CCNA Security Course Booklet Version 2 - Cisco Networking Academy
- Format: Broché Voir le descriptif
Vous en avez un à vendre ?
Vendez-le-vôtre31,99 €
Occasion · Très Bon État
Ou 8,00 € /mois
- Livraison : 0,00 €
- Livré entre le 9 et le 18 mai
- Payez directement sur Rakuten (CB, PayPal, 4xCB...)
- Récupérez le produit directement chez le vendeur
- Rakuten vous rembourse en cas de problème
Gratuit et sans engagement
Félicitations !
Nous sommes heureux de vous compter parmi nos membres du Club Rakuten !
TROUVER UN MAGASIN
Retour
Avis sur Ccna Security Course Booklet Version 2 de Cisco Networking Academy Format Broché - Livre
0 avis sur Ccna Security Course Booklet Version 2 de Cisco Networking Academy Format Broché - Livre
Les avis publiés font l'objet d'un contrôle automatisé de Rakuten.
Présentation Ccna Security Course Booklet Version 2 de Cisco Networking Academy Format Broché
- Livre
Résumé :
The Cisco? Networking Academy? Course Booklet is designed as a study resource that can be easily read, highlighted, and reviewed on the go, wherever the Internet is not available or practical. The text is extracted directly, word-for-word, from the online course so students can highlight important points and take notes in the Your Chapter Notes” section. The Course Booklet is a basic, economical paper-based resource to help students succeed with the Cisco Networking Academy online course.
Sommaire: Chapter 1 Modern Network Security Threats 1.0 Introduction 1.1 Fundamental Principles of a Secure Network 1.2 Viruses, Worms, and Trojan horses 1.3 Attack Methodologies 1.4 Cisco Network Foundation Protection Framework 1.5 Chapter Summary Chapter 2 Securing Network Devices 2.0 Chapter Introduction 2.1 Securing Device Access 2.2 Assigning Administrative Roles 2.3 Monitoring and Managing Devices 2.4 Using Automated Security Features 2.5 Summary Chapter 3 Authentication, Authorization, and Accounting 3.0 Introduction 3.1 Purpose of AAA 3.2 Local AAA Authentication 3.3 Server-Based AAA 3.4 Server-Based AAA Authentication 3.5 Server-Based AAA Authorization and Accounting 3.6 Summary Chapter 4 Implementing Firewall Technologies 4.0 Introduction 4.1 Access Control Lists 4.2 Firewall Technologies 4.3 Zone-Based Policy Firewalls 4.4 Summary Chapter 5 Implementing Intrusion Prevention 5.0 Introduction 5.1 IPS Technologies 5.2 IPS Signatures 5.3 Implement IPS 5.4 Verify and Monitor IPS 5.5 Summary Chapter 6 Securing the Local-Area Network 6.0 Introduction 6.1 Endpoint Security 6.2 Layer 2 Security Considerations 6.3 Configuring Layer 2 Security 6.4 Wireless, VoIP, and SAN Security 6.5 Summary Chapter 7 Cryptographic Systems 7.0 Introduction 7.1 Cryptographic Services 7.2 Basic Integrity and Authenticity 7.3 Confidentiality 7.4 Public Key Cryptography
Détails de conformité du produit
Personne responsable dans l'UE