Personal Information
Organization / Workplace
Vijayawada, Andhra Pradesh, Andhra Pradesh India
Occupation
Assistant Professor
Industry
Education
About
Passionate about Teaching...
Tags
cybersecurity
cisco
netacad
cybersecurity essentials
cybersecuirty essentials v1.1
computer networks
threats
srwe
switching routing and wireless essentials
cisco netacad
networking academy
netacad course
ccna2
cisco ccna
cia triad
ccna
aaa
confidentiality
malware
networks
network security
security controls
ccnav7
wlan
authorization
protocols
encapsulation
layered architecture
integrity
availability
signal propagation
cellular systems
spread spectrum
wireless communication
electromagnetic spectrum
dos
bluetooth
adware
ransomware
introduction to cybersecurity
tcp/ip
hackers
osi
security policy
lan
topologies
social engineering
load balancing
access control
encryption
tactics
people awareness
security attacks
attacks
people
technologies
information security
certifications
security services
cybersecurity cube
tunneling
states of data
model for security
computer security
ip delivery
system calls
operating systems
computer components
system operations
computer architecture
os
security principle
ethics
cybersecurity specialist
availability measures
disaster recovery
incident response
five nines
data obfuscation
data hiding
obscurity
steganography
substitution techniques
types of controls
access control techniques
asymmetric encryption
symmetric encryption
data integrity controls
digital certificate
digital signature
security control
xss scripting
pretexing
ddos attack
seo posioning
protection against malware
cables
selective repeat
crc
hamming code
sliding window protocol
lrc
error correction
data link layer
vrc
go back n
transport layer
udp
tcp
application layer
e mail
dns
rfid
scatternet
design issues
services
broadcasting
extranet
wan
intranet
man
guidelines
orientation
couse outline
reference model
layers
iso
internet protocol suite
physical layer
twisted pair
signal
transmission media
virtual memory
paging
page replacement
thrashing
segmentation
directory implementation
allocation methods
recovery
free space management
virtual file systems
file system implementation
fdma
cdma
tdma
ipv4
ipv6
optimization
mobile ip
wimax
piconet
gsm
gsm frame
gsm protocols
gsm security
gsm frequecy
gsm arhcitecture
gsm identifiers
deadlock
critical section problem
dining philosphers problem
synchronization
bankers algorithm
semaphores
demand paging
frames
logical address space
scareware
bgp
bgp-mp
egp
equal-cost load balancing
unequal-cost load balancing
administrative distance
ripv2
ospfv2
static route
default static route
floating static route
summary static route
next-hop route
directly connected static route
fully specified static route
quad-zero route
host route
local host route
static host route
ccna-2
three factor authentication
social media.
types of firewalls
portscanning
security appliances
ids
ips
incident prevention
security best practices
best path
longest match
prefix length
next-hop router
process switching
fast switching
cisco express forwarding (cef)
route sources
static routes
dynamic routing protocols
ip dhcp snooping vlan #
ip dhcp snooping limit rate
show ip dhcp snooping
ip arp inspection vlan #
ip dhcp snooping trust
ip arp inspection trust
ip arp inspection validate
spanning-tree portfast {default}
spanning-tree bpduguard enable
spanning-tree porfast bpduguard default
na
data breach
next-generation firewall (ngfw)
next-generation ips (ngips)
advanced malware protection (amp)
authentication
accounting (aaa)
identity services engine (ise)
host-based intrusion prevention system (hips)
email security appliance (esa)
is-is for ipv6
cisco networking academy
static ip
wireless lan controller
wlc
access points
network address translation (nat)
wireless mesh network (wmn)
port forwarding
port triggering
wpan
wman
wwan
802.11
itu
ieee
lightweight ap (lap)
lightweight access point protocol (lwapp)
switchport trunk native vlan #
ip dhcp snooping
realtime systems
real time scheduling
processor affinity
multilevel feedback queue
multilevel queues
ccna-1
introduction to networks
types of networks
characteristics of networks
network representations
internet connections
cisco ios
packet tracer
switch configuration
cli
privileged mode
global config mode
gui
navigating the ios
cli commands
os servies
system programs
user interface
api
process
pcb
process control block
process states
ipc
context switch
types of schedulers
long term scheduler
threads
scheduling
fcfs
sjf
srtf
round robin
multicore
decision tree
legal issues
exploit
vulnerability
virus
worms
phishing
whaling
ddos attacks
blended attack
impact reduction
firewalls
antivirus
antispyware
ssid
wireless networks safety
password manager
good passwords
data maintenance
two factor authentication
multiprocessor
computer networks basics
reference models
decapsulation
data acess
rules for communication
cybersecurity domains
network hardening
os hardening
physical security
server hardening
cyber security
personal data
pii
organizational data
attackers
cyberwarfare
professionals
healthcare data
availabilty
See more
Users following Mukesh Chinta