CCNA Security Course Booklet Version 1.2 (häftad)
Fler böcker inom
Format
Häftad (Paperback)
Språk
Engelska
Antal sidor
552
Utgivningsdatum
2014-09-26
Upplaga
3
Förlag
Cisco Press
Medarbetare
Cisco Networking Academy
Dimensioner
279 x 222 x 31 mm
Vikt
1242 g
Antal komponenter
1
ISBN
9781587133466

CCNA Security Course Booklet Version 1.2

(1 röst)
Häftad,  Engelska, 2014-09-26

Slutsåld

CCNA Security Course Booklet Version 1.2

Your Cisco Networking Academy Course Booklet is designed as a study resource you can easily read, highlight, and review on the go, wherever the Internet is not available or practical:

--The text is extracted directly, word-for-word, from the online course so you can highlight important points and take notes in the Your Chapter Notes section.

--Headings with the exact page correlations provide a quick reference to the online course for your classroom discussions and exam preparation.

--An icon system directs you to the online curriculum to take full advantage of the images embedded within the Networking Academy online course interface and reminds you to perform the labs and Packet Tracer activities.

The Course Booklet is a basic, economical paper-based resource to help you succeed with the Cisco Networking Academy online course.

Related Titles:

CCNA Security Lab Manual Version 1.2
ISBN-13: 978-1-58713-347-3
ISBN-10: 1-58713-347-4

CCNA Security (640-554) Portable Command Guide
ISBN-13: 978-1-58720-448-7
ISBN-10: 1-58720-448-7

Implementing Cisco IOS Network Security (IINS 640-554) Foundation Learning Guide, Second Edition
ISBN-13: 978-1-58714-272-7
ISBN-10: 1-58714-272-4

CCNA Security 640-554 Official Cert Guide
ISBN-13: 978-1-58720-446-3
ISBN-10: 1-58720-446-0
Visa hela texten

Kundrecensioner

Har du läst boken? Sätt ditt betyg »

Fler böcker av Cisco Networking Academy

Innehållsförteckning

Chapter 1 Modern Network Security Threats 1

1.0 Introduction 1

1.1 Fundamental Principles of a Secure Network 2

1.1.1 Evolution of Network Security 2

  1.1.1.1 Code Red Worm Attack 2

  1.1.1.2 Evolution of Security Threats 2

  1.1.1.3 Evolution of Network Security Tools 3

  1.1.1.4 Threats to Networks 4

  1.1.1.5 Encryption and Cryptography 4

1.1.2 Drivers for Network Security 5

  1.1.2.1 The Hacker 5

  1.1.2.2 Evolution of Hacking 5

  1.1.2.3 First Network Attacks 6

  1.1.2.4 Network Security Professionals 6

1.1.3 Network Security Organizations 7

  1.1.3.1 Network Security Organizations 7

  1.1.3.2 SANS Institute 7

  1.1.3.3 CERT 8

  1.1.3.4 (ISC)2 8

  1.1.3.5 RSS 9

1.1.4 Domains of Network Security 9

  1.1.4.1 Network Security Domains 9

  1.1.4.2 Security Policy 10

1.1.5 Network Security Policies 10

  1.1.5.1 Network Security Policy 10

  1.1.5.2 Cisco SecureX Architecture 10

  1.1.5.3 Cisco SecureX Product Categories 11

  1.1.5.4 Network Security Policy Objectives 11

1.2 Viruses, Worms, and Trojan horses 11

1.2.1 Viruses 11

  1.2.1.1 Primary Vulnerabilities for End User Devices 11

  1.2.1.2 Comparison of a Human Virus and a Computer Virus 12

1.2.2 Worms 12

  1.2.2.1 Worms 12

  1.2.2.2 Worm Components 13

  1.2.2.3 Worm and Virus Exploit Comparison 13

1.2.3 Trojan horses 14

  1.2.3.1 Trojan Horse Concept 14

  1.2.3.2 Trojan Horse Classifications 15

1.2.4 Mitigating Viruses, Worms, and Trojan Horses 15

  1.2.4.1 Buffer Overflows 15

  1.2.4.2 Antivirus Software 15

  1.2.4.3 Worm Mitigation 16

  1.2.4.4 SQL Slammer Worm 16

1.3 Attack Methodologies 17

1.3.1 Reconnaissance Attacks 17

  1.3.1.1 Types of Attacks 17

  1.3.1.2 Types of Reconnaissance Attacks 18

  1.3.1.3 Packet Sniffer 18

  1.3.1.4 Ping Sweeps and Port Scans 18

  1.3.1.5 Mitigating Reconnaissance Attacks 19

1.3.2 Access Attacks 19

  1.3.2.1 Access Attacks 19

  1.3.2.2 Types of Access Attacks 20

  1.3.2.3 Mitigating Access Attacks 20

1.3.3 Denial of Service Attacks 21

  1.3.3.1 DoS Attacks 21

  1.3.3.2 DoS and DDoS 21

  1.3.3.3 Types of DoS Attacks 22

  1.3.3.4 DoS Attack Symptoms 22

1.3.4 Mitigating Network Attacks 23

  1.3.4.1 Mitigating Network Attacks 23

  1.3.4.2 Mitigating Reconnaissance Attacks 23

  1.3.4.3 Mitigating Access Attacks 24

  1.3.4.4 Mitigating DoS Attacks 24

1.3.4.5 Defending the Net...