; rel=&#34;nofollow&#34;&gt;https://KevTechify.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;-------------------------------------------------------&lt;/p&gt;&lt;p&gt;Network Security v1&lt;/p&gt;&lt;p&gt;Episode 14 - Layer 2 Security Considerations&lt;/p&gt;&lt;p&gt;Part H - Spanning Tree Protocol&lt;/p&gt;&lt;p&gt;Podcast Number: 59&lt;/p&gt;&lt;p&gt;-------------------------------------------------------&lt;/p&gt;&lt;p&gt;Equipment I like.&lt;/p&gt;&lt;p&gt;Home Lab ►► &lt;a href=&#34;https://kit.co/KevTechify/home-lab&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/home-lab&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Networking Tools ►► &lt;a href=&#34;https://kit.co/KevTechify/networking-tools&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/networking-tools&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Studio Equipment ►► &lt;a href=&#34;https://kit.co/KevTechify/studio-equipment&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/studio-equipment&lt;/a&gt;&lt;/p&gt;&lt;p&gt; &lt;/p&gt;</content:encoded>
                
                <enclosure length="12534595" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/451e147c-f5aa-45a6-b30c-949edd62dec5/stream.mp3"/>
                
                <guid isPermaLink="false">3e492ccb-3d05-47a4-bfdf-35bd402ad9e7</guid>
                <link>https://KevTechify.com</link>
                <pubDate>Fri, 01 Apr 2022 08:00:00 &#43;0000</pubDate>
                <itunes:duration>783</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Mitigate Address Spoofing Attacks - Layer 2 Security Considerations - Network Security - KevTechify | Podcast 58</itunes:title>
                <title>Mitigate Address Spoofing Attacks - Layer 2 Security Considerations - Network Security - KevTechify | Podcast 58</title>

                <itunes:episode>58</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>In this episode we are going to look at Mitigate Address Spoofing Attacks.</p><p>We will be discussing Address Spoofing Attacks, Address Spoofing Attack Mitigation, and Configure IP Source Guard.</p><p>Thank you so much for listening to this episode of my series on Network Security.</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>All my details and contact information can be found on my website, <a href="https://kevtechify.com/" rel="nofollow">https://KevTechify.com</a></p><p><span>-------------------------------------------------------</span></p><p>Network Security v1</p><p>Episode 14 - Layer 2 Security Considerations</p><p>Part G - Mitigate Address Spoofing Attacks</p><p>Podcast Number: 58</p><p><span>-------------------------------------------------------</span></p><p>Equipment I like.</p><p>Home Lab <span>►►</span> <a href="https://kit.co/KevTechify/home-lab" rel="nofollow">https://kit.co/KevTechify/home-lab</a></p><p>Networking Tools <span>►►</span> <a href="https://kit.co/KevTechify/networking-tools" rel="nofollow">https://kit.co/KevTechify/networking-tools</a></p><p>Studio Equipment <span>►► </span><a href="https://kit.co/KevTechify/studio-equipment" rel="nofollow">https://kit.co/KevTechify/studio-equipment</a></p><p> </p>]]></description>
                <content:encoded>&lt;p&gt;In this episode we are going to look at Mitigate Address Spoofing Attacks.&lt;/p&gt;&lt;p&gt;We will be discussing Address Spoofing Attacks, Address Spoofing Attack Mitigation, and Configure IP Source Guard.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security.&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;All my details and contact information can be found on my website, &lt;a href=&#34;https://kevtechify.com/&#34; rel=&#34;nofollow&#34;&gt;https://KevTechify.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Network Security v1&lt;/p&gt;&lt;p&gt;Episode 14 - Layer 2 Security Considerations&lt;/p&gt;&lt;p&gt;Part G - Mitigate Address Spoofing Attacks&lt;/p&gt;&lt;p&gt;Podcast Number: 58&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Equipment I like.&lt;/p&gt;&lt;p&gt;Home Lab &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/home-lab&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/home-lab&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Networking Tools &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/networking-tools&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/networking-tools&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Studio Equipment &lt;span&gt;►► &lt;/span&gt;&lt;a href=&#34;https://kit.co/KevTechify/studio-equipment&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/studio-equipment&lt;/a&gt;&lt;/p&gt;&lt;p&gt; &lt;/p&gt;</content:encoded>
                
                <enclosure length="5586860" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/b5731c3b-bdcd-44bb-8ff9-3c654e19c07c/stream.mp3"/>
                
                <guid isPermaLink="false">d32e3ea6-cece-4468-9a26-059adef01177</guid>
                <link>https://KevTechify.com</link>
                <pubDate>Thu, 31 Mar 2022 08:00:00 &#43;0000</pubDate>
                <itunes:duration>349</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Mitigate Address Resolution Protocol (ARP) Attacks - Layer 2 Security Considerations - Network Security - KevTechify | Podcast 57</itunes:title>
                <title>Mitigate Address Resolution Protocol (ARP) Attacks - Layer 2 Security Considerations - Network Security - KevTechify | Podcast 57</title>

                <itunes:episode>57</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>In this episode we are going to look at Mitigate Address Resolution Protocol (ARP) Attacks.</p><p>We will be discussing Address Resolution Protocol (ARP) Attacks, ARP Spoofing, Dynamic ARP Inspection, Dynamic ARP Inspection (DAI) Implementation Guidelines, and an DAI Configuration Example.</p><p>Thank you so much for listening to this episode of my series on Network Security.</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>All my details and contact information can be found on my website, <a href="https://kevtechify.com/" rel="nofollow">https://KevTechify.com</a></p><p><span>-------------------------------------------------------</span></p><p>Network Security v1</p><p>Episode 14 - Layer 2 Security Considerations</p><p>Part F - Mitigate ARP Attacks</p><p>Podcast Number: 57</p><p><span>-------------------------------------------------------</span></p><p>Equipment I like.</p><p>Home Lab <span>►►</span> <a href="https://kit.co/KevTechify/home-lab" rel="nofollow">https://kit.co/KevTechify/home-lab</a></p><p>Networking Tools <span>►►</span> <a href="https://kit.co/KevTechify/networking-tools" rel="nofollow">https://kit.co/KevTechify/networking-tools</a></p><p>Studio Equipment <span>►► </span><a href="https://kit.co/KevTechify/studio-equipment" rel="nofollow">https://kit.co/KevTechify/studio-equipment</a></p><p> </p>]]></description>
                <content:encoded>&lt;p&gt;In this episode we are going to look at Mitigate Address Resolution Protocol (ARP) Attacks.&lt;/p&gt;&lt;p&gt;We will be discussing Address Resolution Protocol (ARP) Attacks, ARP Spoofing, Dynamic ARP Inspection, Dynamic ARP Inspection (DAI) Implementation Guidelines, and an DAI Configuration Example.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security.&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;All my details and contact information can be found on my website, &lt;a href=&#34;https://kevtechify.com/&#34; rel=&#34;nofollow&#34;&gt;https://KevTechify.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Network Security v1&lt;/p&gt;&lt;p&gt;Episode 14 - Layer 2 Security Considerations&lt;/p&gt;&lt;p&gt;Part F - Mitigate ARP Attacks&lt;/p&gt;&lt;p&gt;Podcast Number: 57&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Equipment I like.&lt;/p&gt;&lt;p&gt;Home Lab &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/home-lab&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/home-lab&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Networking Tools &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/networking-tools&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/networking-tools&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Studio Equipment &lt;span&gt;►► &lt;/span&gt;&lt;a href=&#34;https://kit.co/KevTechify/studio-equipment&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/studio-equipment&lt;/a&gt;&lt;/p&gt;&lt;p&gt; &lt;/p&gt;</content:encoded>
                
                <enclosure length="7385338" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/9b6642df-2349-4ae1-a180-87cfe1eabc7b/stream.mp3"/>
                
                <guid isPermaLink="false">b8fad8c8-aba0-4a18-a714-0c77367b082b</guid>
                <link>https://KevTechify.com</link>
                <pubDate>Wed, 30 Mar 2022 08:00:00 &#43;0000</pubDate>
                <itunes:duration>461</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Mitigate Dynamic Host Configuration Protocol (DHCP) Attacks - Layer 2 Security Considerations - Network Security - KevTechify | Podcast 56</itunes:title>
                <title>Mitigate Dynamic Host Configuration Protocol (DHCP) Attacks - Layer 2 Security Considerations - Network Security - KevTechify | Podcast 56</title>

                <itunes:episode>56</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>In this episode we are going to look at Mitigate Dynamic Host Configuration Protocol (DHCP) Attacks.</p><p>We will be discussing DHCP Attacks, DHCP Attacks Mitigation, Steps to Implement DHCP Snooping, and an DHCP Snooping Configuration Example.</p><p>Thank you so much for listening to this episode of my series on Network Security.</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>All my details and contact information can be found on my website, <a href="https://kevtechify.com/" rel="nofollow">https://KevTechify.com</a></p><p><span>-------------------------------------------------------</span></p><p>Network Security v1</p><p>Episode 14 - Layer 2 Security Considerations</p><p>Part E - Mitigate DHCP Attacks</p><p>Podcast Number: 56</p><p><span>-------------------------------------------------------</span></p><p>Equipment I like.</p><p>Home Lab <span>►►</span> <a href="https://kit.co/KevTechify/home-lab" rel="nofollow">https://kit.co/KevTechify/home-lab</a></p><p>Networking Tools <span>►►</span> <a href="https://kit.co/KevTechify/networking-tools" rel="nofollow">https://kit.co/KevTechify/networking-tools</a></p><p>Studio Equipment <span>►► </span><a href="https://kit.co/KevTechify/studio-equipment" rel="nofollow">https://kit.co/KevTechify/studio-equipment</a></p><p> </p>]]></description>
                <content:encoded>&lt;p&gt;In this episode we are going to look at Mitigate Dynamic Host Configuration Protocol (DHCP) Attacks.&lt;/p&gt;&lt;p&gt;We will be discussing DHCP Attacks, DHCP Attacks Mitigation, Steps to Implement DHCP Snooping, and an DHCP Snooping Configuration Example.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security.&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;All my details and contact information can be found on my website, &lt;a href=&#34;https://kevtechify.com/&#34; rel=&#34;nofollow&#34;&gt;https://KevTechify.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Network Security v1&lt;/p&gt;&lt;p&gt;Episode 14 - Layer 2 Security Considerations&lt;/p&gt;&lt;p&gt;Part E - Mitigate DHCP Attacks&lt;/p&gt;&lt;p&gt;Podcast Number: 56&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Equipment I like.&lt;/p&gt;&lt;p&gt;Home Lab &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/home-lab&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/home-lab&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Networking Tools &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/networking-tools&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/networking-tools&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Studio Equipment &lt;span&gt;►► &lt;/span&gt;&lt;a href=&#34;https://kit.co/KevTechify/studio-equipment&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/studio-equipment&lt;/a&gt;&lt;/p&gt;&lt;p&gt; &lt;/p&gt;</content:encoded>
                
                <enclosure length="7989289" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/df05deec-bf63-4e68-8375-442477deec4e/stream.mp3"/>
                
                <guid isPermaLink="false">30613368-5ea0-446c-8d29-0964deabe381</guid>
                <link>https://KevTechify.com</link>
                <pubDate>Tue, 29 Mar 2022 08:00:00 &#43;0000</pubDate>
                <itunes:duration>499</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Mitigate Virtual LAN (VLAN) Attacks - Layer 2 Security Considerations - Network Security - KevTechify | Podcast 55</itunes:title>
                <title>Mitigate Virtual LAN (VLAN) Attacks - Layer 2 Security Considerations - Network Security - KevTechify | Podcast 55</title>

                <itunes:episode>55</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>In this episode we are going to look at Mitigate VLAN Attacks.</p><p>We will be discussing VLAN Hopping Attacks, VLAN Double-Tagging Attack, Mitigating VLAN Hopping Attacks, Syntax Checker - Mitigate VLAN Hopping Attacks, Private VLANs, Private Virtual LAN (PVLAN) Edge Feature, Configure PVLAN Edge, and Private VLAN Tutorial and Demonstration.</p><p>Thank you so much for listening to this episode of my series on Network Security.</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>All my details and contact information can be found on my website, <a href="https://kevtechify.com/" rel="nofollow">https://KevTechify.com</a></p><p><span>-------------------------------------------------------</span></p><p>Network Security v1</p><p>Episode 14 - Layer 2 Security Considerations</p><p>Part D - Mitigate VLAN Attacks</p><p>Podcast Number: 55</p><p><span>-------------------------------------------------------</span></p><p>Equipment I like.</p><p>Home Lab <span>►►</span> <a href="https://kit.co/KevTechify/home-lab" rel="nofollow">https://kit.co/KevTechify/home-lab</a></p><p>Networking Tools <span>►►</span> <a href="https://kit.co/KevTechify/networking-tools" rel="nofollow">https://kit.co/KevTechify/networking-tools</a></p><p>Studio Equipment <span>►► </span><a href="https://kit.co/KevTechify/studio-equipment" rel="nofollow">https://kit.co/KevTechify/studio-equipment</a></p><p> </p>]]></description>
                <content:encoded>&lt;p&gt;In this episode we are going to look at Mitigate VLAN Attacks.&lt;/p&gt;&lt;p&gt;We will be discussing VLAN Hopping Attacks, VLAN Double-Tagging Attack, Mitigating VLAN Hopping Attacks, Syntax Checker - Mitigate VLAN Hopping Attacks, Private VLANs, Private Virtual LAN (PVLAN) Edge Feature, Configure PVLAN Edge, and Private VLAN Tutorial and Demonstration.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security.&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;All my details and contact information can be found on my website, &lt;a href=&#34;https://kevtechify.com/&#34; rel=&#34;nofollow&#34;&gt;https://KevTechify.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Network Security v1&lt;/p&gt;&lt;p&gt;Episode 14 - Layer 2 Security Considerations&lt;/p&gt;&lt;p&gt;Part D - Mitigate VLAN Attacks&lt;/p&gt;&lt;p&gt;Podcast Number: 55&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Equipment I like.&lt;/p&gt;&lt;p&gt;Home Lab &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/home-lab&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/home-lab&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Networking Tools &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/networking-tools&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/networking-tools&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Studio Equipment &lt;span&gt;►► &lt;/span&gt;&lt;a href=&#34;https://kit.co/KevTechify/studio-equipment&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/studio-equipment&lt;/a&gt;&lt;/p&gt;&lt;p&gt; &lt;/p&gt;</content:encoded>
                
                <enclosure length="13847823" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/096ad929-08e0-4dc1-a7f6-a8675e52be62/stream.mp3"/>
                
                <guid isPermaLink="false">df47291b-6ca5-4bcb-b27d-7ed8488b33ef</guid>
                <link>https://KevTechify.com</link>
                <pubDate>Mon, 28 Mar 2022 08:00:00 &#43;0000</pubDate>
                <itunes:duration>865</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Mitigate MAC Table Attacks - Layer 2 Security Considerations - Network Security - KevTechify | Podcast 54</itunes:title>
                <title>Mitigate MAC Table Attacks - Layer 2 Security Considerations - Network Security - KevTechify | Podcast 54</title>

                <itunes:episode>54</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>In this episode we are going to look at Mitigate MAC Table Attacks.</p><p>We will be discussing Secure Unused Ports, Mitigate MAC Address Table Attacks, Enable Port Security, Limit and Learn MAC Addresses, Port Security Aging, Port Security Violation Modes, Ports in error-disabled State, Verify Port Security, SNMP MAC Address Notification, and Implement Port Security.</p><p>Thank you so much for listening to this episode of my series on Network Security.</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>All my details and contact information can be found on my website, <a href="https://kevtechify.com/" rel="nofollow">https://KevTechify.com</a></p><p><span>-------------------------------------------------------</span></p><p>Network Security v1</p><p>Episode 14 - Layer 2 Security Considerations</p><p>Part C - Mitigate MAC Table Attacks</p><p>Podcast Number: 54</p><p><span>-------------------------------------------------------</span></p><p>Equipment I like.</p><p>Home Lab <span>►►</span> <a href="https://kit.co/KevTechify/home-lab" rel="nofollow">https://kit.co/KevTechify/home-lab</a></p><p>Networking Tools <span>►►</span> <a href="https://kit.co/KevTechify/networking-tools" rel="nofollow">https://kit.co/KevTechify/networking-tools</a></p><p>Studio Equipment <span>►► </span><a href="https://kit.co/KevTechify/studio-equipment" rel="nofollow">https://kit.co/KevTechify/studio-equipment</a></p><p> </p>]]></description>
                <content:encoded>&lt;p&gt;In this episode we are going to look at Mitigate MAC Table Attacks.&lt;/p&gt;&lt;p&gt;We will be discussing Secure Unused Ports, Mitigate MAC Address Table Attacks, Enable Port Security, Limit and Learn MAC Addresses, Port Security Aging, Port Security Violation Modes, Ports in error-disabled State, Verify Port Security, SNMP MAC Address Notification, and Implement Port Security.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security.&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;All my details and contact information can be found on my website, &lt;a href=&#34;https://kevtechify.com/&#34; rel=&#34;nofollow&#34;&gt;https://KevTechify.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Network Security v1&lt;/p&gt;&lt;p&gt;Episode 14 - Layer 2 Security Considerations&lt;/p&gt;&lt;p&gt;Part C - Mitigate MAC Table Attacks&lt;/p&gt;&lt;p&gt;Podcast Number: 54&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Equipment I like.&lt;/p&gt;&lt;p&gt;Home Lab &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/home-lab&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/home-lab&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Networking Tools &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/networking-tools&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/networking-tools&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Studio Equipment &lt;span&gt;►► &lt;/span&gt;&lt;a href=&#34;https://kit.co/KevTechify/studio-equipment&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/studio-equipment&lt;/a&gt;&lt;/p&gt;&lt;p&gt; &lt;/p&gt;</content:encoded>
                
                <enclosure length="19619004" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/df364125-63a9-497e-9ad2-b8a6d9f3e4b6/stream.mp3"/>
                
                <guid isPermaLink="false">7409c548-0175-4983-ab1a-4332446489b5</guid>
                <link>https://KevTechify.com</link>
                <pubDate>Sun, 27 Mar 2022 08:00:00 &#43;0000</pubDate>
                <itunes:duration>1226</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>MAC Table Attacks - Layer 2 Security Considerations - Network Security - KevTechify | Podcast 53</itunes:title>
                <title>MAC Table Attacks - Layer 2 Security Considerations - Network Security - KevTechify | Podcast 53</title>

                <itunes:episode>53</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>In this episode we are going to look at MAC Table Attacks.</p><p>We will be discussing Switch Fundamentals, Switch Learning and Forwarding, Filtering Frames, MAC Address Table Flooding, MAC Address Table Attack Mitigation, , , , , , , , ,.</p><p>Thank you so much for listening to this episode of my series on Network Security.</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>All my details and contact information can be found on my website, <a href="https://kevtechify.com/" rel="nofollow">https://KevTechify.com</a></p><p><span>-------------------------------------------------------</span></p><p>Network Security v1</p><p>Episode 14 - Layer 2 Security Considerations</p><p>Part B - MAC Table Attacks</p><p>Podcast Number: 53</p><p><span>-------------------------------------------------------</span></p><p>Equipment I like.</p><p>Home Lab <span>►►</span> <a href="https://kit.co/KevTechify/home-lab" rel="nofollow">https://kit.co/KevTechify/home-lab</a></p><p>Networking Tools <span>►►</span> <a href="https://kit.co/KevTechify/networking-tools" rel="nofollow">https://kit.co/KevTechify/networking-tools</a></p><p>Studio Equipment <span>►► </span><a href="https://kit.co/KevTechify/studio-equipment" rel="nofollow">https://kit.co/KevTechify/studio-equipment</a></p><p> </p>]]></description>
                <content:encoded>&lt;p&gt;In this episode we are going to look at MAC Table Attacks.&lt;/p&gt;&lt;p&gt;We will be discussing Switch Fundamentals, Switch Learning and Forwarding, Filtering Frames, MAC Address Table Flooding, MAC Address Table Attack Mitigation, , , , , , , , ,.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security.&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;All my details and contact information can be found on my website, &lt;a href=&#34;https://kevtechify.com/&#34; rel=&#34;nofollow&#34;&gt;https://KevTechify.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Network Security v1&lt;/p&gt;&lt;p&gt;Episode 14 - Layer 2 Security Considerations&lt;/p&gt;&lt;p&gt;Part B - MAC Table Attacks&lt;/p&gt;&lt;p&gt;Podcast Number: 53&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Equipment I like.&lt;/p&gt;&lt;p&gt;Home Lab &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/home-lab&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/home-lab&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Networking Tools &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/networking-tools&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/networking-tools&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Studio Equipment &lt;span&gt;►► &lt;/span&gt;&lt;a href=&#34;https://kit.co/KevTechify/studio-equipment&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/studio-equipment&lt;/a&gt;&lt;/p&gt;&lt;p&gt; &lt;/p&gt;</content:encoded>
                
                <enclosure length="11398582" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/1a80f422-dc96-4bc5-b3dc-ba8924dd4058/stream.mp3"/>
                
                <guid isPermaLink="false">e8f27a23-c2c9-4446-8dc9-b7923062ffee</guid>
                <link>https://KevTechify.com</link>
                <pubDate>Sat, 26 Mar 2022 08:00:00 &#43;0000</pubDate>
                <itunes:duration>712</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Layer 2 Security Threats - Layer 2 Security Considerations - Network Security - KevTechify | Podcast 52</itunes:title>
                <title>Layer 2 Security Threats - Layer 2 Security Considerations - Network Security - KevTechify | Podcast 52</title>

                <itunes:episode>52</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>In this episode we are going to look at Layer 2 Security Threats.</p><p>We will be discussing Describe Layer 2 Vulnerabilities, and Switch Attack Categories.</p><p>Thank you so much for listening to this episode of my series on Network Security.</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>All my details and contact information can be found on my website, <a href="https://kevtechify.com/" rel="nofollow">https://KevTechify.com</a></p><p><span>-------------------------------------------------------</span></p><p>Network Security v1</p><p>Episode 14 - Layer 2 Security Considerations</p><p>Part A - Layer 2 Security Threats</p><p>Podcast Number: 52</p><p><span>-------------------------------------------------------</span></p><p>Equipment I like.</p><p>Home Lab <span>►►</span> <a href="https://kit.co/KevTechify/home-lab" rel="nofollow">https://kit.co/KevTechify/home-lab</a></p><p>Networking Tools <span>►►</span> <a href="https://kit.co/KevTechify/networking-tools" rel="nofollow">https://kit.co/KevTechify/networking-tools</a></p><p>Studio Equipment <span>►► </span><a href="https://kit.co/KevTechify/studio-equipment" rel="nofollow">https://kit.co/KevTechify/studio-equipment</a></p><p> </p>]]></description>
                <content:encoded>&lt;p&gt;In this episode we are going to look at Layer 2 Security Threats.&lt;/p&gt;&lt;p&gt;We will be discussing Describe Layer 2 Vulnerabilities, and Switch Attack Categories.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security.&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;All my details and contact information can be found on my website, &lt;a href=&#34;https://kevtechify.com/&#34; rel=&#34;nofollow&#34;&gt;https://KevTechify.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Network Security v1&lt;/p&gt;&lt;p&gt;Episode 14 - Layer 2 Security Considerations&lt;/p&gt;&lt;p&gt;Part A - Layer 2 Security Threats&lt;/p&gt;&lt;p&gt;Podcast Number: 52&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Equipment I like.&lt;/p&gt;&lt;p&gt;Home Lab &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/home-lab&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/home-lab&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Networking Tools &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/networking-tools&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/networking-tools&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Studio Equipment &lt;span&gt;►► &lt;/span&gt;&lt;a href=&#34;https://kit.co/KevTechify/studio-equipment&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/studio-equipment&lt;/a&gt;&lt;/p&gt;&lt;p&gt; &lt;/p&gt;</content:encoded>
                
                <enclosure length="4582086" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/829cb4e3-ce75-45a6-b198-55f4440bd74b/stream.mp3"/>
                
                <guid isPermaLink="false">30e8bf58-87e9-4045-9d84-f2aee9fbbc9a</guid>
                <link>https://KevTechify.com</link>
                <pubDate>Fri, 25 Mar 2022 08:00:00 &#43;0000</pubDate>
                <itunes:duration>286</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>802.1X Authentication - Endpoint Security - Network Security - KevTechify | Podcast 51</itunes:title>
                <title>802.1X Authentication - Endpoint Security - Network Security - KevTechify | Podcast 51</title>

                <itunes:episode>51</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>In this episode we are going to look at 802.1X Authentication.</p><p>We will be discussing Security Using 802.1X Port-Based Authentication, Control the 802.1X Authorization State, and 802.1X Configuration.</p><p>Thank you so much for listening to this episode of my series on Network Security.</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>All my details and contact information can be found on my website, <a href="https://kevtechify.com/" rel="nofollow">https://KevTechify.com</a></p><p>-------------------------------------------------------</p><p>Network Security v1</p><p>Episode 13 - Endpoint Security</p><p>Part B - 802.1X Authentication</p><p>Podcast Number: 51</p><p>-------------------------------------------------------</p><p>Equipment I like.</p><p>Home Lab ►► <a href="https://kit.co/KevTechify/home-lab" rel="nofollow">https://kit.co/KevTechify/home-lab</a></p><p>Networking Tools ►► <a href="https://kit.co/KevTechify/networking-tools" rel="nofollow">https://kit.co/KevTechify/networking-tools</a></p><p>Studio Equipment ►► <a href="https://kit.co/KevTechify/studio-equipment" rel="nofollow">https://kit.co/KevTechify/studio-equipment</a></p><p> </p>]]></description>
                <content:encoded>&lt;p&gt;In this episode we are going to look at 802.1X Authentication.&lt;/p&gt;&lt;p&gt;We will be discussing Security Using 802.1X Port-Based Authentication, Control the 802.1X Authorization State, and 802.1X Configuration.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security.&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;All my details and contact information can be found on my website, &lt;a href=&#34;https://kevtechify.com/&#34; rel=&#34;nofollow&#34;&gt;https://KevTechify.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;-------------------------------------------------------&lt;/p&gt;&lt;p&gt;Network Security v1&lt;/p&gt;&lt;p&gt;Episode 13 - Endpoint Security&lt;/p&gt;&lt;p&gt;Part B - 802.1X Authentication&lt;/p&gt;&lt;p&gt;Podcast Number: 51&lt;/p&gt;&lt;p&gt;-------------------------------------------------------&lt;/p&gt;&lt;p&gt;Equipment I like.&lt;/p&gt;&lt;p&gt;Home Lab ►► &lt;a href=&#34;https://kit.co/KevTechify/home-lab&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/home-lab&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Networking Tools ►► &lt;a href=&#34;https://kit.co/KevTechify/networking-tools&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/networking-tools&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Studio Equipment ►► &lt;a href=&#34;https://kit.co/KevTechify/studio-equipment&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/studio-equipment&lt;/a&gt;&lt;/p&gt;&lt;p&gt; &lt;/p&gt;</content:encoded>
                
                <enclosure length="8656352" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/233f8fd5-45fd-4446-8946-74c0fde3d1d4/stream.mp3"/>
                
                <guid isPermaLink="false">21c4e392-ed92-448b-8e66-6fd21e7cbfef</guid>
                <link>https://KevTechify.com</link>
                <pubDate>Thu, 24 Mar 2022 08:00:00 &#43;0000</pubDate>
                <itunes:duration>541</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Endpoint Security Overview - Endpoint Security - Network Security - KevTechify | Podcast 50</itunes:title>
                <title>Endpoint Security Overview - Endpoint Security - Network Security - KevTechify | Podcast 50</title>

                <itunes:episode>50</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>In this episode we are going to look at Endpoint Security Overview.</p><p>We will be discussing Local Area Network (LAN) Elements Security, Traditional Endpoint Security, The Borderless Network, Security for Endpoints in the Borderless Network, Network-Based Malware Protection, Hardware and Software Encryption of Local Data, Network Access Control, NAC Functions, , , , , ,.</p><p>Thank you so much for listening to this episode of my series on Network Security.</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>All my details and contact information can be found on my website, <a href="https://kevtechify.com/" rel="nofollow">https://KevTechify.com</a></p><p><span>-------------------------------------------------------</span></p><p>Network Security v1</p><p>Episode 13 - Endpoint Security</p><p>Part A - Endpoint Security Overview</p><p>Podcast Number: 50</p><p><span>-------------------------------------------------------</span></p><p>Equipment I like.</p><p>Home Lab <span>►►</span> <a href="https://kit.co/KevTechify/home-lab" rel="nofollow">https://kit.co/KevTechify/home-lab</a></p><p>Networking Tools <span>►►</span> <a href="https://kit.co/KevTechify/networking-tools" rel="nofollow">https://kit.co/KevTechify/networking-tools</a></p><p>Studio Equipment <span>►► </span><a href="https://kit.co/KevTechify/studio-equipment" rel="nofollow">https://kit.co/KevTechify/studio-equipment</a></p><p> </p>]]></description>
                <content:encoded>&lt;p&gt;In this episode we are going to look at Endpoint Security Overview.&lt;/p&gt;&lt;p&gt;We will be discussing Local Area Network (LAN) Elements Security, Traditional Endpoint Security, The Borderless Network, Security for Endpoints in the Borderless Network, Network-Based Malware Protection, Hardware and Software Encryption of Local Data, Network Access Control, NAC Functions, , , , , ,.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security.&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;All my details and contact information can be found on my website, &lt;a href=&#34;https://kevtechify.com/&#34; rel=&#34;nofollow&#34;&gt;https://KevTechify.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Network Security v1&lt;/p&gt;&lt;p&gt;Episode 13 - Endpoint Security&lt;/p&gt;&lt;p&gt;Part A - Endpoint Security Overview&lt;/p&gt;&lt;p&gt;Podcast Number: 50&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Equipment I like.&lt;/p&gt;&lt;p&gt;Home Lab &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/home-lab&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/home-lab&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Networking Tools &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/networking-tools&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/networking-tools&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Studio Equipment &lt;span&gt;►► &lt;/span&gt;&lt;a href=&#34;https://kit.co/KevTechify/studio-equipment&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/studio-equipment&lt;/a&gt;&lt;/p&gt;&lt;p&gt; &lt;/p&gt;</content:encoded>
                
                <enclosure length="9868434" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/e053c82b-5f88-424b-8264-9a1d022f60a6/stream.mp3"/>
                
                <guid isPermaLink="false">70a98ea1-de4c-4d1b-8ff1-96e3c8d018ac</guid>
                <link>https://KevTechify.com</link>
                <pubDate>Wed, 23 Mar 2022 08:00:00 &#43;0000</pubDate>
                <itunes:duration>616</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Configure Snort Intrusion Prevention System (IPS) - IPS Operation and Implementation - Network Security - KevTechify | Podcast 49</itunes:title>
                <title>Configure Snort Intrusion Prevention System (IPS) - IPS Operation and Implementation - Network Security - KevTechify | Podcast 49</title>

                <itunes:episode>49</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>In this episode we are going to look at Configure Snort Intrusion Prevention System (IPS).</p><p>We will be discussing Snort Intrusion Prevention System (IPS) Configuration Steps, Step 1. Download the Snort OVA File, Step 2. Install the Snort OVA File, Step 3. Configure Virtual Port Group Interfaces, Step 4. Activate Virtual Services, Step 5. Configure Snort Specifics, Step 6. Enable IPS Globally or on Desired Interfaces, and Step 7. Verify Snort IPS.</p><p>Thank you so much for listening to this episode of my series on Network Security.</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>All my details and contact information can be found on my website, <a href="https://kevtechify.com/" rel="nofollow">https://KevTechify.com</a></p><p><span>-------------------------------------------------------</span></p><p>Network Security v1</p><p>Episode 12 - IPS Operation and Implementation</p><p>Part C - Configure Snort IPS</p><p>Podcast Number: 49</p><p><span>-------------------------------------------------------</span></p><p>Equipment I like.</p><p>Home Lab <span>►►</span> <a href="https://kit.co/KevTechify/home-lab" rel="nofollow">https://kit.co/KevTechify/home-lab</a></p><p>Networking Tools <span>►►</span> <a href="https://kit.co/KevTechify/networking-tools" rel="nofollow">https://kit.co/KevTechify/networking-tools</a></p><p>Studio Equipment <span>►► </span><a href="https://kit.co/KevTechify/studio-equipment" rel="nofollow">https://kit.co/KevTechify/studio-equipment</a></p><p> </p>]]></description>
                <content:encoded>&lt;p&gt;In this episode we are going to look at Configure Snort Intrusion Prevention System (IPS).&lt;/p&gt;&lt;p&gt;We will be discussing Snort Intrusion Prevention System (IPS) Configuration Steps, Step 1. Download the Snort OVA File, Step 2. Install the Snort OVA File, Step 3. Configure Virtual Port Group Interfaces, Step 4. Activate Virtual Services, Step 5. Configure Snort Specifics, Step 6. Enable IPS Globally or on Desired Interfaces, and Step 7. Verify Snort IPS.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security.&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;All my details and contact information can be found on my website, &lt;a href=&#34;https://kevtechify.com/&#34; rel=&#34;nofollow&#34;&gt;https://KevTechify.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Network Security v1&lt;/p&gt;&lt;p&gt;Episode 12 - IPS Operation and Implementation&lt;/p&gt;&lt;p&gt;Part C - Configure Snort IPS&lt;/p&gt;&lt;p&gt;Podcast Number: 49&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Equipment I like.&lt;/p&gt;&lt;p&gt;Home Lab &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/home-lab&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/home-lab&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Networking Tools &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/networking-tools&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/networking-tools&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Studio Equipment &lt;span&gt;►► &lt;/span&gt;&lt;a href=&#34;https://kit.co/KevTechify/studio-equipment&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/studio-equipment&lt;/a&gt;&lt;/p&gt;&lt;p&gt; &lt;/p&gt;</content:encoded>
                
                <enclosure length="15094177" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/94813379-7565-422b-9767-110057e14954/stream.mp3"/>
                
                <guid isPermaLink="false">eb3b62ab-9e60-401f-9082-cdb68927722d</guid>
                <link>https://KevTechify.com</link>
                <pubDate>Tue, 22 Mar 2022 08:00:00 &#43;0000</pubDate>
                <itunes:duration>943</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Cisco Snort Intrusion Prevention System (IPS) - IPS Operation and Implementation - Network Security - KevTechify | Podcast 48</itunes:title>
                <title>Cisco Snort Intrusion Prevention System (IPS) - IPS Operation and Implementation - Network Security - KevTechify | Podcast 48</title>

                <itunes:episode>48</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>In this episode we are going to look at Cisco Snort Intrusion Prevention System (IPS).</p><p>We will be discussing Intrusion Prevention System (IPS) Service Options, NGIPS, Snort IPS, Snort Components and Rules, ISR Container Applications, Snort IPS Rule Alarms, Snort IPS Rule Actions, Snort IPS Header Rule Options, and Snort IPS Operation.</p><p>Thank you so much for listening to this episode of my series on Network Security.</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>All my details and contact information can be found on my website, <a href="https://kevtechify.com/" rel="nofollow">https://KevTechify.com</a></p><p>-------------------------------------------------------</p><p>Network Security v1</p><p>Episode 12 - IPS Operation and Implementation</p><p>Part B - Cisco Snort IPS</p><p>Podcast Number: 48</p><p>-------------------------------------------------------</p><p>Equipment I like.</p><p>Home Lab ►► <a href="https://kit.co/KevTechify/home-lab" rel="nofollow">https://kit.co/KevTechify/home-lab</a></p><p>Networking Tools ►► <a href="https://kit.co/KevTechify/networking-tools" rel="nofollow">https://kit.co/KevTechify/networking-tools</a></p><p>Studio Equipment ►► <a href="https://kit.co/KevTechify/studio-equipment" rel="nofollow">https://kit.co/KevTechify/studio-equipment</a></p><p> </p>]]></description>
                <content:encoded>&lt;p&gt;In this episode we are going to look at Cisco Snort Intrusion Prevention System (IPS).&lt;/p&gt;&lt;p&gt;We will be discussing Intrusion Prevention System (IPS) Service Options, NGIPS, Snort IPS, Snort Components and Rules, ISR Container Applications, Snort IPS Rule Alarms, Snort IPS Rule Actions, Snort IPS Header Rule Options, and Snort IPS Operation.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security.&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;All my details and contact information can be found on my website, &lt;a href=&#34;https://kevtechify.com/&#34; rel=&#34;nofollow&#34;&gt;https://KevTechify.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;-------------------------------------------------------&lt;/p&gt;&lt;p&gt;Network Security v1&lt;/p&gt;&lt;p&gt;Episode 12 - IPS Operation and Implementation&lt;/p&gt;&lt;p&gt;Part B - Cisco Snort IPS&lt;/p&gt;&lt;p&gt;Podcast Number: 48&lt;/p&gt;&lt;p&gt;-------------------------------------------------------&lt;/p&gt;&lt;p&gt;Equipment I like.&lt;/p&gt;&lt;p&gt;Home Lab ►► &lt;a href=&#34;https://kit.co/KevTechify/home-lab&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/home-lab&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Networking Tools ►► &lt;a href=&#34;https://kit.co/KevTechify/networking-tools&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/networking-tools&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Studio Equipment ►► &lt;a href=&#34;https://kit.co/KevTechify/studio-equipment&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/studio-equipment&lt;/a&gt;&lt;/p&gt;&lt;p&gt; &lt;/p&gt;</content:encoded>
                
                <enclosure length="16895582" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/01618d43-97a2-4c65-8df7-df07db41baa1/stream.mp3"/>
                
                <guid isPermaLink="false">b09b68c3-ff64-43a6-9b80-14134d7d9b1c</guid>
                <link>https://KevTechify.com</link>
                <pubDate>Mon, 21 Mar 2022 08:00:00 &#43;0000</pubDate>
                <itunes:duration>1055</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Intrusion Prevention System (IPS) Signatures - IPS Operation and Implementation - Network Security - KevTechify | Podcast 47</itunes:title>
                <title>Intrusion Prevention System (IPS) Signatures - IPS Operation and Implementation - Network Security - KevTechify | Podcast 47</title>

                <itunes:episode>47</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>In this episode we are going to look at IPS Signatures.</p><p>We will be discussing Intrusion Prevention System (IPS) Signature Attributes, Types of Signatures, IPS Signature Alarms, IPS Signature Actions, and Evaluating Alerts.</p><p>Thank you so much for listening to this episode of my series on Network Security.</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>All my details and contact information can be found on my website, <a href="https://kevtechify.com/" rel="nofollow">https://KevTechify.com</a></p><p><span>-------------------------------------------------------</span></p><p>Network Security v1</p><p>Episode 12 - IPS Operation and Implementation</p><p>Part A - IPS Signatures</p><p>Podcast Number: 47</p><p><span>-------------------------------------------------------</span></p><p>Equipment I like.</p><p>Home Lab <span>►►</span> <a href="https://kit.co/KevTechify/home-lab" rel="nofollow">https://kit.co/KevTechify/home-lab</a></p><p>Networking Tools <span>►►</span> <a href="https://kit.co/KevTechify/networking-tools" rel="nofollow">https://kit.co/KevTechify/networking-tools</a></p><p>Studio Equipment <span>►► </span><a href="https://kit.co/KevTechify/studio-equipment" rel="nofollow">https://kit.co/KevTechify/studio-equipment</a></p><p> </p>]]></description>
                <content:encoded>&lt;p&gt;In this episode we are going to look at IPS Signatures.&lt;/p&gt;&lt;p&gt;We will be discussing Intrusion Prevention System (IPS) Signature Attributes, Types of Signatures, IPS Signature Alarms, IPS Signature Actions, and Evaluating Alerts.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security.&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;All my details and contact information can be found on my website, &lt;a href=&#34;https://kevtechify.com/&#34; rel=&#34;nofollow&#34;&gt;https://KevTechify.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Network Security v1&lt;/p&gt;&lt;p&gt;Episode 12 - IPS Operation and Implementation&lt;/p&gt;&lt;p&gt;Part A - IPS Signatures&lt;/p&gt;&lt;p&gt;Podcast Number: 47&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Equipment I like.&lt;/p&gt;&lt;p&gt;Home Lab &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/home-lab&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/home-lab&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Networking Tools &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/networking-tools&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/networking-tools&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Studio Equipment &lt;span&gt;►► &lt;/span&gt;&lt;a href=&#34;https://kit.co/KevTechify/studio-equipment&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/studio-equipment&lt;/a&gt;&lt;/p&gt;&lt;p&gt; &lt;/p&gt;</content:encoded>
                
                <enclosure length="11440796" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/87efc070-0835-4a1f-ae31-e195b62fab97/stream.mp3"/>
                
                <guid isPermaLink="false">4acfb426-9f00-46b1-8a0c-35d4fd9d0ec6</guid>
                <link>https://KevTechify.com</link>
                <pubDate>Sun, 20 Mar 2022 08:00:00 &#43;0000</pubDate>
                <itunes:duration>715</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Cisco Switched Port Analyzer (SPAN) - IPS Technologies - Network Security - KevTechify | Podcast 46</itunes:title>
                <title>Cisco Switched Port Analyzer (SPAN) - IPS Technologies - Network Security - KevTechify | Podcast 46</title>

                <itunes:episode>46</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>In this episode we are going to look at Cisco Switched Port Analyzer (SPAN).</p><p>We will be discussing Network Monitoring Methods, Network Taps, Traffic Mirroring and Cisco Switched Port Analyzer (SPAN), Configure Cisco SPAN, and Implement a Local SPAN.</p><p>Thank you so much for listening to this episode of my series on Network Security.</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>All my details and contact information can be found on my website, <a href="https://kevtechify.com/" rel="nofollow">https://KevTechify.com</a></p><p><span>-------------------------------------------------------</span></p><p>Network Security v1</p><p>Episode 11 - IPS Technologies</p><p>Part D - Cisco Switched Port Analyzer</p><p>Podcast Number: 46</p><p><span>-------------------------------------------------------</span></p><p>Equipment I like.</p><p>Home Lab <span>►►</span> <a href="https://kit.co/KevTechify/home-lab" rel="nofollow">https://kit.co/KevTechify/home-lab</a></p><p>Networking Tools <span>►►</span> <a href="https://kit.co/KevTechify/networking-tools" rel="nofollow">https://kit.co/KevTechify/networking-tools</a></p><p>Studio Equipment <span>►► </span><a href="https://kit.co/KevTechify/studio-equipment" rel="nofollow">https://kit.co/KevTechify/studio-equipment</a></p><p> </p>]]></description>
                <content:encoded>&lt;p&gt;In this episode we are going to look at Cisco Switched Port Analyzer (SPAN).&lt;/p&gt;&lt;p&gt;We will be discussing Network Monitoring Methods, Network Taps, Traffic Mirroring and Cisco Switched Port Analyzer (SPAN), Configure Cisco SPAN, and Implement a Local SPAN.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security.&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;All my details and contact information can be found on my website, &lt;a href=&#34;https://kevtechify.com/&#34; rel=&#34;nofollow&#34;&gt;https://KevTechify.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Network Security v1&lt;/p&gt;&lt;p&gt;Episode 11 - IPS Technologies&lt;/p&gt;&lt;p&gt;Part D - Cisco Switched Port Analyzer&lt;/p&gt;&lt;p&gt;Podcast Number: 46&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Equipment I like.&lt;/p&gt;&lt;p&gt;Home Lab &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/home-lab&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/home-lab&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Networking Tools &lt;span&gt;►►&lt;/span&gt; &lt;a href=&#34;https://kit.co/KevTechify/networking-tools&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/networking-tools&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Studio Equipment &lt;span&gt;►► &lt;/span&gt;&lt;a href=&#34;https://kit.co/KevTechify/studio-equipment&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/studio-equipment&lt;/a&gt;&lt;/p&gt;&lt;p&gt; &lt;/p&gt;</content:encoded>
                
                <enclosure length="11782269" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/6eda3c2c-b3b9-4640-8a4e-6da86e3f9042/stream.mp3"/>
                
                <guid isPermaLink="false">1bf6e2ff-1725-4aa3-b16f-23cba78ad1f0</guid>
                <link>https://KevTechify.com</link>
                <pubDate>Sat, 19 Mar 2022 08:00:00 &#43;0000</pubDate>
                <itunes:duration>736</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Intrusion Prevention System (IPS) on Cisco Integrated Services Routers (ISRs) - IPS Technologies - Network Security - KevTechify | Podcast 45</itunes:title>
                <title>Intrusion Prevention System (IPS) on Cisco Integrated Services Routers (ISRs) - IPS Technologies - Network Security - KevTechify | Podcast 45</title>

                <itunes:episode>45</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>In this episode we are going to look at Intrusion Prevention System (IPS) on Cisco Integrated Services Routers (ISRs).</p><p>We will be discussing Intrusion Prevention System (IPS) Components, Cisco IOS IPS, Snort IPS, Snort Operation, Snort Features, and Snort System Requirements.</p><p>Thank you so much for listening to this episode of my series on Network Security.</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>All my details and contact information can be found on my website, <a href="https://kevtechify.com/" rel="nofollow">https://KevTechify.com</a></p><p>-------------------------------------------------------</p><p>Network Security v1</p><p>Episode 11 - IPS Technologies</p><p>Part C - IPS on Cisco ISRs</p><p>Podcast Number: 45</p><p>-------------------------------------------------------</p><p>Equipment I like.</p><p>Home Lab ►► <a href="https://kit.co/KevTechify/home-lab" rel="nofollow">https://kit.co/KevTechify/home-lab</a></p><p>Networking Tools ►► <a href="https://kit.co/KevTechify/networking-tools" rel="nofollow">https://kit.co/KevTechify/networking-tools</a></p><p>Studio Equipment ►► <a href="https://kit.co/KevTechify/studio-equipment" rel="nofollow">https://kit.co/KevTechify/studio-equipment</a></p><p> </p>]]></description>
                <content:encoded>&lt;p&gt;In this episode we are going to look at Intrusion Prevention System (IPS) on Cisco Integrated Services Routers (ISRs).&lt;/p&gt;&lt;p&gt;We will be discussing Intrusion Prevention System (IPS) Components, Cisco IOS IPS, Snort IPS, Snort Operation, Snort Features, and Snort System Requirements.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security.&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;All my details and contact information can be found on my website, &lt;a href=&#34;https://kevtechify.com/&#34; rel=&#34;nofollow&#34;&gt;https://KevTechify.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;-------------------------------------------------------&lt;/p&gt;&lt;p&gt;Network Security v1&lt;/p&gt;&lt;p&gt;Episode 11 - IPS Technologies&lt;/p&gt;&lt;p&gt;Part C - IPS on Cisco ISRs&lt;/p&gt;&lt;p&gt;Podcast Number: 45&lt;/p&gt;&lt;p&gt;-------------------------------------------------------&lt;/p&gt;&lt;p&gt;Equipment I like.&lt;/p&gt;&lt;p&gt;Home Lab ►► &lt;a href=&#34;https://kit.co/KevTechify/home-lab&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/home-lab&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Networking Tools ►► &lt;a href=&#34;https://kit.co/KevTechify/networking-tools&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/networking-tools&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Studio Equipment ►► &lt;a href=&#34;https://kit.co/KevTechify/studio-equipment&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/studio-equipment&lt;/a&gt;&lt;/p&gt;&lt;p&gt; &lt;/p&gt;</content:encoded>
                
                <enclosure length="12377443" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/d04261e9-11f4-4630-901e-85f31e820880/stream.mp3"/>
                
                <guid isPermaLink="false">44fd4a39-695e-49b3-b3db-c7077236a324</guid>
                <link>https://KevTechify.com</link>
                <pubDate>Fri, 18 Mar 2022 08:00:00 &#43;0000</pubDate>
                <itunes:duration>773</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Intrusion Prevention System (IPS) Implementations - IPS Technologies - Network Security - KevTechify | Podcast 44</itunes:title>
                <title>Intrusion Prevention System (IPS) Implementations - IPS Technologies - Network Security - KevTechify | Podcast 44</title>

                <itunes:episode>44</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>In this episode we are going to look at Intrusion Prevention System (IPS) Implementations.</p><p>We will be discussing Types of IPS, Network-Based IPS, and Modes of Deployment.</p><p>Thank you so much for listening to this episode of my series on Network Security.</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>All my details and contact information can be found on my website, <a href="https://kevtechify.com/" rel="nofollow">https://KevTechify.com</a></p><p>-------------------------------------------------------</p><p>Network Security v1</p><p>Episode 11 - IPS Technologies</p><p>Part B - IPS Implementations</p><p>Podcast Number: 44</p><p>-------------------------------------------------------</p><p>Equipment I like.</p><p>Home Lab ►► <a href="https://kit.co/KevTechify/home-lab" rel="nofollow">https://kit.co/KevTechify/home-lab</a></p><p>Networking Tools ►► <a href="https://kit.co/KevTechify/networking-tools" rel="nofollow">https://kit.co/KevTechify/networking-tools</a></p><p>Studio Equipment ►► <a href="https://kit.co/KevTechify/studio-equipment" rel="nofollow">https://kit.co/KevTechify/studio-equipment</a></p><p> </p>]]></description>
                <content:encoded>&lt;p&gt;In this episode we are going to look at Intrusion Prevention System (IPS) Implementations.&lt;/p&gt;&lt;p&gt;We will be discussing Types of IPS, Network-Based IPS, and Modes of Deployment.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security.&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;All my details and contact information can be found on my website, &lt;a href=&#34;https://kevtechify.com/&#34; rel=&#34;nofollow&#34;&gt;https://KevTechify.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;-------------------------------------------------------&lt;/p&gt;&lt;p&gt;Network Security v1&lt;/p&gt;&lt;p&gt;Episode 11 - IPS Technologies&lt;/p&gt;&lt;p&gt;Part B - IPS Implementations&lt;/p&gt;&lt;p&gt;Podcast Number: 44&lt;/p&gt;&lt;p&gt;-------------------------------------------------------&lt;/p&gt;&lt;p&gt;Equipment I like.&lt;/p&gt;&lt;p&gt;Home Lab ►► &lt;a href=&#34;https://kit.co/KevTechify/home-lab&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/home-lab&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Networking Tools ►► &lt;a href=&#34;https://kit.co/KevTechify/networking-tools&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/networking-tools&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Studio Equipment ►► &lt;a href=&#34;https://kit.co/KevTechify/studio-equipment&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/studio-equipment&lt;/a&gt;&lt;/p&gt;&lt;p&gt; &lt;/p&gt;</content:encoded>
                
                <enclosure length="7432986" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/53a698b2-55cf-4978-a05d-3ddeb670e76b/stream.mp3"/>
                
                <guid isPermaLink="false">194abd11-959d-4891-bb74-7dc548ef5263</guid>
                <link>https://KevTechify.com</link>
                <pubDate>Thu, 17 Mar 2022 08:00:00 &#43;0000</pubDate>
                <itunes:duration>464</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Intrusion Detection Systems (IDS) and Intrusion Prevention System (IPS) Characteristics - IPS Technologies - Network Security - KevTechify | Podcast 43</itunes:title>
                <title>Intrusion Detection Systems (IDS) and Intrusion Prevention System (IPS) Characteristics - IPS Technologies - Network Security - KevTechify | Podcast 43</title>

                <itunes:episode>43</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>In this episode we are going to look at Intrusion Detection Systems (IDS) and Intrusion Prevention System (IPS) Characteristics.</p><p>We will be discussing Zero-Day Attacks, Monitor for Attacks, Intrusion Prevention and Detection Devices, and finally Advantages and Disadvantages of IDS and IPS.</p><p>Thank you so much for listening to this episode of my series on Network Security.</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>All my details and contact information can be found on my website, <a href="https://kevtechify.com/" rel="nofollow">https://KevTechify.com</a></p><p>-------------------------------------------------------</p><p>Network Security v1</p><p>Episode 11 - IPS Technologies</p><p>Part A - IDS and IPS Characteristics</p><p>Podcast Number: 43</p><p>-------------------------------------------------------</p><p>Equipment I like.</p><p>Home Lab ►► <a href="https://kit.co/KevTechify/home-lab" rel="nofollow">https://kit.co/KevTechify/home-lab</a></p><p>Networking Tools ►► <a href="https://kit.co/KevTechify/networking-tools" rel="nofollow">https://kit.co/KevTechify/networking-tools</a></p><p>Studio Equipment ►► <a href="https://kit.co/KevTechify/studio-equipment" rel="nofollow">https://kit.co/KevTechify/studio-equipment</a></p><p> </p>]]></description>
                <content:encoded>&lt;p&gt;In this episode we are going to look at Intrusion Detection Systems (IDS) and Intrusion Prevention System (IPS) Characteristics.&lt;/p&gt;&lt;p&gt;We will be discussing Zero-Day Attacks, Monitor for Attacks, Intrusion Prevention and Detection Devices, and finally Advantages and Disadvantages of IDS and IPS.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security.&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;All my details and contact information can be found on my website, &lt;a href=&#34;https://kevtechify.com/&#34; rel=&#34;nofollow&#34;&gt;https://KevTechify.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;-------------------------------------------------------&lt;/p&gt;&lt;p&gt;Network Security v1&lt;/p&gt;&lt;p&gt;Episode 11 - IPS Technologies&lt;/p&gt;&lt;p&gt;Part A - IDS and IPS Characteristics&lt;/p&gt;&lt;p&gt;Podcast Number: 43&lt;/p&gt;&lt;p&gt;-------------------------------------------------------&lt;/p&gt;&lt;p&gt;Equipment I like.&lt;/p&gt;&lt;p&gt;Home Lab ►► &lt;a href=&#34;https://kit.co/KevTechify/home-lab&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/home-lab&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Networking Tools ►► &lt;a href=&#34;https://kit.co/KevTechify/networking-tools&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/networking-tools&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Studio Equipment ►► &lt;a href=&#34;https://kit.co/KevTechify/studio-equipment&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/studio-equipment&lt;/a&gt;&lt;/p&gt;&lt;p&gt; &lt;/p&gt;</content:encoded>
                
                <enclosure length="8018129" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/6c9fae3e-a59b-4698-8e7b-666131ff2ca4/stream.mp3"/>
                
                <guid isPermaLink="false">8484651b-acd2-48f6-9fd4-564dbf78adcc</guid>
                <link>https://KevTechify.com</link>
                <pubDate>Wed, 16 Mar 2022 08:00:00 &#43;0000</pubDate>
                <itunes:duration>501</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Configure a ZPF - Zone-Based Policy Firewalls - Network Security - KevTechify | Podcast 42</itunes:title>
                <title>Configure a ZPF - Zone-Based Policy Firewalls - Network Security - KevTechify | Podcast 42</title>

                <itunes:episode>42</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>In this episode we are going to look at Configure a ZPF.</p><p>We will be discussing Configure a ZPF, Create the Zones, Identify Traffic, Define an Action, Identify a Zone-Pair and Match to a Policy, Assign Zones to Interfaces, Verify a ZPF Configuration, Configure a ZPF, and ZPF Configuration Considerations.</p><p>Thank you so much for listening to this episode of my series on Network Security.</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>All my details and contact information can be found on my website, <a href="https://kevtechify.com/" rel="nofollow">https://KevTechify.com</a></p><p>-------------------------------------------------------</p><p>Network Security v1</p><p>Episode 10 - Zone-Based Policy Firewalls</p><p>Part C- Configure a ZPF</p><p>Podcast Number: 42</p><p>-------------------------------------------------------</p><p>Equipment I like.</p><p>Home Lab ►► <a href="https://kit.co/KevTechify/home-lab" rel="nofollow">https://kit.co/KevTechify/home-lab</a></p><p>Networking Tools ►► <a href="https://kit.co/KevTechify/networking-tools" rel="nofollow">https://kit.co/KevTechify/networking-tools</a></p><p>Studio Equipment ►► <a href="https://kit.co/KevTechify/studio-equipment" rel="nofollow">https://kit.co/KevTechify/studio-equipment</a></p><p> </p>]]></description>
                <content:encoded>&lt;p&gt;In this episode we are going to look at Configure a ZPF.&lt;/p&gt;&lt;p&gt;We will be discussing Configure a ZPF, Create the Zones, Identify Traffic, Define an Action, Identify a Zone-Pair and Match to a Policy, Assign Zones to Interfaces, Verify a ZPF Configuration, Configure a ZPF, and ZPF Configuration Considerations.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security.&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;All my details and contact information can be found on my website, &lt;a href=&#34;https://kevtechify.com/&#34; rel=&#34;nofollow&#34;&gt;https://KevTechify.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;-------------------------------------------------------&lt;/p&gt;&lt;p&gt;Network Security v1&lt;/p&gt;&lt;p&gt;Episode 10 - Zone-Based Policy Firewalls&lt;/p&gt;&lt;p&gt;Part C- Configure a ZPF&lt;/p&gt;&lt;p&gt;Podcast Number: 42&lt;/p&gt;&lt;p&gt;-------------------------------------------------------&lt;/p&gt;&lt;p&gt;Equipment I like.&lt;/p&gt;&lt;p&gt;Home Lab ►► &lt;a href=&#34;https://kit.co/KevTechify/home-lab&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/home-lab&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Networking Tools ►► &lt;a href=&#34;https://kit.co/KevTechify/networking-tools&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/networking-tools&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Studio Equipment ►► &lt;a href=&#34;https://kit.co/KevTechify/studio-equipment&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/studio-equipment&lt;/a&gt;&lt;/p&gt;&lt;p&gt; &lt;/p&gt;</content:encoded>
                
                <enclosure length="21694171" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/eaab8218-b770-4956-93e4-e7cb4e0f4a0e/stream.mp3"/>
                
                <guid isPermaLink="false">2233c8af-0c8e-4ad5-b668-9d7efe9f35b6</guid>
                <link>https://redcircle.com/shows/54180805-85e2-4677-9802-b19fdc0a3591/episodes/eaab8218-b770-4956-93e4-e7cb4e0f4a0e</link>
                <pubDate>Tue, 15 Mar 2022 08:00:00 &#43;0000</pubDate>
                <itunes:duration>1355</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>ZPF Operation - Zone-Based Policy Firewalls - Network Security - KevTechify | Podcast 41</itunes:title>
                <title>ZPF Operation - Zone-Based Policy Firewalls - Network Security - KevTechify | Podcast 41</title>

                <itunes:episode>41</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>In this episode we are going to look at ZPF Operation.</p><p>We will be discussing ZPF Actions, Rules for Transit Traffic, and Rules for Traffic to the Self Zone.</p><p>Thank you so much for listening to this episode of my series on Network Security.</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>All my details and contact information can be found on my website, <a href="https://kevtechify.com/" rel="nofollow">https://KevTechify.com</a></p><p><span>-------------------------------------------------------</span></p><p>Network Security v1</p><p>Episode 10 - Zone-Based Policy Firewalls</p><p>Part B- ZPF Operation</p><p>Podcast Number: 41</p><p><span>-------------------------------------------------------</span></p><p>Equipment I like.</p><p>Home Lab <span>►</span>► <a href="https://kit.co/KevTechify/home-lab" rel="nofollow">https://kit.co/KevTechify/home-lab</a></p><p>Networking Tools <span>►</span>► <a href="https://kit.co/KevTechify/networking-tools" rel="nofollow">https://kit.co/KevTechify/networking-tools</a></p><p>Studio Equipment <span>►</span>► <a href="https://kit.co/KevTechify/studio-equipment" rel="nofollow">https://kit.co/KevTechify/studio-equipment</a></p><p> </p><p> </p>]]></description>
                <content:encoded>&lt;p&gt;In this episode we are going to look at ZPF Operation.&lt;/p&gt;&lt;p&gt;We will be discussing ZPF Actions, Rules for Transit Traffic, and Rules for Traffic to the Self Zone.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security.&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;All my details and contact information can be found on my website, &lt;a href=&#34;https://kevtechify.com/&#34; rel=&#34;nofollow&#34;&gt;https://KevTechify.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Network Security v1&lt;/p&gt;&lt;p&gt;Episode 10 - Zone-Based Policy Firewalls&lt;/p&gt;&lt;p&gt;Part B- ZPF Operation&lt;/p&gt;&lt;p&gt;Podcast Number: 41&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Equipment I like.&lt;/p&gt;&lt;p&gt;Home Lab &lt;span&gt;►&lt;/span&gt;► &lt;a href=&#34;https://kit.co/KevTechify/home-lab&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/home-lab&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Networking Tools &lt;span&gt;►&lt;/span&gt;► &lt;a href=&#34;https://kit.co/KevTechify/networking-tools&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/networking-tools&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Studio Equipment &lt;span&gt;►&lt;/span&gt;► &lt;a href=&#34;https://kit.co/KevTechify/studio-equipment&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/studio-equipment&lt;/a&gt;&lt;/p&gt;&lt;p&gt; &lt;/p&gt;&lt;p&gt; &lt;/p&gt;</content:encoded>
                
                <enclosure length="9878047" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/b7deb2dd-2ee8-4575-81e9-77d27a7932fb/stream.mp3"/>
                
                <guid isPermaLink="false">408ac7c9-510b-415e-89ec-7d8adbd6f601</guid>
                <link>https://KevTechify.com</link>
                <pubDate>Mon, 14 Mar 2022 08:00:00 &#43;0000</pubDate>
                <itunes:duration>617</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>ZPF Overview - Zone-Based Policy Firewalls - Network Security - KevTechify | Podcast 40</itunes:title>
                <title>ZPF Overview - Zone-Based Policy Firewalls - Network Security - KevTechify | Podcast 40</title>

                <itunes:episode>1</itunes:episode>
                <itunes:season>40</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>In this episode we are going to look at ZPF Overview.</p><p>We will be discussing Benefits of a ZPF and ZPF Design.</p><p>Thank you so much for listening to this episode of my series on Network Security.</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>All my details and contact information can be found on my website, <a href="https://kevtechify.com/" rel="nofollow">https://KevTechify.com</a></p><p><span>-------------------------------------------------------</span></p><p>Network Security v1</p><p>Episode 10 - Zone-Based Policy Firewalls</p><p>Part A- ZPF Overview</p><p>Podcast Number: 40</p><p><span>-------------------------------------------------------</span></p><p>Equipment I like.</p><p>Home Lab <span>►</span>► <a href="https://kit.co/KevTechify/home-lab" rel="nofollow">https://kit.co/KevTechify/home-lab</a></p><p>Networking Tools <span>►</span>► <a href="https://kit.co/KevTechify/networking-tools" rel="nofollow">https://kit.co/KevTechify/networking-tools</a></p><p>Studio Equipment <span>►</span>► <a href="https://kit.co/KevTechify/studio-equipment" rel="nofollow">https://kit.co/KevTechify/studio-equipment</a></p><p> </p><p> </p>]]></description>
                <content:encoded>&lt;p&gt;In this episode we are going to look at ZPF Overview.&lt;/p&gt;&lt;p&gt;We will be discussing Benefits of a ZPF and ZPF Design.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security.&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;All my details and contact information can be found on my website, &lt;a href=&#34;https://kevtechify.com/&#34; rel=&#34;nofollow&#34;&gt;https://KevTechify.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Network Security v1&lt;/p&gt;&lt;p&gt;Episode 10 - Zone-Based Policy Firewalls&lt;/p&gt;&lt;p&gt;Part A- ZPF Overview&lt;/p&gt;&lt;p&gt;Podcast Number: 40&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Equipment I like.&lt;/p&gt;&lt;p&gt;Home Lab &lt;span&gt;►&lt;/span&gt;► &lt;a href=&#34;https://kit.co/KevTechify/home-lab&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/home-lab&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Networking Tools &lt;span&gt;►&lt;/span&gt;► &lt;a href=&#34;https://kit.co/KevTechify/networking-tools&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/networking-tools&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Studio Equipment &lt;span&gt;►&lt;/span&gt;► &lt;a href=&#34;https://kit.co/KevTechify/studio-equipment&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/studio-equipment&lt;/a&gt;&lt;/p&gt;&lt;p&gt; &lt;/p&gt;&lt;p&gt; &lt;/p&gt;</content:encoded>
                
                <enclosure length="9415366" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/c6f0e296-6716-420b-810f-b6484dd865ee/stream.mp3"/>
                
                <guid isPermaLink="false">53067a58-799c-4b50-b1a5-a5206b60d99b</guid>
                <link>https://KevTechify.com</link>
                <pubDate>Sun, 13 Mar 2022 08:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2022/2/23/23/1e73db95-6807-4f3a-a731-491f56c657b3_podnetsec.jpg"/>
                <itunes:duration>588</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Firewalls in Network Design - Firewall Technologies - Network Security - KevTechify | Podcast 39</itunes:title>
                <title>Firewalls in Network Design - Firewall Technologies - Network Security - KevTechify | Podcast 39</title>

                <itunes:episode>39</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>In this episode we are going to look at Firewalls in Network Design.</p><p>We will be discussing Common Security Architectures, Layered Defense, Network Security Design Concepts, and Identify Packet Flow.</p><p>Thank you so much for listening to this episode of my series on Network Security.</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>All my details and contact information can be found on my website, <a href="https://kevtechify.com/" rel="nofollow">https://KevTechify.com</a></p><p>-------------------------------------------------------</p><p>Network Security v1</p><p>Episode 9 - Firewall Technologies</p><p>Part B- Firewalls in Network Design</p><p>Podcast Number: 39</p><p>-------------------------------------------------------</p><p>Equipment I like.</p><p>Home Lab ►► <a href="https://kit.co/KevTechify/home-lab" rel="nofollow">https://kit.co/KevTechify/home-lab</a></p><p>Networking Tools ►► <a href="https://kit.co/KevTechify/networking-tools" rel="nofollow">https://kit.co/KevTechify/networking-tools</a></p><p>Studio Equipment ►► <a href="https://kit.co/KevTechify/studio-equipment" rel="nofollow">https://kit.co/KevTechify/studio-equipment</a></p><p> </p>]]></description>
                <content:encoded>&lt;p&gt;In this episode we are going to look at Firewalls in Network Design.&lt;/p&gt;&lt;p&gt;We will be discussing Common Security Architectures, Layered Defense, Network Security Design Concepts, and Identify Packet Flow.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security.&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;All my details and contact information can be found on my website, &lt;a href=&#34;https://kevtechify.com/&#34; rel=&#34;nofollow&#34;&gt;https://KevTechify.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;-------------------------------------------------------&lt;/p&gt;&lt;p&gt;Network Security v1&lt;/p&gt;&lt;p&gt;Episode 9 - Firewall Technologies&lt;/p&gt;&lt;p&gt;Part B- Firewalls in Network Design&lt;/p&gt;&lt;p&gt;Podcast Number: 39&lt;/p&gt;&lt;p&gt;-------------------------------------------------------&lt;/p&gt;&lt;p&gt;Equipment I like.&lt;/p&gt;&lt;p&gt;Home Lab ►► &lt;a href=&#34;https://kit.co/KevTechify/home-lab&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/home-lab&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Networking Tools ►► &lt;a href=&#34;https://kit.co/KevTechify/networking-tools&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/networking-tools&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Studio Equipment ►► &lt;a href=&#34;https://kit.co/KevTechify/studio-equipment&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/studio-equipment&lt;/a&gt;&lt;/p&gt;&lt;p&gt; &lt;/p&gt;</content:encoded>
                
                <enclosure length="13110543" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/a4720ecb-b829-4ceb-a0cb-d81bcaf62a2e/stream.mp3"/>
                
                <guid isPermaLink="false">4a1dc5ac-5474-41bf-902e-a7c2f1bb0531</guid>
                <link>https://KevTechify.com</link>
                <pubDate>Sat, 12 Mar 2022 09:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2022/2/23/23/2f646526-a73d-4008-975a-970a5e9f045f_cbb6d5a2-326e-47d2-a49a-0e9024c41809_podnetsec.jpg"/>
                <itunes:duration>819</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Secure Networks with Firewalls - Firewall Technologies - Network Security - KevTechify | Podcast 38</itunes:title>
                <title>Secure Networks with Firewalls - Firewall Technologies - Network Security - KevTechify | Podcast 38</title>

                <itunes:episode>38</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>In this episode we are going to look at Secure Networks with Firewalls.</p><p>We will be discussing Firewalls, Types of Firewalls, Packet Filtering Firewall Benefits and Limitations, and Stateful Firewall Benefits and Limitations.</p><p>Thank you so much for listening to this episode of my series on Network Security.</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>All my details and contact information can be found on my website, <a href="https://kevtechify.com/" rel="nofollow">https://KevTechify.com</a></p><p><span>-------------------------------------------------------</span></p><p>Network Security v1</p><p>Episode 9 - Firewall Technologies</p><p>Part A- Secure Networks with Firewalls</p><p>Podcast Number: 38</p><p><span>-------------------------------------------------------</span></p><p>Equipment I like.</p><p>Home Lab <span>►</span>► <a href="https://kit.co/KevTechify/home-lab" rel="nofollow">https://kit.co/KevTechify/home-lab</a></p><p>Networking Tools <span>►</span>► <a href="https://kit.co/KevTechify/networking-tools" rel="nofollow">https://kit.co/KevTechify/networking-tools</a></p><p>Studio Equipment <span>►</span>► <a href="https://kit.co/KevTechify/studio-equipment" rel="nofollow">https://kit.co/KevTechify/studio-equipment</a></p><p> </p><p> </p>]]></description>
                <content:encoded>&lt;p&gt;In this episode we are going to look at Secure Networks with Firewalls.&lt;/p&gt;&lt;p&gt;We will be discussing Firewalls, Types of Firewalls, Packet Filtering Firewall Benefits and Limitations, and Stateful Firewall Benefits and Limitations.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security.&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;All my details and contact information can be found on my website, &lt;a href=&#34;https://kevtechify.com/&#34; rel=&#34;nofollow&#34;&gt;https://KevTechify.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Network Security v1&lt;/p&gt;&lt;p&gt;Episode 9 - Firewall Technologies&lt;/p&gt;&lt;p&gt;Part A- Secure Networks with Firewalls&lt;/p&gt;&lt;p&gt;Podcast Number: 38&lt;/p&gt;&lt;p&gt;&lt;span&gt;-------------------------------------------------------&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Equipment I like.&lt;/p&gt;&lt;p&gt;Home Lab &lt;span&gt;►&lt;/span&gt;► &lt;a href=&#34;https://kit.co/KevTechify/home-lab&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/home-lab&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Networking Tools &lt;span&gt;►&lt;/span&gt;► &lt;a href=&#34;https://kit.co/KevTechify/networking-tools&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/networking-tools&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Studio Equipment &lt;span&gt;►&lt;/span&gt;► &lt;a href=&#34;https://kit.co/KevTechify/studio-equipment&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/studio-equipment&lt;/a&gt;&lt;/p&gt;&lt;p&gt; &lt;/p&gt;&lt;p&gt; &lt;/p&gt;</content:encoded>
                
                <enclosure length="13688581" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/0de5a7ce-da9f-4404-a501-2865b2f1e15e/stream.mp3"/>
                
                <guid isPermaLink="false">28c13ff7-9c0b-4ee6-b792-943094a9cc47</guid>
                <link>https://redcircle.com/shows/54180805-85e2-4677-9802-b19fdc0a3591/episodes/0de5a7ce-da9f-4404-a501-2865b2f1e15e</link>
                <pubDate>Fri, 11 Mar 2022 09:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2022/2/23/23/9a48f05b-fe9e-48f2-b258-7fd62d1dde17_podnetsec.jpg"/>
                <itunes:duration>855</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>IPv6 ACLs - Access Control Lists - Network Security - KevTechify | Podcast 37</itunes:title>
                <title>IPv6 ACLs - Access Control Lists - Network Security - KevTechify | Podcast 37</title>

                <itunes:episode>37</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>In this episode we are going to look at IPv6 ACLs.</p><p>We will be discussing IPv6 ACL Overview, IPv6 ACL Syntax, Configure IPv6 ACLs, and Configure IPv6 ACLs.</p><p>Thank you so much for listening to this episode of my series on Network Security.</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>All my details and contact information can be found on my website, <a href="https://kevtechify.com/" rel="nofollow">https://KevTechify.com</a></p><p>-------------------------------------------------------</p><p>Network Security v1</p><p>Episode 8 - Access Control Lists</p><p>Part G- IPv6 ACLs</p><p>Podcast Number: 37</p><p>-------------------------------------------------------</p><p>Equipment I like.</p><p>Home Lab ►► <a href="https://kit.co/KevTechify/home-lab" rel="nofollow">https://kit.co/KevTechify/home-lab</a></p><p>Networking Tools ►► <a href="https://kit.co/KevTechify/networking-tools" rel="nofollow">https://kit.co/KevTechify/networking-tools</a></p><p>Studio Equipment ►► <a href="https://kit.co/KevTechify/studio-equipment" rel="nofollow">https://kit.co/KevTechify/studio-equipment</a></p><p> </p><p> </p><p> </p>]]></description>
                <content:encoded>&lt;p&gt;In this episode we are going to look at IPv6 ACLs.&lt;/p&gt;&lt;p&gt;We will be discussing IPv6 ACL Overview, IPv6 ACL Syntax, Configure IPv6 ACLs, and Configure IPv6 ACLs.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security.&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;All my details and contact information can be found on my website, &lt;a href=&#34;https://kevtechify.com/&#34; rel=&#34;nofollow&#34;&gt;https://KevTechify.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;-------------------------------------------------------&lt;/p&gt;&lt;p&gt;Network Security v1&lt;/p&gt;&lt;p&gt;Episode 8 - Access Control Lists&lt;/p&gt;&lt;p&gt;Part G- IPv6 ACLs&lt;/p&gt;&lt;p&gt;Podcast Number: 37&lt;/p&gt;&lt;p&gt;-------------------------------------------------------&lt;/p&gt;&lt;p&gt;Equipment I like.&lt;/p&gt;&lt;p&gt;Home Lab ►► &lt;a href=&#34;https://kit.co/KevTechify/home-lab&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/home-lab&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Networking Tools ►► &lt;a href=&#34;https://kit.co/KevTechify/networking-tools&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/networking-tools&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Studio Equipment ►► &lt;a href=&#34;https://kit.co/KevTechify/studio-equipment&#34; rel=&#34;nofollow&#34;&gt;https://kit.co/KevTechify/studio-equipment&lt;/a&gt;&lt;/p&gt;&lt;p&gt; &lt;/p&gt;&lt;p&gt; &lt;/p&gt;&lt;p&gt; &lt;/p&gt;</content:encoded>
                
                <enclosure length="11623862" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/2d44064e-d8bf-466d-b6b2-b163a10c86b0/stream.mp3"/>
                
                <guid isPermaLink="false">7f2b8518-67b9-457b-b850-6308323f6533</guid>
                <link>https://KevTechify.com</link>
                <pubDate>Thu, 10 Mar 2022 21:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2022/3/26/22/b8b4dec3-b93a-4064-8e32-a50c65c2c94c_3b9002f5-ff09-4032-a96c-e7c4da6733e3_podnetsec.jpg"/>
                <itunes:duration>726</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Mitigate Attacks with ACLs - Access Control Lists - Network Security - KevTechify | Podcast 36</itunes:title>
                <title>Mitigate Attacks with ACLs - Access Control Lists - Network Security - KevTechify | Podcast 36</title>

                <itunes:episode>36</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>In this episode we are going to look at Mitigate Attacks with ACLs.</p><p>We will be discussing Mitigate Spoofing Attacks, Permit Necessary Traffic through a Firewall, Mitigate ICMP Attacks, Mitigate SNMP Attacks, and Configure IP ACLs to Mitigate Attacks.</p><p>Thank you so much for listening to this episode of my series on Network Security.</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>http://KevTechify.com</p><p>***********************************</p><p>Network Security v1</p><p>Episode 8 - Access Control Lists</p><p>Part F- Mitigate Attacks with ACLs</p><p>Podcast Number: 36</p>]]></description>
                <content:encoded>&lt;p&gt;In this episode we are going to look at Mitigate Attacks with ACLs.&lt;/p&gt;&lt;p&gt;We will be discussing Mitigate Spoofing Attacks, Permit Necessary Traffic through a Firewall, Mitigate ICMP Attacks, Mitigate SNMP Attacks, and Configure IP ACLs to Mitigate Attacks.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security.&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;http://KevTechify.com&lt;/p&gt;&lt;p&gt;***********************************&lt;/p&gt;&lt;p&gt;Network Security v1&lt;/p&gt;&lt;p&gt;Episode 8 - Access Control Lists&lt;/p&gt;&lt;p&gt;Part F- Mitigate Attacks with ACLs&lt;/p&gt;&lt;p&gt;Podcast Number: 36&lt;/p&gt;</content:encoded>
                
                <enclosure length="11110609" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/19adfc63-e59a-4f29-8578-6a36a4b49637/stream.mp3"/>
                
                <guid isPermaLink="false">25d56107-1541-4f5f-8702-22eb81374abf</guid>
                <link>https://KevTechify.com</link>
                <pubDate>Wed, 09 Mar 2022 09:00:00 &#43;0000</pubDate>
                <itunes:duration>694</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Implement ACLs - Access Control Lists - Network Security - KevTechify | Podcast 35</itunes:title>
                <title>Implement ACLs - Access Control Lists - Network Security - KevTechify | Podcast 35</title>

                <itunes:episode>35</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>In this episode we are going to look at Implement ACLs.</p><p>We will be discussing ACL Configuration Guidelines, Apply an ACL, Where to Place ACLs, Standard ACL Placement Example, Configure Named Standard IPv4 ACLs, Configure Numbered Standard IPv4 ACLs, and Extended ACL Placement Example.</p><p>Thank you so much for listening to this episode of my series on Network Security.</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>http://KevTechify.com</p><p>***********************************</p><p>Network Security v1</p><p>Episode 8 - Access Control Lists</p><p>Part E- Implement ACLs</p><p>Podcast Number: 35</p>]]></description>
                <content:encoded>&lt;p&gt;In this episode we are going to look at Implement ACLs.&lt;/p&gt;&lt;p&gt;We will be discussing ACL Configuration Guidelines, Apply an ACL, Where to Place ACLs, Standard ACL Placement Example, Configure Named Standard IPv4 ACLs, Configure Numbered Standard IPv4 ACLs, and Extended ACL Placement Example.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security.&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;http://KevTechify.com&lt;/p&gt;&lt;p&gt;***********************************&lt;/p&gt;&lt;p&gt;Network Security v1&lt;/p&gt;&lt;p&gt;Episode 8 - Access Control Lists&lt;/p&gt;&lt;p&gt;Part E- Implement ACLs&lt;/p&gt;&lt;p&gt;Podcast Number: 35&lt;/p&gt;</content:encoded>
                
                <enclosure length="19303862" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/4b32c851-c9af-4d6f-a56d-594f2dd36dfb/stream.mp3"/>
                
                <guid isPermaLink="false">e7e9c5ef-67b4-4f42-a6ea-d6202f2ed90d</guid>
                <link>https://KevTechify.com</link>
                <pubDate>Tue, 08 Mar 2022 09:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2022/3/26/22/41459398-19cb-4cf1-99cf-dd7b22d7545a_3e201c84-9a87-44c6-8a30-560d00e68b44_podnetsec.jpg"/>
                <itunes:duration>1206</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Modify ACLs - Access Control Lists - Network Security - KevTechify | Podcast 34</itunes:title>
                <title>Modify ACLs - Access Control Lists - Network Security - KevTechify | Podcast 34</title>

                <itunes:episode>34</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>In this episode we are going to look at Modify ACLs.</p><p>We will be discussing Two Methods to Modify an ACL, Text Editor Method, Sequence Number Method, Syntax Checker - Modify IPv4 ACLs, , , , , , , , , ,.</p><p>Thank you so much for listening to this episode of my series on Network Security.</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>http://KevTechify.com</p><p>***********************************</p><p>Network Security v1</p><p>Episode 8 - Access Control Lists</p><p>Part D- Modify ACLs</p><p>Podcast Number: 34</p>]]></description>
                <content:encoded>&lt;p&gt;In this episode we are going to look at Modify ACLs.&lt;/p&gt;&lt;p&gt;We will be discussing Two Methods to Modify an ACL, Text Editor Method, Sequence Number Method, Syntax Checker - Modify IPv4 ACLs, , , , , , , , , ,.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security.&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;http://KevTechify.com&lt;/p&gt;&lt;p&gt;***********************************&lt;/p&gt;&lt;p&gt;Network Security v1&lt;/p&gt;&lt;p&gt;Episode 8 - Access Control Lists&lt;/p&gt;&lt;p&gt;Part D- Modify ACLs&lt;/p&gt;&lt;p&gt;Podcast Number: 34&lt;/p&gt;</content:encoded>
                
                <enclosure length="5717263" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/111d8fb4-0337-4a4c-8dcc-6b579b8b0508/stream.mp3"/>
                
                <guid isPermaLink="false">52c06502-4746-4c60-822c-b57a98b1d636</guid>
                <link>https://KevTechify.com</link>
                <pubDate>Mon, 07 Mar 2022 09:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2022/2/16/17/d64d9562-8244-4902-aa5c-d2fc623e27e9_podnetsec.jpg"/>
                <itunes:duration>357</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Configure ACLs - Access Control Lists - Network Security - KevTechify | Podcast 33</itunes:title>
                <title>Configure ACLs - Access Control Lists - Network Security - KevTechify | Podcast 33</title>

                <itunes:episode>33</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>In this episode we are going to look at Configure ACLs.</p><p>We will be discussing Creating an ACL, Numbered Standard IPv4 ACL Syntax, Named Standard IPv4 ACL Syntax, Numbered Extended IPv4 ACL Syntax, Protocols and Port Numbers, TCP Established Extended ACL, and Named Extended IPv4 ACL Syntax.</p><p>Thank you so much for listening to this episode of my series on Network Security.</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>http://KevTechify.com</p><p>***********************************</p><p>Network Security v1</p><p>Episode 8 - Access Control Lists</p><p>Part C- Configure ACLs</p><p>Podcast Number: 33</p>]]></description>
                <content:encoded>&lt;p&gt;In this episode we are going to look at Configure ACLs.&lt;/p&gt;&lt;p&gt;We will be discussing Creating an ACL, Numbered Standard IPv4 ACL Syntax, Named Standard IPv4 ACL Syntax, Numbered Extended IPv4 ACL Syntax, Protocols and Port Numbers, TCP Established Extended ACL, and Named Extended IPv4 ACL Syntax.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security.&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;http://KevTechify.com&lt;/p&gt;&lt;p&gt;***********************************&lt;/p&gt;&lt;p&gt;Network Security v1&lt;/p&gt;&lt;p&gt;Episode 8 - Access Control Lists&lt;/p&gt;&lt;p&gt;Part C- Configure ACLs&lt;/p&gt;&lt;p&gt;Podcast Number: 33&lt;/p&gt;</content:encoded>
                
                <enclosure length="26757329" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/92d6f762-47e0-420c-8400-cba4b510691e/stream.mp3"/>
                
                <guid isPermaLink="false">446815f0-e9da-4bbc-9e1a-afefbbb56b00</guid>
                <link>https://KevTechify.com</link>
                <pubDate>Sun, 06 Mar 2022 09:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2022/2/16/17/4ac4d977-bd40-4a9b-89c6-278b4a6339ca_podnetsec.jpg"/>
                <itunes:duration>1672</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Wildcard Masking - Access Control Lists - Network Security - KevTechify | Podcast 32</itunes:title>
                <title>Wildcard Masking - Access Control Lists - Network Security - KevTechify | Podcast 32</title>

                <itunes:episode>32</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>In this episode we are going to look at Wildcard Masking.</p><p>We will be discussing Wildcard Mask Overview, Wildcard Mask Types, Wildcard Mask Calculation, and Wildcard Mask Keywords.</p><p>Thank you so much for listening to this episode of my series on Network Security.</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>http://KevTechify.com</p><p>***********************************</p><p>Network Security v1</p><p>Episode 8 - Access Control Lists</p><p>Part B- Wildcard Masking</p><p>Podcast Number: 32</p>]]></description>
                <content:encoded>&lt;p&gt;In this episode we are going to look at Wildcard Masking.&lt;/p&gt;&lt;p&gt;We will be discussing Wildcard Mask Overview, Wildcard Mask Types, Wildcard Mask Calculation, and Wildcard Mask Keywords.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security.&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;http://KevTechify.com&lt;/p&gt;&lt;p&gt;***********************************&lt;/p&gt;&lt;p&gt;Network Security v1&lt;/p&gt;&lt;p&gt;Episode 8 - Access Control Lists&lt;/p&gt;&lt;p&gt;Part B- Wildcard Masking&lt;/p&gt;&lt;p&gt;Podcast Number: 32&lt;/p&gt;</content:encoded>
                
                <enclosure length="17375399" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/26875dce-f549-449b-b33e-b08268ac6a7b/stream.mp3"/>
                
                <guid isPermaLink="false">4bff04b0-b5c4-4a8f-9089-7e9d54f1d625</guid>
                <link>https://KevTechify.com</link>
                <pubDate>Sat, 05 Mar 2022 09:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2022/2/16/17/4305b03d-7aba-481e-9c2e-a71098f8f96a_podnetsec.jpg"/>
                <itunes:duration>1085</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Introduction to Access Control Lists - Access Control Lists - Network Security - KevTechify | Podcast 31</itunes:title>
                <title>Introduction to Access Control Lists - Access Control Lists - Network Security - KevTechify | Podcast 31</title>

                <itunes:episode>31</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>In this episode we are going to look at Introduction to Access Control Lists.</p><p>We will be discussing What is an ACL?, Packet Filtering, Numbered and Named ACLs, ACL Operation, and an ACL Demonstration.</p><p>Thank you so much for listening to this episode of my series on Network Security.</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>http://KevTechify.com</p><p>***********************************</p><p>Network Security v1</p><p>Episode 8 - Access Control Lists</p><p>Part A- Introduction to Access Control Lists</p><p>Podcast Number: 31</p>]]></description>
                <content:encoded>&lt;p&gt;In this episode we are going to look at Introduction to Access Control Lists.&lt;/p&gt;&lt;p&gt;We will be discussing What is an ACL?, Packet Filtering, Numbered and Named ACLs, ACL Operation, and an ACL Demonstration.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security.&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;http://KevTechify.com&lt;/p&gt;&lt;p&gt;***********************************&lt;/p&gt;&lt;p&gt;Network Security v1&lt;/p&gt;&lt;p&gt;Episode 8 - Access Control Lists&lt;/p&gt;&lt;p&gt;Part A- Introduction to Access Control Lists&lt;/p&gt;&lt;p&gt;Podcast Number: 31&lt;/p&gt;</content:encoded>
                
                <enclosure length="10483252" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/8e957002-4ce1-4509-ae2c-9686e71d30c6/stream.mp3"/>
                
                <guid isPermaLink="false">21138a3d-586a-4686-ba49-f74ffdeef6fb</guid>
                <link>https://KevTechify.com</link>
                <pubDate>Fri, 04 Mar 2022 09:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2022/2/16/17/c1fb2a2b-a604-4c79-9dba-53c69ca8d1cf_podnetsec.jpg"/>
                <itunes:duration>655</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Configure Server-Based Authorization and Accounting - Authentication, Authorization, and Accounting (AAA) - Network Security - KevTechify | Podcast 30</itunes:title>
                <title>Configure Server-Based Authorization and Accounting - Authentication, Authorization, and Accounting (AAA) - Network Security - KevTechify | Podcast 30</title>

                <itunes:episode>30</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>In this episode we are going to look at Configure Server-Based Authorization and Accounting.</p><p>We will be discussing Introduction to Server-Based AAA Authorization, AAA Authorization Configuration, Introduction to Server-Based AAA Accounting, and AAA Accounting Configuration.</p><p>Thank you so much for listening to this episode of my series on Network Security.</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>http://KevTechify.com</p><p>***********************************</p><p>Network Security v1</p><p>Episode 7 - Authentication, Authorization, and Accounting (AAA)</p><p>Part E- Configure Server-Based Authorization and Accounting</p><p>Podcast Number: 30</p>]]></description>
                <content:encoded>&lt;p&gt;In this episode we are going to look at Configure Server-Based Authorization and Accounting.&lt;/p&gt;&lt;p&gt;We will be discussing Introduction to Server-Based AAA Authorization, AAA Authorization Configuration, Introduction to Server-Based AAA Accounting, and AAA Accounting Configuration.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security.&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;http://KevTechify.com&lt;/p&gt;&lt;p&gt;***********************************&lt;/p&gt;&lt;p&gt;Network Security v1&lt;/p&gt;&lt;p&gt;Episode 7 - Authentication, Authorization, and Accounting (AAA)&lt;/p&gt;&lt;p&gt;Part E- Configure Server-Based Authorization and Accounting&lt;/p&gt;&lt;p&gt;Podcast Number: 30&lt;/p&gt;</content:encoded>
                
                <enclosure length="5790406" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/7e2f7d91-8365-4d0c-a9ea-1e4b531b0e42/stream.mp3"/>
                
                <guid isPermaLink="false">26324423-6818-4cee-91a6-c874d8b34817</guid>
                <link>https://KevTechify.com</link>
                <pubDate>Thu, 03 Mar 2022 09:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2022/2/16/17/b0448ccd-b75e-4ffd-a690-17f557674cc5_podnetsec.jpg"/>
                <itunes:duration>361</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Configure Server-Based Authentication - Authentication, Authorization, and Accounting (AAA) - Network Security - KevTechify | Podcast 29</itunes:title>
                <title>Configure Server-Based Authentication - Authentication, Authorization, and Accounting (AAA) - Network Security - KevTechify | Podcast 29</title>

                <itunes:episode>29</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>In this episode we are going to look at Configure Server-Based Authentication.</p><p>We will be discussing Steps to Configure Server-Based AAA Authentication, Configure TACACS+ Servers, Configure RADIUS Servers, and Authenticate to the AAA Server Configuration Commands, .</p><p>Thank you so much for listening to this episode of my series on Network Security.</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>http://KevTechify.com</p><p>***********************************</p><p>Network Security v1</p><p>Episode 7 - Authentication, Authorization, and Accounting (AAA)</p><p>Part D- Configure Server-Based Authentication</p><p>Podcast Number: 29</p>]]></description>
                <content:encoded>&lt;p&gt;In this episode we are going to look at Configure Server-Based Authentication.&lt;/p&gt;&lt;p&gt;We will be discussing Steps to Configure Server-Based AAA Authentication, Configure TACACS&#43; Servers, Configure RADIUS Servers, and Authenticate to the AAA Server Configuration Commands, .&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security.&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;http://KevTechify.com&lt;/p&gt;&lt;p&gt;***********************************&lt;/p&gt;&lt;p&gt;Network Security v1&lt;/p&gt;&lt;p&gt;Episode 7 - Authentication, Authorization, and Accounting (AAA)&lt;/p&gt;&lt;p&gt;Part D- Configure Server-Based Authentication&lt;/p&gt;&lt;p&gt;Podcast Number: 29&lt;/p&gt;</content:encoded>
                
                <enclosure length="7287118" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/b83a14fc-b9f4-47fc-86b1-9d135937a456/stream.mp3"/>
                
                <guid isPermaLink="false">35b4849f-5f7d-45c2-94b2-387c1343653d</guid>
                <link>https://KevTechify.com</link>
                <pubDate>Wed, 02 Mar 2022 09:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2022/2/16/17/febf50c1-bdc1-4ae5-8ba2-b9a3ea934436_podnetsec.jpg"/>
                <itunes:duration>455</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Server-Based AAA Characteristics and Protocols - Authentication, Authorization, and Accounting (AAA) - Network Security - KevTechify | Podcast 28</itunes:title>
                <title>Server-Based AAA Characteristics and Protocols - Authentication, Authorization, and Accounting (AAA) - Network Security - KevTechify | Podcast 28</title>

                <itunes:episode>28</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>In this episode we are going to look at Server-Based AAA Characteristics and Protocols.</p><p>We will be discussing Compare Local AAA and Server-Based AAA Implementations, Cisco Identity Services Engine (ISE), The TACACS+ and RADIUS Protocols, TACACS+ Authentication, and RADIUS Authentication.</p><p>Thank you so much for listening to this episode of my series on Network Security.</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>http://KevTechify.com</p><p>***********************************</p><p>Network Security v1</p><p>Episode 7 - Authentication, Authorization, and Accounting (AAA)</p><p>Part C- Server-Based AAA Characteristics and Protocols</p><p>Podcast Number: 28</p>]]></description>
                <content:encoded>&lt;p&gt;In this episode we are going to look at Server-Based AAA Characteristics and Protocols.&lt;/p&gt;&lt;p&gt;We will be discussing Compare Local AAA and Server-Based AAA Implementations, Cisco Identity Services Engine (ISE), The TACACS&#43; and RADIUS Protocols, TACACS&#43; Authentication, and RADIUS Authentication.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security.&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;http://KevTechify.com&lt;/p&gt;&lt;p&gt;***********************************&lt;/p&gt;&lt;p&gt;Network Security v1&lt;/p&gt;&lt;p&gt;Episode 7 - Authentication, Authorization, and Accounting (AAA)&lt;/p&gt;&lt;p&gt;Part C- Server-Based AAA Characteristics and Protocols&lt;/p&gt;&lt;p&gt;Podcast Number: 28&lt;/p&gt;</content:encoded>
                
                <enclosure length="10237074" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/887ce8bf-be19-40d8-bc87-7d8570404b48/stream.mp3"/>
                
                <guid isPermaLink="false">94b9feab-b1eb-4708-91aa-1cbf9b260bf4</guid>
                <link>https://KevTechify.com</link>
                <pubDate>Tue, 01 Mar 2022 09:00:00 &#43;0000</pubDate>
                <itunes:duration>639</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Configure Local AAA Authentication - Authentication, Authorization, and Accounting (AAA) - Network Security - KevTechify | Podcast 27</itunes:title>
                <title>Configure Local AAA Authentication - Authentication, Authorization, and Accounting (AAA) - Network Security - KevTechify | Podcast 27</title>

                <itunes:episode>27</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>In this episode we are going to look at Configure Local AAA Authentication.</p><p>We will be discussing Authenticate Administrative Access, Authentication Methods, Default and Named Methods, Fine-Tuning the Authentication Configuration, Configure Local AAA Authentication, and Configure Local AAA for Console and VTY Access.</p><p>Thank you so much for listening to this episode of my series on Network Security.</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>http://KevTechify.com</p><p>***********************************</p><p>Network Security v1</p><p>Episode 7 - Authentication, Authorization, and Accounting (AAA)</p><p>Part B- Configure Local AAA Authentication</p><p>Podcast Number: 27</p>]]></description>
                <content:encoded>&lt;p&gt;In this episode we are going to look at Configure Local AAA Authentication.&lt;/p&gt;&lt;p&gt;We will be discussing Authenticate Administrative Access, Authentication Methods, Default and Named Methods, Fine-Tuning the Authentication Configuration, Configure Local AAA Authentication, and Configure Local AAA for Console and VTY Access.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security.&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;http://KevTechify.com&lt;/p&gt;&lt;p&gt;***********************************&lt;/p&gt;&lt;p&gt;Network Security v1&lt;/p&gt;&lt;p&gt;Episode 7 - Authentication, Authorization, and Accounting (AAA)&lt;/p&gt;&lt;p&gt;Part B- Configure Local AAA Authentication&lt;/p&gt;&lt;p&gt;Podcast Number: 27&lt;/p&gt;</content:encoded>
                
                <enclosure length="9350164" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/4dd6a974-baad-429e-8507-62ca1cfab45a/stream.mp3"/>
                
                <guid isPermaLink="false">c14c7f81-1ef2-4e71-87dd-67b7deec77c2</guid>
                <link>https://KevTechify.com</link>
                <pubDate>Mon, 28 Feb 2022 09:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2022/2/16/17/702642af-b2eb-4445-acb3-98888075bf7e_8e89a9c9-a9ea-4a24-8cc1-0823b4e3eb0d_podnetsec.jpg"/>
                <itunes:duration>584</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>AAA Characteristics - Authentication, Authorization, and Accounting (AAA) - Network Security - KevTechify | Podcast 26</itunes:title>
                <title>AAA Characteristics - Authentication, Authorization, and Accounting (AAA) - Network Security - KevTechify | Podcast 26</title>

                <itunes:episode>26</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>In this episode we are going to look at AAA Characteristics.</p><p>We will be discussing Authentication without AAA, AAA Components, Authentication Modes, Authorization, and Accounting.</p><p>Thank you so much for listening to this episode of my series on Network Security.</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>http://KevTechify.com</p><p>***********************************</p><p>Network Security v1</p><p>Episode 7 - Authentication, Authorization, and Accounting (AAA)</p><p>Part A- AAA Characteristics</p><p>Podcast Number: 26</p>]]></description>
                <content:encoded>&lt;p&gt;In this episode we are going to look at AAA Characteristics.&lt;/p&gt;&lt;p&gt;We will be discussing Authentication without AAA, AAA Components, Authentication Modes, Authorization, and Accounting.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security.&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;http://KevTechify.com&lt;/p&gt;&lt;p&gt;***********************************&lt;/p&gt;&lt;p&gt;Network Security v1&lt;/p&gt;&lt;p&gt;Episode 7 - Authentication, Authorization, and Accounting (AAA)&lt;/p&gt;&lt;p&gt;Part A- AAA Characteristics&lt;/p&gt;&lt;p&gt;Podcast Number: 26&lt;/p&gt;</content:encoded>
                
                <enclosure length="8312790" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/ff943b7d-36c3-4277-86c4-d3835226cb24/stream.mp3"/>
                
                <guid isPermaLink="false">189efda2-00dc-427d-806c-08321feb8678</guid>
                <link>https://KevTechify.com</link>
                <pubDate>Sun, 27 Feb 2022 09:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2022/2/16/17/adafce23-1173-41f4-a337-5150d93e7860_podnetsec.jpg"/>
                <itunes:duration>519</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>SNMP Configuration - Device Monitoring and Management - Network Security - KevTechify | Podcast 25</itunes:title>
                <title>SNMP Configuration - Device Monitoring and Management - Network Security - KevTechify | Podcast 25</title>

                <itunes:episode>25</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>In this episode we are going to look at SNMP Configuration.</p><p>We will be discussing Introduction to SNMP, SNMP Operation, Management Information Base (MIB), SNMP Versions, SNMP Vulnerabilities, SNMPv3, SNMPv3 Security Configuration, and Configure Cisco Devices for Syslog, NTP, and SSH Operations.</p><p>Thank you so much for listening to this episode of my series on Network Security.</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>http://KevTechify.com</p><p>***********************************</p><p>Network Security v1</p><p>Episode 6 - Device Monitoring and Management</p><p>Part G- SNMP Configuration</p><p>Podcast Number: 25</p>]]></description>
                <content:encoded>&lt;p&gt;In this episode we are going to look at SNMP Configuration.&lt;/p&gt;&lt;p&gt;We will be discussing Introduction to SNMP, SNMP Operation, Management Information Base (MIB), SNMP Versions, SNMP Vulnerabilities, SNMPv3, SNMPv3 Security Configuration, and Configure Cisco Devices for Syslog, NTP, and SSH Operations.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security.&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;http://KevTechify.com&lt;/p&gt;&lt;p&gt;***********************************&lt;/p&gt;&lt;p&gt;Network Security v1&lt;/p&gt;&lt;p&gt;Episode 6 - Device Monitoring and Management&lt;/p&gt;&lt;p&gt;Part G- SNMP Configuration&lt;/p&gt;&lt;p&gt;Podcast Number: 25&lt;/p&gt;</content:encoded>
                
                <enclosure length="22308571" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/0a023d99-2db0-4e8a-a9bf-64e284911979/stream.mp3"/>
                
                <guid isPermaLink="false">9d539d11-03d1-4fb8-801d-b1eecb75f74b</guid>
                <link>https://KevTechify.com</link>
                <pubDate>Sat, 26 Feb 2022 09:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2022/2/16/17/8b63f6ca-bcc3-42e8-9408-49d103296e48_podnetsec.jpg"/>
                <itunes:duration>1394</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>NTP Configuration - Device Monitoring and Management - Network Security - KevTechify | Podcast 24</itunes:title>
                <title>NTP Configuration - Device Monitoring and Management - Network Security - KevTechify | Podcast 24</title>

                <itunes:episode>24</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>In this episode we are going to look at NTP Configuration.</p><p>We will be discussing Time and Calendar Services, NTP Operation, and Configure and Verify NTP.</p><p>Thank you so much for listening to this episode of my series on Network Security.</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>http://KevTechify.com</p><p>***********************************</p><p>Network Security v1</p><p>Episode 6 - Device Monitoring and Management</p><p>Part F- NTP Configuration</p><p>Podcast Number: 24</p>]]></description>
                <content:encoded>&lt;p&gt;In this episode we are going to look at NTP Configuration.&lt;/p&gt;&lt;p&gt;We will be discussing Time and Calendar Services, NTP Operation, and Configure and Verify NTP.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security.&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;http://KevTechify.com&lt;/p&gt;&lt;p&gt;***********************************&lt;/p&gt;&lt;p&gt;Network Security v1&lt;/p&gt;&lt;p&gt;Episode 6 - Device Monitoring and Management&lt;/p&gt;&lt;p&gt;Part F- NTP Configuration&lt;/p&gt;&lt;p&gt;Podcast Number: 24&lt;/p&gt;</content:encoded>
                
                <enclosure length="12449750" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/570daab4-46f6-49fc-bd63-6d7f903fc868/stream.mp3"/>
                
                <guid isPermaLink="false">74ea2a3a-35c5-4442-8ef2-1c8ac4e9483e</guid>
                <link>https://KevTechify.com</link>
                <pubDate>Fri, 25 Feb 2022 09:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2022/2/16/17/a6499f78-28f4-4208-9dff-1babfab0dd3f_podnetsec.jpg"/>
                <itunes:duration>778</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Network Security Using Syslog - Device Monitoring and Management - Network Security - KevTechify | Podcast 23</itunes:title>
                <title>Network Security Using Syslog - Device Monitoring and Management - Network Security - KevTechify | Podcast 23</title>

                <itunes:episode>23</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>In this episode we are going to look at Network Security Using Syslog.</p><p>We will be discussing Introduction to Syslog, Syslog Operation, Syslog Message Format, Syslog Facilities, Configure Syslog Timestamps, Syslog Systems, and Syslog Configuration.</p><p>Thank you so much for listening to this episode of my series on Network Security.</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>http://KevTechify.com</p><p>***********************************</p><p>Network Security v1</p><p>Episode 6 - Device Monitoring and Management</p><p>Part E- Network Security Using Syslog</p><p>Podcast Number: 23</p>]]></description>
                <content:encoded>&lt;p&gt;In this episode we are going to look at Network Security Using Syslog.&lt;/p&gt;&lt;p&gt;We will be discussing Introduction to Syslog, Syslog Operation, Syslog Message Format, Syslog Facilities, Configure Syslog Timestamps, Syslog Systems, and Syslog Configuration.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security.&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;http://KevTechify.com&lt;/p&gt;&lt;p&gt;***********************************&lt;/p&gt;&lt;p&gt;Network Security v1&lt;/p&gt;&lt;p&gt;Episode 6 - Device Monitoring and Management&lt;/p&gt;&lt;p&gt;Part E- Network Security Using Syslog&lt;/p&gt;&lt;p&gt;Podcast Number: 23&lt;/p&gt;</content:encoded>
                
                <enclosure length="14668695" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/77dbb0c3-d1e8-4d79-a9ac-20b586fd77a1/stream.mp3"/>
                
                <guid isPermaLink="false">3b151a93-b25a-4363-939d-8a50e38a717d</guid>
                <link>https://KevTechify.com</link>
                <pubDate>Thu, 24 Feb 2022 09:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2022/2/16/17/3b79dee3-cb4d-4ba3-8c67-f640930b57f8_podnetsec.jpg"/>
                <itunes:duration>916</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Secure Management and Reporting - Device Monitoring and Management - Network Security - KevTechify | Podcast 22</itunes:title>
                <title>Secure Management and Reporting - Device Monitoring and Management - Network Security - KevTechify | Podcast 22</title>

                <itunes:episode>22</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>In this episode we are going to look at Secure Management and Reporting.</p><p>We will be discussing Types of Management Access and Out-of-Band and In-Band Access.</p><p>Thank you so much for listening to this episode of my series on Network Security.</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>http://KevTechify.com</p><p>***********************************</p><p>Network Security v1</p><p>Episode 6 - Device Monitoring and Management</p><p>Part D- Secure Management and Reporting</p><p>Podcast Number: 22</p>]]></description>
                <content:encoded>&lt;p&gt;In this episode we are going to look at Secure Management and Reporting.&lt;/p&gt;&lt;p&gt;We will be discussing Types of Management Access and Out-of-Band and In-Band Access.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security.&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;http://KevTechify.com&lt;/p&gt;&lt;p&gt;***********************************&lt;/p&gt;&lt;p&gt;Network Security v1&lt;/p&gt;&lt;p&gt;Episode 6 - Device Monitoring and Management&lt;/p&gt;&lt;p&gt;Part D- Secure Management and Reporting&lt;/p&gt;&lt;p&gt;Podcast Number: 22&lt;/p&gt;</content:encoded>
                
                <enclosure length="6308675" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/73a0be43-08ee-48b7-b5a9-21a23291e67d/stream.mp3"/>
                
                <guid isPermaLink="false">4551102f-d8ce-415e-b9dd-9da27a1d33f4</guid>
                <link>https://KevTechify.com</link>
                <pubDate>Wed, 23 Feb 2022 09:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2022/2/16/17/f7fb881d-9251-41ca-9089-8d86c647bf79_podnetsec.jpg"/>
                <itunes:duration>394</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Routing Protocol Authentication - Device Monitoring and Management - Network Security - KevTechify | Podcast 21</itunes:title>
                <title>Routing Protocol Authentication - Device Monitoring and Management - Network Security - KevTechify | Podcast 21</title>

                <itunes:episode>21</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>In this episode we are going to look at Routing Protocol Authentication.</p><p>We will be discussing Dynamic Routing Protocols, Routing Protocol Spoofing, OSPF MD5 Routing Protocol Authentication, OSPF SHA Routing Protocol Authentication, Syntax Checker- OSPF SHA Routing Protocol Authentication, Basic Device Configuration and OSPF Authentication, Configure OSPF Authentication, , , , , , ,.</p><p>Thank you so much for listening to this episode of my series on Network Security.</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>http://KevTechify.com</p><p>***********************************</p><p>Network Security v1</p><p>Episode 6 - Device Monitoring and Management</p><p>Part C- Routing Protocol Authentication</p><p>Podcast Number: 21</p>]]></description>
                <content:encoded>&lt;p&gt;In this episode we are going to look at Routing Protocol Authentication.&lt;/p&gt;&lt;p&gt;We will be discussing Dynamic Routing Protocols, Routing Protocol Spoofing, OSPF MD5 Routing Protocol Authentication, OSPF SHA Routing Protocol Authentication, Syntax Checker- OSPF SHA Routing Protocol Authentication, Basic Device Configuration and OSPF Authentication, Configure OSPF Authentication, , , , , , ,.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security.&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;http://KevTechify.com&lt;/p&gt;&lt;p&gt;***********************************&lt;/p&gt;&lt;p&gt;Network Security v1&lt;/p&gt;&lt;p&gt;Episode 6 - Device Monitoring and Management&lt;/p&gt;&lt;p&gt;Part C- Routing Protocol Authentication&lt;/p&gt;&lt;p&gt;Podcast Number: 21&lt;/p&gt;</content:encoded>
                
                <enclosure length="16297482" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/f23f12bd-2892-40af-922e-ab2c44458ddb/stream.mp3"/>
                
                <guid isPermaLink="false">7ae17360-34a4-42a8-bc0d-937c21604a04</guid>
                <link>https://KevTechify.com</link>
                <pubDate>Tue, 22 Feb 2022 09:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2022/2/16/17/6cc6ac60-4b3a-45c7-b4a9-0b61ae948667_podnetsec.jpg"/>
                <itunes:duration>1018</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Lock Down a Router Using AutoSecure - Device Monitoring and Management - Network Security - KevTechify | Podcast 20</itunes:title>
                <title>Lock Down a Router Using AutoSecure - Device Monitoring and Management - Network Security - KevTechify | Podcast 20</title>

                <itunes:episode>20</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>In this episode we are going to look at Lock Down a Router Using AutoSecure.</p><p>We will be discussing Discovery Protocols CDP and LLDP, Settings for Protocols and Services, Cisco AutoSecure, Cisco AutoSecure Configuration Example, and Configure Automated Security Features.</p><p>Thank you so much for listening to this episode of my series on Network Security.</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>http://KevTechify.com</p><p>***********************************</p><p>Network Security v1</p><p>Episode 6 - Device Monitoring and Management</p><p>Part B- Lock Down a Router Using AutoSecure</p><p>Podcast Number: 20</p>]]></description>
                <content:encoded>&lt;p&gt;In this episode we are going to look at Lock Down a Router Using AutoSecure.&lt;/p&gt;&lt;p&gt;We will be discussing Discovery Protocols CDP and LLDP, Settings for Protocols and Services, Cisco AutoSecure, Cisco AutoSecure Configuration Example, and Configure Automated Security Features.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security.&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;http://KevTechify.com&lt;/p&gt;&lt;p&gt;***********************************&lt;/p&gt;&lt;p&gt;Network Security v1&lt;/p&gt;&lt;p&gt;Episode 6 - Device Monitoring and Management&lt;/p&gt;&lt;p&gt;Part B- Lock Down a Router Using AutoSecure&lt;/p&gt;&lt;p&gt;Podcast Number: 20&lt;/p&gt;</content:encoded>
                
                <enclosure length="15680992" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/305d488d-a880-4be6-8f5c-bf7447d70a29/stream.mp3"/>
                
                <guid isPermaLink="false">3e2bccca-531c-4d4d-a091-952699d6e7d9</guid>
                <link>https://KevTechify.com</link>
                <pubDate>Mon, 21 Feb 2022 09:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2022/2/16/17/77a39390-d283-42b0-bb86-42eb1d591436_podnetsec.jpg"/>
                <itunes:duration>980</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Secure Cisco IOS Image and Configuration Files - Device Monitoring and Management - Network Security - KevTechify | Podcast 19</itunes:title>
                <title>Secure Cisco IOS Image and Configuration Files - Device Monitoring and Management - Network Security - KevTechify | Podcast 19</title>

                <itunes:episode>19</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>In this episode we are going to look at Secure Cisco IOS Image and Configuration Files.</p><p>We will be discussing Cisco IOS Resilient Configuration Feature, Enable the IOS Image Resilience Feature, The Primary Bootset Image, Configure Secure Copy, and Recover a Router Password.</p><p>Thank you so much for listening to this episode of my series on Network Security.</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>http://KevTechify.com</p><p>***********************************</p><p>Network Security v1</p><p>Episode 6 - Device Monitoring and Management</p><p>Part A- Secure Cisco IOS Image and Configuration Files</p><p>Podcast Number: 19</p>]]></description>
                <content:encoded>&lt;p&gt;In this episode we are going to look at Secure Cisco IOS Image and Configuration Files.&lt;/p&gt;&lt;p&gt;We will be discussing Cisco IOS Resilient Configuration Feature, Enable the IOS Image Resilience Feature, The Primary Bootset Image, Configure Secure Copy, and Recover a Router Password.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security.&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;http://KevTechify.com&lt;/p&gt;&lt;p&gt;***********************************&lt;/p&gt;&lt;p&gt;Network Security v1&lt;/p&gt;&lt;p&gt;Episode 6 - Device Monitoring and Management&lt;/p&gt;&lt;p&gt;Part A- Secure Cisco IOS Image and Configuration Files&lt;/p&gt;&lt;p&gt;Podcast Number: 19&lt;/p&gt;</content:encoded>
                
                <enclosure length="18709942" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/a954c9f2-5aaf-4d24-aa6b-ac08e35ba923/stream.mp3"/>
                
                <guid isPermaLink="false">631a2237-7fa0-4935-9b59-4152067cf49c</guid>
                <link>https://KevTechify.com</link>
                <pubDate>Sun, 20 Feb 2022 09:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2022/2/16/17/fb522030-d90f-49e0-a1e7-20c7a4dfff06_podnetsec.jpg"/>
                <itunes:duration>1169</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Configure Role-Based CLI - Assigning Administrative Roles - Network Security - KevTechify | Podcast 18</itunes:title>
                <title>Configure Role-Based CLI - Assigning Administrative Roles - Network Security - KevTechify | Podcast 18</title>

                <itunes:episode>18</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>In this episode we are going to look at Configure Role-Based CLI.</p><p>We will be discussing Role-Based CLI Access, Configure Role-Based Views, Configure Administrative Roles, and Configure Role-Based CLI Superviews.</p><p>Thank you so much for listening to this episode of my series on Network Security.</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>http://KevTechify.com</p><p>***********************************</p><p>Network Security v1</p><p>Episode 5 - Assigning Administrative Roles</p><p>Part B- Configure Role-Based CLI</p><p>Podcast Number: 18</p>]]></description>
                <content:encoded>&lt;p&gt;In this episode we are going to look at Configure Role-Based CLI.&lt;/p&gt;&lt;p&gt;We will be discussing Role-Based CLI Access, Configure Role-Based Views, Configure Administrative Roles, and Configure Role-Based CLI Superviews.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security.&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;http://KevTechify.com&lt;/p&gt;&lt;p&gt;***********************************&lt;/p&gt;&lt;p&gt;Network Security v1&lt;/p&gt;&lt;p&gt;Episode 5 - Assigning Administrative Roles&lt;/p&gt;&lt;p&gt;Part B- Configure Role-Based CLI&lt;/p&gt;&lt;p&gt;Podcast Number: 18&lt;/p&gt;</content:encoded>
                
                <enclosure length="10809678" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/42f18908-3181-4649-b188-27376962d418/stream.mp3"/>
                
                <guid isPermaLink="false">53b93e6c-980e-43be-9fde-52d1f9cfa35d</guid>
                <link>https://KevTechify.com</link>
                <pubDate>Sat, 19 Feb 2022 09:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2022/2/16/17/be6d2680-bdfc-4b07-bba9-d18ca711f8ff_podnetsec.jpg"/>
                <itunes:duration>675</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Configure Privilege Levels - Assigning Administrative Roles - Network Security - KevTechify | Podcast 17</itunes:title>
                <title>Configure Privilege Levels - Assigning Administrative Roles - Network Security - KevTechify | Podcast 17</title>

                <itunes:episode>17</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>In this episode we are going to look at Configure Privilege Levels.</p><p>We will be discussing Limiting Command Availability, Configuring and Assigning Privilege Levels, and Limitations of Privilege Levels.</p><p>Thank you so much for listening to this episode of my series on Network Security.</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>http://KevTechify.com</p><p>***********************************</p><p>Network Security v1</p><p>Episode 5 - Assigning Administrative Roles</p><p>Part A- Configure Privilege Levels</p><p>Podcast Number: 17</p>]]></description>
                <content:encoded>&lt;p&gt;In this episode we are going to look at Configure Privilege Levels.&lt;/p&gt;&lt;p&gt;We will be discussing Limiting Command Availability, Configuring and Assigning Privilege Levels, and Limitations of Privilege Levels.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security.&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;http://KevTechify.com&lt;/p&gt;&lt;p&gt;***********************************&lt;/p&gt;&lt;p&gt;Network Security v1&lt;/p&gt;&lt;p&gt;Episode 5 - Assigning Administrative Roles&lt;/p&gt;&lt;p&gt;Part A- Configure Privilege Levels&lt;/p&gt;&lt;p&gt;Podcast Number: 17&lt;/p&gt;</content:encoded>
                
                <enclosure length="6938122" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/4ef90699-e0fd-460e-b12e-1daeaf20d2c3/stream.mp3"/>
                
                <guid isPermaLink="false">cfbee42d-532b-45db-a8aa-9ac9436ded24</guid>
                <link>https://redcircle.com/shows/54180805-85e2-4677-9802-b19fdc0a3591/episodes/4ef90699-e0fd-460e-b12e-1daeaf20d2c3</link>
                <pubDate>Fri, 18 Feb 2022 09:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2022/2/16/17/ba790e95-5662-49e5-ba2d-64f5c0baef6c_podnetsec.jpg"/>
                <itunes:duration>433</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Configure SSH - Secure Device Access - Network Security - KevTechify | Podcast 16</itunes:title>
                <title>Configure SSH - Secure Device Access - Network Security - KevTechify | Podcast 16</title>

                <itunes:episode>16</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>Greetings to all my Tech Heads out there in the KevTechify Nation and if you are new here, welcome.</p><p>In this episode we are going to look at Configure SSH.</p><p>We will be discussing The Need for SSH, Enable SSH, Enhance SSH Login Security, Syntax Checker - Enable SSH on R2, Connect a Router to an SSH-Enabled Router, Connect a Host to an SSH-Enabled Router, Configure Secure Administrative Access, Configure Secure Passwords and SSH, and Configure Network Devices with SSH.</p><p>Thank you so much for listening to this episode of my series on Network Security.</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>http://KevTechify.com</p><p>***********************************</p><p>Network Security v1</p><p>Episode 4 - Secure Device Access</p><p>Part D- Configure SSH</p><p>Podcast Number: 16</p>]]></description>
                <content:encoded>&lt;p&gt;Greetings to all my Tech Heads out there in the KevTechify Nation and if you are new here, welcome.&lt;/p&gt;&lt;p&gt;In this episode we are going to look at Configure SSH.&lt;/p&gt;&lt;p&gt;We will be discussing The Need for SSH, Enable SSH, Enhance SSH Login Security, Syntax Checker - Enable SSH on R2, Connect a Router to an SSH-Enabled Router, Connect a Host to an SSH-Enabled Router, Configure Secure Administrative Access, Configure Secure Passwords and SSH, and Configure Network Devices with SSH.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security.&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;http://KevTechify.com&lt;/p&gt;&lt;p&gt;***********************************&lt;/p&gt;&lt;p&gt;Network Security v1&lt;/p&gt;&lt;p&gt;Episode 4 - Secure Device Access&lt;/p&gt;&lt;p&gt;Part D- Configure SSH&lt;/p&gt;&lt;p&gt;Podcast Number: 16&lt;/p&gt;</content:encoded>
                
                <enclosure length="12048927" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/94bbea9b-7e40-4796-8861-254b66b5f19d/stream.mp3"/>
                
                <guid isPermaLink="false">06851c7f-464d-4c4e-9f95-7e5a4bafc6e0</guid>
                <link>https://redcircle.com/shows/54180805-85e2-4677-9802-b19fdc0a3591/episodes/94bbea9b-7e40-4796-8861-254b66b5f19d</link>
                <pubDate>Thu, 17 Feb 2022 09:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2022/2/10/7/cfd9f940-1c03-42c2-9567-0b3b7d98b2e3_8ce7f688-343a-41e3-8bab-587873d12c86_podnetsec.jpg"/>
                <itunes:duration>753</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Configure Enhanced Security for Virtual Logins - Secure Device Access - Network Security - KevTechify | Podcast 15</itunes:title>
                <title>Configure Enhanced Security for Virtual Logins - Secure Device Access - Network Security - KevTechify | Podcast 15</title>

                <itunes:episode>15</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>Greetings to all my Tech Heads out there in the KevTechify Nation and if you are new here, welcome.</p><p>In this episode we are going to look at Configure Enhanced Security for Virtual Logins.</p><p>We will be discussing Enhance the Login Process, Configure Login Enhancement Features, Enable Login Enhancements, and Log Failed Attempts.</p><p>Thank you so much for listening to this episode of my series on Network Security.</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>http://KevTechify.com</p><p>***********************************</p><p>Network Security v1</p><p>Episode 4 - Secure Device Access</p><p>Part C- Configure Enhanced Security for Virtual Logins</p><p>Podcast Number: 15</p>]]></description>
                <content:encoded>&lt;p&gt;Greetings to all my Tech Heads out there in the KevTechify Nation and if you are new here, welcome.&lt;/p&gt;&lt;p&gt;In this episode we are going to look at Configure Enhanced Security for Virtual Logins.&lt;/p&gt;&lt;p&gt;We will be discussing Enhance the Login Process, Configure Login Enhancement Features, Enable Login Enhancements, and Log Failed Attempts.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security.&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;http://KevTechify.com&lt;/p&gt;&lt;p&gt;***********************************&lt;/p&gt;&lt;p&gt;Network Security v1&lt;/p&gt;&lt;p&gt;Episode 4 - Secure Device Access&lt;/p&gt;&lt;p&gt;Part C- Configure Enhanced Security for Virtual Logins&lt;/p&gt;&lt;p&gt;Podcast Number: 15&lt;/p&gt;</content:encoded>
                
                <enclosure length="11506834" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/e32305a3-0336-4d3a-a256-faf21efc3406/stream.mp3"/>
                
                <guid isPermaLink="false">46829681-6d99-4605-8b8f-379e4a5ec15f</guid>
                <link>https://redcircle.com/shows/54180805-85e2-4677-9802-b19fdc0a3591/episodes/e32305a3-0336-4d3a-a256-faf21efc3406</link>
                <pubDate>Wed, 16 Feb 2022 09:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2022/2/8/4/89a86759-b415-45c8-b3e2-ae59cebfe1b0_e5eb139e-452c-4871-8f83-150b898904c4_podnetsec.jpg"/>
                <itunes:duration>719</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Configure Secure Administrative Access - Secure Device Access - Network Security - KevTechify | Podcast 14</itunes:title>
                <title>Configure Secure Administrative Access - Secure Device Access - Network Security - KevTechify | Podcast 14</title>

                <itunes:episode>14</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>Greetings to all my Tech Heads out there in the KevTechify Nation and if you are new here, welcome.</p><p>In this episode we are going to look at Configure Secure Administrative Access.</p><p>We will be discussing Passwords, Configure Passwords, Encrypt Passwords, Additional Password Security, and Secret Password Algorithms.</p><p>Thank you so much for listening to this episode of my series on Network Security.</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>http://KevTechify.com</p><p>***********************************</p><p>Network Security v1</p><p>Episode 4 - Secure Device Access</p><p>Part B- Configure Secure Administrative Access</p><p>Podcast Number: 14</p>]]></description>
                <content:encoded>&lt;p&gt;Greetings to all my Tech Heads out there in the KevTechify Nation and if you are new here, welcome.&lt;/p&gt;&lt;p&gt;In this episode we are going to look at Configure Secure Administrative Access.&lt;/p&gt;&lt;p&gt;We will be discussing Passwords, Configure Passwords, Encrypt Passwords, Additional Password Security, and Secret Password Algorithms.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security.&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;http://KevTechify.com&lt;/p&gt;&lt;p&gt;***********************************&lt;/p&gt;&lt;p&gt;Network Security v1&lt;/p&gt;&lt;p&gt;Episode 4 - Secure Device Access&lt;/p&gt;&lt;p&gt;Part B- Configure Secure Administrative Access&lt;/p&gt;&lt;p&gt;Podcast Number: 14&lt;/p&gt;</content:encoded>
                
                <enclosure length="11041645" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/c5214be1-c070-4f0b-a989-ce7ba7fcc979/stream.mp3"/>
                
                <guid isPermaLink="false">95b67ef6-be19-418f-a7cb-2ad6c28f4e38</guid>
                <link>https://redcircle.com/shows/54180805-85e2-4677-9802-b19fdc0a3591/episodes/c5214be1-c070-4f0b-a989-ce7ba7fcc979</link>
                <pubDate>Tue, 15 Feb 2022 09:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2022/2/8/4/b1ae93ba-41a1-48ce-88c9-7b2a87e7a8e0_c6874672-bbc5-4683-8611-25f175d25025_podnetsec.jpg"/>
                <itunes:duration>690</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Secure the Edge Router - Secure Device Access - Network Security - KevTechify | Podcast 13</itunes:title>
                <title>Secure the Edge Router - Secure Device Access - Network Security - KevTechify | Podcast 13</title>

                <itunes:episode>13</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>Greetings to all my Tech Heads out there in the KevTechify Nation and if you are new here, welcome.</p><p>In this episode we are going to look at Secure the Edge Router.</p><p>We will be discussing Secure the Network Infrastructure, Edge Router Security Approaches, Three Areas of Router Security, Secure Administrative Access, and Secure Local and Remote Access.</p><p>Thank you so much for listening to this episode of my series on Network Security.</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>http://KevTechify.com</p><p>***********************************</p><p>Network Security v1</p><p>Episode 4 - Secure Device Access</p><p>Part A- Secure the Edge Router</p><p>Podcast Number: 13</p>]]></description>
                <content:encoded>&lt;p&gt;Greetings to all my Tech Heads out there in the KevTechify Nation and if you are new here, welcome.&lt;/p&gt;&lt;p&gt;In this episode we are going to look at Secure the Edge Router.&lt;/p&gt;&lt;p&gt;We will be discussing Secure the Network Infrastructure, Edge Router Security Approaches, Three Areas of Router Security, Secure Administrative Access, and Secure Local and Remote Access.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security.&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;http://KevTechify.com&lt;/p&gt;&lt;p&gt;***********************************&lt;/p&gt;&lt;p&gt;Network Security v1&lt;/p&gt;&lt;p&gt;Episode 4 - Secure Device Access&lt;/p&gt;&lt;p&gt;Part A- Secure the Edge Router&lt;/p&gt;&lt;p&gt;Podcast Number: 13&lt;/p&gt;</content:encoded>
                
                <enclosure length="9334700" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/57073269-5249-449f-800b-ad73e948a7b0/stream.mp3"/>
                
                <guid isPermaLink="false">b152b17c-cb60-40bc-83d1-f3e90424ab82</guid>
                <link>https://redcircle.com/shows/54180805-85e2-4677-9802-b19fdc0a3591/episodes/57073269-5249-449f-800b-ad73e948a7b0</link>
                <pubDate>Mon, 14 Feb 2022 09:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2022/2/8/4/660be408-5158-4979-bb9c-d6d503e74bf6_cfba8478-8a4a-40ca-bf5b-5290a8df8e30_podnetsec.jpg"/>
                <itunes:duration>583</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Cisco Network Foundation Protection Framework - Mitigating Threats - Network Security - KevTechify | Podcast 12</itunes:title>
                <title>Cisco Network Foundation Protection Framework - Mitigating Threats - Network Security - KevTechify | Podcast 12</title>

                <itunes:episode>12</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>Greetings to all my Tech Heads out there in the KevTechify Nation and if you are new here, welcome.</p><p>In this episode we are going to look at Cisco Network Foundation Protection Framework.</p><p>We will be discussing NFP Framework, Securing the Control Plane, Securing the Management Plane, and Securing the Data Plane.</p><p>Thank you so much for listening to this episode of my series on Network Security.</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>http://KevTechify.com</p><p>***********************************</p><p>Network Security v1</p><p>Episode 3 - Mitigating Threats</p><p>Part E- Cisco Network Foundation Protection Framework</p><p>Podcast Number: 12</p>]]></description>
                <content:encoded>&lt;p&gt;Greetings to all my Tech Heads out there in the KevTechify Nation and if you are new here, welcome.&lt;/p&gt;&lt;p&gt;In this episode we are going to look at Cisco Network Foundation Protection Framework.&lt;/p&gt;&lt;p&gt;We will be discussing NFP Framework, Securing the Control Plane, Securing the Management Plane, and Securing the Data Plane.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security.&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;http://KevTechify.com&lt;/p&gt;&lt;p&gt;***********************************&lt;/p&gt;&lt;p&gt;Network Security v1&lt;/p&gt;&lt;p&gt;Episode 3 - Mitigating Threats&lt;/p&gt;&lt;p&gt;Part E- Cisco Network Foundation Protection Framework&lt;/p&gt;&lt;p&gt;Podcast Number: 12&lt;/p&gt;</content:encoded>
                
                <enclosure length="7141250" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/0f656b6e-f7b6-4b0c-b603-8eeeba996f5a/stream.mp3"/>
                
                <guid isPermaLink="false">1a6ed55e-7536-42b2-bd3d-9bdefaffc9ee</guid>
                <link>https://redcircle.com/shows/54180805-85e2-4677-9802-b19fdc0a3591/episodes/0f656b6e-f7b6-4b0c-b603-8eeeba996f5a</link>
                <pubDate>Sun, 13 Feb 2022 09:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2022/2/8/4/a185663d-e3bb-4802-8ad9-ad0260c47e44_c091c998-ec75-45ee-a1a1-04f18d4f07ce_podnetsec.jpg"/>
                <itunes:duration>446</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Mitigating Common Network Attacks - Mitigating Threats - Network Security - KevTechify | Podcast 11</itunes:title>
                <title>Mitigating Common Network Attacks - Mitigating Threats - Network Security - KevTechify | Podcast 11</title>

                <itunes:episode>11</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>Greetings to all my Tech Heads out there in the KevTechify Nation and if you are new here, welcome.</p><p>In this episode we are going to look at Mitigating Common Network Attacks.</p><p>We will be discussing Defending the Network, Mitigating Malware, Mitigating Worms, Mitigating Reconnaissance Attacks, Mitigating Access Attacks, and Mitigating DoS Attacks.</p><p>Thank you so much for listening to this episode of my series on Network Security.</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>http://KevTechify.com</p><p>***********************************</p><p>Network Security v1</p><p>Episode 3 - Mitigating Threats</p><p>Part D- Mitigating Common Network Attacks</p><p>Podcast Number: 11</p>]]></description>
                <content:encoded>&lt;p&gt;Greetings to all my Tech Heads out there in the KevTechify Nation and if you are new here, welcome.&lt;/p&gt;&lt;p&gt;In this episode we are going to look at Mitigating Common Network Attacks.&lt;/p&gt;&lt;p&gt;We will be discussing Defending the Network, Mitigating Malware, Mitigating Worms, Mitigating Reconnaissance Attacks, Mitigating Access Attacks, and Mitigating DoS Attacks.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security.&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;http://KevTechify.com&lt;/p&gt;&lt;p&gt;***********************************&lt;/p&gt;&lt;p&gt;Network Security v1&lt;/p&gt;&lt;p&gt;Episode 3 - Mitigating Threats&lt;/p&gt;&lt;p&gt;Part D- Mitigating Common Network Attacks&lt;/p&gt;&lt;p&gt;Podcast Number: 11&lt;/p&gt;</content:encoded>
                
                <enclosure length="16292884" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/055c3c82-aee8-4a46-965d-08596063384f/stream.mp3"/>
                
                <guid isPermaLink="false">ee5cdc0e-d96a-4559-a14f-6bba99124e70</guid>
                <link>https://redcircle.com/shows/54180805-85e2-4677-9802-b19fdc0a3591/episodes/055c3c82-aee8-4a46-965d-08596063384f</link>
                <pubDate>Fri, 11 Feb 2022 09:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2022/2/8/4/ab3e780c-deb1-4d95-bd6c-1cf39fcddc31_0f589219-9f66-4fa6-8a31-9ea22f9ccdb9_podnetsec.jpg"/>
                <itunes:duration>1018</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Security Tools, Platforms, and Services - Mitigating Threats - Network Security - KevTechify | Podcast 10</itunes:title>
                <title>Security Tools, Platforms, and Services - Mitigating Threats - Network Security - KevTechify | Podcast 10</title>

                <itunes:episode>10</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>Greetings to all my Tech Heads out there in the KevTechify Nation and if you are new here, welcome.</p><p>In this episode we are going to look at Security Tools, Platforms, and Services.</p><p>We will be discussing The Security Onion and The Security Artichoke, Security Testing Tools, Data Security Platforms, Cisco SecureX Demonstration, and Security Services.</p><p>Thank you so much for listening to this episode of my series on Network Security.</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>http://KevTechify.com</p><p>***********************************</p><p>Network Security v1</p><p>Episode 3 - Mitigating Threats</p><p>Part C- Security Tools, Platforms, and Services</p><p>Podcast Number: 10</p>]]></description>
                <content:encoded>&lt;p&gt;Greetings to all my Tech Heads out there in the KevTechify Nation and if you are new here, welcome.&lt;/p&gt;&lt;p&gt;In this episode we are going to look at Security Tools, Platforms, and Services.&lt;/p&gt;&lt;p&gt;We will be discussing The Security Onion and The Security Artichoke, Security Testing Tools, Data Security Platforms, Cisco SecureX Demonstration, and Security Services.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security.&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;http://KevTechify.com&lt;/p&gt;&lt;p&gt;***********************************&lt;/p&gt;&lt;p&gt;Network Security v1&lt;/p&gt;&lt;p&gt;Episode 3 - Mitigating Threats&lt;/p&gt;&lt;p&gt;Part C- Security Tools, Platforms, and Services&lt;/p&gt;&lt;p&gt;Podcast Number: 10&lt;/p&gt;</content:encoded>
                
                <enclosure length="12106187" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/58974b9c-d932-4fed-96ff-cf1ef19e4a0a/stream.mp3"/>
                
                <guid isPermaLink="false">a892e57d-0c6a-4ef2-a73f-1d95d03d90d4</guid>
                <link>https://redcircle.com/shows/54180805-85e2-4677-9802-b19fdc0a3591/episodes/58974b9c-d932-4fed-96ff-cf1ef19e4a0a</link>
                <pubDate>Fri, 11 Feb 2022 09:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2022/2/8/4/2b67e9f5-8eac-4484-899e-577f5d8b1233_d3587932-f5ea-4a7e-bd05-208080be29ab_podnetsec.jpg"/>
                <itunes:duration>756</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Network Security Policies - Mitigating Threats - Network Security - KevTechify | Podcast 9</itunes:title>
                <title>Network Security Policies - Mitigating Threats - Network Security - KevTechify | Podcast 9</title>

                <itunes:episode>9</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>Greetings to all my Tech Heads out there in the KevTechify Nation and if you are new here, welcome.</p><p>In this episode we are going to look at Network Security Policies.</p><p>We will be discussing Network Security Domains, Business Policies, Security Policy, BYOD Policies, and Regulatory and Standards Compliance.</p><p>Thank you so much for listening to this episode of my series on Network Security.</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>http://KevTechify.com</p><p>***********************************</p><p>Network Security v1</p><p>Episode 3 - Mitigating Threats</p><p>Part B- Network Security Policies</p><p>Podcast Number: 9</p>]]></description>
                <content:encoded>&lt;p&gt;Greetings to all my Tech Heads out there in the KevTechify Nation and if you are new here, welcome.&lt;/p&gt;&lt;p&gt;In this episode we are going to look at Network Security Policies.&lt;/p&gt;&lt;p&gt;We will be discussing Network Security Domains, Business Policies, Security Policy, BYOD Policies, and Regulatory and Standards Compliance.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security.&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;http://KevTechify.com&lt;/p&gt;&lt;p&gt;***********************************&lt;/p&gt;&lt;p&gt;Network Security v1&lt;/p&gt;&lt;p&gt;Episode 3 - Mitigating Threats&lt;/p&gt;&lt;p&gt;Part B- Network Security Policies&lt;/p&gt;&lt;p&gt;Podcast Number: 9&lt;/p&gt;</content:encoded>
                
                <enclosure length="12832600" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/765234c7-97d8-4f6b-89af-d24fec2a93b7/stream.mp3"/>
                
                <guid isPermaLink="false">8516fa41-a644-4593-8a4f-adeefbdcfbc9</guid>
                <link>https://redcircle.com/shows/54180805-85e2-4677-9802-b19fdc0a3591/episodes/765234c7-97d8-4f6b-89af-d24fec2a93b7</link>
                <pubDate>Thu, 10 Feb 2022 09:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2022/2/8/4/95644d1c-e42b-493c-9c06-1f8b70cea34c_7557c04a-451a-452c-a5d9-d5c69545b9fc_podnetsec.jpg"/>
                <itunes:duration>802</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Defending the Network - Mitigating Threats - Network Security - KevTechify | Podcast 8</itunes:title>
                <title>Defending the Network - Mitigating Threats - Network Security - KevTechify | Podcast 8</title>

                <itunes:episode>8</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>Greetings to all my Tech Heads out there in the KevTechify Nation and if you are new here, welcome.</p><p>In this episode we are going to look at Defending the Network.</p><p>We will be discussing Network Security Professionals, Network Intelligence Communities, Network Security Certifications, and Communications Security: CIA.</p><p>Thank you so much for listening to this episode of my series on Network Security.</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>http://KevTechify.com</p><p>***********************************</p><p>Network Security v1</p><p>Episode 3 - Mitigating Threats</p><p>Part A- Defending the Network</p><p>Podcast Number: 8</p>]]></description>
                <content:encoded>&lt;p&gt;Greetings to all my Tech Heads out there in the KevTechify Nation and if you are new here, welcome.&lt;/p&gt;&lt;p&gt;In this episode we are going to look at Defending the Network.&lt;/p&gt;&lt;p&gt;We will be discussing Network Security Professionals, Network Intelligence Communities, Network Security Certifications, and Communications Security: CIA.&lt;/p&gt;&lt;p&gt;Thank you so much for listening to this episode of my series on Network Security.&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;http://KevTechify.com&lt;/p&gt;&lt;p&gt;***********************************&lt;/p&gt;&lt;p&gt;Network Security v1&lt;/p&gt;&lt;p&gt;Episode 3 - Mitigating Threats&lt;/p&gt;&lt;p&gt;Part A- Defending the Network&lt;/p&gt;&lt;p&gt;Podcast Number: 8&lt;/p&gt;</content:encoded>
                
                <enclosure length="8411846" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/ab9a1d57-0f2b-4110-9a2d-6d831f230978/stream.mp3"/>
                
                <guid isPermaLink="false">183aefca-8ea3-46ff-982a-49d56e0c3e3c</guid>
                <link>https://redcircle.com/shows/54180805-85e2-4677-9802-b19fdc0a3591/episodes/ab9a1d57-0f2b-4110-9a2d-6d831f230978</link>
                <pubDate>Wed, 09 Feb 2022 09:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2022/2/8/4/0cc53f3b-8a70-4b0f-8172-4bc91445070e_c42349a2-301d-4506-9f91-ec4ab735ecd0_podnetsec.jpg"/>
                <itunes:duration>525</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Network Attacks - Denial of Service, Buffer Overflows, and Evasion - Network Threats - Network Security - KevTechify | Podcast 7</itunes:title>
                <title>Network Attacks - Denial of Service, Buffer Overflows, and Evasion - Network Threats - Network Security - KevTechify | Podcast 7</title>

                <itunes:episode>7</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>Greetings to all my Tech Heads out there in the KevTechify Nation and if you are new here, welcome.</p><p>In this episode we are going to look at Network Attacks - Denial of Service, Buffer Overflows, and Evasion.</p><p>We will be discussing Denial of Service Attacks, DoS and DDoS Attacks, Components of DDoS Attacks, Mirai Botnet, Buffer Overflow Attack, and Evasion Methods.</p><p>Thank you so much for watching this episode of my series on Network Security.</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>http://KevTechify.com</p><p>***********************************</p><p>Network Security v1</p><p>Episode 2 - Network Threats</p><p>Part E- Network Attacks - Denial of Service, Buffer Overflows, and Evasion</p><p>Podcast Number: 7</p>]]></description>
                <content:encoded>&lt;p&gt;Greetings to all my Tech Heads out there in the KevTechify Nation and if you are new here, welcome.&lt;/p&gt;&lt;p&gt;In this episode we are going to look at Network Attacks - Denial of Service, Buffer Overflows, and Evasion.&lt;/p&gt;&lt;p&gt;We will be discussing Denial of Service Attacks, DoS and DDoS Attacks, Components of DDoS Attacks, Mirai Botnet, Buffer Overflow Attack, and Evasion Methods.&lt;/p&gt;&lt;p&gt;Thank you so much for watching this episode of my series on Network Security.&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;http://KevTechify.com&lt;/p&gt;&lt;p&gt;***********************************&lt;/p&gt;&lt;p&gt;Network Security v1&lt;/p&gt;&lt;p&gt;Episode 2 - Network Threats&lt;/p&gt;&lt;p&gt;Part E- Network Attacks - Denial of Service, Buffer Overflows, and Evasion&lt;/p&gt;&lt;p&gt;Podcast Number: 7&lt;/p&gt;</content:encoded>
                
                <enclosure length="14569639" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/21a6abb2-ce36-4f62-957e-cb76b8eb09b0/stream.mp3"/>
                
                <guid isPermaLink="false">dacaf911-08f9-4c66-aa57-dfcab7fcac76</guid>
                <link>https://redcircle.com/shows/54180805-85e2-4677-9802-b19fdc0a3591/episodes/21a6abb2-ce36-4f62-957e-cb76b8eb09b0</link>
                <pubDate>Tue, 08 Feb 2022 09:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2022/2/5/17/2c4860f3-6cb5-498f-a614-a20d69b4dbb9_14d5d9d2-eaab-47af-970d-13f6aff6b0d6_podnetsec.jpg"/>
                <itunes:duration>910</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Common Network Attacks - Reconnaissance, Access, and Social Engineering - Network Threats - Network Security - KevTechify | Podcast 6</itunes:title>
                <title>Common Network Attacks - Reconnaissance, Access, and Social Engineering - Network Threats - Network Security - KevTechify | Podcast 6</title>

                <itunes:episode>6</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>Greetings to all my Tech Heads out there in the KevTechify Nation and if you are new here, welcome.</p><p>In this episode we are going to look at Common Network Attacks - Reconnaissance, Access, and Social Engineering.</p><p>We will be discussing Types of Network Attacks, Reconnaissance Attacks, Reconnaissance Attacks, Access Attacks, Access and Social Engineering Attacks, Social Engineering Attacks, Strengthening the Weakest Link, Social Engineering, , , , , ,.</p><p>Thank you so much for watching this episode of my series on Network Security.</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>http://KevTechify.com</p><p>***********************************</p><p>Network Security v1</p><p>Episode 2 - Network Threats</p><p>Part D- Common Network Attacks - Reconnaissance, Access, and Social Engineering</p><p>Podcast Number: 6</p>]]></description>
                <content:encoded>&lt;p&gt;Greetings to all my Tech Heads out there in the KevTechify Nation and if you are new here, welcome.&lt;/p&gt;&lt;p&gt;In this episode we are going to look at Common Network Attacks - Reconnaissance, Access, and Social Engineering.&lt;/p&gt;&lt;p&gt;We will be discussing Types of Network Attacks, Reconnaissance Attacks, Reconnaissance Attacks, Access Attacks, Access and Social Engineering Attacks, Social Engineering Attacks, Strengthening the Weakest Link, Social Engineering, , , , , ,.&lt;/p&gt;&lt;p&gt;Thank you so much for watching this episode of my series on Network Security.&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;http://KevTechify.com&lt;/p&gt;&lt;p&gt;***********************************&lt;/p&gt;&lt;p&gt;Network Security v1&lt;/p&gt;&lt;p&gt;Episode 2 - Network Threats&lt;/p&gt;&lt;p&gt;Part D- Common Network Attacks - Reconnaissance, Access, and Social Engineering&lt;/p&gt;&lt;p&gt;Podcast Number: 6&lt;/p&gt;</content:encoded>
                
                <enclosure length="16134060" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/a4b9c439-0ac4-4ee6-95ea-1b1c971d5027/stream.mp3"/>
                
                <guid isPermaLink="false">71f41446-9b99-4af5-a309-96e16dbaa138</guid>
                <link>https://redcircle.com/shows/54180805-85e2-4677-9802-b19fdc0a3591/episodes/a4b9c439-0ac4-4ee6-95ea-1b1c971d5027</link>
                <pubDate>Mon, 07 Feb 2022 09:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2022/2/5/7/6edc9d7b-801c-4f1b-8afe-7896a3b896f3_ff8ab33b-ed11-427c-a688-42801674fb8f_podnetsec.jpg"/>
                <itunes:duration>1008</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Malware - Network Threats - Network Security - KevTechify | Podcast 5</itunes:title>
                <title>Malware - Network Threats - Network Security - KevTechify | Podcast 5</title>

                <itunes:episode>5</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>Greetings to all my Tech Heads out there in the KevTechify Nation and if you are new here, welcome.</p><p>In this episode we are going to look at Malware.</p><p>We will be discussing Types of Malware, Viruses, Trojan Horses, Trojan Horse Classification, Worms, Worm Components, Ransomware, Other Malware, and Common Malware Behaviors.</p><p>Thank you so much for watching this episode of my series on Network Security.</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>http://KevTechify.com</p><p>***********************************</p><p>Network Security v1</p><p>Episode 2 - Network Threats</p><p>Part C- Malware</p><p>Podcast Number: 5</p>]]></description>
                <content:encoded>&lt;p&gt;Greetings to all my Tech Heads out there in the KevTechify Nation and if you are new here, welcome.&lt;/p&gt;&lt;p&gt;In this episode we are going to look at Malware.&lt;/p&gt;&lt;p&gt;We will be discussing Types of Malware, Viruses, Trojan Horses, Trojan Horse Classification, Worms, Worm Components, Ransomware, Other Malware, and Common Malware Behaviors.&lt;/p&gt;&lt;p&gt;Thank you so much for watching this episode of my series on Network Security.&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;http://KevTechify.com&lt;/p&gt;&lt;p&gt;***********************************&lt;/p&gt;&lt;p&gt;Network Security v1&lt;/p&gt;&lt;p&gt;Episode 2 - Network Threats&lt;/p&gt;&lt;p&gt;Part C- Malware&lt;/p&gt;&lt;p&gt;Podcast Number: 5&lt;/p&gt;</content:encoded>
                
                <enclosure length="15291454" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/3c378f69-add8-4525-870d-6a65c866dec2/stream.mp3"/>
                
                <guid isPermaLink="false">984b2a52-ce7c-41b1-a25a-0af1ce533612</guid>
                <link>https://redcircle.com/shows/54180805-85e2-4677-9802-b19fdc0a3591/episodes/3c378f69-add8-4525-870d-6a65c866dec2</link>
                <pubDate>Sun, 06 Feb 2022 09:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2022/2/5/7/860622b2-744c-42e2-a04a-52c02f62b51c_24cc5002-53d7-4821-a9ad-d0f2e1c714e1_podnetsec.jpg"/>
                <itunes:duration>955</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Threat Actor Tools - Network Threats - Network Security - KevTechify | Podcast 4</itunes:title>
                <title>Threat Actor Tools - Network Threats - Network Security - KevTechify | Podcast 4</title>

                <itunes:episode>4</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>Greetings to all my Tech Heads out there in the KevTechify Nation and if you are new here, welcome.</p><p>In this episode we are going to look at Threat Actor Tools.</p><p>We will be discussing Introduction of Attack Tools, Evolution of Security Tools, and Categories of Attacks.</p><p>Thank you so much for watching this episode of my series on Network Security.</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>http://KevTechify.com</p><p>***********************************</p><p>Network Security v1</p><p>Episode 2 - Network Threats</p><p>Part B- Threat Actor Tools</p><p>Podcast Number: 4</p>]]></description>
                <content:encoded>&lt;p&gt;Greetings to all my Tech Heads out there in the KevTechify Nation and if you are new here, welcome.&lt;/p&gt;&lt;p&gt;In this episode we are going to look at Threat Actor Tools.&lt;/p&gt;&lt;p&gt;We will be discussing Introduction of Attack Tools, Evolution of Security Tools, and Categories of Attacks.&lt;/p&gt;&lt;p&gt;Thank you so much for watching this episode of my series on Network Security.&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;http://KevTechify.com&lt;/p&gt;&lt;p&gt;***********************************&lt;/p&gt;&lt;p&gt;Network Security v1&lt;/p&gt;&lt;p&gt;Episode 2 - Network Threats&lt;/p&gt;&lt;p&gt;Part B- Threat Actor Tools&lt;/p&gt;&lt;p&gt;Podcast Number: 4&lt;/p&gt;</content:encoded>
                
                <enclosure length="12508682" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/aae85f72-de6c-48ed-b76e-384a5d3c11ce/stream.mp3"/>
                
                <guid isPermaLink="false">9961a746-2c6f-4a26-93d0-0478f10fb774</guid>
                <link>https://redcircle.com/shows/54180805-85e2-4677-9802-b19fdc0a3591/episodes/aae85f72-de6c-48ed-b76e-384a5d3c11ce</link>
                <pubDate>Sat, 05 Feb 2022 09:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2022/2/5/17/9d3c7ba3-cc42-4b95-bbe2-c667f2dc6986_9929d52f-9b2f-4b26-8d5c-278db3984912_podnetsec.jpg"/>
                <itunes:duration>781</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Who is Attacking Our Network? - Network Threats - Network Security - KevTechify | Podcast 3</itunes:title>
                <title>Who is Attacking Our Network? - Network Threats - Network Security - KevTechify | Podcast 3</title>

                <itunes:episode>3</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>Greetings to all my Tech Heads out there in the KevTechify Nation and if you are new here, welcome.</p><p>In this episode we are going to look at Who is Attacking Our Network?.</p><p>We will be discussing Threat, Vulnerability, and Risk, Hacker vs. Threat Actor, Evolution of Threat Actors, Cybercriminals, Cybersecurity Tasks, Cyber Threat Indicators, Threat Sharing and Building Cybersecurity Awareness.</p><p>Thank you so much for watching this episode of my series on Network Security.</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>http://KevTechify.com</p><p>***********************************</p><p>Network Security v1</p><p>Episode 2 - Network Threats</p><p>Part A- Who is Attacking Our Network?</p><p>Podcast Number: 3</p>]]></description>
                <content:encoded>&lt;p&gt;Greetings to all my Tech Heads out there in the KevTechify Nation and if you are new here, welcome.&lt;/p&gt;&lt;p&gt;In this episode we are going to look at Who is Attacking Our Network?.&lt;/p&gt;&lt;p&gt;We will be discussing Threat, Vulnerability, and Risk, Hacker vs. Threat Actor, Evolution of Threat Actors, Cybercriminals, Cybersecurity Tasks, Cyber Threat Indicators, Threat Sharing and Building Cybersecurity Awareness.&lt;/p&gt;&lt;p&gt;Thank you so much for watching this episode of my series on Network Security.&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;http://KevTechify.com&lt;/p&gt;&lt;p&gt;***********************************&lt;/p&gt;&lt;p&gt;Network Security v1&lt;/p&gt;&lt;p&gt;Episode 2 - Network Threats&lt;/p&gt;&lt;p&gt;Part A- Who is Attacking Our Network?&lt;/p&gt;&lt;p&gt;Podcast Number: 3&lt;/p&gt;</content:encoded>
                
                <enclosure length="17407164" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/18051f6e-7c46-4aac-9f3a-244157b861cb/stream.mp3"/>
                
                <guid isPermaLink="false">4e565b61-21a2-46ce-8bd1-211d3c0814f6</guid>
                <link>https://redcircle.com/shows/54180805-85e2-4677-9802-b19fdc0a3591/episodes/18051f6e-7c46-4aac-9f3a-244157b861cb</link>
                <pubDate>Fri, 04 Feb 2022 09:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2022/2/5/17/ac5c25ae-a3b3-4683-b058-903fa7013e55_1ba3157c-6628-4ca9-83fc-a93916e6bde6_podnetsec.jpg"/>
                <itunes:duration>1087</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Network Topology Overview - Securing Networks - Network Security - KevTechify | Podcast 2</itunes:title>
                <title>Network Topology Overview - Securing Networks - Network Security - KevTechify | Podcast 2</title>

                <itunes:episode>2</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>Greetings to all my Tech Heads out there in the KevTechify Nation and if you are new here, welcome.</p><p>In this episode we are going to look at Network Topology Overview.</p><p>We will be discussing Campus Area Networks, Small Office and Home Office Networks, Wide Area Networks, Data Center Networks, Cloud Networks and Virtualization, and The Evolving Network Border.</p><p>Thank you so much for watching this episode of my series on Network Security.</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>http://KevTechify.com</p><p>***********************************</p><p>Network Security v1</p><p>Episode 1 - Securing Networks</p><p>Part B- Network Topology Overview</p><p>Podcast Number: 2</p>]]></description>
                <content:encoded>&lt;p&gt;Greetings to all my Tech Heads out there in the KevTechify Nation and if you are new here, welcome.&lt;/p&gt;&lt;p&gt;In this episode we are going to look at Network Topology Overview.&lt;/p&gt;&lt;p&gt;We will be discussing Campus Area Networks, Small Office and Home Office Networks, Wide Area Networks, Data Center Networks, Cloud Networks and Virtualization, and The Evolving Network Border.&lt;/p&gt;&lt;p&gt;Thank you so much for watching this episode of my series on Network Security.&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;http://KevTechify.com&lt;/p&gt;&lt;p&gt;***********************************&lt;/p&gt;&lt;p&gt;Network Security v1&lt;/p&gt;&lt;p&gt;Episode 1 - Securing Networks&lt;/p&gt;&lt;p&gt;Part B- Network Topology Overview&lt;/p&gt;&lt;p&gt;Podcast Number: 2&lt;/p&gt;</content:encoded>
                
                <enclosure length="17591484" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/7e71d07c-f9e6-4e80-84ce-42619a036f5e/stream.mp3"/>
                
                <guid isPermaLink="false">4da2b20e-e104-4420-b5fc-61b7ce18c9c8</guid>
                <link>https://redcircle.com/shows/54180805-85e2-4677-9802-b19fdc0a3591/episodes/7e71d07c-f9e6-4e80-84ce-42619a036f5e</link>
                <pubDate>Thu, 03 Feb 2022 09:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2022/2/5/17/4991617f-3390-4afa-9697-3157ecdd5e6f_990ee2f1-dcd7-4cb7-9059-a6acde7e126e_podnetsec.jpg"/>
                <itunes:duration>1099</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Current State of Affairs - Securing Networks - Network Security - KevTechify | Podcast 1</itunes:title>
                <title>Current State of Affairs - Securing Networks - Network Security - KevTechify | Podcast 1</title>

                <itunes:episode>1</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>KevTechify</itunes:author>
                
                <description><![CDATA[<p>Greetings to all my Tech Heads out there in the KevTechify Nation and if you are new here, welcome.</p><p>In this episode we are going to look at Current State of Affairs.</p><p>We will be discussing Networks Are Targets, Reasons for Network Security, Vectors of Network Attacks, Data Loss, and Anatomy of an Attack.</p><p>Thank you so much for watching this episode of my series on Network Security.</p><p>Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.</p><p>http://KevTechify.com</p><p>***********************************</p><p>Network Security v1</p><p>Episode 1 - Securing Networks</p><p>Part A- Current State of Affairs</p><p>Video Number: 1</p>]]></description>
                <content:encoded>&lt;p&gt;Greetings to all my Tech Heads out there in the KevTechify Nation and if you are new here, welcome.&lt;/p&gt;&lt;p&gt;In this episode we are going to look at Current State of Affairs.&lt;/p&gt;&lt;p&gt;We will be discussing Networks Are Targets, Reasons for Network Security, Vectors of Network Attacks, Data Loss, and Anatomy of an Attack.&lt;/p&gt;&lt;p&gt;Thank you so much for watching this episode of my series on Network Security.&lt;/p&gt;&lt;p&gt;Once again, I’m Kevin and this is KevTechify. Let’s get this adventure started.&lt;/p&gt;&lt;p&gt;http://KevTechify.com&lt;/p&gt;&lt;p&gt;***********************************&lt;/p&gt;&lt;p&gt;Network Security v1&lt;/p&gt;&lt;p&gt;Episode 1 - Securing Networks&lt;/p&gt;&lt;p&gt;Part A- Current State of Affairs&lt;/p&gt;&lt;p&gt;Video Number: 1&lt;/p&gt;</content:encoded>
                
                <enclosure length="7948747" type="audio/mpeg" url="https://audio3.redcircle.com/episodes/e8a9a080-f5a3-466b-8c80-99a5df6dea2f/stream.mp3"/>
                
                <guid isPermaLink="false">11b1ce5a-dd61-4884-9efe-be5759364878</guid>
                <link>https://redcircle.com/shows/54180805-85e2-4677-9802-b19fdc0a3591/episodes/e8a9a080-f5a3-466b-8c80-99a5df6dea2f</link>
                <pubDate>Wed, 02 Feb 2022 09:00:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2022/2/5/7/f0d4c356-1437-4d91-9b2f-b35ce5d60fa7_1adc6298-d879-4560-a7b1-b264e6151b14_podnetsec.jpg"/>
                <itunes:duration>496</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
    </channel>
</rss>
