CCNA Cybersecurity Operations Course Booklet

Author:   Cisco Networking Academy
Publisher:   Pearson Education (US)
ISBN:  

9781587134371


Pages:   336
Publication Date:   09 May 2018
Format:   Paperback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $45.95 Quantity:  
Add to Cart

Share |

CCNA Cybersecurity Operations Course Booklet


Add your own review!

Overview

A low-cost, text-only booklet that brings together the CCNA Cyber Operations course for easy offline studying This booklet of the course is perfect for offline studying. Easy to read, highlight, and review on the go, wherever the Internet is not available. Extracted directly from the online course, with headings that have exact page correlations to the online course. An icon system directs the reader to the online course to take full advantage of the images, labs, Packet Tracer activities, and dynamic activities.

Full Product Details

Author:   Cisco Networking Academy
Publisher:   Pearson Education (US)
Imprint:   Cisco Press
Dimensions:   Width: 21.00cm , Height: 2.40cm , Length: 27.60cm
Weight:   0.920kg
ISBN:  

9781587134371


ISBN 10:   1587134373
Pages:   336
Publication Date:   09 May 2018
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

Chapter 1. Cybersecurity and the Security Operations Center The Danger Explain why networks and data are attacked. 1.2 Fighters in the War Against Cybercrime Explain how to prepare for a career in Cybersecurity operations. Chapter 2. Windows Operating System 2.1 Windows Overview Explain the operation of the Windows Operating System. 2.2 Windows Administration Explain how to secure Windows endpoints. Chapter 3. Linux Operating System 3.1 Linux Overview Perform basic operations in the Linux shell. 3.2 Linux Administration Perform basic Linux administration tasks. 3.3 Linux Hosts Perform basic security-related tasks on a Linux host. Chapter 4. Network Protocols and Services 4.1 Network Protocols Explain how protocols enable network operations. 4.2 Ethernet and Internet Protocol Explain how the Ethernet and IP protocols support network communication. 4.3 Connectivity Verification Use common testing utilities to verify and test network connectivity. 4.4 Address Resolution Protocol Explain how the address resolution protocol enables communication on a network. 4.5 The Transport Layer Explain how transport layer protocols support network functionality. 4.6 Network Services Explain how network services enable network functionality. Chapter 5. Network Infrastructure 5.1 Network Communication Devices Explain how network devices enable wired and wireless network communication. 5.2 Network Security Infrastructure Explain how devices and services are used to enhance network security. 5.3 Network Representations Explain how networks and network topologies are represented. Chapter 6. Principles of Network Security 6.1 Attackers and Their Tools Explain how networks are attacked. 6.2 Common Threats and Attacks Explain the various types of threats and attacks. Chapter 7. Network Attacks: A Deeper Look 7.1 Observing Network Operation Explain network traffic monitoring. 7.2 Attacking the Foundation Explain how TCP/IP vulnerabilities enable network attacks. 7.3 Attacking What We Do Explain how common network applications and services are vulnerable to attack. Chapter 8. Protecting the Network 8.1 Understanding Defense Explain approaches to network security defense. 8.2 Access Control Explain access control as a method of protecting a network. 8.3 Threat Intelligence Use various intelligence sources to locate current security threats. Chapter 9. Cryptography and the Public Key Infrastructure 9.1 Cryptography Use tools to encrypt and decrypt data. 9.2 Public Key Cryptography Explain how the public key infrastructure (PKI) supports network security. Chapter 10. Endpoint Security and Analysis 10.1 Endpoint Protection Use a malware analysis website to generate a malware analysis report. 10.2 Endpoint Vulnerability Assessment Classify endpoint vulnerability assessment information. Chapter 11. Security Monitoring 11.1 Technologies and Protocols Explain how security technologies affect security monitoring. 11.2 Log Files Explain the types of log files used in security monitoring Chapter 12. Intrusion Data Analysis 12.1 Evaluating Alerts Explain the process of evaluating alerts. 12.2 Working with Network Security Data Interpret data to determine the source of an alert. 12.3 Digital Forensics Explain how the cybersecurity analyst handles digital forensics and evidence to ensure proper attack attr

Reviews

Author Information

Cisco Networking Academy is an innovative Cisco education initiative that delivers information and communication technology skills to improve career and economic opportunities around the world. The Academy provides online courses, interactive tools, and lab activities to prepare individuals for information technology and networking careers in virtually every industry.

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

wl

Shopping Cart
Your cart is empty
Shopping cart
Mailing List