Menu: Are they making hacking too easy? 0:00 Story 1: Companies doing dumb things: 0:40 Are Blackberry phones the best? 2:18 Example of why people steal data: 3:42 Story 2: CEO doesn't want any tools: 4:40 It's a joke really: 6:35 Rockyou wordlist: 8:25 Top 10 passwords: 9:30 You too good for rockyou? 10:40 75 - 80% success rate: 11:15
cybersecurity cybersecurity careers hacking hack ethical hacking ceh oscp ine try hack me hack the box hacking ethical hacker oscp certification ctf for beginners first job cybersecurity job hacking job how to break in break in hacking linkedin tips linkedin cybersecurity
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
A Powerful Partnership: Cisco, with its industry-leading expertise in Ethernet networking and extensive partner ecosystem, together with NVIDIA, the inventor of the GPU that fuelled the AI boom, share a vision and commitment to help customers navigate the transitions for AI with highly secure Ethernet-based infrastructure.
“AI is fundamentally changing how we work and live, and history has shown that a shift of this magnitude is going to require enterprises to rethink and re-architect their infrastructures,” said Chuck Robbins, Chair and CEO, Cisco. “Strengthening our great partnership with NVIDIA is going to arm enterprises with the technology and the expertise they need to build, deploy, manage, and secure AI solutions at scale.”
“Companies everywhere are racing to transform their businesses with generative AI,” said Jensen Huang, founder and CEO of NVIDIA. “Working closely with Cisco, we’re making it easier than ever for enterprises to obtain the infrastructure they need to benefit from AI, the most powerful technology force of our lifetime.”
NVIDIA news: https://nvidianews.nvidia.com/news/cisco-nvidia-secure-ai-infrastructure
Big thank you to Cisco for sponsoring this video and my trip to Cisco Live.
// Jonathan’s SOCIAL //
X: https://twitter.com/jonathandavidsn
LinkedIn: http://linkedin.com/in/jonathandavidson1
Cisco Newsroom: https://newsroom.cisco.com/c/r/newsroom/en/us/executives/jonathan-davidson.html
Book: https://www.ciscopress.com/store/voice-over-ip-fundamentals-9781587052576
// YouTube Video REFERENCE //
Cisco Live 2024 Amsterdam: Opening Keynote: https://youtu.be/QWXlvx1GoTY
Cybersecurity and Networking just changed: https://youtu.be/hNHsYgLQsg0
// Book REFERENCE //
Voice over IP Fundamentals by Jonathan Davidson https://amzn.to/43wFRpR
// Website REFERENCE //
https://blogs.nvidia.com/blog/whats-a-dpu-data-processing-unit/
// David's SOCIAL //
Discord: https://discord.com/invite/usKSyzb
X / Twitter: https://www.twitter.com/davidbombal
Instagram: https://www.instagram.com/davidbombal
LinkedIn: https://www.linkedin.com/in/davidbombal
Facebook: https://www.facebook.com/davidbombal.co
TikTok: http://tiktok.com/@davidbombal
YouTube: https://www.youtube.com/@davidbombal
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
AI
Artificial Intelligence
Cisco
NVIDIA
Network
Connectivity explosion
Security and networking domain challenges
AI and network infrastructure
Cisco Silicon One chips
Collaboration with Nvidia
Enterprise data center solutions
AI workloads and gaming
Ethernet and InfiniBand
Digital Experience Monitoring
Cybersecurity and ethical hacking
Cisco Networking Cloud
Data company and telemetry
AI acceleration and learning
Prompt engineering
Networking and security careers
IoT and smart cities
Cloud-based AI infrastructure
On-premises AI infrastructure
Networking and software
Infrastructure management
Secure AI infrastructure
Observable AI solutions
NVIDIA AI Enterprise software
Generative AI workloads
Ethernet networking-based solutions
Global channel
Professional services
GPU clusters
ClusterPower
Data center operations
AI/ML solutions
Cisco LIVE
AI infrastructure solutions
Computing power
Chuck Robbins
Jensen Huang
Ethernet networking
Partner ecosystem
GPU
Webex collaboration devices
Hybrid workforces
AI-powered meetings
Virtual desktop infrastructure
Scalable AI cluster management
Automated troubleshooting
Tensor Core GPUs
Cisco UCS rack and blade servers
Data-intensive workloads
Software frameworks
Pretrained models
Development tools
Cisco Validated Designs (CVDs)
FlexPod
FlashStack
Cisco Networking Cloud
Cisco Nexus Dashboard
Cisco Intersight
ThousandEyes
Digital Experience Monitoring
Cisco Observability Platform
AI-driven insights
Automated remediation
Global ecosystem of partners
Ethernet-based AI solutions
AI Proving Ground lab
Vijay Bhagavath
IDC Research
Performance-optimized Ethernet-based infrastructure
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
#ai #artificialintelligence #gpu
...
https://www.youtube.com/watch?v=9Iep5v1Mbmo
SNMP Packet Tracer file (PT Version 7.1): https://bit.ly/2OIDV7O
Get the Packet Tracer course for only $10 by clicking here: https://goo.gl/vikgKN
Get my ICND1 and ICND2 courses for $10 here: https://goo.gl/XR1xm9 (you will get ICND2 as a free bonus when you buy the ICND1 course).
For lots more content, visit http://www.davidbombal.com - learn about GNS3, CCNA, Packet Tracer, Python, Ansible and much, much more.
#CCNA #PacketTracer #CCENT
Open Shortest Path First (OSPF) is a routing protocol for IP. It is a link-state protocol, as opposed to a distance-vector protocol. A link-state protocol makes routing decisions based on the states of the links that connect source and destination machines. The state of a link is a description of that interface and the relationship to its neighboring networking devices. The interface information includes the IPv6 prefix of the interface, the network mask, the type of network it is connected to, the routers connected to that network, and so forth. This information is propagated in various type of link-state advertisements (LSAs).
OSPF version 3, which is described in RFC 2740, supports IPv6.
How OSPFv3 Works
OSPFv3 is a routing protocol for IPv4 and IPv6. It is a link-state protocol, as opposed to a distance-vector protocol. Think of a link as being an interface on a networking device. A link-state protocol makes its routing decisions based on the states of the links that connect source and destination machines. The state of a link is a description of that interface and its relationship to its neighboring networking devices. The interface information includes the IPv6 prefix of the interface, the network mask, the type of network it is connected to, the devices connected to that network, and so on. This information is propagated in various type of link-state advertisements (LSAs).
A device's collection of LSA data is stored in a link-state database. The contents of the database, when subjected to the Dijkstra algorithm, result in the creation of the OSPF routing table. The difference between the database and the routing table is that the database contains a complete collection of raw data; the routing table contains a list of shortest paths to known destinations via specific device interface ports.
OSPFv3, which is described in RFC 5340, supports IPv6 and IPv4 unicast AFs.
Comparison of OSPFv3 and OSPF Version 2
Much of OSPF version 3 is the same as in OSPF version 2. OSPFv3, which is described in RFC 5340, expands on OSPF version 2 to provide support for IPv6 routing prefixes and the larger size of IPv6 addresses.
In OSPFv3, a routing process does not need to be explicitly created. Enabling OSPFv3 on an interface will cause a routing process, and its associated configuration, to be created.
In OSPFv3, each
...
https://www.youtube.com/watch?v=Buj8qH4emHM
People really do share too much information on social media (even on ships!). That's makes it too easy to find them and know what technology what they are using - don't overshare and don't use default passwords. Don't connect insecure systems to the Internet as tools such as Shodan make it easy to find them. This does affect ICS systems and other systems that control a ship.
Rae's book has been published since this interview:
Amazon.com: https://amzn.to/426Bd0F
Amazon.co.uk: https://amzn.to/41Md8fW
// Rae's Social //
Twitter: https://twitter.com/wondersmith_rae
Training Website: https://kasescenarios.com/
Website: https://www.raebaker.net/
// Micah Hoffman SOCIAL //
Twitter: https://twitter.com/webbreacher
LinkedIn: https://www.linkedin.com/in/micahhoffman/
Personal website: https://webbreacher.com
Micah's OSINT Training Courses: https://myosint.training
Micah's OSINT CTF Platform: https://osint.games
// David's SOCIAL //
Discord: https://discord.com/invite/usKSyzb
Twitter: https://www.twitter.com/davidbombal
Instagram: https://www.instagram.com/davidbombal
LinkedIn: https://www.linkedin.com/in/davidbombal
Facebook: https://www.facebook.com/davidbombal.co
TikTok: http://tiktok.com/@davidbombal
YouTube: https://www.youtube.com/davidbombal
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// MENU //
00:00 - Intro
00:44 - Introductions // Rae Baker and Micah Hoffman
02:07 - Finding ships with OSINT
04:04 - How to find and track ships
14:13 - Using Twitter for maritime OSINT
16:21 - Security leaks on TikTok
18:32 - AIS systems on Shodan // Hacking vulnerable ships
24:33 - Cases of illegal activities
28:09 - Using satellite to find ships
35:53 - Finding the owner of a ship
40:58 - The complications of maritime OSINT
43:06 - Vulnerable technologies on ships // Hacking ships
44:40 - Spoofing of a US Navy ship in Crimea
46:51 - China's maritime militia
47:58 - Somali pirates
48:25 - Live Piracy Map
49:02 - Rae Baker socials
49:28 - Upcoming book
50:00 - Conclusion
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
osint
open-source intelligence
open source intelligence tools
geolocation
geolocation game
tiktok
facebook
instagram
geolocation google
geolocation bing
social media
warning about social media
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
#osint #cyber #privacy
...
https://www.youtube.com/watch?v=dxiNByvkvU8
Learn how to check if a WiFi adapter supports monitor mode and packet injection. Use some basic commands in Kali Linux to check if you can hack WiFi networks using a WiFi adapter or network interface card. As always, only test against networks that you personally own or have permission to test. Be ethical. Learn cybersecurity and help protect companies.
Menu:
Can I hack using this WiFi adapter? 0:00
View the chipset in an adapter: 0:32
Alfa AWUS036NHA adapter: 1:11
View adapter in managed mode: 1:35
View adapter chipset: 1:53
Verify monitor mode: 3:07
Verify packet injection: 4:00
TP-Link Tl-WN722N adapter: 4:44
View adapter chipset: 5:08
Verify monitor mode: 5:58
Verify packet injection: 6:33
Alfa AWUS036ACH adapter: 7:11
Wifite demo: 8:00
View adapter in managed mode: 8:17
Verify monitor mode: 8:35
Previous video: https://youtu.be/5MOsY3VNLK8
TP-WN722N Adapter Fix: Video coming soon
===============
Commands Used:
===============
!Check details
lsusb
!Change 001 and 004 to the right number:
lsusb -D /dev/bus/usb/001/004
!kill processes
sudo airmon-ng check kill
!Start monitor mode
sudo airmon-ng start wlan0
!Verify that monitor mode is used
sudo airmon-ng
!You could also use iwconfig to check that interface is in monitor mode:
iwconfig
!Test injection:
sudo aireplay-ng --test wlan0mon
====================
Recommended Adapters:
====================
Alfa AWUS036NHA: https://amzn.to/3wnyVen
Alfa AWUS036ACM: https://amzn.to/3fCL4WT
Alfa AWUS036ACH: https://amzn.to/3rLAjny or https://amzn.to/2PxkkMV
Others:
Alfa AWUS1900: https://amzn.to/31E0AtH
Alfa Long-Range Dual-Band AC1200: https://amzn.to/34UUCEL
Alfa AWUS036NEH: https://amzn.to/3sK2iW8
Panda PAU05: https://amzn.to/3ue23Da
Panda PAU06: https://amzn.to/3wwqRZ8
Panda PAU09: https://amzn.to/3wosx6X
WiFi Nation 802.11ac AC600: https://amzn.to/3cLQddm
WiFi Nation Atheros AR9271: https://amzn.to/3u8JUqm
See Aircrack FAQ for more: https://bit.ly/39AtWNZ
================
Connect with me:
================
Discord: https://discord.com/invite/usKSyzb
Twitter: https://www.twitter.com/davidbombal
Instagram: https://www.instagram.com/davidbombal
LinkedIn: https://www.linkedin.com/in/davidbombal
Facebook: https://www.facebook.com/davidbombal.co
TikTok: http://tiktok.com/@davidbombal
YouTube: https://www.youtube.com/davidbombal
================
Links:
================
ITProTV Free Training: https://www.itpro.tv/plans/personal/
My ITProTV affiliate link: https://go.itpro.tv/davidbombal
OSCP: https://www.offensive-security.com/courses-and-certifications/
SANS: https://www.sans.org/
Hack the box: https://www.hackthebox.eu/
Try Hack Me: https://tryhackme.com/
CTF Time: https://ctftime.org/ctf-wtf/
CEH: https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/
wifi
hacking
hacking wifi
wifi
...
https://www.youtube.com/watch?v=UA-IJ8DWh_8
Udemy: Get the course for $10 here: https://goo.gl/QYC988
GNS3 Academy: Get the course for $10 here: https://goo.gl/vnZJhg
More free Python videos here: https://www.youtube.com/playlist?list=PLhfrWIlLOoKPn7T9FtvbOWX8GxgsFFNwn
Learn Python programming with GNS3. In this series of videos, I will show you how you can quickly and easily program Cisco networks using Python. Cisco Wired LAN Design Guide: https://goo.gl/k855Vj
Script on GitHub:
https://github.com/davidbombal/pythonvideos/commit/f154a11443ed1c67b94402e4925e53a173d6ff2a
Transcription:
This is one of the multiple videos showing you how to use Python to configure Cisco networks.
In this example, we're going to use Netmiko to configure a campus network running in GNS3 based on a validated Cisco technology design guide for campus wired local area networks.
Cisco has for years provided solution reference network design guides and validated designs for different networks and implementations. This guide can help you implement best practices in Wired campus networks.
So as an example, at the access layer, you need to think about a security and implementing DHCP snooping, IP source guard, port security, and dynamic ARP inspection.
Different access layer platforms are discussed and lots of examples and best practices and associated explanations are provided in this guide. There are examples of how to implement quality of service for IP phones.
So very good examples of quality of service are provided in this guide. There's also a procedure for LAN switch universal settings such as configuring the host name, such as configuring VTP transparent mode and the reasons for configuring VTP transparent mode.
It's recommended that you run rapid PVST, you enable UDLD, you enable recovery mechanisms to allow ports disabled as a result of errors to automatically clear error disabled status and attempt a recovery.
So we have this option error disabled recovery cause all for EtherChannels you should be using load balancing using source and destination IP addresses. You should configure a DNS server. You should configure HTTPS and disable HTTP. You should be using SSH rather than telnet. You can enable SNMP and then lock it down SNMP using an access list as well as locking down access to the vty lines.
You can configure a local username and password or better use a TACACS server. You should also be using NTP and set your time stamps.
So there's a lot of good information in this guide. I won't bore you going through the entire guide. They talk about the VLAN configuration, setting a IP default gateway or IP route enabling DHCP snooping, enabling ARP inspection, configuring BPDU guard on port fast enabled interfaces, enabling IPv6 first top security policy for host ports, configuring voice VLANs and acce
...
https://www.youtube.com/watch?v=S4NtYBHb3gs
Thanks to the support of Cisco Press, one person will win a $700 CCNA prize; and two people will win CCNP prizes worth $160! But, wait! There's more! Sorry - couldn't resist - I am giving away a lot more during this giveaway. Want to win? Watch my video.
======================
Giveaways:
======================
CCNA Learning Library ($700 value): bit.ly/700ccna
CCNP Enterprise Learning Library ($160 value): bit.ly/ccnp160
CCNA 200-301 course (limited to 100): See video for link.
Python Network Automation (Time limited): See video for link.
Wireshark course (limited to 100): See video for link.
======================
Special Offers:
======================
Cisco Press: Up to 50% discount
Save every day on Cisco Press learning products! Use discount code BOMBAL during checkout to save 35% on print books (plus free shipping in the U.S.), 45% on eBooks, and 50% on video courses and simulator software. Offer expires December 31, 2020. Shop now.
Link: bit.ly/ciscopress50
Boson software: 15% discount
Link: bit.ly/boson15
Code: DBAF15P
Udemy:
CCNA course for $9.99 (Udemy): bit.ly/ccna999
Wireshark course for $12.99 (Udemy): bit.ly/wireshark1299
GNS3 Academy:
CCNA ($10): bit.ly/gns3ccna10
Wireshark ($10): bit.ly/gns3wireshark
DavidBombal.com
CCNA ($10): http://bit.ly/yt999ccna
Wireshark ($9): bit.ly/wireshark9
===================
Free and Trial Network Software:
===================
Solar-PuTTY: http://bit.ly/SolarPutty
SolarWinds TFTP Server: http://bit.ly/2mbtD6j
WAN Killer: http://bit.ly/wankiller
Engineers Toolset: http://bit.ly/gns3toolset
IP Address Scanner: http://bit.ly/swipscan
Network Device Scanner: http://bit.ly/swnetscan
Wifi Heat Map: http://bit.ly/wifiheat
Wifi Analyzer: http://bit.ly/swwifianalyzer
SolarWinds NPM: http://bit.ly/getnpm
================
Connect with David:
================
Twitter: https://www.twitter.com/davidbombal
Instagram: https://www.instagram.com/davidbombal
LinkedIn: https://www.linkedin.com/in/davidbombal
Facebook: https://www.facebook.com/davidbombal.co
TikTok: http://vm.tiktok.com/f6SGnr/
YouTube: https://www.youtube.com/davidbombal
Website: http://www.davidbombal.com
cisco ccna
200-301
ccna 200-301
ccna 200 301
VIRL
CML-P
CML
EVE-NG
GNS3
Packet Tracer
CCNA
Cisco Devnet Associate
CCNP Enterprise
CCNP Security
CCNP Data Center
CCNP Service Provider
CCNP Collaboration
Cisco Certified Devnet Professional
Cisco Certified Network Professional
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
#ccna #ccnp #python
...
https://www.youtube.com/watch?v=DySVOlFPHbU
I talk about the future with Mikko Hyppönen, the author of "If it's Smart, it's Vulnerable" - we discuss the huge risks of having smart devices (and dumb devices getting smart connectivity). What does this mean for your privacy and security? Is the future just gloom and doom?
Mikko Hyppönen is a Finnish computer security expert, speaker and author. He is known for the Hyppönen Law about IoT security, which states that whenever an appliance is described as being "smart", it is vulnerable. He works as the Chief Research Officer at WithSecure (former F-Secure for Business) and as the Principal Research Advisor at F-Secure.
Source: Wikipedia.
// MENU //
00:00 - Coming Up
00:31 - Intro
00:55 - Mikko's Book
02:38 - Internet of Things
09:58 - Internet Regulation
11:18 - Privacy is Dead
13:52 - Leaving the Internet
19:33 - The NSA
20:43 - Boycott of RSA
24:39 - Cyber Security Tetris
27:47 - Mikko's Journey
32:28 - Mikko's Advice for New Comers
34:18 - The Next Trends
37:55 - Machine Learning
41:57 - Educating Yourself
43:54 - Command Line
44:45 - Linux/Linus Torvalds
46:54 - Closed Environment Device Security
50:46 - Admin Rights
52:56 - SCADA and ICS Device Worries
56:15 - Should You Be Optimistic
57:55 - Reading the Terms & Conditions
58:57 - Mikko's First PC Virus
01:00:24 - Mikko's Closing Thoughts
// BOOK //
If it’s smart it’s vulnerable by Mikko Hyppönen: https://amzn.to/3GdCbR0
// TED Talks //
-
How the NSA betrayed the world's trust -- time to act: https://youtu.be/9CqVYUOjHLw
- Living in a surveillance state: https://youtu.be/lHj7jgQpnBM
The Internet is on fire: https://youtu.be/QKe-aO44R7k
- Fighting viruses, defending the net: https://youtu.be/cf3zxHuSM2Y
- Three types of online attack: https://youtu.be/VM7HQ_zbdIw
// DEFCON Talks //
- The history and evolution of computer viruses: https://youtu.be/1y36gnV5DNw
// Mikko's SOCIAL //
Twitter: https://twitter.com/mikko
Wikipedia: https://en.wikipedia.org/wiki/Mikko_Hypp%C3%B6nen
// David's SOCIAL //
Discord: https://discord.gg/davidbombal
Twitter: https://www.twitter.com/davidbombal
Instagram: https://www.instagram.com/davidbombal
LinkedIn: https://www.linkedin.com/in/davidbombal
Facebook: https://www.facebook.com/davidbombal.co
TikTok: http://tiktok.com/@davidbombal
YouTube Main Channel: https://www.youtube.com/davidbombal
YouTube Tech Channel: https://youtube.com/channel/UCZTIRrENWr_rjVoA7BcUE_A
YouTube Clips Channel: https://www.youtube.com/channel/UCbY5wGxQgIiAeMdNkW5wM6Q
YouTube Shorts Channel: https://www.youtube.com/channel/UCEyCubIF0e8MYi1jkgVepKg
Apple Podcast: https://davidbombal.wiki/applepodcast
Spotify Podcast: https://open.spotify.com/show/3f6k6gERfuriI96efWWLQQ
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
wifi
bluetooth
hue
tv
cctv
monitor
camera
hack
hacker
hacking
cybersecurity
infosec
iot
nsa
nsa hacking
rsa
rsa conference
internet of things
iot vulnerable
internet of things vulnerability
iot hacking
iot hacker
iot devices
camera
smart tv
tv
smart speaker
encryption
apple
google
degoogle phone
degoogling a phone
ios
skynet
robocop
pine phone
privacy
online privacy
online privacy guide
internet security
tracking
online privacy for kids
online privacy and security
online privacy it doesnt exist
online privacy tips
online privacy ted talk
online privacy guide
online privacy for students
internet security tutorial
edward snowden
naomi brockwell
privacy
five eyes
5 eyes
brave browser
tor
protonvpn
protonmail
duckduckgo
google
online tracking
ios
android
graphite phone
privacy browser
privacy browser ios
privacy broke
privacy browser for pc
anonymous
hide online
hidden identity
hide identity online
data
hack
identity
internet
privacy
social change
technology
Disclaimer: This video is for educational purposes only.
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
#hacking #wifi #iot
...
https://www.youtube.com/watch?v=Nvv0drH4lmA
Can CML support multivendor topologies? Can you use other vendor VMs with CML? These are often asked questions. In this video I'm going to show you how to run a Windows 10 Virtual Machine (VM) in Cisco CML (VIRL 2).
Be warned! There are a number of steps required to make this work, but it's definitely possible.
This is Part 7 of my CML (VIRL 2) series showing you how to download, install and configure Cisco VIRL 2 (CML-P). The new version of Cisco VIRL allows you to create virtual Cisco networks using just your Web browser. You don't have to use a thick client or any other software - everything is included and everything is easy to use.
The new version of Cisco CML is one of your best options for CCNA, CCNP and CCIE Labs. CML has multiple advantages over other platforms such as GNS3 or EVE-NG. CML supports an HTML5 web client and contains all the Cisco IOS images. You don't have to use a thick client like you do with GNS3. You don't have to follow a convoluted process to get Cisco images working like you do with EVE-NG.
You don't have to try to find images as they are all included as part of your CML subscription and by simply mapping an ISO drive to your virtual machine you can immediately start using all Cisco IOS images in your topologies. Both EVE-NG and GNS3 require that you provide your own IOS images - typically they recommend that you buy a CML subscription anyway. That means that you are already paying for CML.
CML (VIRL2) is also an official Cisco product - that means that you don't have to worry about any gray legal issues with regards to running Cisco IOS images on your laptop. This is an official Cisco product that is supported by Cisco. By paying your yearly subscription fee of $199, you can use Cisco IOS images such as IOSv, IOSvL2, ASAv, NX-OSv and others without any worries. CML (VIRL 2) has everything you need to get started.
Disadvantages include the requirement to license your installation. That however has been simplified dramatically from previous releases. There is also a 20 node limited in topologies. However, for most of us that is fine for a lot of labs.
Is VIRL better than GNS3 or EVE-NG? In many ways it is. But, all platforms have advantages and disadvantages. If you are studying for your ccie, you many prefer gns3 or eve-ng as they don't limit the number of devices in a topology like virl does. VIRL-PE limits you to 20 devices - so your topologies cannot be massive like they could with gns3 or eve ng. However, if you are studying for your ccna or ccnp, VIRL may be more than enough.
Cisco have made massive changes to their certification programs and it is fantastic to see the new version of VIRL in action.
Menu:
Overview: 0:00
Steps: 4:17
Download Windows VMs: 7:00
Download and install QEMU: 8:32
Unzip Windo
...
https://www.youtube.com/watch?v=ur2G0dpMCBs