Virtual Training

Over the course of a few short weeks, the Covid-19 Pandemic has driven a focus towards almost a complete virtual reality. During this situation, became laid back and relaxed considering this as an everlasting holiday. However, one day, I took a journey towards my past and did some accounting of how time was spent during my previous so-called normal Professional Routine.  

I realized that I had become engaged with my official assignments and follow-ups constantly. This had forced my work life to become monotonous with lowered upgradeability of skill sets. To upgrade my knowledge, I used to read multiple books and watch as many videos that were available. Mostly, this was time-consuming and in bite-sized fragments of learning. Bringing this knowledge together into one concise learning outcome was un-imaginary, due to random fragments of knowledge. 

Finally, during COVIDit was time to upgrade my skills and was presented with an opportunity to attend a couple of virtual training sessions. Here started a new journey of education for me. The first day’s session started when the participants had to switch between mute and unmute due to external disturbances. Introductions were done and expectations were set. We started asking questions vocally and the trainer was patient enough in addressing every question. I had a few silly ones which I was too shy to ask and hence, typed them into the chat feed and I received prompt responses. I suppose others too had similar experiences. My learning experience was almost like classroom-based physical session except for the face to face and physical experiences. 

Virtual training reduce cost and lost time. At the end of the day, the important factor is finding the answer to the questions 

Did I gain Applicable Knowledge with fewer efforts and time, and not in fragments? “Yes”.  

I do agree that there are pros and cons to both forms of learning. However, based on my experience, I am sure both outcomes are pretty much equal in terms of the goals achieved.  

Knowledge Gained at Convenience. 

 

By : Nanda Kumar (Ananda) Ananda

Senior Instructor/Consultant at Red Education

 

Red Education Is Awarded The Top Regional ATC Partner – APAC for 2019

Checkpoint

SYDNEY May 2020 Toni Ponder – Global Training Certifications and Certification Manager for Checkpoint announced that Red Education has just won the annual award for Top Regional ATP – APAC.

Toni from Checkpoint commented, “As we are completing the 10th week of the COVID-19 quarantine, we are learning a “new normal” with many areas of our lives. You, our ATC partners, are the best part of my workday.  I am happy to announce and recognize our Top Regional ATC Partner for APAC is Red Education. Your organization showed strong year-over-year positive growth, in addition to collaboration with our courseware, certification, and operations teams. “

Mike Baird Managing Director said “ In these difficult times it’s extremely encouraging to see Red Education overcome these business challenges whilst continuing to deliver strong attendance numbers. It’s been a real team effort to drive this success and a testimony of how good this organization is. From strong attendance numbers through to excellent training feedback delivered by exceptional instructors, the future looks bright for Red Education.”

Red Education:

Red Education is the leader in IT training and professional services in the Asia Pacific region. Since its launch in 2005, Red Education has trained more than 75,000 IT professionals in many industries including financial services, government, telecommunications, education, healthcare, and many others. The combination of extensively experienced trainers and courses that balance theoretical concepts and hands-on labs is the formula for Red Education’s class success. Red Education ensures quality class across all delivery methods; in-class, virtual-instructor led training (VILT) or on clients’ sites.

Media Contact:

Aloke Bikkina

Marketing Manager – Red Education

M: +61 410 894 277

E: aloke.bikkina@rededucation.com

How to Monitor ISP Bandwidth With PRTG Then Tweet about It!

 

Are you getting the speed that you are paying your ISP for?

A step by step guide on how to use PRTG to monitor the bandwidth you are getting, and how to let your ISP know via a Tweet once it drops below a threshold!

Please enter your email below to get instant access to the full guide.

 

Sanjay

By: Sanjay Kanesamoorthy
Senior Trainer/Consultant at Red Education

 

Securing my home network, #DoIEvenBother

 

When I get back home after a long day at work, it’s dark, and my mind often wanders into thoughts of how secure (physically) my home actually is. As I unlock the front gate, then the flyscreen door, then the actual front-door (3 locks), I grin as I consider how easy it is for someone to simply break a window to get in, or jimmy the flimsy sliding door locks on the side of the house. I suppose it’s more of a deterrent than anything else. Why do I concern myself with these things? Well, I’ve had my prized possessions stolen before.  My mountain bikes mean the world to me, and the scum of the earth bike thieves took them. Absolute scum.

As I opeDoorLockn my door, it’s nice to see that my TV is still hanging on the wall, and everything is as I left it. I suspect this is a thought that goes through the minds of a lot of people. Did I remember to lock the front door? Who REALLY cares if you didn’t? (Well to start off with, without any signs of forced entry, it’s unlikely your insurance company will replace that TV!). If you were confident you left it unlocked, chances are you’d turn around, even if it meant being late to that important meeting, and lock up. Why do we give so much credence to physical security, yet the majority of us don’t even bat an eyelid in regards to our meta-physical security, our data… (which I know technically isn’t meta-physical, It just sounds so cool I had to say it…)

 “Home network security is something that we tend to overlook, and I suspect the primary reason is that we don’t value its contents to the same extent as our physical world.”

Let’s take the worst-case scenario. Assuming your home network gets 100% pwned. What will you lose? Let’s follow Doctor Angela Ziegler as an example. Doctor Ziegler is a medical scientist conducting some ground-breaking research at the state-of-the-art facilities at work. She works long hours and tends to bring work home with her on her work issue laptop. At home, she enjoys watching live gaming streams of overwatch on twitch, and the occasional episode of the (legitimately downloaded) TV-Show “Where Are My Pants?”.

At home, she has a NAS drive she purchased from her local target, containing precious photos of her colleagues (some who have passed away, others suffered a worse fate), as well as some auxiliary research papers. Connected appliances such as her cloud controlled Air-conditioner, and her Lucky-Goldstar (LG) Internet Connected refrigerator also form part of her network, along with all the latest generation gaming consoles.
Back at the office, we trust that all her research is secured by the security team, but what about back home?
Who setup the network at home? Were there any thoughts towards security during its design? Was it even designed, or did she just use the default Huawei Modem/Router supplied by her ISP?

Securing home network

What are the risks here? What does Dr. Ziegler have to lose? If your thoughts jumped to the NAS drive, with the photos and research, you would be partially correct. This is indeed the most obvious concern, if this data were to be lost, would it be replaceable? A TV at home is easy to replace, in fact, you would probably upgrade, but the photos, they are gone. What dollar value would Dr. Ziegler place on these? If you could buy your own photos that were previously lost, how much would you pay? Especially if it contains photos of friends and family who are no longer with us… Think ransomware. Apart from the personal effects, what about the auxiliary research documents? What value do they have for Dr. Ziegler, and the organisation funding her research? What if these got into the hands of a competitor? (Talon)

If you are thinking that those documents should be stored on the servers back at the office… yeah, that’s fair… in best practice. However, as humans, we are often the weakest part of any network. We are lazy, and take shortcuts when available. It’s far quicker for Dr. Ziegler to have these files locally when she works from home, rather than VPN in to the office, using that annoying 2-factor authentication the security team back at the office implemented… Where did she leave that key-fob anyway?

On that note, she doesn’t only use her work issue laptop for research either. She sometimes uses her personal desktop (gaming rig) to crunch some numbers. After all, it’s far more powerful. This is the same machine she uses to watch twitch.tv streams and browse the Internet. What security does she have on this machine? Surprisingly, the common answer here is “none”.

We have barely scraped the surface though. Remember those connected appliances? It wasn’t long ago that a vulnerability in Miele dishwashers was discovered (Article Here), allowing an attacker root access to them. So what? I hear you cry. What’s the attacker going to do? Clean my dishes?

Fair response I suppose. I guess it would be possible to control different aspects of the machine itself, but that’s not the likely goal for an attacker (although I can think of a few funny pranks to do). They could use your machine as part of a botnet, to be used for an attack on an external party (such as DDOS’ing Blizzards servers), or they could use it to move laterally through your network. I.e. once they have control of your dishwasher, they can attack your NAS drive. This same concept applies to all devices on your network.

The good news is, it’s not that hard to follow some security best practices at home. Simple things like changing the default passwords on your devices and NAS go a surprisingly long way, Setting up Wifi with a strong password and appropriate encryption, segregating work from play by not using the same machines, and ensuring that a sufficient endpoint solution (anti-virus, anti-malware etc) is present on ALL your machines.  Above all, backup your important documents! Not just on a NAS locally, but offsite too. There are many cloud-based backup solutions that could be used for Photos and Private material… BUT NOT FOR SENSITIVE WORK CONTENT!

I will address Doctor Zieglers not so unique situation in a later post, detailing a potential solution. The first step however, is identifying the risk. So the next time you return home, and follow your own unlocking routine, maybe have a think about what it is that you’re securing, and more importantly, what you’re not!

 

Ronen

Written by Ronen Meshel
You can read more about Ronen on his website: ronen.it/

End Of Financial Year Promotions – Training Credits and F5 v12

TRAINING CREDITS PROMOTION

Purchase your Training Credits for prior to June 30, 2016 and receive an additional 15% off the value of your purchase. With end of financial year looming for many organisations it marks the end of the budget cycle. Take advantage of Red Education’s Training Credits offer and maximise your training budget – with 12 months to use your Training Credits from the date of purchase, and with 10 leading vendors in the catalogue to book training for, you’ll be able to extend the skill sets of your teams to deliver the innovation you need. Training Credits from Red Education – talk to your Account Manager today to take advantage of this offer.

Check out the detail on Training Credits here.

F5 v12 PROMOTION

F5 has released v12 of its BIG-IP platform to incredible adoption rates all over the planet. There are major revisions to all products and there are new training courses across the following:

F5 Administering BIG-IP & Configuring BIG-IP Local Traffic Manager (LTM) v12
F5 BIG-IP Application Security Manager (ASM) v12
F5 Configuring BIG-IP DNS (Formerly GTM) v12
F5 Troubleshooting BIG-IP Local Traffic Manager (LTM) v12
F5 Configuring BIG-IP Access Policy Manager (APM) v12
F5 Configuring BIG-IP Advanced Firewall Manager (AFM) v12
F5 Configuring BIG-IP Application Acceleration Manager (AAM) v12
F5 Configuring BIG-IP v12 on Viprion
F5 Developing iApps for BIG-IP v11.x
F5 Developing iRules for BIG-IP v12

Red Education is ready to deliver all of the new courses across Asia Pacific and has already started! You can sign up to get access to deep dive information on any of our public courses, or arrange a customised course – perhaps for a migration from a legacy version to v12.

To help previous attendees on Red Education’s F5 courses get up to speed with the latest version, we are offering a 20% discount to any previous attendee prior to Dec 31, 2014 that registers on a v12 course between now and June 30. So sign up today and take advantage of this special offer! The discount isn’t available in conjunction with any other offer.

5 Tips for Certification Preparation

This week I wish to outline 5 things to do during your exam preparation. Last week we discussed certifications and exams – this can be found here.

To start off, make sure you are looking in the right places, as there are lots of “wrong” places out there. Beware of websites making themselves look like a source for legitimate study guides. I don’t think I have come across any legitimate sites for this purpose, so I just stick to the info from course-ware, labs, and instructor from AEPs.

With that said, here are 5 tips on being successful in your next computer based multi-choice certification exam:

1) Look at the requirements for the exam before you book it. There may be additional items you need to look at on top of course-ware and other preparations you have done. These include bugs, updates, white papers, or knowledge base articles specific to the version of the product you are dealing with.

2) Understand rather than memorize. For example, where does NAT take place in the flow logic? Think like a packet!

3) If the exam you do doesn’t permit you to go back once a question is completed, make sure you read and re-read the question and answers before moving on. Most exams I’ve sat allowed me to go back and review at the end of the exam. In this case, go through all the questions, answer all the ones you know for sure. Note you can flag questions to review for later.

4) Then do a second pass, this time paying attention to the ones you think you know. Finally, do a third pass, completing all questions, and by now you very likely have remembered the little things you needed to answer most, if not all questions.

5) Time management. Skills, physical and mental state comes in to play as well. But for longer exams, give yourself at least 6 months of preparation before attempting this. If you are preparing for a lab exam, knowledge and skill aren’t the only thing that you need to work on.

For candidates facing the preparation process for the Check Point CCSA or CCSE, or Palo Alto Networks the PCNSE in Australia or New Zealand, if you choose to sit in an instructor let course through Red Education, I look forward to perhaps training you, and sharing my experience with you all.

I wish you all the best in your future endeavours, and look forward to hearing your thoughts on your experience.