From the course: Cisco Network Security: Secure Access
Unlock the full course today
Join today to access over 24,600 courses taught by industry experts.
Secure Copy Protocol - Cisco Tutorial
From the course: Cisco Network Security: Secure Access
Secure Copy Protocol
- [Instructor] When transferring files, we must be mindful of the fact that unauthorized individuals could read or modify file contents. There are a few ways to transfer files. If you need to list directories and/or modify, rename, move, or delete files, you'll need to use file transfer protocol. Native FTP is not secure. To transfer files securely use secure FTP, which uses Secure Shell to handle authentication and encryption. If you only need to transfer a file, you could use Trivial File Transfer Protocol. For many years, network administrators would use Trivial File Transfer Protocol, or TFTP, which is a light weight file transfer protocol that uses UDP. TFTP is an unauthenticated, unsecured plaintext file transfer method. A large configuration file could send a lot of small packets across the network. Let's take a look at a TFTP file transfer with CloudShark. I'm in CloudShark, which is a free protocol analysis…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
Secure Access Control System overview5m 11s
-
(Locked)
Compare in-band and out-of-band management4m 48s
-
Secure network management5m 42s
-
(Locked)
Simple Network Management Protocol (SNMP)6m 55s
-
(Locked)
Configure SNMP6m 3s
-
(Locked)
Configure and verify security for Network Time Protocol7m 50s
-
(Locked)
Secure Copy Protocol3m 8s
-
-
-
-
-