Home
Categories
EXPLORE
True Crime
Comedy
Business
Society & Culture
History
Sports
Health & Fitness
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/58/6d/69/586d6967-1f44-22c7-e69a-f33694c29d17/mza_11351649260386312473.jpg/600x600bb.jpg
Deepdive
Xatusbetazx17
12 episodes
5 days ago
Welcome to DeepDive with xatusbetazx17, the weekly podcast where network-engineer-in-training Marcelo Collado breaks down the tech world into clear, actionable insights. Whether you’re building your first home lab, hardening your network against cyber threats, or curious about the latest AI breakthroughs, this is your go-to resource. Each episode, you’ll get: Hands-on tutorials for assembling and optimizing hardware—from budget routers to high-performance servers. Cybersecurity deep dives, where Marcelo walks you through real-world security tools, best practices, and step-by-step.
Show more...
Technology
RSS
All content for Deepdive is the property of Xatusbetazx17 and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Welcome to DeepDive with xatusbetazx17, the weekly podcast where network-engineer-in-training Marcelo Collado breaks down the tech world into clear, actionable insights. Whether you’re building your first home lab, hardening your network against cyber threats, or curious about the latest AI breakthroughs, this is your go-to resource. Each episode, you’ll get: Hands-on tutorials for assembling and optimizing hardware—from budget routers to high-performance servers. Cybersecurity deep dives, where Marcelo walks you through real-world security tools, best practices, and step-by-step.
Show more...
Technology
https://d3t3ozftmdmh3i.cloudfront.net/staging/podcast_uploaded_nologo/44063418/44063418-1752451783024-d86aea174e483.jpg
Network Port Security and Authentication Protocols
Deepdive
20 minutes 21 seconds
3 months ago
Network Port Security and Authentication Protocols

In this episode of DeepDive, XatusBetaZx17 breaks down how to lock down your network at the edge—covering port security on switches and 802.1X authentication for wired and wireless access. You’ll learn best practices for configuring port limits and MAC-based restrictions, see how authentication protocols grant or deny network access, and discover how these controls fit into a larger defense-in-depth strategy.Resources & Links:

• Security Best Practices in Catalyst Campus Switches (Cisco PDF)
https://www.cisco.com/c/dam/global/fr_ca/assets/presentations/Security/Security_pratices_in_ethernet_Switched_networks.pdf Cisco
• What Is 802.1X? How Does It Work? (SecureW2)
https://www.securew2.com/solutions/802-1x SecureW2
• Choosing the Right Flavor of 802.1X (TechTarget)
https://www.techtarget.com/searchnetworking/feature/Choosing-the-right-flavor-of-8021X

• Subscribe & leave a review on Apple Podcasts, Spotify, or your favorite app! find me real sources for this please this is today episode


Deepdive
Welcome to DeepDive with xatusbetazx17, the weekly podcast where network-engineer-in-training Marcelo Collado breaks down the tech world into clear, actionable insights. Whether you’re building your first home lab, hardening your network against cyber threats, or curious about the latest AI breakthroughs, this is your go-to resource. Each episode, you’ll get: Hands-on tutorials for assembling and optimizing hardware—from budget routers to high-performance servers. Cybersecurity deep dives, where Marcelo walks you through real-world security tools, best practices, and step-by-step.