Chapter 14: Implementing Layer 2 and Wireless Security
Implementing network security practices and configurations should be like second nature to a network engineer. As a professional, it's important that you learn about various Layer 2 threats and how a threat actor can take advantage of vulnerabilities found within various Layer 2 network protocols. Our job is to make the organization's network safe and free from cyber attacks.
During the course of this chapter, you will learn about the need to use a defense-in-depth (DiD) approach to secure both your users and devices on a network. Furthermore, you will learn how to identify various Layer 2 threats and attacks that are used to compromise an organization. Lastly, you will gain the knowledge and hands-on experience to implement various Layer 2 security controls to prevent and mitigate such attacks.
In this chapter, we will cover the following topics:
- Types of Layer 2 attacks on a network
- Protecting against...