LogoLogo
  • Master security
  • OWNER
  • Disclaimer !
  • 🛡️ O‘zbekiston Respublikasi qonunchiligi doirasida axloqiy xakerlik (Ethical Hacking)
    • Axloqiy xakerlik nima ?
    • Axloqiy xakerlikda shartnoma: huquqiy asos, tuzilma va amaliyot
    • Namuna shartnoma
  • Darslar va ualrni bitirgandan so'ng qanday sertifikat olish mumkin ?
  • 12 Oylik bepul kiberxavfsizlik o‘quv Rejasi: Noldan mutaxassislik sari
  • 1 -Daraja Asosiy Bilimlar (Foundations)
    • Kompyuter arxitekturasi
    • Operatsion tizimlar
    • Kompyuter tarmoqlari CISCO
      • CCNAv7 Introduction to Networks
        • Basic Switch and End Device Configuration
        • Protocols and Models
        • Physical Layer
        • Number Systems
        • Data Link Layer
        • Ethernet Switching
        • Network Layer
        • Address Resolution
        • Basic Router Configuration
        • IPv4 Addressing
        • IPv6 Addressing
        • ICMP
        • Transport Layer
        • Application Layer
        • Network Security Fundamentals
        • Build a Small Network
      • CCNAv7 Switching, Routing, and Wireless Essentials
        • Basic Device Configuration
        • Switching Concepts
        • VLANs
        • Inter-VLAN Routing
        • STP Concepts
        • EtherChannel
        • DHCPv4
        • SLAAC and DHCPv6
        • UntitledFHRP Concepts
        • LAN Security Concepts
        • Switch Security Configuration
        • WLAN Concepts
        • WLAN Configuration
        • Routing Concepts
        • IP Static Routing
        • Troubleshoot Static and Default Routes
      • CCNAv7 Enterprise Networking, Security, and Automation
        • 1 - Single-Area OSPFv2 Concepts
        • 2 - Single-Area OSPFv2 Configuration
        • 3 - Network Security Concepts
        • 4 - ACL Concepts
        • 5 - ACLs for IPv4 Configuration
        • 6 - NAT for IPv4
        • 7 - WAN Concepts
        • 8 - VPN and IPsec Concepts
        • 9 - QoS Concepts
        • 10 - Network Management
        • 11 - Network Design
        • 12 - Network Troubleshooting
        • 13 - Network Virtualization
        • 14 - Network Automation
    • SQL va malumotlar bazasi
      • MySQL
        • Page 8
      • PostgreSQL
        • Page 5
      • Microsoft SQL Server
        • Page 9
    • Linux va Server Konfiguratsiyasi:
      • Mundarija
    • Linux tarmoq sozlamalari WHT hacker
      • Mavzular
    • Windows cmd
      • Mavzu
      • Page
    • C dasturlash tili
    • C++ Dasturlash tili
      • Page 4
    • Bash script (To‘liq Professional Qo‘llanma)
      • Mavzular ro'yxati
        • 1-Bo'lim
          • 1- Bash nima va nima uchun axloqiy xakerlar uchun muhim?
          • 2- Unix/Linux shell turlari va ularning farqi
          • 3- Terminal interfeysi va komandalar arxitekturasi
          • 4- Etik xakerlik va skriptlash: real bog‘liqlik
          • Kernel nima ?
        • 2- Bo'lim
          • 5 - Shebang (#!/bin/bash) va skript boshlanishi
          • 6- Fayl va kataloglar bilan ishlash: cd, pwd, ls, mkdir, rmdir
          • 7-Fayl tarkibini ko‘rish: cat, less, head, tail
          • 8 - Fayl va kataloglarni nusxalash va ko‘chirish: cp, mv, rm
          • 9- Qidirish- find, locate, which, whereis
          • 10 - Matn qidirish: grep, egrep, fgrep
          • 11- Fayllarni tartiblash va formatlash: sort, uniq, cut, awk, sed
          • 12 - Taxalluslar (alias) va history bilan samarali ishlash
          • 13 - Yo‘naltirish operatorlari: >, >>, <, 2>, |
        • 3-Bo'lim
          • Page 11
        • 4-Bo'lim
          • Page 12
        • 5-Bo'lim
          • Page 13
        • 6-Bo'lim
          • Page 14
        • 7-Bo'lim
          • Page 15
        • 8-Bo'lim
          • Page 16
        • 9-Bo'lim
          • Page 17
        • 10-Bo'lim
          • Page 18
    • Assembly
      • Kerakli qo'llanmalar o'zbek tilida hammasi
    • Python asoslari
      • Mundarija :
    • Windows Server va Windows Foydalanuvchilari uchun PowerShell Skriptlari Asoslari
      • Page 1
  • 2 -Daraja Axborot xavfsizligi asoslari
    • Kiber xafsizlik va xaborot xafsizligi asoslari.
      • Mundarija
      • Kiberxavfsizlikning ta’rifi va maqsadlari
      • Kiberxavfsizlikning Tarixiy Rivojlanishi
      • Axborot xavfsizligining iqtisodiy ahamiyati
    • CyberOps
      • 1 - The Danger
      • 2 - Fighters in the War Against Cybercrime
      • 3 - The Windows Operating System
      • 4 - Linux Overview
      • 5 - Network Protocols
      • 6 - Ethernet and Internet Protocol (IP)
      • 7 - Connectivity Verification
      • 8 - Address Resolution Protocol
      • 9 - The Transport Layer
      • 10 - Network Services
      • 11 - Network Communication Devices
      • 12 - Network Security Infrastructure
      • 13 - Attackers and Their Tools
      • 14 - Common Threats and Attacks
      • 15 - Network Monitoring and Tools
      • 💀16 - Attacking the Foundation
      • 17 - Attacking What We Do
      • 18 - Understanding Defense
      • 19 - Access Control
      • 20 - Threat Intelligence
      • 21 - Cryptography
      • 22 - Endpoint Protection
      • 23 - Endpoint Vulnerability Assessment
      • 24 - Technologies and Protocols
      • 25 - Network Security Data
      • 26 - Evaluating Alerts
      • 27 - Working with Network Security Data
      • 28 - Digital Forensics and Incident Analysis and Response
    • DevSecOps
    • Network Defense
    • OSINT
    • Social Engineering
    • Front-end texnologiyalari Axloqiy Xakerlik
      • Page 3
    • Python va Axloqiy Xakerlik
      • Mundarija hammasi
    • .NET C# (Windows malware programing)
      • C# dasturlash tili va .NET platformasi bo‘yicha kirish
      • C# 10 Sintaksisi qisqacha
      • C# da Output nima ?
      • C# da Comments
    • Web Application Security
  • 3 - Daraja Amaliy Hujum va Himoya (Hands-on Offensive & Defensive)
    • CEH / OSCP Pracktical labaratory
    • Red/Blue Team
    • Bug bounty
    • SOC (Security Operations Center build)
    • Exploit developing
    • Post Exploitation
    • Reverse Engineering
    • Practical Malware Analysis
    • Threat Intelligence
    • Honeypot va deception
    • Web Application security
    • Mobile Application Security
    • Cloud Security
    • AI for Cybersecurity
    • Zero Trust
    • Risk management
    • ISO 27001 / SOC II
    • Cryptography I (Stanford)
    • Cyber Law & Policy, GDPR
    • Rust Programming (yangi xavfsiz til)
  • 4 Daraja - Advanced & Specialist Track
    • A -> Exploit Developer bo‘lish uchun
    • B -> Malware Analyst bo‘lish uchun
    • C -> Cloud Security mutaxassisi
    • D -> SCADA/OT sohasiga kirish
  • DevOps pentest
    • Physical PenTest 101
    • SCADA/OT Practical Industrial Control Systems
  • Xalqaro darajadagi maxsus suhbatlarga tayyorgarlik.
  • IoT hacking my lovley step
Powered by GitBook
On this page

Was this helpful?

Export as PDF
  1. 1 -Daraja Asosiy Bilimlar (Foundations)
  2. Kompyuter tarmoqlari CISCO
  3. CCNAv7 Switching, Routing, and Wireless Essentials

Troubleshoot Static and Default Routes

PreviousIP Static RoutingNextCCNAv7 Enterprise Networking, Security, and Automation

Was this helpful?