Description: CCNA Cybersecurity Operations Course Booklet by Cisco Networking Academy The Cisco Networking Academy Course Booklet is designed as an economical study resource students can easily read, highlight, and review on the go, wherever the Internet is not available or practical. FORMAT Paperback LANGUAGE English CONDITION Brand New Publisher Description A low-cost, text-only booklet that brings together the CCNA Cyber Operations course for easy offline studying This booklet of the course is perfect for offline studying. Easy to read, highlight, and review on the go, wherever the Internet is not available. Extracted directly from the online course, with headings that have exact page correlations to the online course. An icon system directs the reader to the online course to take full advantage of the images, labs, Packet Tracer activities, and dynamic activities. Author Biography Cisco Networking Academy is an innovative Cisco education initiative that delivers information and communication technology skills to improve career and economic opportunities around the world. The Academy provides online courses, interactive tools, and lab activities to prepare individuals for information technology and networking careers in virtually every industry. Table of Contents Chapter 1. Cybersecurity and the Security Operations Center The Danger Explain why networks and data are attacked. 1.2 Fighters in the War Against Cybercrime Explain how to prepare for a career in Cybersecurity operations. Chapter 2. Windows Operating System 2.1 Windows Overview Explain the operation of the Windows Operating System. 2.2 Windows Administration Explain how to secure Windows endpoints. Chapter 3. Linux Operating System 3.1 Linux Overview Perform basic operations in the Linux shell. 3.2 Linux Administration Perform basic Linux administration tasks. 3.3 Linux Hosts Perform basic security-related tasks on a Linux host. Chapter 4. Network Protocols and Services 4.1 Network Protocols Explain how protocols enable network operations. 4.2 Ethernet and Internet Protocol Explain how the Ethernet and IP protocols support network communication. 4.3 Connectivity Verification Use common testing utilities to verify and test network connectivity. 4.4 Address Resolution Protocol Explain how the address resolution protocol enables communication on a network. 4.5 The Transport Layer Explain how transport layer protocols support network functionality. 4.6 Network Services Explain how network services enable network functionality. Chapter 5. Network Infrastructure 5.1 Network Communication Devices Explain how network devices enable wired and wireless network communication. 5.2 Network Security Infrastructure Explain how devices and services are used to enhance network security. 5.3 Network Representations Explain how networks and network topologies are represented. Chapter 6. Principles of Network Security 6.1 Attackers and Their Tools Explain how networks are attacked. 6.2 Common Threats and Attacks Explain the various types of threats and attacks. Chapter 7. Network Attacks: A Deeper Look 7.1 Observing Network Operation Explain network traffic monitoring. 7.2 Attacking the Foundation Explain how TCP/IP vulnerabilities enable network attacks. 7.3 Attacking What We Do Explain how common network applications and services are vulnerable to attack. Chapter 8. Protecting the Network 8.1 Understanding Defense Explain approaches to network security defense. 8.2 Access Control Explain access control as a method of protecting a network. 8.3 Threat Intelligence Use various intelligence sources to locate current security threats. Chapter 9. Cryptography and the Public Key Infrastructure 9.1 Cryptography Use tools to encrypt and decrypt data. 9.2 Public Key Cryptography Explain how the public key infrastructure (PKI) supports network security. Chapter 10. Endpoint Security and Analysis 10.1 Endpoint Protection Use a malware analysis website to generate a malware analysis report. 10.2 Endpoint Vulnerability Assessment Classify endpoint vulnerability assessment information. Chapter 11. Security Monitoring 11.1 Technologies and Protocols Explain how security technologies affect security monitoring. 11.2 Log Files Explain the types of log files used in security monitoring Chapter 12. Intrusion Data Analysis 12.1 Evaluating Alerts Explain the process of evaluating alerts. 12.2 Working with Network Security Data Interpret data to determine the source of an alert. 12.3 Digital Forensics Explain how the cybersecurity analyst handles digital forensics and evidence to ensure proper attack attr Long Description Your Cisco Networking Academy Course Booklet is designed as a study resource you can easily read, highlight, and review on the go, wherever the Internet is not available or practical: Feature The text is extracted directly, word-for-word, from the online course so students can highlight important points and take notes in the "Your Chapter Notes" section. Headings with the exact page correlations provide a quick reference to the online course for classroom discussions and exam preparation. An icon system directs students to the online curriculum to take full advantage of the images embedded within the Networking Academy online course interface and reminds them to perform the labs, Class Activities, interactive activities, Packet Tracer activities, watch videos, and take the chapter quizzes and exams. Details ISBN1587134373 Author Cisco Networking Academy Year 2018 ISBN-10 1587134373 ISBN-13 9781587134371 Format Paperback Imprint Cisco Press Place of Publication Indianapolis Country of Publication United States Pages 336 Media Book DEWEY 005.8076 Language English Series Course Booklets AU Release Date 2018-05-09 NZ Release Date 2018-05-09 US Release Date 2018-05-09 Publication Date 2018-05-09 UK Release Date 2018-05-09 Publisher Pearson Education (US) Audience Professional & Vocational We've got this At The Nile, if you're looking for it, we've got it. With fast shipping, low prices, friendly service and well over a million items - you're bound to find what you want, at a price you'll love! TheNile_Item_ID:123775154;
Price: 115.01 AUD
Location: Melbourne
End Time: 2024-12-01T06:34:41.000Z
Shipping Cost: 0 AUD
Product Images
Item Specifics
Restocking fee: No
Return shipping will be paid by: Buyer
Returns Accepted: Returns Accepted
Item must be returned within: 30 Days
ISBN-13: 9781587134371
Book Title: CCNA Cybersecurity Operations Course Booklet
Item Height: 270 mm
Item Width: 210 mm
Author: Cisco Networking Academy
Publication Name: Ccna Cybersecurity Operations Course Booklet
Format: Paperback
Language: English
Publisher: Pearson Education (Us)
Subject: Computer Science
Publication Year: 2018
Type: Textbook
Item Weight: 705 g
Number of Pages: 336 Pages