Packet Tracer is a powerful network simulator that can be utilized in training for Network certifications by allowing students to create networks with an almost unlimited number of devices and to experience troubleshooting without having to buy real Cisco routers or switches. The tool is created by Cisco Systems. The purpose of Packet Tracer is to offer students a tool to learn the principles of networking as well as develop Cisco technology specific skills. However, it is not be used as a replacement for Routers or Switches.
It can be downloaded for free if you have a Netacad account. As Cisco says, the best way to learn about networking is to do it. Hands-on equipment gets students started, but is limited to the number of devices in the lab. Furthermore, Educators use Packet Tracer to demonstrate complex technical concepts and networking systems. Students use Packet Tracer to complete assignments, working on their own or in teams.
As a network engineer, I used to simulate complex scenarios first on packet tracer and then deploy them on the real equipments. Please notice though, this course will not teach you networking, but rather let teach you how to simulate and apply your networking related knowledge.
A few word about myself.
In this video will be presented the main features of Packet Tracer.
In this video I will present you the types of devices that can be used on Packet Tracer.
The connection types are presented in this video.
This video will show you how to add equipment and interconnect them, along with what kind of connection should be used.
Sometime custom interfaces are required. It is possible in Packet Tracer to add them, as required.
Senior Information Security Consultant
I work in the Internet security team, focused on ethical hacking - deliberately and purposefully challenging the IT security assumptions, strategies, and methods of protecting vital assets and information by emulating an adversary. Act as an effective participant in multidisciplinary security project team. -Scan and exploit for a wide variety of data center infrastructure and application vulnerabilities, following defined rules of engagement and attack scenarios (ethical hacking). Make recommendations on security weaknesses and report on activities and findings. - Perform Internet penetration testing (black box / white box testing) and code reviews (manual and automated) - Security lab fixed and virtual assets design for different LAN / WAN architectures - Use testing tools as NetBIOS scanning, network pinging and testing, packet crafting and analyzing, port scanning for vulnerability assessment - Perform analysis and testing to verify the strengths and weaknesses of - Web Applications and Web Services (SML, SOAP, WSDL, UDDI, etc.) - Perform analysis and testing to verify the strengths and weaknesses of a variety of operating systems, network devices, web applications, and security architectures - Assist with the development of remediation services for identified findings - Customize, operate, audit, and maintain security related tools and applications
- Trainer for Web Application Hacking and Network Infrastructure Hacking - Training students for CCNA and CCNA Security Certification - Training NDG Linux Basics - Legal Main Contact - Curriculum Leader
- CREST CRT (Registered Penetration Tester)
- ISO 270001 Lead Auditor
- ECSA (EC-Council Certified Professional)
- CEH (Certified Ethical Hacker)
- CEI (Certified EC-Council Instructor)
- VMWare vSphere Install, Configure, Manage
- CCNA and CCNA Security
- CCNP Routing and CCNP Switching
- Advanced Linux&InfoSEC
- Microsoft Certified Technology Specialist (MCTS/MCP 70-642): Microsoft Windows Server 2008 Network Infrastructure, etc.