Start learning cybersecurity with CBT Nuggets. https://courses.cbt.gg/security

In this video, Keith Barker covers how to lab up, capture, and analyze Network Time Protocol (NTP) using GNS3 and Wireshark. This critical feature affects all aspects of network and device security, from activity logs to time-based access control lists.

One of the examples of NTP that Keith uses in this video is a user whose computer is set to the wrong year (for example, 2013). If he attempts to connect to a site with a security certificate that’s valid from 2014 to 2016, the user’s computer won’t accept the security certificate as valid.

This isn’t just applicable to PCs but is also relevant for servers, routers, and virtually all other network equipment.

Accurate times affect everything from timestamps and time logs to time-based access control lists (ACL) that enable or disable certain functions based on the time of day. Keith digs into this critical concept and then walks you through each step of accurately configuring network time protocol.

Download the Free Ultimate Networking Cert Guide: https://blog.cbt.gg/ioqr

⬇️ 13-Week Study Plan: CCNA (200-301): https://blog.cbt.gg/v6nb


Start learning with CBT Nuggets:

• Cisco CCNA Routing and Switching (100-105 ICND1 & 200-105 ICND2) | https://courses.cbt.gg/4lv
• Cisco CCNA Assessment Labs (200-301) | https://courses.cbt.gg/92o
• Cisco CCNA (200-301) | https://courses.cbt.gg/h6s