Tracey Wilson (CCNA, JNCIS, SNIA, MCSE) has a B.S. in Electrical Engineering and experience in network administration, network architecture and disaster recovery solutions. He’s also an active participant in SCinet, the organization responsible for planning and implementing the “World’s faster Network” as well as IEEE Computer Society and Association for Computing Machinery (ACM). Tracey currently serves as the technical lead and program manager for DICE - Data Intensive Computing Environment, evaluating new and emerging technologies to solve HPC and data management issues.
Tracey Wilson has written 13 posts for TrainSignal Training
By Tracey Wilson ⋅ May 23, 2012 ⋅ 4 comments
Access Control List (ACL) configuration and deployment is covered in this installment of Tracey’s network security series. Brush up on IPv4 protocols, configuration commands, and extended ACLs on Cisco routers and be on the lookout for more tips upcoming in this ACL series.
By Tracey Wilson ⋅ May 16, 2012 ⋅ One comment
This article series will focus on securing access control lists (ACLs), concepts that are definitely covered in various Cisco exams, Security+ and CISSP. This first article in the series will cover the basics of ACLs, including de-militarized buffer zones (DMZ), types of access control lists, and implementation on a router interface.
By Tracey Wilson ⋅ December 28, 2011 ⋅ Post a comment
A good understanding of how to create a Computer Security Incident Response Plan (CSIRP) is a must for any IT security professional. Learn about the benefits of having a good plan and how to create one.
By Tracey Wilson ⋅ December 28, 2011 ⋅ Post a comment
There are a number of important benefits to having an Computer Security Incident Response Team (CSIRT) in your organization. In this article we’ll explore the importance of developing an IT security response plan and the formation of a CSIRT.
By Tracey Wilson ⋅ August 13, 2010 ⋅ 3 comments
IT Security certification is on the fast track and the train continues to accelerate. In a previous article, I discussed several different types of IT Security certifications, including the Security+ cert and some of the core concepts they share. In this article, I will explain the Certified Information Systems Security Professional (CISSP) certification and together [...]
By Tracey Wilson ⋅ August 6, 2010 ⋅ Post a comment
Although the adoption of IPv6 has proved to be much slower than expected, the network protocol is making it’s way into the IT world. This year has already had some interesting developments with the usage and adoption of IPv6 into the mainstream, not only in Asia and Europe, but surprising updates in the United States [...]
By Tracey Wilson ⋅ May 20, 2010 ⋅ 3 comments
Implementation of IPv6 is spreading across the globe and network professionals are put in the spotlight as this new protocol is added to their organization’s network infrastructure. The CCNA 604-802 exam requires candidates to have a good understanding of IPv6 and how to implement the protocol. In my previous article, IPv6 Addresses: Form and Function, [...]
By Tracey Wilson ⋅ May 5, 2010 ⋅ One comment
IT professionals are often concerned with creating redundancies in their infrastructure and reduction of single points of failure. But the major concern for an organization or company is disaster recovery and in many cases, business continuity. Disaster recovery is an important concept covered on the CompTIA Security+ (SY0-201) exam and an entire focus element is [...]
By Tracey Wilson ⋅ April 14, 2010 ⋅ Post a comment
Over 70% of IT Security breaches are a result of failure on the inside of the organization or IT infrastructure to protect important data or access to critical systems. One of the ways that the bad guys gain access is through a process called Social Engineering. In my previous article on IT Security, we discussed [...]
By Tracey Wilson ⋅ March 24, 2010 ⋅ 9 comments
In my previous article on IT Security, we explored the key concepts of IT Security and looked at some of the more prominent IT Security Certifications available today. In continuation of my series focusing on IT Security, today’s article addresses the key objectives for passing the CompTIA Security+ (SY0-201) exam. CompTIA Security+ (SY0-201) Exam Overview [...]
By Tracey Wilson ⋅ March 9, 2010 ⋅ Post a comment
Information technology professionals face a constant battle to secure systems and networks from a variety of threats. IT Security, as a concept, is often synonymous with Computer Security, Information Security, Information Assurance, or Cyber Security. Each of these security concepts have slight differences in meaning, but primarily focus on the protection of information or data, [...]
By Tracey Wilson ⋅ February 23, 2010 ⋅ Post a comment
The transition to IPv6 will be one of the most important issues that network professionals will address in this new decade. As CCNA candidates, a solid understanding of the IPv6 protocol and how to use it in addition to IPv4 is essential. In my previous article, we examined the history of IPv6 and answered the [...]
By Tracey Wilson ⋅ February 10, 2010 ⋅ One comment
One of the components of the current CCNA Exam (640-802) is a basic understanding of the new IPv6 protocol and some transition steps to utilize IPv6 in existing IPv4 network implementations. But before you begin to study the formats and functionality of IPv6 for your CCNA exam, you should have a firm grasp of why [...]