Qui de l’IA ou de la Créativité dicte sa volonté? sujet très passionnant et qui ne manquerait de vous intéresser. Mettez vos gants et en garde ! au 1er round Indéniablement, la créativité est la...
In this post, we’ll review the general idea behind NAT operation and how it could affect positively (friendly) or negatively (unfriendly) the performance of our network services on the cloud. In...
In this series of posts we’ll explore routing operation. Let’s start from the general idea of how could we manage traffic, a move from one location to another… ” This person ne...
In this post, we present an example of an IPv6 network operation, based on a home network setup that is a PC (Windows) and a box (an internet box provided by an ISP that supports IPv6). Introduction I...
in this blog we talk about the general idea about using and IDS or IPS. let’s recall that IDS/IPS stands for intrusion detection and prevention systems. We give examples of implementations of ve...
Introduction Dans cet article nous discutons de la fonction de base d’un WAF ou pare-feu d’applications web. Comme son nom l’indique il s’agit de sécuriser l’application, plus précisemment l’acc...
802.11 (4) application (2) architecture (4) asm (4) automatisation (2) cagd (3) chd (2) checkpoint (2) cisco (6) command (5) cost (6) coverage (5) debug (10) distance (6) dtls (2) dynamic rrm (5) firewall (2) fortinet (2) gns3 (2) ieee (4) igmp (5) igp (8) interference (2) internet (3) ip (2) logique (2) loop (5) mac (3) machine learning (3) model (2) mpls (3) mroute (4) multicast (5) nat (2) ndp (2) network (3) next-hop (5) nurbs (3) osi (6) pat (2) pim (4) poisoning (6) policy (2) projet (2) qos (2) radio (5) rib (5) rip (5) route (6) router (6) routing (15) rpf (4) rrm (10) security (3) security gateway (2) show (5) simulation (2) snr (2) solution (2) split-horizon (5) ssl (2) ssm (4) static (6) stp (2) summarization (5) tcp (2) travail (2) udp (2) vpn (3) vrf (3) wifi (11) windows (2) wireshark (2) wlan (7) wlc (5)
- Protected: An example network from scratch: Internet accessThis content is password protected.
- Protected: An example network from scratch: Build the Wifi NetworkThis content is password protected.
- Protected: An example network from scratch: On-premise Network Automation with AnsibleThis content is password protected.
- Protected: An example network from scratch: Build your network securityThis content is password protected.
- Travailler son CVle CV est une étape importante de toute recherche d’emploi, au moins pour initier le processus (répondre à une offre, candidature spontanée, etc.)… plus encore, c’est une occasion de se poser, de réfléchir son développement, son expérience et de se projeter dans une nouvelle opportunité! une approche classique du CV pour nombre de “demandeurs d’emploi”,
M | T | W | T | F | S | S |
---|---|---|---|---|---|---|
1 | 2 | 3 | 4 | 5 | ||
6 | 7 | 8 | 9 | 10 | 11 | 12 |
13 | 14 | 15 | 16 | 17 | 18 | 19 |
20 | 21 | 22 | 23 | 24 | 25 | 26 |
27 | 28 | 29 | 30 | 31 |