Blog index > Archives > Posts Tagged ‘Cisco’

Cyber Security

Thursday, May 25th, 2017

Cyber Security, is the protection of computer systems; from theft or damage to their hardware, software or information, from annonymous attackers. The UK suffers with many cyber attacks every year, having eight in ten of the biggest companies in the UK attacked, costing the economy billions of pounds. One of the biggest problems  of cyber-security is the quick and constant evolving nature of security risks.

The approach has been to focus most resources on the most important system components and protect against the biggest known threats, which meant leaving some less important system components undefended and some less dangerous risks un-protected. Such an approach is insufficient in the current environment.

All companies can face two types of cyber attack:

They will either be deliberately attacked because they have a high profile and appear to have valuable data that is visible, or they will be attacked because an automated scan detects the existence of exploitable information. Nearly every Internet-facing company will have exploitable information unless it has tested and secured.

There are 3 main types of Cyber risks that companies are vunerable to:

Cyber crime – this is conducted by individual people or in groups, they primarily focus on money, data and causing disruption within a company.

Cyber war – where a nation state conducting sabotage and espionage against another nation in order to cause disruption or to extract data

Cyber terror – an organisation, working independently of a nation state, conducting terrorist activities through the medium of cyberspace.

Computer security is neccessary in almost any industry which uses computers. At the moment, most electronic devices such as computers, laptops and phones come with built in firewall security software, but despite this, computers are not 100% secure and may not be able to protect our data.

How do attackers operate?

Cyber criminals operate remotely, using numerous types of attack that are also known as ‘malware’. These include:

Worms – these expose weaknesses in operating systems to damage networks and allow full control of the infected security, is one of the biggest topics within information technology, which is why many organizations have been created to meet the demand for it.

Spyware/adware – this takes contro of your device and collect personal information without you knowing

Trojans – these create an escape on your device by which information can be stolen and damage can be caused to your device

Fast Lane offer a variety of Cyber security training, both in-classroom and e-learning programmes, ranging from beginner to expert classes.




For more information surrounding all training offers from various venders, please follow this url:

Should you require any information on training from Fast Lane, please contact us on:

Phone: 0845 470 1000

Fax: 0845 470 1001



No Comments

New features of Cisco Wireless LAN Controller 8.4

Friday, May 5th, 2017

New features of Cisco Wireless LAN Controller 8.4, WLC v 8.4 is due now.

Open DNS is now integrated with 8.4 to give us visibility and enforcement; DNS snooping-based ACL- supported on 5520/8540 -allows DNS resolution to populate your ACL; ISE auto configuration with WLC; Support for ATF on Mesh APs; Flex features to include Proxy ARP, NAT/PAT and QoS override per client.

Lastly be aware that 1040,1140,1260 APS will no longer be supported from 8.4 and beyond.

denise-papierDenise Papier
Lead Instructor

Certified Cisco Trainer (CCSI)
Microsoft Certified Trainer (MCT)


No Comments

Administering Cisco Unified Communications Manager

Tuesday, January 10th, 2017

Cisco Unified Communications Manager, at the core of Cisco Collaboration infrastructure helps to bring people together anytime, anywhere and on any device with a single architecture for voice, video and data.

It’s no surprise many organisations are adopting CUCM to seamlessly integrate people, application and endpoints, such as laptops, tablets, smartphones and other devices.

With the ability to scale for up to 80,000 users and provide instant access, feedback suggests that following the initial deployment our customers could use a little assistance with the basic operation and administration of Cisco Unified Communications Manager.

Taking this into account we have worked with Dave Looby, our Cisco Collaboration Subject Matter Expert to develop the course below, designed to provide phone network administrators, data system administrators and entry-level network engineers with a deeper understanding of the product and it’s capabilities, allowing them to optimise and maintain the solution for the organisations they are working for.

Cisco Unified Communications Manager and Unity Connection 11.x for Administrators 

This 4 day instructor led training course provides an understanding of the Cisco Unified Communications Manager System, Unity Connection Voicemail and the IM and Presence Server for Cisco Jabber. Through a combination of instructor sessions and lab exercise, students are taught the concepts of IP telephony based in system administration, including its function, features, and configuration. It begins with the basics of IP telephony and very quickly moves you forward into an understanding of system concepts: clustering, creation of phones and users, route plans, digit manipulation, media resources, and phone features, which are all important when supporting IP telephony in the enterprise network.

Focusing on Cisco Unified Communications Manager version 11.x, the course is geared to individuals that will be using and managing the system and performing administration for Level 1 and Level 2 support.

Should you require any further information on training from Fast Lane, please contact us on 0845 470 1000 email or visit

No Comments

Apple and Cisco Working Together

Monday, October 17th, 2016

Apple and Cisco Working Together –Upgrade to WLC 8.3 and iOS 10, enable 802.11R, 802.11K, 802.11V to see the partnership effect:

  • 8 times faster roaming- speed can be reduced from approx. 6 seconds to 12ms.
  • Better Quality
  • Lower Battery Life

For more information please click here.


Denise Papier
Lead Instructor
Certified Cisco Trainer (CCSI)
Microsoft Certified Trainer (MCT)

No Comments