Computer certification: Cisco Books

39 products


  • CCNP and CCIE Data Center  Core DCCOR 350601

    Pearson Education (US) CCNP and CCIE Data Center Core DCCOR 350601

    3 in stock

    Book SynopsisSomit Maloo, CCIE No. 28603, CCDE No. 20170002, is a content architect from the data center team in the Learning & Certifications' organization. He holds a master's degree in telecommunication networks and a bachelor's degree in electronics and telecommunication engineering. He is also a penta CCIE in routing and switching, service provider, wireless, security, and data center technologies. Somit holds various industry-leading certifications, including CCDE, PMP, RHCSA, and VMware VCIX6 in Data Center and Network Virtualization. Somit has extensive experience in designing and developing various data center courses for the official Cisco curriculum. He started his career as a Cisco TAC engineer. Somit has more than 13 years of experience in the networking industry, working mostly with data center networks. You can reach Somit on Twitter: @somitmaloo. Iskren Nikolov, CCIE No. 20164, CCSI No. 32481, MCT Alumni, content architect, engineer, and dTable of ContentsIntroduction xxxv Part I Networking Chapter 1 Implementing Routing in the Data Center 2 “Do I Know This Already?” Quiz 2 Foundation Topics 5 Routing Protocols Support on Cisco Nexus Devices 5 OSPF 6 OSPF Link-State Advertisements 7 OSPF Authentication 13 OSPF Configurations and Verifications 13 Border Gateway Protocol 24 BGP Peering 25 BGP Path Selection 26 Multiprotocol BGP 29 BGP Configurations and Verifications 30 Bidirectional Forwarding Detection 37 Rapid Detection of Failures 38 BFD Configurations and Verifications 38 Multicast 42 Internet Group Management Protocol 43 Switch IGMP Snooping 46 Multicast Listener Discovery 46 Multicast Distribution Trees 47 Protocol Independent Multicast 49 Multicast Forwarding 55 Multicast Configurations and Verifications 56 Hot Standby Router Protocol 69 Virtual Router Redundancy Protocol 73 VRRP Operation 73 VRRP Groups 75 VRRP Router Priority and Preemption 76 VRRP Authentication 77 VRRP Tracking 77 IPv6 First Hop Redundancy 77 HSRP/VRRP Configurations and Verifications 79 Exam Preparation Tasks 87 Chapter 2 Implementing Data Center Switching Protocols 90 “Do I Know This Already?” Quiz 90 Foundation Topics 93 Spanning Tree Protocols 93 STP Topology 93 STP Port Types 94 STP Extensions 94 Unidirectional Link Detection 97 Rapid PVST+ 98 Spanning Tree Configurations and Verifications 102 Port Channels 117 Port Channel Load Balance 120 Virtual Port Channel 122 vPC Traffic Flows 125 vPC Dual-Control Plane 126 vPC Primary and Secondary Roles 127 vPC Configuration Consistency 128 vPC Duplicate Frames Prevention Mechanism 129 vPC HSRP Gateway Considerations 131 vPC ARP Synchronization 131 vPC Peer Gateway 131 Port Channel Configurations and Verifications 132 Exam Preparation Tasks 146 Chapter 3 Implementing Data Center Overlay Protocols 150 “Do I Know This Already?” Quiz 150 Foundation Topics 151 Virtual Extensible LAN (VXLAN) Overview 151 VXLAN Encapsulation and Packet Format 152 VXLAN Tunnel Endpoint 152 Virtual Network Identifier 153 VXLAN Control Plane 154 VXLAN Gateways 157 VXLAN High Availability 157 VXLAN Tenant Routed Multicast 159 VXLAN Configurations and Verifications 159 Exam Preparation Tasks 169 Chapter 4 Describe Cisco Application Centric Infrastructure 172 “Do I Know This Already?” Quiz 172 Foundation Topics 174 Cisco Application Centric Infrastructure (ACI) Overview 174 Cisco Application Policy Infrastructure Controller 176 Cisco Nexus 9000 Series Spine and Leaf Switches for Cisco ACI 179 Cisco ACI Initial Setup, Fabric Discovery, Fabric Upgrade, and Fabric Access Policies 182 Cisco ACI Initial Setup 182 Cisco ACI Fabric Discovery 187 Startup with Cisco ACI Fabric Discovery and Configuration 188 Fabric Upgrade 189 Cisco ACI Fabric Access Policies 190 Cisco ACI Fabric Building Blocks, Policy Model, and VMM Domains 195 ACI Policy Model 197 Cisco ACI Tenants 198 Taboo Contracts 209 vzAny Rule 210 Filters and Subjects 213 Management Tenant 213 In-Band Management Access 214 ACI VXLAN 215 ACI Intersubnet Tenant Traffic 217 Policy Identification and Enforcement 218 ACI Fabric Traffic Storm Control 219 ACI Fabric Traffic Load Balance 219 ACI Fabric Loop Detection 220 ACI Design Best Practices 221 ACI LAB Configurations Example 221 Building ACI Fabric 224 Creating Tenant 227 Creating Contract and Filter 230 Deploying a Three-Tier Application 233 Integrating with vCenter 235 Exam Preparation Tasks 238 Chapter 5 Cisco Cloud Services and Deployment Models 240 “Do I Know This Already?” Quiz 240 Foundation Topics 242 What Is Cloud Computing? 242 Cloud Service Models 245 Software as a Service 245 Platform as a Service 246 Infrastructure as a Service 246 Cloud Deployment Models 248 Private Cloud 248 Public Cloud 248 Hybrid Cloud 249 Community Cloud 250 Exam Preparation Tasks 250 Chapter 6 Data Center Network Management and Monitoring 252 “Do I Know This Already?” Quiz 252 Foundation Topics 254 Cisco Nexus NX-OS Software Installation, Updates, and Their Impacts 254 PowerOn Auto Provisioning (POAP) 259 Data Center Infrastructure Software Lifecycle Management 263 Nexus Nondisruptive In-Service Software Upgrade 263 Nexus Disruptive and Nondisruptive Upgrade/Downgrade Procedure 265 Programmable Logical Devices Upgrade 269 Nexus Configuration Management 271 NX-OS Configuration Save and Backup 272 Nexus Config Rollback and Checkpoint 272 Network Time Management 274 Network Time Protocol 275 Precision Time Protocol 280 Network Infrastructure Monitoring 284 NX-OS System Message Logging 284 NX-OS Simple Network Management Protocol 286 Nexus Smart Call Home 292 Nexus NetFlow 293 Switched Port Analyzer 298 Streaming Telemetry 306 Network Assurance Concept 310 Exam Preparation Tasks 312 Chapter 7 Describe Cisco Nexus Dashboard 314 “Do I Know This Already?” Quiz 314 Foundation Topics 316 Cisco Nexus Dashboard 316 Cisco Nexus Dashboard Insights 318 Cisco Nexus Dashboard Orchestrator 323 Cisco Nexus Dashboard Fabric Controller 325 Cisco Nexus Dashboard Data Broker 335 Cisco Nexus Dashboard Platforms 337 Cisco Nexus Dashboard Cluster Nodes 339 Cisco Nexus Dashboard External Networks 341 Cisco Nexus Dashboard GUI Overview 342 One View Page 343 Admin Console Page 343 Exam Preparation Tasks 348 Part II Storage Chapter 8 Implement Fibre Channel 352 “Do I Know This Already?” Quiz 353 Foundation Topics 356 Cisco MDS 9000 Series Hardware 356 Cisco MDS 9700 Series Multilayer Directors 356 Cisco MDS 9300 Series Multilayer Fabric Switches 360 Cisco MDS 9200 Series Multiservice Switches 361 Cisco MDS 9100 Series Multilayer Fabric Switches 362 Fibre Channel Basics 365 Fibre Channel Topologies 365 Fibre Channel Port Types 368 Fibre Channel Addressing 371 Flow Control 372 Switched Fabric Initialization 373 Device Registration: FLOGI, PLOGI, PRLI 378 FLOGI and FCNS Databases 378 CFS 380 CFS Features 381 CFS Fabric Lock 382 CFSoIP and CFSoFC 382 CFS Merge 384 CFS Regions 384 VSAN 386 VSAN Features 386 VSAN Attributes 387 VSAN Advantages 388 Dynamic Port VSAN Membership (DPVM) 388 VSAN Trunking 389 SAN Port Channels 396 Types of SAN Port Channels 396 Port Channel Load Balancing 398 Port Channel Modes 399 Zoning 404 Zoning Features 404 Zone Enforcement 406 Full and Active Zone Set 407 Autozone 410 Zone Merge 410 Smart Zoning 411 Enhanced Zoning 412 Device Alias 418 Device Alias Features 419 Device Alias Modes 419 Device Alias Distribution 420 Zone Aliases (FC Aliases) Versus Device Aliases 421 NPIV and NPV 424 Exam Preparation Tasks 431 Chapter 9 Implement FCoE Unified Fabric 434 “Do I Know This Already?” Quiz 434 Foundation Topics 436 FCoE Overview 436 Ethernet Enhancements 438 FCoE Frame Format 442 Virtual Fibre Channel (VFC) 444 FCoE Elements and Port Types 445 FCoE Addressing and Forwarding 447 FCoE Initialization Protocol (FIP) 448 Benefits of FCoE 451 FCoE Topology Options 451 FCoE Single-Hop Topology 451 FCoE Multi-Hop Topology 454 FCoE Implementations 455 FCoE Configuration on Cisco Nexus 7000 Series Switches 456 FCoE Configuration on Cisco Nexus 5000 Series Switches 458 FCoE Configuration on Cisco Nexus 9000 Series Switches 459 FCoE over FEX 461 FCoE NPV 463 FCoE Verification 466 Exam Preparation Tasks 475 Chapter 10 Describe NFS and NAS Concepts 478 “Do I Know This Already?” Quiz 478 Foundation Topics 479 Describe NFS Concepts 479 Describe NAS Concepts 481 NAS Benefits 483 Cisco UCS S-Series Storage Servers 483 Exam Preparation Tasks 485 Chapter 11 Describe Software Management and Infrastructure Monitoring 488 “Do I Know This Already?” Quiz 488 Foundation Topics 490 Cisco MDS NX-OS Setup Utility 490 Cisco MDS NX-OS Software Upgrade and Downgrade 498 Nondisruptive Upgrade on a Cisco MDS Fabric Switch 500 Disruptive Upgrade on a Cisco MDS Fabric Switch 505 Nondisruptive Downgrade on a Cisco MDS Fabric Switch 508 Disruptive Downgrade on a Cisco MDS Fabric Switch 513 EPLD Upgrade on Cisco MDS 9000 Series Switches 515 Infrastructure Monitoring 521 System Messages 521 Call Home 521 Embedded Event Manager 522 RMON 523 SPAN 523 Exam Preparation Tasks 528 Part III Compute Chapter 12 Cisco Unified Computing Systems Overview 530 “Do I Know This Already?” Quiz 530 Foundation Topics 532 Cisco UCS Architecture 532 Cisco UCS Components and Connectivity 534 Cisco UCS 5108 Blade Server Chassis 536 UCS Blade Servers 536 Cisco UCS Rack Servers 537 Cisco UCS Storage Servers 537 Cisco UCS Mini 539 Cisco UCS Fabric Infrastructure 539 Cisco UCS 6536 Fabric Interconnect 540 Cisco UCS 6454 Fabric Interconnect 541 Cisco UCS 6300 Series Fabric Interconnects 543 Fabric Interconnect and Fabric Extender Connectivity 544 Cisco UCS Virtualization Infrastructure 550 Cisco UCS-X System 555 Cisco UCS Initial Setup and Management 557 Fabric Interconnect Connectivity and Configurations 565 Fabric Interconnect Port Modes 567 Fabric Failover for Ethernet: High-Availability vNIC 569 Ethernet Switching Mode 570 UCS Device Discovery 577 Chassis/FEX Discovery 577 Rack Server Discovery Policy 577 Initial Server Setup for Standalone UCS C-Series 578 Cisco UCS Network Management 584 UCS Virtual LAN 584 UCS Identity Pools 591 Service Profiles 596 UCS Server Policies 599 UCS Service Profile Templates 602 Quality of Service 608 Cisco UCS Storage 611 UCS SAN Connectivity 611 UCS SAN Configuration 615 Virtual Storage-Area Networks 616 World Wide Name Pool 621 SAN Connectivity Policies 624 Exam Preparation Tasks 625 Chapter 13 Cisco Unified Computing Infrastructure Monitoring 628 “Do I Know This Already?” Quiz 628 Foundation Topics 630 Cisco UCS System Monitoring 630 Data Management Engine 631 Application Gateway 631 Northbound Interfaces 631 Cisco UCS Monitoring Events and Logs 632 Cisco UCS Monitoring Policies 634 Traffic Monitoring 640 Cisco Intersight 647 Intersight Management as a Service 648 Intersight as a Telemetry Data Collection 650 Cisco Intersight Supported Software 650 Cisco Intersight Licensing 652 Exam Preparation Tasks 656 Chapter 14 Cisco Unified Compute Software and Configuration Management 658 “Do I Know This Already?” Quiz 658 Foundation Topics 660 Cisco UCS Configuration Management 660 Creating and Running a Backup Operation 661 Backup Policies 666 Backup Policy Configuration 666 Import Backups 668 Enable the Import Operation 669 System Restore 670 Restoring the Configuration for a Fabric Interconnect 671 UCS Firmware and Software Updates 672 Firmware Version Terminology 679 Firmware Upgrades Through Auto Install 680 Direct Upgrade After Auto Install Procedure 684 Install Infrastructure Firmware Procedure 688 Upgrading the Server Firmware with Auto Install 691 Standalone Cisco UCS C-Series Server Firmware Upgrade Using the Host Upgrade Utility (HUU) 693 Downloading and Preparing the ISO for an Upgrade 694 Exam Preparation Tasks 700 Chapter 15 Cisco HyperFlex Overview 702 “Do I Know This Already?” Quiz 702 Foundation Topics 704 Cisco HyperFlex Solution and Benefits 704 HyperFlex Benefits 707 HyperFlex as an Edge, Hybrid, and All-Flash Nodes 712 HyperFlex as an Edge Device 712 HyperFlex Hyperconverged Multicloud Platform (Hybrid or All-Flash) 714 HyperFlex All NVMe 715 Cisco HyperFlex Data Platform 716 Exam Preparation Tasks 728 Part IV Automation Chapter 16 Automation and Scripting Tools 730 “Do I Know This Already?” Quiz 730 Foundation Topics 733 EEM Overview 733 Policies 733 Event Statements 734 Action Statements 734 Configuring EEM 735 Verifying the EEM Configuration 736 Scheduler 736 Configuring Scheduler 737 Verifying Scheduler Configuration 739 Bash Shell for Cisco NX-OS 740 Managing Feature RPMs 742 Managing Patch RPMs 742 Guest Shell for Cisco NX-OS 743 Accessing the Guest Shell 743 Resources Used for the Guest Shell 744 Capabilities in the Guest Shell 744 Managing the Guest Shell 746 XML 748 Example 749 XML Syntax 750 JSON 751 Rest API 752 Authentication 753 Response 754 NX-API 755 NX-API Request and Response Elements 757 NX-API Developer Sandbox 759 Exam Preparation Tasks 760 Chapter 17 Evaluate Automation and Orchestration Technologies 762 “Do I Know This Already?” Quiz 762 Foundation Topics 764 Ansible 764 Ansible Components 765 Important Ansible Concepts 766 Ansible CLI Tools 767 Cisco NX-OS and Ansible Example 767 Python 768 Python Package for Cisco 769 Using the CLI Command APIs 771 Python in Interactive Mode 772 Python in Noninteractive Mode 773 UCS Manager Python SDK 775 Convert to UCS Python 777 PowerOn Auto Provisioning (POAP) 777 Limitations of POAP 778 Network Requirements for POAP 778 POAP Configuration Script 778 POAP Process 779 Configuring a Switch Using POAP 782 HashiCorp Terraform 783 Terraform Concept 784 Terraform Components 784 Terraform Commands 786 PowerShell 789 Exam Preparation Tasks 795 Part V Security Chapter 18 Network Security 798 “Do I Know This Already?” Quiz 798 Foundation Topics 801 Authentication, Authorization, and Accounting 801 AAA Service Configuration Options 802 Authentication and Authorization User Login Process 803 AAA NX-OS Configurations 804 Role-Based Access Control 807 NX-OS User Roles and Rules 809 NX-OS RBAC Configurations 811 Nexus First-Hop Security 815 Nexus Dynamic ARP Inspection 816 NX-OS DAI Configurations 819 NX-OS DHCP Snooping 827 Port Security 832 Nexus Port Secure MAC Address Maximum and Dynamic Address Aging 833 Port Security Violations and Actions 834 Nexus Port Types and Port Security 835 NX-OS Port Security Configuration 835 Nexus Control Plane Policing 837 Control Plane Packet 839 Classification for CoPP 840 NX-OS CoPP Configuration 844 Cisco ACI Contracts 851 Cisco ACI Contract Configuration Parameters 853 Create, Modify, or Remove Regular Contracts 854 Apply or Remove VRF Contracts 856 Inter-Tenant Contracts 857 Inter-Private Network Contracts Communication 858 Single Contract Bidirectional Reverse Filter 859 Single Contract Unidirectional with Multiple Filters 859 Multiple Contracts Unidirectional Single Filter 860 ACI Microsegmentation 860 Example: ACI Microsegmentation with VMs from a Single Application EPG 862 Example: ACI Microsegmentation with VMs in Different Application EPGs 863 ACI Microsegmentation Configurations 864 Keychain Authentication 868 NX-OS Keychain Configurations 868 Key Selection 871 Exam Preparation Tasks 872 Chapter 19 Compute Security 874 “Do I Know This Already?” Quiz 874 Foundation Topics 875 Securing UCS Management Using Authentication, Authorization, and Accounting 875 User RADIUS and TACACS+ Attributes 876 Two-Factor Authentication 879 UCS Web Session Refresh and Session Timeout Period 879 UCS LDAP Providers and Groups 879 RADIUS and TACACS+ Authentication Configurations 888 UCS Remote Users Role Policy 892 Multiple Authentication Services Configuration 894 Exam Preparation Tasks 895 Chapter 20 Storage Security 896 “Do I Know This Already?” Quiz 896 Foundation Topics 898 Authentication, Authorization, and Accounting 898 Authentication 899 Authorization 899 Accounting 900 Server Groups 900 AAA Service Configuration Options 900 AAA Server Monitoring 900 Remote AAA Services 901 Local AAA Services 911 AAA Authentication and Authorization Process 912 AAA Server Distribution 913 Merging RADIUS and TACACS+ Configurations 914 User Accounts and RBAC 914 User Roles 915 Rules 915 User Role Policies 917 RBAC Sample Configuration 918 Port Security 919 Port Security Configuration 921 Verification of Port Security 924 Fabric Binding 926 Fabric Binding Configuration 926 Port Security Versus Fabric Binding 928 Exam Preparation Tasks 929 Chapter 21 Final Preparation 932 Getting Ready 932 Tools for Final Preparation 933 Pearson Test Prep Practice Test Software and Questions on the Website 933 How to Access the Pearson Test Prep (PTP) App 933 Customizing Your Exams 934 Updating Your Exams 935 Chapter-Ending Review Tools 935 Learn the Question Types Using the Cisco Certification Exam Tutorial 935 Suggested Plan for Final Review/Study 940 Summary 940 Chapter 22 CCNP and CCIE Data Center Core DCCOR 350-601 Official Cert Guide Exam Updates 942 The Purpose of This Chapter 942 About Possible Exam Updates 943 Impact on You and Your Study Plan 943 News About the Next Exam Release 944 Updated Technical Content 944 Appendix A Answers to the “Do I Know This Already?” Quizzes 946 Glossary 961 Online Elements Appendix B Memory Tables Appendix C Memory Tables Answer Key Appendix D Study Planner Glossary 9780138228088 TOC 11/7/2023

    3 in stock

    £48.68

  • CCNA 200301 Official Cert Guide Volume 1

    Pearson Education (US) CCNA 200301 Official Cert Guide Volume 1

    7 in stock

    Book SynopsisWendell Odom, CCIE Enterprise No. 1624, was the first Cisco Press author for Cisco certification guides. He wrote all prior editions of this book, along with books on topics ranging from introductory networking to CCENT, CCNA R&S, CCNA DC, CCNP ROUTE, CCNP QoS, and CCIE R&S. In his four decades as a networker, he has worked as a network engineer, consultant, systems engineer, instructor, and course developer. He now spends his time focused on updating the CCNA books, his blog (www.certskills.com), building his new CCNA YouTube channel (www.youtube.com/@NetworkUpskill), and teaching online (www.certskills.com/courses). You can find him at www.LinkedIn.com/in/WendellOdom, Twitter (@WendellOdom), and at his blog, which provides a variety of free CCNA learning resources.

    7 in stock

    £35.99

  • CCNP and CCIE  Security Core SCOR 350701 Official

    Pearson Education (US) CCNP and CCIE Security Core SCOR 350701 Official

    5 in stock

    Book SynopsisOmar Santos is a cybersecurity thought leader with a passion for driving industry-wide initiatives to enhance the security of critical infrastructures. Omar is the lead of the DEF CON Red Team Village, the chair of the Common Security Advisory Framework (CSAF) technical committee, and board member of the OASIS Open standards organization. Omar's collaborative efforts extend to numerous organizations, including the Forum of Incident Response and Security Teams (FIRST) and the Industry Consortium for Advancement of Security on the Internet (ICASI).   Omar is a renowned expert in ethical hacking, vulnerability research, incident response, and AI security. He employs his deep understanding of these disciplines to help organizations stay ahead of emerging threats. His dedication to cybersecurity has made a significant impact on businesses, academic institutions, law enforcement agencies, and other entities striving to bolster their security measures. OTable of Contents Introduction xxxi Chapter 1 Cybersecurity Fundamentals 2 “Do I Know This Already?” Quiz 3 Foundation Topics 6 Introduction to Cybersecurity 6 Defining What Are Threats, Vulnerabilities, and Exploits 8 Common Software and Hardware Vulnerabilities 31 Confidentiality, Integrity, and Availability 43 Cloud Security Threats 50 IoT Security Threats 54 An Introduction to Digital Forensics and Incident Response 58 Summary 76 Exam Preparation Tasks 76 Review All Key Topics 76 Define Key Terms 78 Review Questions 78 Chapter 2 Cryptography 80 “Do I Know This Already?” Quiz 80 Foundation Topics 82 Introduction to Cryptography 82 Fundamentals of PKI 97 Exam Preparation Tasks 106 Review All Key Topics 106 Define Key Terms 107 Review Questions 107 Chapter 3 Software-Defined Networking Security and Network Programmability 110 “Do I Know This Already?” Quiz 110 Foundation Topics 112 Software-Defined Networking (SDN) and SDN Security 112 Introduction to Network Programmability 136 Exam Preparation Tasks 151 Review All Key Topics 151 Define Key Terms 152 Review Questions 152 Chapter 4 Authentication, Authorization, Accounting (AAA) and Identity Management 156 “Do I Know This Already?” Quiz 157 Foundation Topics 160 Introduction to Authentication, Authorization, and Accounting 160 Authentication 162 Authorization 177 Accounting 179 Infrastructure Access Controls 179 AAA Protocols 182 Cisco Identity Services Engine (ISE) 192 Configuring TACACS+ Access 207 Configuring RADIUS Authentication 213 Additional Cisco ISE Design Tips 222 Exam Preparation Tasks 225 Review All Key Topics 225 Define Key Terms 226 Review Questions 227 Chapter 5 Network Visibility and Segmentation 232 “Do I Know This Already?” Quiz 233 Foundation Topics 236 Introduction to Network Visibility 236 NetFlow 237 IP Flow Information Export (IPFIX) 249 NetFlow Deployment Scenarios 255 Cisco Secure Network Analytics and Cisco Secure Cloud Analytics 263 Cisco Cognitive Intelligence and Cisco Encrypted Traffic Analytics (ETA) 274 NetFlow Collection Considerations and Best Practices 279 Configuring NetFlow in Cisco IOS and Cisco IOS-XE 280 Configuring NetFlow in NX-OS 295 Introduction to Network Segmentation 296 Micro-Segmentation with Cisco ACI 301 Segmentation with Cisco ISE 302 Exam Preparation Tasks 312 Review All Key Topics 312 Define Key Terms 313 Review Questions 314 Chapter 6 Infrastructure Security 316 “Do I Know This Already?” Quiz 317 Foundation Topics 320 Securing Layer 2 Technologies 320 VLAN and Trunking Fundamentals 320 Common Layer 2 Threats and How to Mitigate Them 333 Network Foundation Protection 343 Understanding and Securing the Management Plane 345 Understanding the Control Plane 347 Understanding and Securing the Data Plane 348 Securing Management Traffic 350 Implementing Logging Features 378 Configuring NTP 379 Securing the Network Infrastructure Device Image and Configuration Files 380 Securing the Data Plane in IPv6 381 Securing Routing Protocols and the Control Plane 395 Exam Preparation Tasks 404 Review All Key Topics 404 Define Key Terms 405 Review Questions 405 Chapter 7 Cisco Secure Firewall 410 “Do I Know This Already?” Quiz 410 Foundation Topics 413 Introduction to Cisco Secure Firewall 413 Comparing Network Security Solutions That Provide Firewall Capabilities 435 Deployment Modes of Network Security Solutions and Architectures That Provide Firewall Capabilities 437 High Availability and Clustering 448 Implementing Access Control 452 Cisco Firepower Intrusion Policies 472 Cisco Secure Malware Defense 478 Security Intelligence, Security Updates, and Keeping Firepower Software Up to Date 483 Exam Preparation Tasks 484 Review All Key Topics 485 Define Key Terms 486 Review Questions 486 Chapter 8 Virtual Private Networks (VPNs) 490 “Do I Know This Already?” Quiz 490 Foundation Topics 494 Virtual Private Network (VPN) Fundamentals 494 Deploying and Configuring Site-to-Site VPNs in Cisco Routers 506 Configuring Site-to-Site VPNs in Cisco ASA Firewalls 528 Configuring Remote-Access VPNs in the Cisco ASA 537 Configuring Clientless Remote Access SSL VPNs in the Cisco ASA 540 Configuring Client-Based Remote-Access SSL VPNs in the Cisco ASA 551 Configuring Remote-Access VPNs in Cisco Secure Firewall 556 Configuring Site-to-Site VPNs in the Cisco Secure Firewall 567 Cisco SD-WAN 569 Exam Preparation Tasks 573 Review All Key Topics 573 Define Key Terms 574 Review Questions 575 Chapter 9 Securing the Cloud 578 “Do I Know This Already?” Quiz 579 Foundation Topics 581 What Is Cloud and What Are the Cloud Service Models? 581 DevOps, Continuous Integration (CI), Continuous Delivery (CD), and Describing the Customer vs. Provider Security Responsibility for the Different Cloud Service Models 605 Cisco Umbrella 608 Cisco Secure Email Threat Defense 614 Cisco Attack Surface Management (Formerly Cisco Secure Cloud Insights) 616 Cisco Secure Cloud Analytics 618 AppDynamics Cloud Monitoring 619 Cisco Secure Workload 622 Cisco XDR 627 Exam Preparation Tasks 632 Review All Key Topics 633 Define Key Terms 634 Review Questions 634 Chapter 10 Content Security 638 “Do I Know This Already?” Quiz 638 Foundation Topics 641 Content Security Fundamentals 641 Cisco Secure Web Appliance 642 Cisco Secure Email 658 Cisco Content Security Management Appliance (SMA) 662 Exam Preparation Tasks 667 Review All Key Topics 668 Define Key Terms 668 Review Questions 669 Chapter 11 Endpoint Protection and Detection 672 “Do I Know This Already?” Quiz 672 Foundation Topics 674 Introduction to Endpoint Protection and Detection 674 Cisco Secure Endpoint 676 Cisco Threat Response 693 Exam Preparation Tasks 693 Review All Key Topics 693 Define Key Terms 694 Review Questions 694 Chapter 12 Final Preparation 696 Hands-on Activities 696 Suggested Plan for Final Review and Study 696 Summary 697 Chapter 13 CCNP and CCIE Security Core SCOR (350-701) Exam Updates 698 The Purpose of This Chapter 698 News about the Next Exam Release 700 Updated Technical Content 700 Appendix A Answers to the “Do I Know This Already?” Quizzes and Q&A Glossary 714 Online Element Appendix B Study Planner 9780138221263, TOC, 10/2/23

    5 in stock

    £50.39

  • CCNP and CCIE Enterprise Core  CCNP Enterprise

    Pearson Education (US) CCNP and CCIE Enterprise Core CCNP Enterprise

    Out of stock

    Book SynopsisScott Empson is an instructor in the Department of Information Systems Technology at the Northern Alberta Institute of Technology in Edmonton, Alberta, Canada, where he has taught for over 21 years. He teaches technical courses in Cisco routing and switching, along with courses in professional development and leadership. Scott created the CCNA Command Quick Reference in 2004 as a companion guide to the Cisco Networking Academy Program, and this guide became the CCNA Portable Command Guide in 2005. Other titles in the series in the areas of CCNP, Wireless, Security, Microsoft, and Linux followed beginning in 2006. Scott has a Master of Education degree along with three undergraduate degrees: a Bachelor of Arts, with a major in English; a Bachelor of Education, again with a major in English/language arts; and a Bachelor of Applied Information Systems Technology, with a major in network management. Patrick Gargano has been an educator since 1Table of ContentsIntroduction xix PART I: LAYER 2 INFRASTRUCTUREChapter 1 VLANs 1 Virtual LANs 1 Creating Static VLANs Using VLAN Configuration Mode 2 Assigning Ports to Data and Voice VLANs 2 Using the range Command 3 Dynamic Trunking Protocol (DTP) 3 Setting the Trunk Encapsulation and Allowed VLANs 4 VLAN Trunking Protocol (VTP) 5 Verifying VTP 6 Verifying VLAN Information 7 Saving VLAN Configurations 7 Erasing VLAN Configurations 7 Configuration Example: VLANs 8 Layer 2 Link Aggregation 11 Interface Modes in EtherChannel 12 Default EtherChannel Configuration 12 Guidelines for Configuring EtherChannel 12 Configuring Layer 2 EtherChannel 14 Configuring Layer 3 EtherChannel 14 Configuring EtherChannel Load Balancing 15 Configuring LACP Hot-Standby Ports 16 Monitoring and Verifying EtherChannel 17 Configuration Example: EtherChannel 18 Chapter 2 Spanning Tree Protocol 23 Spanning Tree Protocol Definition 24 Enabling Spanning Tree Protocol 24 Changing the Spanning-Tree Mode 25 Configuring the Root Switch 25 Configuring a Secondary Root Switch 26 Configuring Port Priority 26 Configuring the Path Cost 27 Configuring the Switch Priority of a VLAN 27 Configuring STP Timers 27 Configuring Optional Spanning-Tree Features 28 PortFast 28 BPDU Guard (2xxx/older 3xxx Series) 29 BPDU Guard (3650/9xxx Series) 29 BPDU Filter 30 UplinkFast 30 BackboneFast 31 Root Guard 31 Loop Guard 32 Unidirectional Link Detection 33 Configuring and Verifying Port Error Conditions 33 Enabling Rapid Spanning Tree 36 Rapid Spanning Tree Link Types 36 Enabling Multiple Spanning Tree 37 Verifying the Extended System ID 39 Verifying STP 39 Troubleshooting Spanning Tree Protocol 40 Configuration Example: PVST+ 40 Spanning-Tree Migration Example: PVST+ to Rapid-PVST+ 43 Chapter 3 Implementing Inter-VLAN Routing 45 Inter-VLAN Communication Using an External Router: Router-on-a-Stick 45 Inter-VLAN Communication Tips 46 Inter-VLAN Communication on a Multilayer Switch Through a Switch Virtual Interface 46 Configuring Inter-VLAN Communication on an L3 Switch 47 Removing L2 Switchport Capability of an Interface on an L3 Switch 47 Configuration Example: Inter-VLAN Communication 47 Configuration Example: IPv6 Inter-VLAN Communication 55 PART II: LAYER 3 INFRASTRUCTUREChapter 4 EIGRP 61 Enhanced Interior Gateway Routing Protocol (EIGRP) 62 Enabling EIGRP for IPv4 Using Classic Mode Configuration 62 Enabling EIGRP for IPv6 Using Classic Mode Configuration 63 EIGRP Using Named Mode Configuration 64 EIGRP Named Mode Subconfiguration Modes 66 Upgrading Classic Mode to Named Mode Configuration 66 EIGRP Router ID 67 Authentication for EIGRP 67 Configuring Authentication in Classic Mode 67 Configuring Authentication in Named Mode 68 Verifying and Troubleshooting EIGRP Authentication 70 Auto-Summarization for EIGRP 70 IPv4 Manual Summarization for EIGRP 70 IPv6 Manual Summarization for EIGRP 71 Timers for EIGRP 71 Passive Interfaces for EIGRP 72 “Pseudo” Passive EIGRP Interfaces 72 Injecting a Default Route into EIGRP: Redistribution of a Static Route 73 Injecting a Default Route into EIGRP: ip default-network 74 Injecting a Default Route into EIGRP: Summarize to 0.0.0.0/0 74 Accepting Exterior Routing Information: default-information 75 Equal-cost Load Balancing: maximum-paths 75 Unequal-cost Load Balancing: variance 76 EIGRP Traffic Sharing 76 Bandwidth Use for EIGRP 77 Stub Routing for EIGRP 77 EIGRP Unicast Neighbors 79 EIGRP Wide Metrics 79 Adjusting the EIGRP Metric Weights 80 Verifying EIGRP 80 Troubleshooting EIGRP 82 Configuration Example: EIGRP for IPv4 and IPv6 Using Named Mode 83 Chapter 5 OSPF 87 Comparing OSPFv2 and OSPFv3 88 Configuring OSPF 89 Configuring Multiarea OSPF 89 Using Wildcard Masks with OSPF Areas 90 Configuring Traditional OSPFv3 91 Enabling OSPF for IPv6 on an Interface 91 OSPFv3 and Stub/NSSA Areas 92 Interarea OSPFv3 Route Summarization 92 Enabling an IPv4 Router ID for OSPFv3 93 Forcing an SPF Calculation 93 OSPFv3 Address Families 93 Configuring the IPv6 Address Family in OSPFv3 94 Configuring the IPv4 Address Family in OSPFv3 94 Applying Parameters in Address Family Configuration Mode 94 Authentication for OSPF 95 Configuring OSPFv2 Authentication: Simple Password 95 Configuring OSPFv2 Cryptographic Authentication: SHA-256 96 Configuring OSPFv3 Authentication and Encryption 97 Verifying OSPFv2 and OSPFv3 Authentication 98 Optimizing OSPF Parameters 98 Loopback Interfaces 98 Router ID 99 DR/BDR Elections 99 Passive Interfaces 100 Modifying Cost Metrics 100 OSPF Reference Bandwidth 101 OSPF LSDB Overload Protection 101 Timers 101 IP MTU 102 Propagating a Default Route 102 Route Summarization 103 Interarea Route Summarization 103 External Route Summarization 103 OSPF Route Filtering 104 Using the filter-list Command 104 Using the area range not-advertise Command 104 Using the distribute-list in Command 104 Using the summary-address not-advertise Command 105 OSPF Special Area Types 105 Stub Areas 105 Totally Stubby Areas 106 Not-So-Stubby Areas (NSSA) 106 Totally NSSA 107 Virtual Links 108 Configuration Example: Virtual Links 108 Verifying OSPF Configuration 109 Troubleshooting OSPF 111 Configuration Example: Single-Area OSPF 111 Configuration Example: Multiarea OSPF 114 Configuration Example: Traditional OSPFv3 117 Configuration Example: OSPFv3 with Address Families 120 Chapter 6 Redistribution and Path Control 127 Defining Seed and Default Metrics 128 Redistributing Connected Networks 129 Redistributing Static Routes 129 Redistributing Subnets into OSPF 130 Assigning E1 or E2 Routes in OSPF 130 Redistributing OSPF Internal and External Routes 131 Configuration Example: Route Redistribution for IPv4 131 Configuration Example: Route Redistribution for IPv6 132 Verifying Route Redistribution 134 Route Filtering Using the distribute-list Command 134 Configuration Example: Inbound and Outbound Distribute List Route Filters 134 Configuration Example: Controlling Redistribution with Outbound Distribute Lists 135 Verifying Route Filters 136 Route Filtering Using Prefix Lists 137 Configuration Example: Using a Distribute List That References a Prefix List to Control Redistribution 139 Verifying Prefix Lists 140 Using Route Maps with Route Redistribution 140 Configuration Example: Route Maps 141 Manipulating Redistribution Using Route Tagging 142 Changing Administrative Distance 143 Path Control with Policy-Based Routing 144 Verifying Policy-Based Routing 145 Configuration Example: PBR with Route Maps 146 Cisco IOS IP SLA 147 Configuring Authentication for IP SLA 149 Monitoring IP SLA Operations 150 PBR with Cisco IOS IP SLA 150 Step 1: Define Probe(s) 151 Step 2: Define Tracking Object(s) 152 Step 3a: Define the Action on the Tracking Object(s) 152 Step 3b: Define Policy Routing Using the Tracking Object(s) 152 Step 4: Verify IP SLA Operations 152 Chapter 7 BGP 155 Configuring BGP: Classic Configuration 156 Configuring Multiprotocol BGP (MP-BGP) 157 Configuring BGP: Address Families 158 Configuration Example: Using MP-BGP Address Families to Exchange IPv4 and IPv6 Routes 159 BGP Support for 4-Byte AS Numbers 160 BGP Timers 161 BGP and update-source 161 IBGP Next-Hop Behavior 162 EBGP Multihop 162 Attributes 164 Route Selection Decision Process–The BGP Best Path Algorithm 164 Weight Attribute 164 Using AS Path Access Lists to Manipulate the Weight Attribute 166 Using Prefix Lists and Route Maps to Manipulate the Weight Attribute 166 Local Preference Attribute 167 Using AS Path Access Lists with Route Maps to Manipulate the Local Preference Attribute 167 AS Path Attribute Prepending 169 AS Path: Removing Private Autonomous Systems 171 Multi-Exit Discriminator (MED) Attribute 171 Verifying BGP 174 Troubleshooting BGP 175 Default Routes 177 Route Aggregation 177 Route Reflectors 177 Regular Expressions 178 Regular Expressions: Examples 179 BGP Route Filtering Using Access Lists and Distribute Lists 180 Configuration Example: Using Prefix Lists and AS Path Access Lists 181 BGP Peer Groups 182 Authentication for BGP 184 Configuring Authentication Between BGP Peers 184 Verifying BGP Authentication 184 PART III: INFRASTRUCTURE SERVICESChapter 8 IP Services 185 Network Address Translation (NAT) 186 Private IP Addresses: RFC 1918 186 Configuring Static NAT 187 Configuring Dynamic NAT 188 Configuring Port Address Translation (PAT) 189 Configuring a NAT Virtual Interface 190 Verifying NAT and PAT Configurations 190 Troubleshooting NAT and PAT Configurations 191 Configuration Example: PAT 191 Configuration Example: NAT Virtual Interfaces and Static NAT 193 First-Hop Redundancy Protocols 194 Hot Standby Router Protocol 194 Virtual Router Redundancy Protocol 201 IPv4 Configuration Example: HSRP on L3 Switch 204 IPv4 Configuration Example: VRRPv2 on Router and L3 Switch with IP SLA Tracking 209 IPv6 Configuration Example: HSRPv2 on Router and L3 Switch 212 Dynamic Host Control Protocol (DHCP) 217 Implementing DHCP for IPv4 217 Implementing DHCP for IPv6 221 Configuration Example: DHCP for IPv4 224 Configuration Example: DHCP for IPv6 226 Chapter 9 Device Management 231 Configuring Passwords 231 Cleartext Password Encryption 232 Password Encryption Algorithm Types 233 Configuring SSH 234 Verifying SSH 235 Boot System Commands 235 The Cisco IOS File System 236 Viewing the Cisco IOS File System 236 Commonly Used URL Prefixes for Cisco Network Devices 236 Deciphering IOS Image Filenames 237 Backing Up Configurations to a TFTP Server 238 Restoring Configurations from a TFTP Server 238 Backing Up the Cisco IOS Software to a TFTP Server 239 Restoring/Upgrading the Cisco IOS Software from a TFTP Server 239 Restoring the Cisco IOS Software Using the ROM Monitor Environmental Variables and tftpdnld Command 240 Secure Copy Protocol (SCP) 241 Configuring an SCP Server 241 Verifying and Troubleshooting SCP 241 Configuration Example: SCP 241 Disabling Unneeded Services 242 Useful Device Management Options 243 PART IV: INFRASTRUCTURE SECURITYChapter 10 Infrastructure Security 245 IPv4 Access Control Lists (ACLs) 246 Configuring and Applying Standard IPv4 ACLs 246 Configuring and Applying Extended IPv4 ACLs 247 Configuring and Applying Time-based ACLs 248 Configuring and Applying VTY ACLs 249 IPv6 ACLs 250 Configuring and Applying IPv6 ACLs 250 Verifying IPv4 and IPv6 ACLs 251 Implementing Authentication Methods 251 Simple Local Database Authentication 252 AAA-based Local Database Authentication 252 RADIUS Authentication 253 TACACS+ Authentication 255 Configuring Authorization and Accounting 256 Troubleshooting AAA 257 Control Plane Policing (CoPP) 257 Step 1: Define ACLs to Identify Permitted CoPP Traffic Flows 258 Step 2: Define Class Maps for Matched Traffic 258 Step 3: Define a Policy Map to Police Matched Traffic 259 Step 4: Assign a Policy Map to the Control Plane 259 Verifying CoPP 260 Unicast Reverse Path Forwarding (uRPF) 260 Configuring uRPF 260 Verifying and Troubleshooting uRPF 260 PART V: NETWORK ASSURANCEChapter 11 Network Assurance 261 Internet Control Message Protocol Redirect Messages 262 The ping Command 262 Examples of Using the ping and the Extended ping Commands 263 The traceroute Command 265 The debug Command 265 Conditionally Triggered Debugs 266 Configuring Secure SNMP 267 Securing SNMPv1 or SNMPv2c 267 Securing SNMPv3 268 Verifying SNMP 269 Implementing Logging 269 Configuring Syslog 269 Syslog Message Format 269 Syslog Severity Levels 270 Syslog Message Example 270 Configuring NetFlow 271 Configuring Flexible NetFlow 272 Step 1: Configure a Flow Record 272 Step 2: Configure a Flow Exporter 272 Step 3: Configure a Flow Monitor 272 Step 4: Apply the Flow Monitor to an Interface 273 Verifying NetFlow 273 Implementing Port Mirroring 273 Default SPAN and RSPAN Configuration 273 Configuring Local SPAN 274 Local SPAN Guidelines for Configuration 274 Configuration Example: Local SPAN 274 Configuring Remote SPAN 277 Remote SPAN Guidelines for Configuration 278 Configuration Example: Remote SPAN 278 Configuring Encapsulated RSPAN (ERSPAN) 280 Verifying and Troubleshooting Local and Remote SPAN 281 Configuring Network Time Protocol 281 NTP Configuration 281 NTP Design 282 Securing NTP 284 Verifying and Troubleshooting NTP 286 Setting the Clock on a Router 286 Using Time Stamps 290 Configuration Example: NTP 290 Tool Command Language (Tcl) 294 Embedded Event Manager (EEM) 295 EEM Configuration Examples 296 EEM and Tcl Scripts 298 Verifying EEM 298 PART VI: WIRELESSChapter 12 Wireless Security and Troubleshooting 299 Authenticating Wireless Clients 299 Open Authentication 300 Authenticating with a Pre-shared Key 302 Authenticating with EAP 304 Authenticating with WebAuth 310 Troubleshooting from the Wireless LAN Controller 312 Troubleshooting Wireless Client Connectivity 318 Cisco AireOS Monitoring Dashboard GUI 318 Cisco IOS XE GUI 322 PART VII: OVERLAYS AND VIRTUALIZATIONChapter 13 Overlay Tunnels and VRF 325 Generic Routing Encapsulation (GRE) 325 Configuring an IPv4 GRE Tunnel 326 Configuring an IPv6 GRE Tunnel 326 Verifying IPv4 and IPv6 GRE Tunnels 327 Configuration Example: IPv4 and IPv6 GRE Tunnels with OSPFv3 327 Site-to-Site GRE over IPsec 331 GRE/IPsec Using Crypto Maps 332 GRE/IPsec Using IPsec Profiles 333 Verifying GRE/IPsec 335 Site-to-Site Virtual Tunnel Interface (VTI) over IPsec 335 Cisco Dynamic Multipoint VPN (DMVPN) 336 Configuration Example: Cisco DMVPN for IPv4 337 Verifying Cisco DMVPN 342 VRF-Lite 343 Configuring VRF-Lite 343 Verifying VRF-Lite 345 Appendix A: Create Your Own Journal Here 347 Index 361

    Out of stock

    £28.49

  • Introduction to Networks Labs and Study Guide

    Pearson Education (US) Introduction to Networks Labs and Study Guide

    Out of stock

    Book SynopsisAllan Johnson entered the academic world in 1999 after 10 years as a business owner/operator to dedicate his efforts to his passion for teaching. He holds both an MBA and an M.Ed in occupational training and development. He taught a variety of technology courses to high school students and is an adjunct instructor at Del Mar College. Since 2006, Allan has worked full time for Cisco Networking Academy in several roles. He is currently engaged as Curriculum Lead. Cisco Networking Academy isan innovative Cisco education initiative that delivers information andcommunication technology skills to improve career and economic opportunitiesaround the world. The Academy provides online courses, interactive tools, andlab activities to prepare individuals for information technology and networkingcareers in virtually every industry.Table of Contents Introduction xxx Chapter 1 Networking Today 1 Networks Affect Our Lives 2 Network Components 2 Network Representations and Topologies 4 Common Types of Networks 5 Internet Connections 6 Reliable Networks 8 Network Trends 9 Network Security 11 The IT Professional 12 1.5.7 Packet Tracer—Network Representation 13 1.9.3 Lab—Research IT and Networking Job Opportunities 16 Chapter 2 Basic Switch and End Device Configuration 19 Cisco IOS Access 20 IOS Navigation 21 The Command Structure 23 Basic Device Configuration 25 Save Configurations 27 Ports and Addresses 27 Configure IP Addressing 28 Verify Connectivity 30 Command Reference 32 2.3.7 Packet Tracer—Navigate the IOS 33 2.3.8 Lab—Navigate the IOS by Using Tera Term for Console Connectivity 38 2.5.5 Packet Tracer—Configure Initial Switch Settings 45 2.7.6 Packet Tracer—Implement Basic Connectivity 50 2.9.1 Packet Tracer—Basic Switch and End Device Configuration 53 2.9.2 Lab—Basic Switch and End Device Configuration 55 Chapter 3 Protocols and Models 59 The Rules 60 Protocols 61 Protocol Suites 63 Standards Organizations 66 Reference Models 68 Data Encapsulation 69 Data Access 71 3.0.3 Class Activity—Design a Communications System 73 3.4.4 Lab—Research Networking Standards 74 3.5.5 Packet Tracer—Investigate the TCP/IP and OSI Models in Action 77 3.7.9 Lab—Install Wireshark 82 3.7.10 Lab—Use Wireshark to View Network Traffic 84 Chapter 4 Physical Layer 91 Purpose of the Physical Layer 92 Physical Layer Characteristics 92 Copper Cabling 94 UTP Cabling 96 Fiber-Optic Cabling 97 Wireless Media 99 4.6.5 Packet Tracer—Connect a Wired and Wireless LAN 101 4.6.6 Lab—View Wired and Wireless NIC Information 105 4.7.1 Packet Tracer—Connect the Physical Layer 109 Chapter 5 Number Systems 115 Binary Number System 116 Hexadecimal Number System 118 Chapter 6 Data Link Layer 123 Purpose of the Data Link Layer 124 Topologies 126 Data Link Frame 128 Chapter 7 Ethernet Switching 131 Ethernet Frames 132 Ethernet MAC Address 134 The MAC Address Table 135 Switch Speeds and Forwarding Methods 140 7.1.6 Lab—Use Wireshark to Examine Ethernet Frames 142 7.2.7 Lab—View Network Device MAC Addresses 149 7.3.7 Lab—View the Switch MAC Address Table 155 Chapter 8 Network Layer 159 Network Layer Characteristics 160 IPv4 Packet 161 IPv6 Packet 163 How a Host Routes 164 Introduction to Routing 166 Chapter 9 Address Resolution 171 MAC and IP 172 ARP 173 IPv6 Neighbor Discovery 175 9.1.3 Packet Tracer—Identify MAC and IP Addresses 177 9.2.9 Packet Tracer—Examine the ARP Table 181 9.3.4 Packet Tracer—IPv6 Neighbor Discovery 185 Chapter 10 Basic Router Configuration 191 Configure Initial Router Settings 192 Configure Interfaces 194 Configure the Default Gateway 196 Command Reference 197 10.1.4 Packet Tracer—Configure Initial Router Settings 198 10.3.4 Packet Tracer—Connect a Router to a LAN 202 10.3.5 Packet Tracer—Troubleshoot Default Gateway Issues 207 10.4.3 Packet Tracer—Basic Device Configuration 210 10.4.4 Lab—Build a Switch and Router Network 212 Chapter 11 IPv4 Addressing 219 IPv4 Address Structure 220 IPv4 Unicast, Broadcast, and Multicast 224 Types of IPv4 Addresses 224 Network Segmentation 226 Subnet an IPv4 Network 227 VLSM Addressing Schemes 231 11.5.5 Packet Tracer—Subnet an IPv4 Network 236 11.6.6 Lab—Calculate IPv4 Subnets 241 11.7.5 Packet Tracer—Subnetting Scenario 245 11.9.3 Packet Tracer—VLSM Design and Implementation Practice 249 11.10.1 Packet Tracer—Design and Implement a VLSM Addressing Scheme 253 11.10.2 Lab—Design and Implement a VLSM Addressing Scheme 255 Chapter 12 IPv6 Addressing 261 IPv4 Issues 262 IPv6 Address Representation 263 IPv6 Address Types 263 GUA and LLA Static Configuration 265 Dynamic Addressing for IPv6 GUAs 267 Dynamic Addressing for IPv6 LLAs 272 IPv6 Multicast Addresses 272 Subnet an IPv6 Network 272 12.6.6 Packet Tracer—Configure IPv6 Addressing 276 12.7.4 Lab—Identify IPv6 Addresses 280 12.9.1 Packet Tracer—Implement a Subnetted IPv6 Addressing Scheme 284 12.9.2 Lab—Configure IPv6 Addresses on Network Devices 286 Chapter 13 ICMP 291 ICMP Messages 292 Ping and Traceroute Tests 296 Command Reference 297 13.2.6 Packet Tracer—Verify IPv4 and IPv6 Addressing 297 13.2.7 Packet Tracer—Use Ping and Traceroute to Test Network Connectivity 301 13.3.1 Packet Tracer—Use ICMP to Test and Correct Network Connectivity 305 13.3.2 Lab—Use Ping and Traceroute to Test Network Connectivity 307 Chapter 14 Transport Layer 319 Transportation of Data 320 TCP Overview 322 UDP Overview 325 Port Numbers 327 TCP Communication Process 329 Reliability and Flow Control 332 UDP Communication 334 Command Reference 336 14.8.1 Packet Tracer—TCP and UDP Communications 336 Chapter 15 Application Layer 343 Application, Presentation, and Session 344 Application Layer 344 Peer-to-Peer 346 Web and Email Protocols 347 IP Addressing Services 349 File Sharing Services 353 Command Reference 355 15.4.8 Lab—Observe DNS Resolution 355 Chapter 16 Network Security Fundamentals 359 Security Threats and Vulnerabilities 360 Network Attacks 361 Network Attack Mitigation 364 Device Security 366 Command Reference 368 16.2.6 Lab—Research Network Security Threats 368 16.4.6 Packet Tracer—Configure Secure Passwords and SSH 372 16.4.7 Lab—Configure Network Devices with SSH 375 16.5.1 Packet Tracer—Secure Network Devices 381 16.5.1 Lab—Secure Network Devices 383 Chapter 17 Build a Small Network 389 Devices in a Small Network 390 Small Network Applications and Protocols 392 Scale to Larger Networks 394 Verify Connectivity 395 Host and IOS Commands 397 Troubleshooting Methodologies 402 Troubleshooting Scenarios 403 Command Reference 405 17.4.6 Lab—Test Network Latency with Ping and Traceroute 406 17.5.9 Packet Tracer—Interpret show Command Output 411 17.7.6 Lab—Troubleshoot Connectivity Issues 413 17.7.7 Packet Tracer—Troubleshoot Connectivity Issues 418 17.8.1 Lab—Design and Build a Small Network 422 17.8.2 Packet Tracer—Skills Integration Challenge 423 17.8.3 Packet Tracer—Troubleshooting Challenge 426

    Out of stock

    £48.44

  • CCNP and CCIE Collaboration Core CLCOR 350801

    Pearson Education (US) CCNP and CCIE Collaboration Core CLCOR 350801

    1 in stock

    Book SynopsisAnyone who has worked with Jason Ball or has sat in one of his classes knows that his enthusiasm for collaboration is matched only by his engaging zeal for teaching. Jason currently works for Cisco on the Learning & Certifications team, helping manage all the collaboration certification learning content. He has been operating as a collaboration engineer since 2009 and holds 19 different certifications, including a CCNP Collaboration certification and a Cisco Certified Systems Instructor (CCSI) certification. He has been teaching Cisco Voice, Video, and Collaboration certification courses for as many years as he has been involved with Cisco.   Some of his accomplishments include serving as a subject matter expert (SME), developing certification content, performing installations of many Cisco UCS servers with collaboration VMs, and performing as a consultant and technical instructor for many years as well. He also co-wrote the CCNA CollaborationTable of Contents Introduction xxxiv Part I AV Fundamentals 3 Chapter 1 Introduction to Collaboration 4 “Do I Know This Already?” Quiz 4 Foundation Topics 6 Audio Communication 6 Video Communication 8 Unified Communication 10 Driving Change in the Industry 11 Exam Preparation Tasks 13 Review All Key Topics 13 Define Key Terms 14 Q&A 14 Chapter 2 Audio Basics 16 “Do I Know This Already?” Quiz 17 Foundation Topics 19 Basic Understanding of Sound 19 Analog vs. Digital Signals 23 ITU Audio Encoding Formats 27 Exam Preparation Tasks 30 Review All Key Topics 30 Define Key Terms 30 Q&A 30 Chapter 3 Video Basics 32 “Do I Know This Already?” Quiz 33 Foundation Topics 35 Basic Understanding of Light 35 Capturing and Cameras 39 Standard Video Codecs 45 Video Container Formats and Codecs 47 Exam Preparation Tasks 49 Review All Key Topics 50 Define Key Terms 50 Q&A 50 Chapter 4 Collaboration Endpoint Components and Environment 52 “Do I Know This Already?” Quiz 53 Foundation Topics 55 Physical Components 55 Sound Behavior 57 Light Behavior 70 Exam Preparation Tasks 81 Review All Key Topics 81 Define Key Terms 82 Q&A 82 Chapter 5 Communication Protocols 84 “Do I Know This Already?” Quiz 85 Foundation Topics 88 PSTN Communication 88 H.323 Communication 91 SIP Communication 95 NAT and Firewall Traversal Solutions 102 Exam Preparation Tasks 109 Review All Key Topics 109 Define Key Terms 110 Q&A 110 Chapter 6 Cisco Solution for Converged Collaboration 112 “Do I Know This Already?” Quiz 114 Foundation Topics 116 Introduction to Cisco Endpoints 116 Introduction to Cisco Call Control 119 Introduction to Cisco Applications 126 Designing a Cisco Collaboration Solution 130 Exam Preparation Tasks 146 Review All Key Topics 146 Define Key Terms 147 Command Reference to Check Your Memory 148 Q&A 148 Part II Endpoints 151 Chapter 7 Cisco Unified Communications Phones 152 “Do I Know This Already?” Quiz 152 Foundation Topics 154 7800 Series Phones 154 8800 Series Phones 157 Software Versions for Phones 160 Exam Preparation Tasks 161 Review All Key Topics 161 Define Key Terms 162 Q&A 162 Chapter 8 Cisco Telepresence Endpoints 164 “Do I Know This Already?” Quiz 165 Foundation Topics 167 CE Software 167 DX Series 171 SX Series 172 MX Series 176 Webex Series 179 Webex Desk Series Endpoints 189 Exam Preparation Tasks 192 Review All Key Topics 192 Define Key Terms 193 Q&A 193 Chapter 9 Endpoint Registration 194 “Do I Know This Already?” Quiz 195 Foundation Topics 197 SIP Registration to the Cisco Unified Communications Manager 197 SIP Registration to Expressway Core 218 H.323 Registration to the Expressway Core 225 Exam Preparation Tasks 229 Review All Key Topics 229 Define Key Terms 230 Command Reference to Check Your Memory 230 Q&A 232 Chapter 10 Call Settings on Cisco CE Software-Based Endpoints 234 “Do I Know This Already?” Quiz 235 Foundation Topics 237 Calling Options 237 Content Sharing Options 246 Other Features 248 Exam Preparation Tasks 259 Review All Key Topics 259 Define Key Terms 260 Q&A 260 Chapter 11 Maintaining Cisco Endpoints 262 “Do I Know This Already?” Quiz 262 Foundation Topics 264 Upgrading Endpoints 264 Backing Up and Restoring CE Software-Based Endpoints 270 Exam Preparation Tasks 276 Review All Key Topics 276 Define Key Terms 277 Q&A 277 Part III Network Requirements for Collaboration Deployments 279 Chapter 12 Cisco Core Network Components 280 “Do I Know This Already?” Quiz 281 Foundation Topics 283 LAN, WAN, and Wireless LAN 283 Gateways 295 Exam Preparation Tasks 302 Review All Key Topics 302 Define Key Terms 302 Q&A 303 Chapter 13 Layer 2 and Layer 3 QoS Parameters 304 “Do I Know This Already?” Quiz 306 Foundation Topics 309 QoS-Related Issues 309 Class Models for Provisioning QoS 311 QoS Requirements 315 Traffic Classifications 319 Configure and Verify LLQ 322 Exam Preparation Tasks 328 Review All Key Topics 328 Define Key Terms 328 Command Reference to Check Your Memory 329 Q&A 331 Chapter 14 DNS, NTP, and SNMP 332 “Do I Know This Already?” Quiz 333 Foundation Topics 334 DNS Settings 334 NTP Settings 339 SNMP Settings 340 Exam Preparation Tasks 342 Review All Key Topics 342 Define Key Terms 343 Q&A 343 Part IV Call Control Mechanisms 345 Chapter 15 Cisco Unified Communications Manager Setup 346 “Do I Know This Already?” Quiz 347 Foundation Topics 349 Services 349 Enterprise Parameters 353 Service Parameters 355 Other Settings 357 Codec Negotiations Using Regions 364 Exam Preparation Tasks 367 Review All Key Topics 367 Define Key Terms 368 Q&A 368 Chapter 16 LDAP Integration with Cisco Unified Communications Manager 370 “Do I Know This Already?” Quiz 371 Foundation Topics 373 Application Users and End Users 373 Cisco Unified Communications Directory Architecture 376 LDAP Synchronization 377 LDAP Authentication 389 Exam Preparation Tasks 393 Review All Key Topics 393 Define Key Terms 393 Q&A 393 Chapter 17 Registering SIP Endpoints to the Cisco Unified Communications Manager 394 “Do I Know This Already?” Quiz 395 Foundation Topics 397 Bulk Administration Tool (BAT) 407 Device Onboarding with Activation Codes 414 Exam Preparation Tasks 420 Review All Key Topics 420 Define Key Terms 421 Q&A 422 Chapter 18 Cisco Unified Communications Manager Call Admission Control (CAC) 424 “Do I Know This Already?” Quiz 425 Foundation Topics 427 Endpoint Addressing 427 Call Privileges 435 Call Coverage 446 Exam Preparation Tasks 454 Review All Key Topics 454 Define Key Terms 454 Q&A 454 Chapter 19 Configuring Globalized Call Routing in Cisco Unified Communications Manager 456 “Do I Know This Already?” Quiz 457 Foundation Topics 458 Call Routing and Path Selection 458 Digit Manipulation 471 Exam Preparation Tasks 473 Review All Key Topics 473 Define Key Terms 474 Q&A 474 Part V Edge Services 477 Chapter 20 Introduction to Cisco Edge Services 478 “Do I Know This Already?” Quiz 479 Foundation Topics 480 Cisco Expressway 480 Cisco Voice Gateway Elements 483 Cisco Unified Border Element 485 Exam Preparation Tasks 486 Review All Key Topics 486 Define Key Terms 487 Q&A 487 Chapter 21 Mobile and Remote Access (MRA) 488 “Do I Know This Already?” Quiz 489 Foundation Topics 492 Requirements for MRA 492 Cisco Unified Communications Manager Settings for MRA 498 TLS Verify Requirements 501 Initializing MRA on Expressway Servers 511 Collaboration Traversal Zones and Search Rules 515 Device Onboarding with Activation Codes over MRA 518 Exam Preparation Tasks 523 Review All Key Topics 523 Define Key Terms 524 Q&A 524 Part VI Webex Calling 527 Chapter 22 Components of the Webex Solution 528 “Do I Know This Already?” Quiz 529 Foundation Topics 531 Webex Meeting 531 Webex Messaging 533 Webex Calling 535 Exam Preparation Tasks 537 Review All Key Topics 538 Define Key Terms 538 Q&A 538 Chapter 23 Adding Users and Devices in the Webex Control Hub 540 “Do I Know This Already?” Quiz 541 Foundation Topics 543 Webex Control Hub Overview 543 Methods of Adding Users to Webex Control Hub 556 Directory Connector Configuration 566 Add Unified IP Phones to Webex Control Hub 570 Add Webex Endpoints to Webex Control Hub 575 Exam Preparation Tasks 578 Review All Key Topics 578 Define Key Terms 579 Q&A 579 Chapter 24 Webex Calling Options 580 “Do I Know This Already?” Quiz 581 Foundation Topics 583 PSTN Options for Webex Calling 583 Routers Supporting Local Gateway 588 Deployment Scenarios for the Local Gateway 593 Exam Preparation Tasks 599 Review All Key Topics 599 Define Key Terms 599 Q&A 599 Chapter 25 Webex Calling Features 600 “Do I Know This Already?” Quiz 600 Foundation Topics 602 Admin-Configurable Features 602 User-Configurable Features 620 Exam Preparation Tasks 629 Review All Key Topics 629 Define Key Terms 630 Q&A 630 Chapter 26 Webex Calling Using a Local Gateway 632 “Do I Know This Already?” Quiz 633 Foundation Topics 635 Webex Control Hub Settings 635 Router Configuration 644 Exam Preparation Tasks 651 Review All Key Topics 652 Define Key Terms 652 Command Reference to Check Your Memory 652 Q&A 657 Part VII Collaboration Applications 659 Chapter 27 Understanding Cisco Unity Connection 660 “Do I Know This Already?” Quiz 661 Foundation Topics 662 Cisco Unity Connection Integration 662 Cisco Unity Connection System Settings 666 Cisco Unity Connection Call Handlers 667 Cisco Unity Connection Call Routing 668 Cisco Unity Connection Distribution Lists 670 Cisco Unity Connection Authentication Rules 670 Cisco Unity Connection Dial Plan 671 Exam Preparation Tasks 671 Review All Key Topics 671 Define Key Terms 672 Q&A 672 Chapter 28 Cisco Unity Connection End-User and Voice Mailbox 674 “Do I Know This Already?” Quiz 675 Foundation Topics 677 Cisco Unity Connection End-User Templates 677 User Templates Basics 681 Default Class of Service 683 Password Settings and Roles 684 Transfer Rules and Greetings 685 Call Actions 686 Message Actions and Caller Input 687 TUI Experience 689 Cisco Unity Connection End Users 690 Cisco Unity Connection Voice Mailboxes 696 Exam Preparation Tasks 698 Review All Key Topics 698 Define Key Terms 699 Q&A 699 Chapter 29 Deploying the Webex Application 700 “Do I Know This Already?” Quiz 701 Foundation Topics 703 Webex App Overview 703 Register Webex App to Cisco Unified Communications Manager 708 Migrate Cisco Jabber Clients to Webex App 715 Exam Preparation Tasks 721 Review All Key Topics 721 Define Key Terms 721 Q&A 721 Part VIII Troubleshooting Collaboration Components 723 Chapter 30 Troubleshooting Endpoints 724 “Do I Know This Already?” Quiz 725 Foundation Topics 727 Accessing Logs on Cisco Unified IP Phones 727 Accessing Logs on CE Software-Based Endpoints 729 Call Signaling and Quality 734 Troubleshooting Cisco Jabber 749 Exam Preparation Tasks 753 Review All Key Topics 753 Define Key Terms 754 Q&A 754 Chapter 31 Cisco Unified Communications Manager Reports 756 “Do I Know This Already?” Quiz 756 Foundation Topics 758 Dialed Number Analyzer 758 CAR Tool 760 CDR and CMR Logs on CUCM 763 Exam Preparation Tasks 770 Review All Key Topics 771 Define Key Terms 771 Q&A 771 Chapter 32 Real-Time Monitoring Tool (RTMT) 772 “Do I Know This Already?” Quiz 772 Foundation Topics 774 Cisco Unified RTMT Overview 774 Monitor Systems with RTMT 778 Monitor the CUCM with RTMT 783 Exam Preparation Tasks 787 Review All Key Topics 787 Define Key Terms 788 Q&A 788 Chapter 33 Understanding the Disaster Recovery System 790 “Do I Know This Already?” Quiz 790 Foundation Topics 792 Disaster Recovery System Overview 792 Backup Cisco Unified Communications Solutions 794 Restore Cisco Unified Communications Solutions 797 Exam Preparation Tasks 799 Review All Key Topics 799 Define Key Terms 799 Q&A 799 Chapter 34 Monitoring Voicemail in Cisco Unity Connection 800 “Do I Know This Already?” Quiz 800 Foundation Topics 802 Generate Reports on Cisco Unity Connection 802 Generate Reports in Cisco Unified Serviceability 808 Use Reports for Troubleshooting and Maintenance 810 Exam Preparation Tasks 814 Review All Key Topics 814 Define Key Terms 815 Q&A 815 Part IX Final Preparation 817 Chapter 35 Final Preparation 818 Hands-on Activities 818 Suggested Plan for Final Review and Study 818 Summary 819 Part X Exam Updates 821 Chapter 36 CCNP and CCIE Collaboration Core (CLCOR) 350-801 Exam Updates 822 The Purpose of This Chapter 822 News about the Next Exam Release 824 Updated Technical Content 824 Part XI Appendices 827 Appendix A Answers to the “Do I Know This Already?” Quizzes and Q&A Sections 828 Glossary 859 Online Elements Part XII Online Appendices Appendix B Memory Tables Appendix C Memory Tables Answer Key Appendix D Study Planner 9780138200947, TOC, 9/26/23

    1 in stock

    £43.69

  • CCNA 200301 Portable Command Guide

    Pearson Education (US) CCNA 200301 Portable Command Guide

    2 in stock

    Book SynopsisScott Empson is an instructor in the Department of Information Systems Technology at the Northern Alberta Institute of Technology in Edmonton, Alberta, Canada, where he has taught for more than 20 years. He teaches technical courses in Cisco routing and switching, along with courses in professional development and leadership. He has a Master of Education degree along with three undergraduate degrees: a Bachelor of Arts, with a major in English; a Bachelor of Education, again with a major in English/language arts; and a Bachelor of Applied Information Systems Technology, with a major in network management. Scott lives in Edmonton, Alberta, with his wife, Trina, and two university-attending-but-still-haven't-moved-out-yet-but-hope-to-move-out-as-soon-aspossible-after-graduation-so-Dad-can-have-the-TV-room-back children, Zachariah and Shaelyn.Table of ContentsIntroduction xix Part I: Network Fundamentals CHAPTER 1 IPv4 Addressing–How It Works 1 What Are IPv4 Addresses Used For? 1 What Does an IPv4 Address Look Like? 2 Network and Subnetwork Masks 2 Ways to Write a Network or Subnet Mask 3 Network, Node, and Broadcast Addresses 3 Classes of IPv4 Addresses 4 Network vs. Node (Host) Bits 5 RFC (Private) 1918 Addresses 6 Local vs. Remote Addresses 7 Classless Addressing 7 Lessons Learned 9 CHAPTER 2 How to Subnet IPv4 Addresses 11 Subnetting a Class C Network Using Binary 12 Subnetting a Class B Network Using Binary 15 Binary ANDing 17 So Why AND? 19 Shortcuts in Binary ANDing 20 CHAPTER 3 Variable Length Subnet Masking (VLSM) 23 IP Subnet Zero 23 VLSM Example 24 Step 1: Determine How Many H Bits Will Be Needed to Satisfy the Largest Network 25 Step 2: Pick a Subnet for the Largest Network to Use 25 Step 3: Pick the Next Largest Network to Work With 26 Step 4: Pick the Third Largest Network to Work With 28 Step 5: Determine Network Numbers for Serial Links 30 CHAPTER 4 Route Summarization 33 Example for Understanding Route Summarization 33 Step 1: Summarize Winnipeg’s Routes 34 Step 2: Summarize Calgary’s Routes 35 Step 3: Summarize Edmonton’s Routes 35 Step 4: Summarize Vancouver’s Routes 36 Route Summarization and Route Flapping 38 Requirements for Route Summarization 38 CHAPTER 5 IPv6 Addressing–How It Works 39 IPv6: A Very Brief Introduction 39 What Does an IPv6 Address Look Like? 40 Reducing the Notation of an IPv6 Address 41 Rule 1: Omit Leading 0s 41 Rule 2: Omit All-0s Hextet 42 Combining Rule 1 and Rule 2 42 Prefix Length Notation 43 IPv6 Address Types 44 Unicast Addresses 45 Multicast Addresses 48 Anycast Addresses 50 CHAPTER 6 Cables and Connections 51 Connecting a Rollover Cable to Your Router or Switch 51 Using a USB Cable to Connect to Your Router or Switch 51 Terminal Settings 52 LAN Connections 53 Serial Cable Types 53 Which Cable to Use? 55 ANSI/TIA Cabling Standards 56 T568A Versus T568B Cables 57 CHAPTER 7 The Command-Line Interface 59 Shortcuts for Entering Commands 59 Using the Tab Key to Complete Commands 60 Console Error Messages 60 Using the Question Mark for Help 60 enable Command 61 exit Command 61 end Command 61 disable Command 61 logout Command 62 Setup Mode 62 Keyboard Help 62 History Commands 63 terminal Commands 64 show Commands 64 Using the Pipe Parameter ( | ) with the show or more Commands 64 Using the no and default Forms of Commands 66 Part II: LAN Switching Technologies CHAPTER 8 Configuring a Switch 67 Help Commands 68 Command Modes 68 Verifying Commands 68 Resetting Switch Configuration 69 Setting Host Names 69 Setting Passwords 69 Setting IP Addresses and Default Gateways 70 Setting Interface Descriptions 70 The mdix auto Command 70 Setting Duplex Operation 71 Setting Operation Speed 71 Managing the MAC Address Table 72 Configuration Example 72 CHAPTER 9 VLANs 75 Creating Static VLANs 75 Creating Static VLANs Using VLAN Configuration Mode 75 Assigning Ports to VLANs 76 Using the range Command 76 Configuring a Voice VLAN 76 Configuring Voice and Data with Trust 77 Configuring Voice and Data Without Trust 78 Verifying VLAN Information 78 Saving VLAN Configurations 79 Erasing VLAN Configurations 79 Configuration Example: VLANs 80 2960 Switch 80 CHAPTER 10 VLAN Trunking Protocol and Inter-VLAN Communication 83 Dynamic Trunking Protocol (DTP) 83 Setting the VLAN Encapsulation Type 84 VLAN Trunking Protocol (VTP) 84 Verifying VTP 86 Inter-VLAN Communication Using an External Router: Router-on-a-Stick 87 Inter-VLAN Communication on a Multilayer Switch Through a Switch Virtual Interface 88 Removing L2 Switchport Capability of an Interface on an L3 Switch 88 Configuring Inter-VLAN Communication on an L3 Switch 88 Inter-VLAN Communication Tips 88 Configuration Example: Inter-VLAN Communication 89 ISP Router 89 CORP Router 90 L2Switch2 (Catalyst 2960) 92 L3Switch1 (Catalyst 3560/3650/3750) 94 L2Switch1 (Catalyst 2960) 95 CHAPTER 11 Spanning Tree Protocol 97 Spanning Tree Protocol Definition 97 Enabling Spanning Tree Protocol 98 Changing the Spanning-Tree Mode 99 BPDU Guard (3650/9xxx Series) 99 Configuring the Root Switch 100 Configuring a Secondary Root Switch 100 Configuring Port Priority 100 Configuring the Path Cost 101 Configuring the Switch Priority of a VLAN 101 Configuring STP Timers 102 Configuring Optional Spanning-Tree Features 102 PortFast 102 BPDU Guard (2xxx/Older 3xxx Series) 103 Enabling the Extended System ID 103 Verifying STP 104 Troubleshooting Spanning Tree Protocol 104 Configuration Example: PVST+ 104 Core Switch (3650) 105 Distribution 1 Switch (3650) 106 Distribution 2 Switch (3650) 106 Access 1 Switch (2960) 107 Access 2 Switch (2960) 107 Spanning-Tree Migration Example: PVST+ to Rapid-PVST+ 108 Access 1 Switch (2960) 108 Access 2 Switch (2960) 108 Distribution 1 Switch (3650) 109 Distribution 2 Switch (3650) 109 Core Switch (3650) 109 CHAPTER 12 EtherChannel 111 EtherChannel 111 Interface Modes in EtherChannel 111 Default EtherChannel Configuration 112 Guidelines for Configuring EtherChannel 112 Configuring Layer 2 EtherChannel 113 Configuring Layer 3 EtherChannel 114 Configuring EtherChannel Load Balancing 114 Configuring LACP Hot-Standby Ports 115 Monitoring and Verifying EtherChannel 116 Configuration Example: EtherChannel 117 DLSwitch (3560 or 9300) 117 ALSwitch1 (2960 or 9200) 118 ALSwitch2 (2960 or 9200) 119 CHAPTER 13 Cisco Discovery Protocol (CDP) and Link Layer Discovery Protocol (LLDP) 121 Cisco Discovery Protocol 121 Configuring CDP 121 Verifying and Troubleshooting CDP 122 CDP Design Tips 122 Link Layer Discovery Protocol (802.1AB) 123 Configuring LLDP (802.1AB) 123 Verifying and Troubleshooting LLDP 124 Part III: Routing Technologies CHAPTER 14 Configuring a Cisco Router 125 Router Modes 126 Entering Global Configuration Mode 126 Configuring a Router Name 126 Configuring Passwords 126 Password Encryption 127 Interface Names 127 Moving Between Interfaces 131 Configuring a Serial Interface 132 Assigning an IPv4 Address to a Fast Ethernet Interface 132 Assigning an IPv4 Address to a Gigabit Ethernet Interface 132 Assigning IPv6 Addresses to Interfaces 133 Creating a Message-of-the-Day Banner 133 Creating a Login Banner 134 Mapping a Local Host Name to a Remote IP Address 134 The no ip domain-lookup Command 134 Working with DNS on a Router 134 The logging synchronous Command 135 The exec-timeout Command 136 Saving Configurations 136 Erasing Configurations 136 The write Command 137 Verifying Your Configurations Using show Commands 137 EXEC Commands in Configuration Mode: The do Command 138 Configuration Example: Basic Router Configuration 138 Boston Router 138 CHAPTER 15 Static Routing 141 Configuring an IPv4 Static Route 141 Static Routes and Recursive Lookups 142 The permanent Keyword 142 Floating Static Routes in IPv4 and Administrative Distance 143 Configuring an IPv4 Default Route 144 Verifying IPv4 Static Routes 144 Configuration Example: IPv4 Static Routes 144 Ketchikan Router 145 Juneau Router 145 Sitka Router 146 Configuring an IPv6 Static Route 146 Floating Static Routes in IPv6 147 Configuring an IPv6 Default Route 147 Verifying IPv6 Static Routes 147 CHAPTER 16 Open Shortest Path First (OSPF) 149 OSPFv2 Versus OSPFv3 149 Configuring OSPF 150 Using Wildcard Masks with OSPF Areas 150 Loopback Interfaces 152 Router ID 152 DR/BDR Elections 153 Timers 153 Verifying OSPFv2 Configurations 153 Troubleshooting OSPFv2 154 Configuration Example: Single-Area OSPF 154 Austin Router 155 Houston Router 156 Galveston Router 157 Part IV: IP Services CHAPTER 17 DHCP 159 Configuring a DHCP Server on an IOS Router 159 Using Cisco IP Phones with a DHCP Server 160 Verifying and Troubleshooting DHCP Configuration 160 Configuring a DHCP Helper Address 161 Configuring a DHCP Client on a Cisco IOS Software Ethernet Interface 162 Configuration Example: DHCP 162 Edmonton Router 162 Gibbons Router 164 CHAPTER 18 Network Address Translation (NAT) 165 Private IP Addresses: RFC 1918 165 Configuring Dynamic NAT: One Private to One Public Address Translation 165 Configuring PAT: Many Private to One Public Address Translation 167 Configuring Static NAT: One Private to One Permanent Public Address Translation 169 Verifying NAT and PAT Configurations 170 Troubleshooting NAT and PAT Configurations 171 Configuration Example: PAT 171 ISP Router 171 Company Router 172 CHAPTER 19 Configuring Network Time Protocol (NTP) 175 NTP Configuration 175 NTP Design 176 Securing NTP 177 Enabling NTP Authentication 177 Limiting NTP Access with Access Lists 178 Verifying and Troubleshooting NTP 178 Setting the Clock on a Router 179 Using Time Stamps 182 Configuration Example: NTP 182 Core1 Router 183 Core2 Router 184 DLSwitch1 185 DLSwitch2 185 ALSwitch1 186 ALSwitch2 186 Part V: Security Fundamentals CHAPTER 20 Layer Two Security Features 187 Setting Passwords on a Switch 187 Configuring Static MAC Addresses 188 Configuring Switch Port Security 188 Configuring Sticky MAC Addresses 189 Verifying Switch Port Security 189 Recovering Automatically from Error-Disabled Ports 190 Verifying Autorecovery of Error-Disabled Ports 190 Configuring DHCP Snooping 191 Verifying DHCP Snooping 192 Configuring Dynamic ARP Inspection (DAI) 193 Verifying Dynamic ARP Inspection 193 Configuration Example: Switch Security 194 CHAPTER 21 Managing Traffic Using Access Control Lists (ACLs) 197 Access List Numbers 197 Using Wildcard Masks 198 ACL Keywords 198 Creating Standard ACLs 198 Applying Standard ACLs to an Interface 199 Verifying ACLs 200 Removing ACLs 200 Creating Extended ACLs 200 Applying Extended ACLs to an Interface 201 The established Keyword 201 The log Keyword 202 Creating Named ACLs 203 Using Sequence Numbers in Named ACLs 203 Removing Specific Lines in Named ACLs Using Sequence Numbers 204 Sequence Number Tips 204 Including Comments About Entries in ACLs 205 Restricting Virtual Terminal Access 206 Tips for Configuring ACLs 206 IPv6 ACLs 207 Verifying IPv6 ACLs 207 Configuration Examples: IPv4 ACLs 208 Configuration Examples: IPv6 ACLs 210 CHAPTER 22 Device Monitoring and Hardening 213 Device Monitoring 213 Configuration Backups 213 Implementing Logging 214 Configuring Syslog 215 Syslog Message Format 215 Syslog Severity Levels 216 Syslog Message Example 216 Device Hardening 217 Configuring Passwords 217 Password Encryption 218 Password Encryption Algorithm Types 218 Configuring SSH 219 Verifying SSH 220 Restricting Virtual Terminal Access 220 Disabling Unneeded Services 221 Part VI: Wireless Technologies CHAPTER 23 Configuring and Securing a WLAN AP 223 Initial Setup of a Wireless LAN Controller (WLC) 223 Monitoring the WLC 229 Configuring a VLAN (Dynamic) Interface 230 Configuring a DHCP Scope 234 Configuring a WLAN 237 Defining a RADIUS Server 239 Exploring Management Options 242 Configuring a WLAN Using WPA2 PSK 246 Part VII: Appendices APPENDIX A How to Count in Decimal, Binary, and Hexadecimal 251 How to Count in Decimal 251 How to Count in Binary 253 How to Count in Hexadecimal 254 Representing Decimal, Binary, and Hexadecimal Numbers 256 APPENDIX B How to Convert Between Number Systems 259 How to Convert from Decimal to Binary 259 How to Convert from Binary to Decimal 260 How to Convert from Decimal IP Addresses to Binary and from Binary IP Addresses to Decimal 261 A Bit of Perspective 262 How to Convert from Hexadecimal to Binary 262 How to Convert from Binary to Hexadecimal 263 How to Convert from Decimal to Hexadecimal 264 How to Convert from Hexadecimal to Decimal 265 APPENDIX C Binary/Hex/Decimal Conversion Chart 267 APPENDIX D Create Your Own Journal Here 275 9780135937822 TOC 10/31/2019

    2 in stock

    £29.69

  • Enterprise Networking Security and Automation

    Pearson Education Enterprise Networking Security and Automation

    Out of stock

    Book SynopsisCisco Networking Academy teaches hundreds of thousands of students annually the skills needed to build, design, and maintain networks, improving their career prospects while filling the global demand for networking professionals. With 10,000 academies in 165 countries, it helps individuals prepare for industry-recognized certifications and entry-level information and communication technology careers in virtually every industrydeveloping foundational technical skills while acquiring vital 21st-century career skills in problem solving, collaboration, and critical thinking. Cisco Networking Academy uses a public-private partnership model to create the world's largest classroom.

    Out of stock

    £62.75

  • CCNA 200301 Network Simulator

    Pearson Education (US) CCNA 200301 Network Simulator

    15 in stock

    Book SynopsisSean Wilkins (@Sean_R_Wilkins) is an accomplished networking consultant and writer for infoDispersion who has been in the IT field for more than 20 years, working with several large enterprises. Sean holds certifications with Cisco (CCNP/CCDP), Microsoft (MCSE), and CompTIA (A+ and Network+). His educational accomplishments include a Masters of Science in Information Technology with a focus in Network Architecture and Design, a Masters of Science in Organizational Management, a Masters Certificate in Network Security, a Bachelors of Science in Computer Networking, and an Associates of Applied Science in Computer Information Systems. Sean spends most of his time writing articles and books for various clients including Cisco Press, Pearson, Tom's IT Pro, and PluralSight, as well as being an active video training author for PluralSight.Table of Contents ICND1 Skill Builders Part I: Navigation and Administration Lab 1: Switch CLI Exec Mode Lab 2: Switch CLI Configuration Process I Lab 3: Switch CLI Configuration Process II Lab 4: Router CLI Exec Mode I Lab 5: Router CLI Exec Mode II Lab 6: Router CLI Configuration Process Lab 7: Setting Switch Passwords Lab 8: Configuring Switch IP Settings Lab 9: Setting Router Passwords Lab 10: Configuring Router IP Settings Lab 11: Configuring Local Usernames Lab 12: Using and Suspending Telnet Connections Lab 13: Configuring SSH Lab 14: Migrating to a New IOS Image Lab 15: Setting the Configuration Register Lab 16: Comparing Configuration Files Lab 17: Examining the IP Routing Table Lab 18: Using debug Lab 19: Testing Using Pings with Hostnames Lab 20: Ignoring the Startup-config File Lab 21: Booting a New Router IOS Lab 22: Terminal History I Lab 23: Terminal History II Lab 24: Topology Analysis Part II: LAN Switching Lab 1: Interface Settings I Lab 2: Interface Settings II Lab 3: Interface Settings III Lab 4: Switch Forwarding I Lab 5: Switch IP Connectivity I Lab 6: VLANs I Lab 7: VLANs II Lab 8: VLANs III Lab 9: Interface Status I Lab 10: Interface Status II Lab 11: Interface Status III Lab 12: Interface Status IV Lab 13: Switch Security I Lab 14: Switch Security II Lab 15: Switch Security III Lab 16: Switch Security IV Part III: IP Addressing, Routing, and WANs Lab 1: Configuring IP Addresses I Lab 2: Configuring IP Addresses II Lab 3: Configuring IP Addresses III Lab 4: Configuring IP Addresses IV Lab 5: Connected Routes Lab 6: Static Routes I Lab 7: Static Routes II Lab 8: Static Routes III Lab 9: Static Routes IV Lab 10: Default Routes Lab 11: IP Classless Lab 12: Subnet Zero I Lab 13: Subnet Zero II Lab 14: Loopback Interfaces Lab 15: RIP Configuration I Lab 16: RIP Configuration II Lab 17: RIP Configuration III Lab 18: RIP Configuration IV Lab 19: RIP Configuration V Lab 20: RIP Configuration VI Lab 21: RIP Verification I Lab 22: RIP Verification II Lab 23: Configuring Hostnames Lab 24: PC IP Commands I Lab 25: PC IP Commands II Lab 26: PC IP Commands III Lab 27: Serial Link Configuration I Lab 28: Serial Link Configuration II Lab 29: Serial Link Configuration III Lab 30: Serial Link Configuration IV Lab 31: Interface Status V Lab 32: Interface Status VI Configuration Scenarios Part I: Navigation and Administration Lab 1: The Initial Configuration Dialogue (Setup) Lab 2: New Job I Lab 3: Rebuild a Configuration Lab 4: SSH and Telnet Part II: LAN Switching Lab 1: Switch Interfaces and Forwarding Lab 2: Switch IP Connectivity Lab 3: Switch Security Lab 4: Configuring VLANs Part III: IP Addressing, Routing, and WANs Lab 1: Subnetting and Addressing I Lab 2: Subnetting and Addressing II Lab 3: Subnetting and Addressing III Lab 4: Static Routing I Lab 5: Static Routing II Lab 6: RIP-2 Configuration I Lab 7: RIP-2 Configuration II Lab 8: RIP Auto-summary Lab 9: Serial Link Configuration I Lab 10: IP and MAC Address Comparisons Lab 11: IP Classless Troubleshooting Scenarios Lab 1: Switch Forwarding I Lab 2: Path Analysis I Lab 3: Port Security Lab 4: Network Discovery I Lab 5: Network Discovery II Lab 6: Addressing and Routing Lab 7: IP Routing I Lab 8: IP Routing II Subnetting Exercises Part I: Subnet ID Calculation Lab 1 Lab 2 Lab 3 Lab 4 Lab 5 Lab 6 Lab 7 Lab 8 Lab 9 Lab 10 Lab 11 Part II: IP Address Rejection Lab 1 Lab 2 Lab 3 Lab 4 Lab 5 Lab 6 Lab 7 Lab 8 Lab 9 Lab 10 Lab 11 Part III: IP Route Selection Lab 1 Lab 2 Lab 3 Lab 4 Lab 5 Lab 6 Lab 7 Lab 8 Lab 9 Lab 10 ICND 2 Skill Builders Part I: VLANs and Trunking Lab 1: VLAN Configuration I Lab 2: VLAN Configuration II Lab 3: VLAN Configuration III Lab 4: VLAN Configuration IV Lab 5: VLAN Configuration V Lab 6: VTP Configuration I Lab 7: VTP Configuration II Lab 8: VTP Configuration III Lab 9: VTP Configuration IV Lab 10: VTP Configuration V Lab 11: Trunking Configuration I Lab 12: Trunking Configuration II Lab 13: Trunking Configuration III Lab 14: Trunking Configuration IV Lab 15: STP Analysis I Lab 16: STP Analysis II Lab 17: STP Configuration I Lab 18: STP Configuration II Lab 19: STP Configuration III Lab 20: EtherChannel Part II: IP Addressing and Routing Lab 1: IP Addressing I Lab 2: IP Addressing II Lab 3: IP Addressing III Lab 4: Traceroute I Lab 5: Default Route I Lab 6: Zero Subnet Lab 7: Switch IP Address Lab 8: ACL I Lab 9: ACL II Lab 10: ACL III Lab 11: ACL IV Lab 12: ACL V Lab 13: ACL VI Lab 14: Named ACL I Lab 15: Named ACL II Lab 16: Named ACL III Lab 17: ACL Analysis I Lab 18: Auto-summary Lab 19: Routing Analysis I Lab 20: Traceroute II Part III: IP Routing Protocols Lab 1: EIGRP Serial Configuration I Lab 2: EIGRP Serial Configuration II Lab 3: EIGRP Serial Configuration III Lab 4: EIGRP Serial Configuration IV Lab 5: EIGRP Serial Configuration V Lab 6: EIGRP Serial Configuration VI Lab 7: EIGRP Frame Relay Configuration I Lab 8: EIGRP Frame Relay Configuration II Lab 9: EIGRP Frame Relay Configuration III Lab 10: EIGRP Authentication I Lab 11: EIGRP Authentication II Lab 12: EIGRP Route Tuning I Lab 13: EIGRP Route Tuning II Lab 14: EIGRP Route Tuning III Lab 15: EIGRP Route Tuning IV Lab 16: EIGRP Neighbors I Lab 17: EIGRP Neighbors II Lab 18: EIGRP Neighbors III Lab 19: OSPF Serial Configuration I Lab 20: OSPF Serial Configuration II Lab 21: OSPF Serial Configuration III Lab 22: OSPF Serial Configuration IV Lab 23: OSPF Serial Configuration V Lab 24: OSPF Serial Configuration VI Lab 25: OSPF Router ID I Lab 26: OSPF Router ID II Lab 27: OSPF Frame Relay Configuration I Lab 28: OSPF Frame Relay Configuration II Lab 29: OSPF Frame Relay Configuration III Lab 30: OSPF Authentication I Lab 31: OSPF Authentication II Lab 32: OSPF Metric Tuning I Lab 33: OSPF Metric Tuning II Lab 34: OSPF Metric Tuning III Lab 35: OSPF Neighbors I Lab 36: OSPF Neighbors II Lab 37: OSPF Neighbors III Lab 38: OSPF Neighbors IV Lab 39: OSPF Neighbors V Part IV: WAN Lab 1: Serial Configuration I Lab 2: Serial Configuration II Lab 3: Serial Authentication I Lab 4: Serial Authentication II Lab 5: Frame Relay Configuration I Lab 6: Frame Relay Configuration II Lab 7: Frame Relay Configuration III Lab 8: Frame Relay Configuration IV Lab 9: Frame Relay Configuration V Lab 10: Frame Relay Verification I Lab 11: Frame Relay Verification II Lab 12: Frame Relay Verification III Part V: Scaling IP Lab 1: NAT Configuration I Lab 2: NAT Configuration II Lab 3: NAT Configuration III Lab 4: NAT Configuration IV Lab 5: NAT Configuration V Lab 6: NAT Configuration VI Lab 7: NAT Configuration VII Lab 8: IPv6 Address Configuration I Lab 9: IPv6 Address Configuration II Lab 10: IPv6 Address Configuration III Lab 11: IPv6 Address Configuration IV Lab 12: IPv6 Address Configuration V Lab 13: IPv6 Address Configuration VI Lab 14: IPv6 Address Configuration VII Lab 15: IPv6 Address Configuration VIII Lab 16: IPv6 Address Configuration IX Lab 17: IPv6 Routing Configuration I Lab 18: IPv6 Routing Configuration II Lab 19: IPv6 Routing Configuration III Lab 20: IPv6 Hostnames Configuration Scenarios Part I: VLANs and Trunking Lab 1: VTP I Lab 2: VTP Transparent Mode Lab 3: VLAN Trunking I Lab 4: VLAN Trunking II Lab 5: STP Analysis I Lab 6: STP Configuration II Part II: IP Addressing and Routing Lab 1: IP Addressing and Configuration I Lab 2: IP Addressing and Configuration II Lab 3: IP Default Routing and IP Classless Lab 4: Default Routes Lab 5: Standard ACL I Lab 6: Extended ACL I Lab 7: Extended ACL II Part III: IP Routing Protocols Lab 1: OSPF Configuration I Lab 2: OSPF Configuration II Lab 3: OSPF Configuration III Lab 4: OSPF Metric Manipulation Lab 5: EIGRP Serial Configuration I Lab 6: EIGRP Configuration II Lab 7: EIGRP Metric Manipulation I Lab 8: EIGRP Variance and Maximum Paths I Part IV: WAN Lab 1: Frame Relay Configuration I Lab 2: Frame Relay Inverse ARP Lab 3: Frame Relay Correlation Part V: Scaling IP Lab 1: NAT Configuration I Lab 2: NAT Configuration II Lab 3: IPv6 Configuration I Lab 4: IPv6 Configuration II Troubleshooting Scenarios Lab 1: Path Analysis Lab 2: Path Analysis II Lab 3: Path Analysis III Lab 4: Path Troubleshooting I Lab 5: Path Troubleshooting II Lab 6: Path Troubleshooting III Lab 7: Path Troubleshooting IV Lab 8: VLAN Troubleshooting I Lab 9: OSPF Troubleshooting I Lab 10: Routing Analysis III Lab 11: Network Expansion Lab 12: NAT Lab 13: IP Routing II Subnetting Exercises Part I: VLSM Overlap Lab 1 Lab 2 Lab 3 Lab 4 Lab 5 Lab 6 Lab 7 Lab 8 Lab 9 Lab 10 Lab 11 Part II: VLSM Route Selection Lab 1 Lab 2 Lab 3 Lab 4 Lab 5 Lab 6 Lab 7

    15 in stock

    £125.30

  • 31 Days Before your CCNA Exam

    Pearson Education 31 Days Before your CCNA Exam

    1 in stock

    Book SynopsisAllan Johnson entered the academic world in 1999 after 10 years as a business owner/operator to dedicate his efforts to his passion for teaching. He holds both an MBA and an MEd in training and development. He taught CCNA courses at the high school level for 7 years and has taught both CCNA and CCNP courses at Del Mar College in Corpus Christi, Texas. In 2003, Allan began to commit much of his time and energy to the CCNA Instructional Support Team, providing services to Networking Academy instructors worldwide and creating training materials. He now splits his time between working as a Curriculum Lead for Cisco Networking Academy and as Account Lead for Unicon (unicon.net), supporting Cisco's educational efforts.

    1 in stock

    £38.26

  • CCNA 200301 Official Cert Guide Volume 1

    Pearson Education (US) CCNA 200301 Official Cert Guide Volume 1

    Out of stock

    Book SynopsisWendell Odom, CCIE No. 1624 Emeritus, has been in the networking industry since 1981. He has worked as a network engineer, consultant, systems engineer, instructor, and course developer; he currently works writing and creating certification study tools. This book is his 28th edition of some product for Pearson, and he is the author of all editions of the CCNA Cert Guides about Routing and Switching from Cisco Press. He has written books about topics from networking basics, certification guides throughout the years for CCENT, CCNA R&S, CCNA DC, CCNP ROUTE, CCNP QoS, and CCIE R&S. He maintains study tools, links to his blogs, and other resources at www.certskills.com.

    Out of stock

    £32.94

  • 31 Days Before your CCNA Exam

    Pearson Education (US) 31 Days Before your CCNA Exam

    Out of stock

    Book SynopsisAllan Johnson entered the academic world in 1999, after 10 years as a business owner/operator to dedicate his efforts to his passion for teaching. He holds both an MBA and an MEd in occupational training and development. He taught a variety of technology courses to high school students and is an adjunct instructor at Del Mar College in Corpus Christi, Texas. Since 2006, Allan has worked full time for Cisco Networking Academy in several roles. He is currently engaged as curriculum lead.     Table of Contents Introduction xxviiiDay 31: Networking Models, Devices, and Components 1 CCNA 200-301 Exam Topics 1 Key Points 1 The OSI and TCP/IP Models 1 The TCP/IP Application Layer 5 The TCP/IP Transport Layer 5 The TCP/IP Internet Layer 10 The TCP/IP Network Access Layer 10 Data Encapsulation Summary 12 Networking Icons 13 Devices 13 Physical Layer 20 LAN Device Connection Guidelines 22 LANs and WANs 23 Small Office/Home Office (SOHO) 23 Physical and Logical Topologies 24 Hierarchical Campus Designs 25 Study Resources 27Day 30: Ethernet Switching 29 CCNA 200-301 Exam Topics 29 Key Topics 29 Evolution to Switching 29 Switching Logic 30 Collision and Broadcast Domains 31 Frame Forwarding 31 Ethernet Overview 32 Legacy Ethernet Technologies 33 Current Ethernet Technologies 35 UTP Cabling 36 Benefits of Using Switches 37 Ethernet Addressing 37 Ethernet Framing 38 The Role of the Physical Layer 39 Study Resources 40Day 29: Switch Configuration Basics 41 CCNA 200-301 Exam Topics 41 Key Topics 41 Accessing and Navigating the Cisco IOS 41 Basic Switch Configuration Commands 45 Half Duplex, Full Duplex, and Port Speed 47 Verifying Network Connectivity 48 Troubleshoot Interface and Cable Issues 50 Study Resources 54Day 28: IPv4 Addressing 55 CCNA 200-301 Exam Topics 55 Key Topics 55 IPv4 Addressing 55 Private and Public IP Addressing 58 Subnetting in Four Steps 58 VLSM 62 Study Resources 64Day 27: IPv6 Addressing 65 CCNA 200-301 Exam Topics 65 Key Topics 65 Overview and Benefits of IPv6 65 The IPv6 Protocol 66 IPv6 Address Types 67 Representing the IPv6 Address 76 IPv6 Subnetting 77 EUI-64 Concept 78 Stateless Address Autoconfiguration 79 Migration to IPv6 80 Study Resources 81Day 26: VLAN and Trunking Concepts and Configurations 83 CCNA 200-301 Exam Topics 83 Key Points 83 VLAN Concepts 83 Trunking VLANs 86 VLAN Configuration and Verification 88 Trunking Configuration and Verification 92 VLAN Troubleshooting 94 Trunking Troubleshooting 96 Study Resources 98Day 25: STP 99 CCNA 200-125 Exam Topics 99 Key Topics 99 STP Concepts and Operation 99 STP Algorithm 100 STP Convergence 101 STP Varieties 102 PVST Operation 103 Rapid PVST+ Operation 105 Configuring and Verifying Varieties of STP 108 Study Resources 112Day 24: EtherChannel and HSRP 113 CCNA 200-301 Exam Topics 113 Key Topics 113 EtherChannel Operation 113 Benefits of EtherChannel 114 Implementation Restrictions 114 EtherChannel Protocols 115 Configuring EtherChannel 116 Verifying EtherChannel 117 Troubleshooting EtherChannel 119 First-Hop Redundancy Concepts 119 FHRPs 120 HSRP Operation 121 HSRP Configuration and Verification 122 HSRP Load Balancing 123 Troubleshooting HSRP 126 Study Resources 126Day 23: DHCP and DNS 127 CCNA 200-301 Exam Topics 127 Key Topics 127 DHCPv4 127 DHCPv4 Configuration Options 128 DHCPv6 134 DHCPv6 Configuration Options 137 DHCP Troubleshooting 140 DNS Operation 140 Troubleshooting DNS 142 Verifying Host IP Configuration 143 Study Resources 148Day 22: Wireless Concepts 149 CCNA 200-301 Exam Topics 149 Key Topics 149 Wireless Standards 149 Wireless Topologies 152 AP Architectures 155 Wireless Security Protocols 158 Study Resources 162Day 21: WLAN Configuration 163 CCNA 200-301 Exam Topics 163 Key Topics 163 Logging Into a Cisco WLC 163 Configuring a WLC with a WLAN 165 Study Resources 171Day 20: LAN Security and Device Hardening 173 CCNA 200-301 Exam Topics 173 Key Topics 173 Endpoint Security 173 Access Control 175 Port Security 181 LAN Threat Mitigation 185 Study Resources 193Day 19: Basic Routing Concepts 195 CCNA 200-301 Exam Topics 195 Key Topics 195 Packet Forwarding 195 Routing Methods 197 Classifying Dynamic Routing Protocols 198 Dynamic Routing Metrics 200 Administrative Distance 201 IGP Comparison Summary 203 Routing Loop Prevention 203 Link-State Routing Protocol Features 204 Study Resources 207Day 18: Basic Router Configuration 209 CCNA 200-301 Exam Topics 209 Key Topics 209 Basic Router Configuration with IPv4 209 Basic Router Configuration with IPv6 217 Verifying IPv4 and IPv6 Network Connectivity 220 Small Office or Home Office Routers 223 Basic IP Addressing Troubleshooting 224 Study Resources 225Day 17: The Routing Table 227 CCNA 200-301 Exam Topics 227 Key Topics 227 Two Router Functions 227 Components of the Routing Table 228 Study Resources 232Day 16: Inter-VLAN Routing 233 CCNA 200-301 Exam Topics 233 Key Points 233 Inter-VLAN Routing Concepts 233 Router on a Stick Configuration and Verification 235 Multilayer Switching Inter-VLAN Routing Configuration and Verification 238 Study Resources 240Day 15: Static and Default Route Configuration 241 CCNA 200-301 Exam Topics 241 Key Topics 241 Static and Default Routing Overview 241 IPv4 Static Route Configuration 242 Study Resources 254Day 14: OSPF Operation 255 CCNA 200-301 Exam Topics 255 Key Topics 255 Single-Area OSPF Operation 255 OSPFv2 Versus OSPFv3 261 Multiarea OSPF Operation 262 Study Resources 264Day 13: Single-Area OSPF Implementation 265 CCNA 200-301 Exam Topics 265 Key Topics 265 Single-Area OSPFv2 Configuration 265 Verifying OSPFv2 270 Study Resources 274Day 12: Fine-Tuning and Troubleshooting OSPF 275 CCNA 200-125 Exam Topics 275 Key Topics 275 OSPFv2 Configuration Example 275 Modifying OSPFv2 277 Troubleshooting OSPF 281 Study Resources 283Day 11: Network Security Concepts 285 CCNA 200-301 Exam Topics 285 Key Topics 285 Security Fundamentals 285 Network Attacks 289 Security Program 293 Study Resources 293Day 10: ACL Concepts 295 CCNA 200-301 Exam Topics 295 Key Topics 295 ACL Operation 295 Planning to Use ACLs 297 Study Resources 300Day 9: ACL Implementation 301 CCNA 200-301 Exam Topics 301 Key Topics 301 Configuring Standard Numbered IPv4 ACLs 301 Configuring Extended Numbered IPv4 ACLs 303 Configuring Named IPv4 ACLs 305 Verifying IPv4 ACLs 307 Comparing IPv4 and IPv6 ACLs 308 Configuring IPv6 ACLs 309 Verifying IPv6 ACLs 311 Troubleshooting ACLs 313 Study Resources 314Day 8: NAT 315 CCNA 200-301 Exam Topics 315 Key Topics 315 NAT Concepts 315 Configuring Static NAT 319 Verifying NAT 322 Troubleshooting NAT 323 Study Resources 324Day 7: WAN, VPN, and IPsec 325 CCNA 200-301 Exam Topics 325 Key Topics 325 WAN Topologies 325 WAN Connection Options 326 VPN Technology 333 Study Resources 342Day 6: QoS 343 CCNA 200-301 Exam Topics 343 Key Topics 343 QoS 343 Study Resources 350Day 5: CDP and LLDP 351 CCNA 200-301 Exam Topics 351 Key Topics 351 CDP Overview 351 LLDP Overview 357 Study Resources 360Day 4: Device Monitoring, Management, and Maintenance 361 CCNA 200-301 Exam Topics 361 Key Topics 361 SNMP Operation 361 Configuring SNMP 364 Verifying SNMP 364 Syslog 365 Network Time Protocol 370 Cisco IOS File System and Devices 371 Managing Cisco IOS Images 375 Password Recovery 377 Study Resources 378Day 3: Cloud, Virtualization, and SDN 379 CCNA 200-301 Exam Topics 379 Key Topics 379 Cloud Computing 379 Software-Defined Networking 383 Study Resources 388Day 2: SDA and Cisco DNA Center 389 CCNA 200-301 Exam Topics 389 Key Topics 389 SDA Architecture 389 Cisco DNA Center 391 Study Resources 395 Day 1: Network Automation 397 CCNA 200-301 Exam Topics 397 Key Topics 397 Data Formats 397 RESTful APIs 400 Configuration Management Tools 402 Study Resources 405Exam Day 407 What You Need for the Exam 407 What You Should Receive After Completion 407 Summary 407Post-Exam Information 409 Receiving Your Certificate 409 Determining Career Options 409 Examining Certification Options 410 If You Did Not Pass the Exam 410 Summary 4109780135964088, TOC, 1/29/2020

    Out of stock

    £26.99

  • CCNP Enterprise Design ENSLD 300420 Official Cert

    Pearson Education CCNP Enterprise Design ENSLD 300420 Official Cert

    1 in stock

    Book SynopsisAnthony Bruno, CCIE No. 2738, is an architect and technical resource manager with British Telecom (BT) with more than 27 years of experience in the internetworking field. Previously, he worked for International Network Services (INS) and Lucent Technologies, and he was a captain in the U.S. Air Force. He has consulted for many enterprise and service provider customers in the design, implementation, and optimization of large scale networks. Anthony leads architecture and design teams in building next-generation networks for customers. Anthony completed a master of science degree in electrical engineering at the University of MissouriRolla in 1994 and a bachelor of science in electrical engineering at the University of Puerto RicoMayaguez in 1990. For the past 20 years, he has coauthored five editions of the CCDA Official Cert Guide for Cisco Press. Outside work, Anthony enjoys running marathons and Spartan obstacle races, and he has finished seven Ironman distance triathlons. He is also an avid genealogist and ancestry tree researcher. Anthony also enjoys piloting his Mavic Pro drone during trips. Steve Jordan, CCIE No. 11293, is a Principal Architect with J. Network Architects and has 23 years of experience in the field of internetworking. For the last 13 years, Steve has specialized in data center and network security architectures involving compute, network, security,storage, and virtualization. Over the years, Steve has consulted with many enterprise and service provider customers in both pre-sales and post-sales engineering and architecture roles, along with working at several Cisco Gold Partners. He has extensive experience in data center and security architecture design and has implemented solutions in many financial, energy, retail, healthcare,education, and telecommunications industries. Steve is a 15-Year triple CCIE in the tracks of Routing & Switching, Storage Networking, and Data Center. His other certifications include CCNA, CCNP Enterprise, VMware VCIX6-NV, and VCP6-NV. Steve lives in Houston, Texas; and when he is not working on technology, Steve can be found traveling to new places, home brewing, and trading stocks. For the past 14 years, Steve was also the coauthor for three editions of the CCDA Official Cert Guide.

    1 in stock

    £48.68

  • CCNP Enterprise Wireless Design ENWLSD 300425 and

    Pearson Education (US) CCNP Enterprise Wireless Design ENWLSD 300425 and

    2 in stock

    Book Synopsis Jerome Henry, CCIE No. 24750, is a Principal Engineer in the Office of the Wireless CTO at Cisco Systems. Jerome has more than 15 years' experience teaching technical Cisco courses, in more than 15 countries and four languages, to audiences ranging from bachelor's degree students to networking professionals and Cisco internal system engineers. Focusing on his wireless and networking experience, Jerome joined Cisco in 2012. Before that time, he was consulting and teaching about heterogeneous networks and wireless integration with the European Airespace team, which was later acquired by Cisco to become its main wireless solution. He then spent several years with a Cisco Learning Partner, developing networking courses and working on training materials for emerging technologies. Jerome is a certified wireless networking expert (CWNE No. 45), has developed multiple Cisco courses, and authored several wireless books and video courses. Jerome hol

    2 in stock

    £48.68

  • Introduction to Networks Course Booklet CCNAv7

    Pearson Education Introduction to Networks Course Booklet CCNAv7

    15 in stock

    Book SynopsisCisco Networking Academy teaches hundreds of thousands of students annually the skills needed to build, design, and maintain networks, improving their career prospects while filling the global demand for networking professionals. With 10,000 academies in 165 countries, it helps individuals prepare for industry-recognized certifications and entry-level information and communication technology careers in virtually every industrydeveloping foundational technical skills while acquiring vital 21st-century career skills in problem solving, collaboration, and critical thinking. Cisco Networking Academy uses a public-private partnership model to create the world's largest classroom.

    15 in stock

    £31.39

  • Introduction to Networks Companion Guide CCNAv7

    Pearson Education (US) Introduction to Networks Companion Guide CCNAv7

    15 in stock

    Book SynopsisCisco Networking Academy teaches hundreds of thousands of students annually the skills needed to build, design, and maintain networks, improving their career prospects while filling the global demand for networking professionals. With 10,000 academies in 165 countries, it helps individuals prepare for industry-recognized certifications and entry-level information and communication technology careers in virtually every industrydeveloping foundational technical skills while acquiring vital 21st-century career skills in problem solving, collaboration, and critical thinking. Cisco Networking Academy uses a public-private partnership model to create the world's largest classroom.

    15 in stock

    £63.94

  • Switching Routing and Wireless Essentials Labs

    Pearson Education (US) Switching Routing and Wireless Essentials Labs

    15 in stock

    Book SynopsisCisco Networking Academy is an innovative Cisco education initiative that delivers information and communication technology skills to improve career and economic opportunities around the world. The Academy provides online courses, interactive tools, and lab activities to prepare individuals for information technology and networking careers in virtually every industry. Contributing Author: Allan Johnson entered the academic world in 1999, after 10 years as a business owner/operator, to dedicate his efforts to his passion for teaching. He holds both an M.B.A. and an M.Ed. in training and development. He taught CCNA courses at the high school level for 7 years and has taught both CCNA and CCNP courses at Del Mar College in Corpus Christi, Texas. In 2003, Allan began to commit much of his time and energy to the CCNA Instructional Support Team, providing services to Networking Academy instructors worldwide and creating training materials. He now works full Table of Contents Introduction xxvii Chapter 1 Basic Device Configuration 1 Study Guide 2 Configure a Switch with Initial Settings 2 Configure Switch Ports 6 Network Access Layer Issues 8 Secure Remote Access 9 Basic Router Configuration 12 Verify Directly Connected Networks 15 Labs and Activities 21 Command Reference 21 1.1.7 Lab—Basic Switch Configuration 22 1.3.6 Packet Tracer—Configure SSH 36 1.4.7 Packet Tracer—Configure Router Interfaces 38 1.5.10 Packet Tracer—Verify Directly Connected Networks 39 1.6.1 Packet Tracer—Implement a Small Network 42 1.6.2 Lab—Configure Basic Router Settings 45 Chapter 2 Switching Concepts 53 Study Guide 54 Frame Forwarding 54 Switching Domains 57 Labs and Activities 59 Chapter 3 VLANs 61 Study Guide 62 Overview of VLANs 62 VLANs in a Multi-Switched Environment 64 VLAN Configuration 69 Packet Tracer 3-1: VLAN Creation and Port Assignment 70 VLAN Trunks 72 Dynamic Trunking Protocol 74 Labs and Activities 78 Command Reference 78 3.1.4 Packet Tracer—Who Hears the Broadcast? 79 3.2.8 Packet Tracer—Investigate a VLAN Implementation 81 3.3.12 Packet Tracer—VLAN Configuration 84 3.4.5 Packet Tracer—Configure Trunks 87 3.4.6 Lab—Configure VLANs and Trunking 89 3.5.5 Packet Tracer—Configure DTP 98 3.6.1 Packet Tracer—Implement VLANs and Trunking 103 3.6.2 Lab—Implement VLANs and Trunking 105 Chapter 4 Inter-VLAN Routing 109 Study Guide 110 Inter-VLAN Routing Operation 110 Router-on-a-Stick Inter-VLAN Routing 112 Inter-VLAN Routing Using Layer 3 Switches 114 Troubleshoot Inter-VLAN Routing 116 Labs and Activities 122 Command Reference 122 4.2.7 Packet Tracer—Configure Router-on-a-Stick Inter-VLAN Routing 122 4.2.8 Lab—Configure Router-on-a-Stick Inter-VLAN Routing 125 4.3.8 Packet Tracer—Configure Layer 3 Switching and Inter-VLAN Routing 131 4.4.8 Packet Tracer—Troubleshoot Inter-VLAN Routing 136 4.4.9 Lab—Troubleshoot Inter-VLAN Routing 138 4.5.1 Packet Tracer—Inter-VLAN Routing Challenge 141 4.5.2 Lab—Implement Inter-VLAN Routing 142 Chapter 5 STP Concepts 147 Study Guide 148 Purpose of STP 148 STP Operation 149 Evolution of STP 155 Labs and Activities 158 Command Reference 158 5.1.9 Packet Tracer—Investigate STP Loop Prevention 158 Chapter 6 EtherChannel 161 Study Guide 162 EtherChannel Operation 162 Configure EtherChannel 165 Verify and Troubleshoot EtherChannel 166 Labs and Activities 171 Command Reference 171 6.2.4 Packet Tracer—Configure EtherChannel 171 6.3.4 Packet Tracer—Troubleshoot EtherChannel 177 6.4.1 Packet Tracer—Implement EtherChannel 179 6.4.2 Lab—Implement EtherChannel 181 Chapter 7 DHCPv4 185 Study Guide 186 DHCPv4 Concepts 186 Configure a Cisco IOS DHCPv4 Server 187 Configure a DHCPv4 Client 190 Labs and Activities 191 Command Reference 191 7.2.10 Packet Tracer—Configure DHCPv4 191 7.4.1 Packet Tracer—Implement DHCPv4 194 7.4.2 Lab—Implement DHCPv4 196 Chapter 8 SLAAC and DHCPv6 203 Study Guide 204 IPv6 GUA Assignment 204 SLAAC 205 DHCPv6 207 Configure DHCPv6 Server 209 Labs and Activities 213 Command Reference 213 8.5.1 Lab—Configure DHCPv6 213 Chapter 9 FHRP Concepts 221 Study Guide 222 First Hop Redundancy Protocols 222 HSRP 224 Labs and Activities 227 Command Reference 227 9.3.3 Packet Tracer—HSRP Configuration Guide 227 Chapter 10 LAN Security Concepts 233 Study Guide 234 Endpoint Security 234 Access Control 235 Layer 2 Security Threats 237 MAC Address Table Attack 239 LAN Attacks 240 Labs and Activities 243 Chapter 11 Switch Security Configuration 245 Study Guide 246 Implement Port Security 246 Mitigate VLAN Attacks 249 Mitigate DHCP Attacks 249 Mitigate ARP Attacks 251 Mitigate STP Attacks 251 Labs and Activities 253 Command Reference 253 11.1.10 Packet Tracer—Implement Port Security 254 11.6.1 Packet Tracer—Switch Security Configuration 256 11.6.2 Lab—Switch Security Configuration 258 Chapter 12 WLAN Concepts 267 Study Guide 268 Introduction to Wireless 268 WLAN Components 269 WLAN Operation 271 CAPWAP Operation 273 Channel Management 275 WLAN Threats 277 Secure WLANs 278 Labs and Activities 281 Chapter 13 WLAN Configuration 283 Study Guide 284 Remote Site WLAN Configuration 284 Configure a Basic WLAN on the WLC 286 Configure a WPA2 Enterprise WLAN on the WLC 291 Troubleshoot WLAN Issues 299 Labs and Activities 302 13.1.10 Packet Tracer—Configure a Wireless Network 302 13.1.11 Lab—Configure a Wireless Network 307 13.2.7 Packet Tracer—Configure a Basic WLAN on the WLC 312 13.3.12 Packet Tracer—Configure a WPA2 Enterprise WLAN on the WLC 316 13.4.5 Packet Tracer—Troubleshoot WLAN Issues 322 13.5.1 Packet Tracer—WLAN Configuration 324 Chapter 14 Routing Concepts 329 Study Guide 330 Path Determination 330 Packet Forwarding 332 Basic Router Configuration Review 336 IP Routing Table 341 Static and Dynamic Routing 343 Labs and Activities 346 Command Reference 346 14.3.5 Packet Tracer—Basic Router Configuration Review 347 Chapter 15 IP Static Routing 353 Study Guide 354 Static Routes 354 Configure IP Static Route Types 356 Labs and Activities 361 Command Reference 361 15.6.1 Packet Tracer—Configure IPv4 and IPv6 Static and Default Routes 362 15.6.2 Lab—Configure IPv4 and IPv6 Static and Default Routes 365 Chapter 16 Troubleshoot Static and Default Routes 371 Study Guide 372 Packet Processing with Static Routes 372 Troubleshoot IPv4 Static and Default Route Configuration 373 Labs and Activities 374 16.3.1 Packet Tracer—Troubleshoot Static and Default Routes 374 16.3.2 Lab—Troubleshoot IPv4 and IPv6 Static and Default Routers 376 TOC, 9780136634386, 7/14/2020

    15 in stock

    £45.24

  • Enterprise Networking Security and Automation

    Pearson Education (US) Enterprise Networking Security and Automation

    Out of stock

    Book SynopsisCisco Networking Academy teaches hundreds of thousands of students annually the skills needed to build, design, and maintain networks, improving their career prospects while filling the global demand for networking professionals. With 10,000 academies in 165 countries, it helps individuals prepare for industry-recognized certifications and entry-level information and communication technology careers in virtually every industrydeveloping foundational technical skills while acquiring vital 21st-century career skills in problem solving, collaboration, and critical thinking. Cisco Networking Academy uses a public-private partnership model to create the world's largest classroom.Table of ContentsIntroduction xxx Chapter 1 Single-Area OSPFv2 Concepts 1 Introduction - 1.0 1 Why should I take this module? - 1.0.1 1 What will I learn to do in this module? - 1.0.2 1 OSPF Features and Characteristics - 1.1 1 Introduction to OSPF - 1.1.1 1 Components of OSPF - 1.1.2 2 Link-State Operation - 1.1.3 3 Single-Area and Multiarea OSPF - 1.1.4 4 Multiarea OSPF - 1.1.5 4 OSPFv3 - 1.1.6 5 Check Your Understanding - OSPF Features and Characteristics - 1.1.7 6 OSPF Packets - 1.2 6 Video - OSPF Packets - 1.2.1 6 Types of OSPF Packets - 1.2.2 6 Link-State Updates - 1.2.3 7 Hello Packet - 1.2.4 7 Check Your Understanding - OSPF Packets - 1.2.5 7 OSPF Operation - 1.3 7 Video - OSPF Operation - 1.3.1 7 OSPF Operational States - 1.3.2 7 Establish Neighbor Adjacencies - 1.3.3 8 Synchronizing OSPF Databases - 1.3.4 9 The Need for a DR - 1.3.5 10 LSA Flooding With a DR - 1.3.6 11 Check Your Understanding - OPSF Operation - 1.3.7 11 Module Practice and Quiz - 1.4 11 What did I learn in this module? - 1.4.1 11 Chapter Quiz - Single-Area OSPFv2 Concepts 14 Your Chapter Notes 14 Chapter 2 Single-Area OSPFv2 Configuration 15 Introduction - 2.0 15 Why should I take this module? - 2.0.1 15 What will I learn to do in this module? - 2.0.2 15 OSPF Router ID - 2.1 15 OSPF Reference Topology - 2.1.1 15 Router Configuration Mode for OSPF - 2.1.2 16 Router IDs - 2.1.3 16 Router ID Order of Precedence - 2.1.4 17 Configure a Loopback Interface as the Router ID - 2.1.5 17 Explicitly Configure a Router ID - 2.1.6 18 Modify a Router ID - 2.1.7 18 Syntax Checker - Configure R2 and R3 Router IDs - 2.1.8 19 Check Your Understanding - OSPF Router ID - 2.1.9 19 Point-to-Point OSPF Networks - 2.2 20 The network Command Syntax - 2.2.1 20 The Wildcard Mask - 2.2.2 20 Check Your Understanding - The Wildcard Masks - 2.2.3 20 Configure OSPF Using the network Command - 2.2.4 20 Syntax Checker - Configure R2 and R3 Using the network Command - 2.2.5 21 Configure OSPF Using the ip ospf Command - 2.2.6 21 Syntax Checker - Configure R2 and R3 Using the ip ospf Command - 2.2.7 22 Passive Interface - 2.2.8 22 Configure Passive Interfaces - 2.2.9 23 Syntax Checker - Configure R2 and R3 Passive Interfaces - 2.2.10 24 OSPF Point-to-Point Networks - 2.2.11 24 Loopbacks and Point-to-Point Networks - 2.2.12 26 Packet Tracer - Point-to-Point Single-Area OSPFv2 Configuration - 2.2.13 26 Multiaccess OSPF Networks - 2.3 27 OSPF Network Types - 2.3.1 27 OSPF Designated Router - 2.3.2 27 OSPF Multiaccess Reference Topology - 2.3.3 27 Verify OSPF Router Roles - 2.3.4 28 Verify DR/BDR Adjacencies - 2.3.5 30 Default DR/BDR Election Process - 2.3.6 32 DR Failure and Recovery - 2.3.7 33 The ip ospf priority Command - 2.3.8 33 Configure OSPF Priority - 2.3.9 34 Syntax Checker - Configure OSPF Priority - 2.3.10 35 Packet Tracer - Determine the DR and BDR - 2.3.11 35 Modify Single-Area OSPFv2 - 2.4 36 Cisco OSPF Cost Metric - 2.4.1 36 Adjust the Reference Bandwidth - 2.4.2 36 OSPF Accumulates Costs - 2.4.3 38 Manually Set OSPF Cost Value - 2.4.4 38 Test Failover to Backup Route - 2.4.5 39 Syntax Checker - Modify the Cost Values for R2 and R3 - 2.4.6 40 Hello Packet Intervals - 2.4.7 40 Verify Hello and Dead Intervals - 2.4.8 40 Modify OSPFv2 Intervals - 2.4.9 42 Syntax Checker - Modifying Hello and Dead Intervals on R3 - 2.4.10 43 Packet Tracer - Modify Single-Area OSPFv2 - 2.4.11 43 Default Route Propagation - 2.5 43 Propagate a Default Static Route in OSPFv2 - 2.5.1 43 Verify the Propagated Default Route - 2.5.2 44 Packet Tracer - Propagate a Default Route in OSPFv2 - 2.5.3 46 Verify Single-Area OSPFv2 - 2.6 46 Verify OSPF Neighbors - 2.6.1 46 Verify OSPF Protocol Settings - 2.6.2 48 Verify OSPF Process Information - 2.6.3 48 Verify OSPF Interface Settings - 2.6.4 50 Syntax Checker - Verify Single-Area OSPFv2 - 2.6.5 51 Packet Tracer - Verify Single-Area OSPFv2 - 2.6.6 51 Module Practice and Quiz - 2.7 51 Packet Tracer - Single-Area OSPFv2 Configuration - 2.7.1 51 Lab - Single-Area OSPFv2 Configuration - 2.7.2 51 What did I learn in this module? - 2.7.3 52 Chapter Quiz - Single-Area OSPFv2 Configuration 56 Your Chapter Notes 56 Chapter 3 Network Security Concepts 57 Introduction - 3.0 57 Why should I take this module? - 3.0.1 57 What will I learn in this module? - 3.0.2 57 Ethical Hacking Statement - 3.0.3 57 Current State of Cybersecurity - 3.1 58 Current State of Affairs - 3.1.1 58 Vectors of Network Attacks - 3.1.2 58 Data Loss - 3.1.3 59 Check Your Understanding - Current State of Cybersecurity - 3.1.4 60 Threat Actors - 3.2 60 The Hacker - 3.2.1 60 Evolution of Hackers - 3.2.2 61 Cyber Criminals - 3.2.3 61 Hacktivists - 3.2.4 61 State-Sponsored Hackers - 3.2.5 61 Check Your Understanding - Threat Actors - 3.2.6 62 Threat Actor Tools - 3.3 62 Video - Threat Actor Tools - 3.3.1 62 Introduction to Attack Tools - 3.3.2 62 Evolution of Security Tools - 3.3.3 62 Attack Types - 3.3.4 63 Check Your Understanding - Threat Actor Tools - 3.3.5 64 Malware - 3.4 64 Overview of Malware - 3.4.1 64 Viruses and Trojan Horses - 3.4.2 64 Other Types of Malware - 3.4.3 65 Check Your Understanding - Malware - 3.4.4 66 Common Network Attacks - 3.5 66 Overview of Network Attacks - 3.5.1 66 Video - Reconnaissance Attacks - 3.5.2 67 Reconnaissance Attacks - 3.5.3 67 Video - Access and Social Engineering Attacks - 3.5.4 68 Access Attacks - 3.5.5 68 Social Engineering Attacks - 3.5.6 69 Lab - Social Engineering - 3.5.7 70 Video - Denial of Service Attacks - 3.5.8 70 DoS and DDoS Attacks - 3.5.9 70 Check Your Understanding - Common Network Attacks - 3.5.10 71 IP Vulnerabilities and Threats - 3.6 71 Video - Common IP and ICMP Attacks - 3.6.1 71 IPv4 and IPv6 - 3.6.2 71 ICMP Attacks - 3.6.3 71 Video - Amplification, Reflection, and Spoofing Attacks - 3.6.4 72 Amplification and Reflection Attacks - 3.6.5 72 Address Spoofing Attacks - 3.6.6 72 Check Your Understanding - IP Vulnerabilities and Threats - 3.6.7 73 TCP and UDP Vulnerabilities - 3.7 73 TCP Segment Header - 3.7.1 73 TCP Services - 3.7.2 73 TCP Attacks - 3.7.3 74 UDP Segment Header and Operation - 3.7.4 74 UDP Attacks - 3.7.5 75 Check Your Understanding - TCP and UDP Vulnerabilities - 3.7.6 75 IP Services - 3.8 75 ARP Vulnerabilities - 3.8.1 75 ARP Cache Poisoning - 3.8.2 76 Video - ARP Spoofing - 3.8.3 76 DNS Attacks - 3.8.4 76 DNS Tunneling - 3.8.5 78 DHCP - 3.8.6 78 DHCP Attacks - 3.8.7 78 Lab - Explore DNS Traffic - 3.8.8 79 Network Security Best Practices - 3.9 80 Confidentiality, Integrity, and Availability - 3.9.1 80 The Defense-in-Depth Approach - 3.9.2 80 Firewalls - 3.9.3 80 IPS - 3.9.4 81 Content Security Appliances - 3.9.5 81 Check Your Understanding - Network Security Best Practices - 3.9.6 82 Cryptography - 3.10 82 Video - Cryptography - 3.10.1 82 Securing Communications - 3.10.2 82 Data Integrity - 3.10.3 83 Hash Functions - 3.10.4 83 Origin Authentication - 3.10.5 84 Data Confidentiality - 3.10.6 85 Symmetric Encryption - 3.10.7 85 Asymmetric Encryption - 3.10.8 86 Diffie-Hellman - 3.10.9 87 Check Your Understanding - Cryptography - 3.10.10 88 Module Practice and Quiz - 3.11 88 What did I learn in this module? - 3.11.1 88 Chapter Quiz - Network Security Concepts 91 Your Chapter Notes 91 Chapter 4 ACL Concepts 93 Introduction - 4.0 93 Why should I take this module? - 4.0.1 93 What will I learn to do in this module? - 4.0.2 93 Purpose of ACLs - 4.1 93 What is an ACL? - 4.1.1 93 Packet Filtering - 4.1.2 95 ACL Operation - 4.1.3 95 Packet Tracer - ACL Demonstration - 4.1.4 96 Check Your Understanding - Purpose of ACLs - 4.1.5 96 Wildcard Masks in ACLs - 4.2 96 Wildcard Mask Overview - 4.2.1 96 Wildcard Mask Types - 4.2.2 97 Wildcard Mask Calculation - 4.2.3 97 Wildcard Mask Keywords - 4.2.4 98 Check Your Understanding - Wildcard Masks in ACLs - 4.2.5 99 Guidelines for ACL Creation - 4.3 99 Limited Number of ACLs per Interface - 4.3.1 99 ACL Best Practices - 4.3.2 99 Check Your Understanding - Guidelines for ACL Creation - 4.3.3 100 Types of IPv4 ACLs - 4.4 100 Standard and Extended ACLs - 4.4.1 100 Numbered and Named ACLs - 4.4.2 101 Where to Place ACLs - 4.4.3 102 Standard ACL Placement Example - 4.4.4 102 Extended ACL Placement Example - 4.4.5 103 Check Your Understanding - Guidelines for ACL Placement - 4.4.6 103 Module Practice and Quiz - 4.5 103 What did I learn in this module? - 4.5.1 103 Chapter Quiz - ACL Concepts 106 Your Chapter Notes 106 Chapter 5 ACLs for IPv4 Configuration 107 Introduction - 5.0 107 Why should I take this module? - 5.0.1 107 What will I learn to do in this module? - 5.0.2 107 Configure Standard IPv4 ACLs - 5.1 107 Create an ACL - 5.1.1 107 Numbered Standard IPv4 ACL Syntax - 5.1.2 108 Named Standard IPv4 ACL Syntax - 5.1.3 109 Apply a Standard IPv4 ACL - 5.1.4 109 Numbered Standard IPv4 ACL Example - 5.1.5 110 Named Standard IPv4 ACL Example - 5.1.6 111 Syntax Check - Configure Standard IPv4 ACLs - 5.1.7 112 Packet Tracer - Configure Numbered Standard IPv4 ACLs - 5.1.8 113 Packet Tracer - Configure Named Standard IPv4 ACLs - 5.1.9 113 Modify IPv4 ACLs - 5.2 113 Two Methods to Modify an ACL - 5.2.1 113 Text Editor Method - 5.2.2 113 Sequence Numbers Method - 5.2.3 114 Modify a Named ACL Example - 5.2.4 115 ACL Statistics - 5.2.5 116 Syntax Checker - Modify IPv4 ACLs - 5.2.6 116 Packet Tracer - Configure and Modify Standard IPv4 ACLs - 5.2.7 116 Secure VTY Ports with a Standard IPv4 ACL - 5.3 116 The access-class Command - 5.3.1 116 Secure VTY Access Example - 5.3.2 117 Verify the VTY Port is Secured - 5.3.3 118 Syntax Checker - Secure the VTY Ports - 5.3.4 118 Configure Extended IPv4 ACLs - 5.4 119 Extended ACLs - 5.4.1 119 Numbered Extended IPv4 ACL Syntax - 5.4.2 119 Protocols and Ports - 5.4.3 120 Protocols and Port Numbers Configuration Examples - 5.4.4 123 Apply a Numbered Extended IPv4 ACL - 5.4.5 123 TCP Established Extended ACL - 5.4.6 123 Named Extended IPv4 ACL Syntax - 5.4.7 124 Named Extended IPv4 ACL Example - 5.4.8 125 Edit Extended ACLs - 5.4.9 126 Another Named Extended IPv4 ACL Example - 5.4.10 127 Verify Extended ACLs - 5.4.11 128 Packet Tracer - Configure Extended IPv4 ACLs - Scenario 1 - 5.4.12 130 Packet Tracer - Configure Extended IPv4 ACLs - Scenario 2 - 5.4.13 130 Module Practice and Quiz - 5.5 130 Packet Tracer - IPv4 ACL Implementation Challenge - 5.5.1 130 Lab - Configure and Verify Extended IPv4 ACLs - 5.5.2 131 What did I learn in this module? - 5.5.3 131 Chapter Quiz - ACLs for IPv4 Implementation 133 Your Chapter Notes 133 Chapter 6 NAT for IPv4 135 Introduction - 6.0 135 Why should I take this module? - 6.0.1 135 What will I learn to do in this module? - 6.0.2 135 NAT Characteristics - 6.1 135 IPv4 Private Address Space - 6.1.1 135 What is NAT - 6.1.2 136 How NAT Works - 6.1.3 137 NAT Terminology - 6.1.4 137 Check Your Understanding - NAT Characteristics - 6.1.5 138 Types of NAT - 6.2 139 Static NAT - 6.2.1 139 Dynamic NAT - 6.2.2 139 Port Address Translation - 6.2.3 139 Next Available Port - 6.2.4 140 NAT and PAT Comparison - 6.2.5 140 Packets without a Layer 4 Segment - 6.2.6 141 Packet Tracer - Investigate NAT Operations - 6.2.7 141 NAT Advantages and Disadvantages - 6.3 142 Advantages of NAT - 6.3.1 142 Disadvantages of NAT - 6.3.2 142 Check Your Understanding - NAT Advantages and Disadvantages - 6.3.3 143 Static NAT - 6.4 143 Static NAT Scenario - 6.4.1 143 Configure Static NAT - 6.4.2 143 Analyze Static NAT - 6.4.3 144 Verify Static NAT - 6.4.4 144 Packet Tracer - Configure Static NAT - 6.4.5 145 Dynamic NAT - 6.5 146 Dynamic NAT Scenario - 6.5.1 146 Configure Dynamic NAT - 6.5.2 146 Analyze Dynamic NAT - Inside to Outside - 6.5.3 147 Analyze Dynamic NAT - Outside to Inside - 6.5.4 147 Verify Dynamic NAT - 6.5.5 148 Packet Tracer - Configure Dynamic NAT - 6.5.6 150 PAT - 6.6 150 PAT Scenario - 6.6.1 150 Configure PAT to Use a Single IPv4 Address - 6.6.2 150 Configure PAT to Use an Address Pool - 6.6.3 151 Analyze PAT - PC to Server - 6.6.4 151 Analyze PAT - Server to PC - 6.6.5 151 Verify PAT - 6.6.6 151 Packet Tracer - Configure PAT - 6.6.7 152 NAT64 - 6.7 153 NAT for IPv6? - 6.7.1 153 NAT64 - 6.7.2 153 Module Practice and Quiz - 6.8 153 Packet Tracer - Configure NAT for IPv4 - 6.8.1 153 Lab - Configure NAT for IPv4 - 6.8.2 154 What did I learn in this module? - 6.8.3 154 Chapter Quiz - NAT for IPv4 158 Your Chapter Notes 158 Chapter 7 WAN Concepts 159 Introduction - 7.0 159 Why should I take this module? - 7.0.1 159 What will I learn to do in this module? - 7.0.2 159 Purpose of WANs - 7.1 159 LANs and WANs - 7.1.1 159 Private and Public WANs - 7.1.2 160 WAN Topologies - 7.1.3 160 Carrier Connections - 7.1.4 162 Evolving Networks - 7.1.5 162 Check Your Understanding - Purpose of WANs - 7.1.6 164 WAN Operations - 7.2 164 WAN Standards - 7.2.1 164 WANs in the OSI Model - 7.2.2 164 Common WAN Terminology - 7.2.3 165 WAN Devices - 7.2.4 166 Serial Communication - 7.2.5 167 Circuit-Switched Communication - 7.2.6 168 Packet-Switched Communications - 7.2.7 168 SDH, SONET, and DWDM - 7.2.8 169 Check Your Understanding - WAN Operations - 7.2.9 169 Traditional WAN Connectivity - 7.3 169 Traditional WAN Connectivity Options - 7.3.1 169 Common WAN Terminology - 7.3.2 169 Circuit-Switched Options - 7.3.3 170 Packet-Switched Options - 7.3.4 171 Check Your Understanding - Traditional WAN Connectivity - 7.3.5 172 Modern WAN Connectivity - 7.4 172 Modern WANs - 7.4.1 172 Modern WAN Connectivity Options - 7.4.2 172 Ethernet WAN - 7.4.3 173 MPLS - 7.4.4 174 Check Your Understanding - Modern WAN Connectivity - 7.4.5 174 Internet-Based Connectivity - 7.5 174 Internet-Based Connectivity Options - 7.5.1 174 DSL Technology - 7.5.2 175 DSL Connections - 7.5.3 175 DSL and PPP - 7.5.4 176 Cable Technology - 7.5.5 176 Optical Fiber - 7.5.6 177 Wireless Internet-Based Broadband - 7.5.7 177 VPN Technology - 7.5.8 179 ISP Connectivity Options - 7.5.9 179 Broadband Solution Comparison - 7.5.10 180 Lab - Research Broadband Internet Access Options - 7.5.11 181 Module Practice and Quiz - 7.6 181 Packet Tracer - WAN Concepts - 7.6.1 181 What did I learn in this module? - 7.6.2 181 Chapter Quiz - WAN Concepts 184 Your Chapter Notes 184 Chapter 8 VPN and IPsec Concepts 185 Introduction - 8.0 185 Why should I take this module? - 8.0.1 185 What will I learn in this module? - 8.0.2 185 VPN Technology - 8.1 185 Virtual Private Networks - 8.1.1 185 VPN Benefits - 8.1.2 186 Site-to-Site and Remote-Access VPNs - 8.1.3 186 Enterprise and Service Provider VPNs - 8.1.4 186 Check Your Understanding - VPN Technology - 8.1.5 187 Types of VPNs - 8.2 187 Remote-Access VPNs - 8.2.1 187 SSL VPNs - 8.2.2 187 Site-to-Site IPsec VPNs - 8.2.3 188 GRE over IPsec - 8.2.4 188 Dynamic Multipoint VPNs - 8.2.5 189 IPsec Virtual Tunnel Interface - 8.2.6 189 Service Provider MPLS VPNs - 8.2.7 190 Check Your Understanding - Types of VPNs - 8.2.8 190 IPsec - 8.3 190 Video - IPsec Concepts - 8.3.1 190 IPsec Technologies - 8.3.2 190 IPsec Protocol Encapsulation - 8.3.3 191 Confidentiality - 8.3.4 192 Integrity - 8.3.5 192 Authentication - 8.3.6 192 Secure Key Exchange with Diffie-Hellman - 8.3.7 193 Video - IPsec Transport and Tunnel Mode - 8.3.8 193 Check Your Understanding - IPsec - 8.3.9 193 Module Practice and Quiz - 8.4 193 What did I learn in this module? - 8.4.1 193 Chapter Quiz - VPN and IPsec Concepts 195 Your Chapter Notes 195 Chapter 9 QoS Concepts 197 Introduction - 9.0 197 Why should I take this module? - 9.0.1 197 What will I learn to do in this module? - 9.0.2 197 Network Transmission Quality - 9.1 197 Video Tutorial - The Purpose of QoS - 9.1.1 197 Prioritizing Traffic - 9.1.2 197 Bandwidth, Congestion, Delay, and Jitter - 9.1.3 198 Packet Loss - 9.1.4 199 Check Your Understanding - Network Transmission Quality - 9.1.5 199 Traffic Characteristics - 9.2 199 Video Tutorial - Traffic Characteristics - 9.2.1 199 Network Traffic Trends - 9.2.2 199 Voice - 9.2.3 200 Video - 9.2.4 200 Data - 9.2.5 201 Check Your Understanding - Traffic Characteristics - 9.2.6 202 Queuing Algorithms - 9.3 202 Video Tutorial - QoS Algorithms - 9.3.1 202 Queuing Overview - 9.3.2 202 First In First Out - 9.3.3 202 Weighted Fair Queuing (WFQ) - 9.3.4 203 Class-Based Weighted Fair Queuing (CBWFQ) - 9.3.5 203 Low Latency Queuing (LLQ) - 9.3.6 204 Check Your Understanding - Queuing Algorithms - 9.3.7 204 QoS Models - 9.4 204 Video Tutorial - QoS Models - 9.4.1 204 Selecting an Appropriate QoS Policy Model - 9.4.2 204 Best Effort - 9.4.3 205 Integrated Services - 9.4.4 206 Differentiated Services - 9.4.5 206 Check Your Understanding - QoS Models - 9.4.6 208 QoS Implementation Techniques - 9.5 208 Video Tutorial - QoS Implementation Techniques - 9.5.1 208 Avoiding Packet Loss - 9.5.2 208 QoS Tools - 9.5.3 208 Classification and Marking - 9.5.4 209 Marking at Layer 2 - 9.5.5 210 Marking at Layer 3 - 9.5.6 210 Type of Service and Traffic Class Field - 9.5.7 211 DSCP Values - 9.5.8 211 Class Selector Bits - 9.5.9 211 Trust Boundaries - 9.5.10 211 Congestion Avoidance - 9.5.11 212 Shaping and Policing - 9.5.12 212 QoS Policy Guidelines - 9.5.13 213 Check Your Understanding - QoS Implementation Techniques - 9.5.14 213 Module Practice and Quiz - 9.6 213 What did I learn in this module? - 9.6.1 213 Chapter Quiz - QoS Concepts 216 Your Chapter Notes 216 Chapter 10 Network Management 217 Introduction - 10.0 217 Why should I take this module? - 10.0.1 217 What will I learn to do in this module? - 10.0.2 217 Device Discovery with CDP - 10.1 217 CDP Overview - 10.1.1 217 Configure and Verify CDP - 10.1.2 218 Discover Devices by Using CDP - 10.1.3 220 Syntax Checker - Configure and Verify CDP - 10.1.4 222 Packet Tracer - Use CDP to Map a Network - 10.1.5 222 Device Discovery with LLDP - 10.2 222 LLDP Overview - 10.2.1 222 Configure and Verify LLDP - 10.2.2 222 Discover Devices by Using LLDP - 10.2.3 223 Syntax Checker - Configure and Verify LLDP - 10.2.4 225 Check Your Understanding - Compare CDP and LLDP - 10.2.5 225 Packet Tracer - Use LLDP to Map a Network - 10.2.6 225 NTP - 10.3 225 Time and Calendar Services - 10.3.1 225 NTP Operation - 10.3.2 226 Configure and Verify NTP - 10.3.3 227 Packet Tracer - Configure and Verify NTP - 10.3.4 229 SNMP - 10.4 229 Introduction to SNMP - 10.4.1 229 SNMP Operation - 10.4.2 230 SNMP Agent Traps - 10.4.3 230 SNMP Versions - 10.4.4 231 Check Your Understanding - SNMP Versions - 10.4.5 232 Community Strings - 10.4.6 232 MIB Object ID - 10.4.7 233 SNMP Polling Scenario - 10.4.8 233 SNMP Object Navigator - 10.4.9 233 Lab - Research Network Monitoring Software - 10.4.10 234 Syslog - 10.5 234 Introduction to Syslog - 10.5.1 234 Syslog Operation - 10.5.2 234 Syslog Message Format - 10.5.3 235 Syslog Facilities - 10.5.4 236 Configure Syslog Timestamp - 10.5.5 236 Check Your Understanding - Syslog Operation - 10.5.6 237 Router and Switch File Maintenance - 10.6 237 Router File Systems - 10.6.1 237 Switch File Systems - 10.6.2 240 Use a Text File to Back Up a Configuration - 10.6.3 241 Use a Text File to Restore a Configuration - 10.6.4 241 Use TFTP to Back Up and Restore a Configuration - 10.6.5 242 USB Ports on a Cisco Router - 10.6.6 242 Use USB to Back Up and Restore a Configuration - 10.6.7 243 Password Recovery Procedures - 10.6.8 245 Password Recovery Example - 10.6.9 245 Packet Tracer - Back Up Configuration Files - 10.6.10 247 Lab - Use Tera Term to Manage Router Configuration Files - 10.6.11 248 Lab - Use TFTP, Flash, and USB to Manage Configuration Files - 10.6.12 248 Lab - Research Password Recovery Procedures - 10.6.13 248 IOS Image Management - 10.7 248 Video - Managing Cisco IOS Images - 10.7.1 248 TFTP Servers as a Backup Location - 10.7.2 248 Backup IOS Image to TFTP Server Example - 10.7.3 249 Copy an IOS Image to a Device Example - 10.7.4 250 The boot system Command - 10.7.5 251 Packet Tracer - Use a TFTP Server to Upgrade a Cisco IOS Image - 10.7.6 252 Module Practice and Quiz - 10.8 253 Packet Tracer - Configure CDP, LLDP, and NTP - 10.8.1 253 Lab - Configure CDP, LLDP, and NTP - 10.8.2 253 What did I learn in this module? - 10.8.3 253 Chapter Quiz - Network Management 257 Your Chapter Notes 257 Chapter 11 Network Design 259 Introduction - 11.0 259 Why should I take this module? - 11.0.1 259 What will I learn to do in this module? - 11.0.2 259 Hierarchical Networks - 11.1 259 Video - Three-Layer Network Design - 11.1.1 259 The Need to Scale the Network - 11.1.2 259 Borderless Switched Networks - 11.1.3 260 Hierarchy in the Borderless Switched Network - 11.1.4 261 Access, Distribution, and Core Layer Functions - 11.1.5 262 Three-Tier and Two-Tier Examples - 11.1.6 262 Role of Switched Networks - 11.1.7 263 Check Your Understanding - Hierarchical Networks - 11.1.8 263 Scalable Networks - 11.2 263 Design for Scalability - 11.2.1 263 Plan for Redundancy - 11.2.2 264 Reduce Failure Domain Size - 11.2.3 265 Increase Bandwidth - 11.2.4 265 Expand the Access Layer - 11.2.5 266 Tune Routing Protocols - 11.2.6 266 Check Your Understanding - Scalable Networks - 11.2.7 266 Switch Hardware - 11.3 266 Switch Platforms - 11.3.1 266 Switch Form Factors - 11.3.2 267 Port Density - 11.3.3 268 Forwarding Rates - 11.3.4 268 Power over Ethernet - 11.3.5 269 Multilayer Switching - 11.3.6 269 Business Considerations for Switch Selection - 11.3.7 270 Check Your Understanding - Switch Hardware - 11.3.8 270 Router Hardware - 11.4 270 Router Requirements - 11.4.1 270 Cisco Routers - 11.4.2 271 Router Form Factors - 11.4.3 271 Check Your Understanding - Router Hardware - 11.4.4 272 Module Practice and Quiz - 11.5 272 Packet Tracer - Compare Layer 2 and Layer 3 Devices - 11.5.1 272 What did I learn in this module? - 11.5.2 273 Chapter Quiz - Network Design 275 Your Chapter Notes 275 Chapter 12 Network Troubleshooting 277 Introduction - 12.0 277 Why should I take this module? - 12.0.1 277 What will I learn to do in this module? - 12.0.2 277 Network Documentation - 12.1 277 Documentation Overview - 12.1.1 277 Network Topology Diagrams - 12.1.2 278 Network Device Documentation - 12.1.3 279 Establish a Network Baseline - 12.1.4 279 Step 1 - Determine What Types of Data to Collect - 12.1.5 280 Step 2 - Identify Devices and Ports of Interest - 12.1.6 280 Step 3 - Determine the Baseline Duration - 12.1.7 280 Data Measurement - 12.1.8 281 Check Your Understanding - Network Documentation - 12.1.9 282 Troubleshooting Process - 12.2 282 General Troubleshooting Procedures - 12.2.1 282 Seven-Step Troubleshooting Process - 12.2.2 282 Question End Users - 12.2.3 284 Gather Information - 12.2.4 285 Troubleshooting with Layered Models - 12.2.5 286 Structured Troubleshooting Methods - 12.2.6 286 Guidelines for Selecting a Troubleshooting Method - 12.2.7 288 Check Your Understanding - Troubleshooting Process - 12.2.8 288 Troubleshooting Tools - 12.3 288 Software Troubleshooting Tools - 12.3.1 288 Protocol Analyzers - 12.3.2 289 Hardware Troubleshooting Tools - 12.3.3 289 Syslog Server as a Troubleshooting Tool - 12.3.4 290 Check Your Understanding - Troubleshooting Tools - 12.3.5 292 Symptoms and Causes of Network Problems - 12.4 292 Physical Layer Troubleshooting - 12.4.1 292 Data Link Layer Troubleshooting - 12.4.2 294 Network Layer Troubleshooting - 12.4.3 295 Transport Layer Troubleshooting - ACLs - 12.4.4 297 Transport Layer Troubleshooting - NAT for IPv4 - 12.4.5 298 Application Layer Troubleshooting - 12.4.6 299 Check Your Understanding - Symptoms and Causes of Network Problems - 12.4.7 300 Troubleshooting IP Connectivity - 12.5 300 Components of Troubleshooting End-to-End Connectivity - 12.5.1 300 End-to-End Connectivity Problem Initiates Troubleshooting - 12.5.2 301 Step 1 - Verify the Physical Layer - 12.5.3 303 Step 2 - Check for Duplex Mismatches - 12.5.4 304 Step 3 - Verify Addressing on the Local Network - 12.5.5 306 Step 4 - Verify Default Gateway - 12.5.7 310 Troubleshoot IPv6 Default Gateway Example - 12.5.8 311 Step 5 - Verify Correct Path - 12.5.9 314 Step 6 - Verify the Transport Layer - 12.5.10 315 Step 7 - Verify ACLs - 12.5.11 317 Step 8 - Verify DNS - 12.5.12 318 Packet Tracer - Troubleshoot Enterprise Networks - 12.5.13 319 Module Practice and Quiz - 12.6 319 Packet Tracer - Troubleshooting Challenge - Document the Network - 12.6.1 319 Packet Tracer - Troubleshooting Challenge - Use Documentation to Solve Issues - 12.6.2 319 What did I learn in this module? - 12.6.3 320 Chapter Quiz - Network Troubleshooting 324 Your Chapter Notes 324 Chapter 13 Network Virtualization 325 Introduction - 13.0 325 Why should I take this module? - 13.0.1 325 What will I learn to do in this module? - 13.0.2 325 Cloud Computing - 13.1 325 Video - Cloud and Virtualization - 13.1.1 325 Cloud Overview - 13.1.2 325 Cloud Services - 13.1.3 326 Cloud Models - 13.1.4 326 Cloud Computing versus Data Center - 13.1.5 327 Check Your Understanding - Cloud Computing - 13.1.6 327 Virtualization - 13.2 327 Cloud Computing and Virtualization - 13.2.1 327 Dedicated Servers - 13.2.2 328 Server Virtualization - 13.2.3 328 Advantages of Virtualization - 13.2.4 328 Abstraction Layers - 13.2.5 329 Type 2 Hypervisors - 13.2.6 330 Check Your Understanding - Virtualization - 13.2.7 330 Virtual Network Infrastructure - 13.3 330 Type 1 Hypervisors - 13.3.1 330 Installing a VM on a Hypervisor - 13.3.2 330 The Complexity of Network Virtualization - 13.3.3 331 Check Your Understanding - Virtual Network Infrastructure - 13.3.4 332 Software-Defined Networking - 13.4 332 Video - Software-Defined Networking - 13.4.1 332 Control Plane and Data Plane - 13.4.2 332 Network Virtualization Technologies - 13.4.3 333 Traditional and SDN Architectures - 13.4.4 334 Check Your Understanding - Software-Defined Networking - 13.4.5 334 Controllers - 13.5 334 SDN Controller and Operations - 13.5.1 334 Video - Cisco ACI - 13.5.2 335 Core Components of ACI - 13.5.3 335 Spine-Leaf Topology - 13.5.4 335 SDN Types - 13.5.5 336 APIC-EM Features - 13.5.6 336 APIC-EM Path Trace - 13.5.7 336 Check Your Understanding - Controllers - 13.5.8 337 Module Practice and Quiz - 13.6 337 Lab - Install Linux in a Virtual Machine and Explore the GUI - 13.6.1 337 What did I learn in this module? - 13.6.2 337 Chapter Quiz - Network Virtualization 341 Your Chapter Notes 341 Chapter 14 Network Automation 343 Introduction - 14.0 343 Why should I take this module? - 14.0.1 343 What will I learn in this module? - 14.0.2 343 Automation Overview - 14.1 343 Video - Automation Everywhere - 14.1.1 343 The Increase in Automation - 14.1.2 344 Thinking Devices - 14.1.3 344 Check Your Understanding - Benefits of Automation - 14.1.4 344 Data Formats - 14.2 344 Video - Data Formats - 14.2.1 344 The Data Formats Concept - 14.2.2 345 Data Format Rules - 14.2.3 345 Compare Data Formats - 14.2.4 346 JSON Data Format - 14.2.5 347 JSON Syntax Rules - 14.2.6 348 YAML Data Format - 14.2.7 349 XML Data Format - 14.2.8 350 Check Your Understanding - Data Formats - 14.2.9 351 APIs - 14.3 351 Video - APIs - 14.3.1 351 The API Concept - 14.3.2 352 An API Example - 14.3.3 352 Open, Internal, and Partner APIs - 14.3.4 352 Types of Web Service APIs - 14.3.5 353 Check Your Understanding - APIs - 14.3.6 354 REST - 14.4 354 Video - REST - 14.4.1 354 REST and RESTful API - 14.4.2 354 RESTful Implementation - 14.4.3 354 URI, URN, and URL - 14.4.4 355 Anatomy of a RESTful Request - 14.4.5 355 RESTful API Applications - 14.4.6 356 Check Your Understanding - REST - 14.4.7 357 Configuration Management Tools - 14.5 357 Video - Configuration Management Tools - 14.5.1 357 Traditional Network Configuration - 14.5.2 358 Network Automation - 14.5.3 358 Configuration Management Tools - 14.5.4 358 Compare Ansible, Chef, Puppet, and SaltStack - 14.5.5 359 Check Your Understanding - Configuration Management - 14.5.6 360 IBN and Cisco DNA Center - 14.6 360 Video - Intent-Based Networking - 14.6.1 360 Intent-Based Networking Overview - 14.6.2 360 Network Infrastructure as Fabric - 14.6.3 360 Cisco Digital Network Architecture (DNA) - 14.6.4 361 Cisco DNA Center - 14.6.5 362 Video - DNA Center Overview and Platform APIs - 14.6.6 362 Video - DNA Center Design and Provision - 14.6.7 363 Video - DNA Center Policy and Assurance - 14.6.8 363 Video - DNA Center Troubleshooting User Connectivity - 14.6.9 363 Check Your Understanding - IBN and Cisco DNA Center - 14.6.10 363 Module Practice and Quiz - 14.7 363 What did I learn in this module? - 14.7.1 363 Chapter Quiz - Network Automation 365 Your Chapter Notes 365 9780136634737 TOC 6/18/2020

    Out of stock

    £30.16

  • Cisco Cybersecurity Operations Fundamentals

    Pearson Education Cisco Cybersecurity Operations Fundamentals

    15 in stock

    Book Synopsis

    15 in stock

    £33.60

  • Exam Ref SC100 Microsoft Cybersecurity Architect

    Pearson Education (US) Exam Ref SC100 Microsoft Cybersecurity Architect

    15 in stock

    Book SynopsisYuri Diogenes, MSC Master of science in cybersecurity intelligence and forensics investigation from UTICA College, currently working on his PhD in Cybersecurity Leadership from Capitol Technology University. Yuri has been working at Microsoft since 2006, and currently he is a Principal PM Manager for the CxE Microsoft Defender for Cloud Team. Yuri has published a total of 29 books, mostly around information security and Microsoft technologies. Yuri is also a Professor at EC-Council University where he teaches at the Bachelor in Cybersecurity Program. Yuri also has an MBA and many IT/Security industry certifications, such as CISSP, MITRE ATT&CK Cyber Threat Intelligence Certified, ECND, ECEH, ECSA, ECHFI, CompTIA Security+, CySA+, Network+, CASP and CyberSec First Responder. You can follow Yuri on Twitter at @ yuridiogenes. Mark Simos is Lead Cybersecurity Architect for Microsoft where he leads the development of cybersecurity reference architTable of ContentsCHAPTER 1 Build an overall security strategy and architecture CHAPTER 2 Design a security operations strategy CHAPTER 3 Design an identity security strategy CHAPTER 4 Design a regulatory compliance strategy CHAPTER 5 Evaluate security posture and recommend technical strategies to manage risk CHAPTER 6 Design a strategy for securing server and client endpoints CHAPTER 7 Design a strategy for securing SaaS, PaaS, and IaaS services CHAPTER 8 Specify security requirements for applications CHAPTER 9 Design a strategy for securing data CHAPTER 10 Microsoft Cybersecurity Reference Architectures and Microsoft cloud security benchmark best practices CHAPTER 11 Recommend a secure methodology by using the Cloud Adoption Framework (CAF) CHAPTER 12 Recommend a ransomware strategy by using Microsoft Security Best Practices

    15 in stock

    £27.19

  • 31 Days Before your Cisco Certified Support

    Pearson Education 31 Days Before your Cisco Certified Support

    1 in stock

    Book SynopsisAllan Johnson entered the academic world in 1999 after 10 years as a business owner/operator to dedicate his efforts to his passion for teaching. He holds both an MBA and an MEd in training and development. He taught CCNA courses at the high school level for seven years and has taught both CCNA and CCNP courses at Del Mar College in Corpus Christi, Texas. In 2003, Allan began to commit much of his time and energy to the CCNA Instructional Support Team, providing services to Networking Academy instructors worldwide and creating training materials. He now splits his time between working as a curriculum lead for Cisco Networking Academy and as an account lead for Unicon (unicon.net) supporting Cisco's educational efforts.

    1 in stock

    £28.49

  • Pearson It Certification McSa 70742 Identity with Windows Server 2016

    Out of stock

    Book Synopsis

    Out of stock

    £152.00

  • CCNA Certification Study Guide

    John Wiley & Sons Inc CCNA Certification Study Guide

    10 in stock

    Book SynopsisCisco expert Todd Lammle prepares you for the NEW Cisco CCNA certification exam! Cisco, the world leader in network technologies, has released the new Cisco Certified Network Associate (CCNA) exam. This consolidated certification exam tests a candidate's ability to implement and administer a wide range of modern IT networking technologies. The CCNA Certification Study Guide: Volume 2 Exam 200-301 covers every exam objective, including network components, IP connectivity and routing, network security, virtual networking, and much more. Clear and accurate chapters provide you with real-world examples, hands-on activities, in-depth explanations, and numerous review questions to ensure that you're fully prepared on exam day. Written by the leading expert on Cisco technologies and certifications, this comprehensive exam guide includes access to the acclaimed Sybex online learning systeman interactive environment featuring practice exams, electronic flashcards,Table of ContentsIntroduction xxv Assessment Test xl Chapter 1 Network Fundamentals 1 Network Components 2 Next-Generation Firewalls and IPS 6 Network Topology Architectures 10 Physical Interfaces and Cables 17 Ethernet Cabling 19 Summary 24 Exam Essentials 24 Review Questions 26 Chapter 2 TCP/IP 29 Introducing TCP/IP 30 TCP/IP and the DoD Model 31 IP Addressing 60 IPv4 Address Types 67 Summary 71 Exam Essentials 71 Review Questions 73 Chapter 3 Easy Subnetting 75 Subnetting Basics 76 Summary 102 Exam Essentials 102 Review Questions 103 Chapter 4 Troubleshooting IP Addressing 105 Cisco’s Way of Troubleshooting IP 106 Summary 114 Exam Essentials 114 Review Questions 115 Chapter 5 IP Routing 117 Routing Basics 119 The IP Routing Process 121 Configuring IP Routing 132 Configuring IP Routing in Our Network 141 Dynamic Routing 150 Routing Information Protocol (RIP) 152 Summary 159 Exam Essentials 159 Review Questions 161 Chapter 6 Open Shortest Path First (OSPF) 163 Open Shortest Path First (OSPF) Basics 164 Configuring OSPF 171 OSPF and Loopback Interfaces 179 Verifying OSPF Configuration 182 Summary 188 Exam Essentials 188 Review Questions 189 Chapter 7 Layer 2 Switching 193 Switching Services 194 Configuring Catalyst Switches 204 Summary 215 Exam Essentials 215 Review Questions 216 Chapter 8 VLANs and Inter-VLAN Routing 219 VLAN Basics 220 Identifying VLANs 224 Routing Between VLANs 229 Configuring VLANs 231 Summary 247 Exam Essentials 247 Review Questions 248 Chapter 9 Enhanced Switched Technologies 251 Spanning Tree Protocol (STP) 252 Types of Spanning-Tree Protocols 259 Modifying and Verifying the Bridge ID 267 Spanning-Tree Failure Consequences 273 PortFast and BPDU Guard 275 EtherChannel 278 Summary 284 Exam Essentials 284 Review Questions 285 Chapter 10 Access Lists 289 Perimeter, Firewall, and Internal Routers 290 Introduction to Access Lists 291 Standard Access Lists 295 Extended Access Lists 303 Monitoring Access Lists 313 Summary 316 Exam Essentials 316 Review Questions 317 Chapter 11 Network Address Translation (NAT) 319 When Do We Use NAT? 320 Types of Network Address Translation 322 NAT Names 322 How NAT Works 323 Testing and Troubleshooting NAT 328 Summary 333 Exam Essentials 333 Review Questions 334 Chapter 12 IP Services 337 Exploring Connected Devices Using CDP and LLDP 338 Network Time Protocol (NTP) 347 SNMP 348 Syslog 352 Secure Shell (SSH) 357 Summary 358 Exam Essentials 358 Review Questions 360 Chapter 13 Security 363 Network Security Threats 365 Three Primary Network Attacks 365 Network Attacks 366 Security Program Elements 374 Layer 2 Security Features 378 Authentication Methods 381 Managing User Accounts 386 Security Password Policy Elements 389 User-Authentication Methods 398 Setting Passwords 400 Summary 407 Exam Essentials 407 Review Questions 408 Chapter 14 First Hop Redundancy Protocol (HSRP) 411 Client Redundancy Issues 412 Introducing First Hop Redundancy Protocol (FHRP) 414 Hot Standby Router Protocol (HSRP) 416 Summary 429 Exam Essentials 429 Review Questions 430 Chapter 15 Virtual Private Networks (VPNs) 433 Virtual Private Networks 434 GRE Tunnels 441 Summary 447 Exam Essentials 447 Review Questions 448 Chapter 16 Quality of Service (QoS) 451 Quality of Service 452 Trust Boundary 454 QoS Mechanisms 455 Summary 461 Exam Essentials 461 Review Questions 462 Chapter 17 Internet Protocol Version 6 (IPv6) 465 Why Do We Need IPv6? 467 The Benefits and Uses of IPv6 467 IPv6 Addressing and Expressions 469 How IPv6 Works in an Internetwork 473 IPv6 Routing Protocols 483 Configuring IPv6 on Our Internetwork 484 Configuring Routing on Our Internetwork 487 Summary 490 Exam Essentials 490 Review Questions 492 Chapter 18 Troubleshooting IP, IPv6, and VLANs 495 Endpoints 496 Servers 497 IP Config 498 Troubleshooting IP Network Connectivity 507 Troubleshooting IPv6 Network Connectivity 522 Troubleshooting VLAN Connectivity 531 Summary 544 Exam Essentials 545 Review Questions 546 Chapter 19 Wireless Technologies 549 Wireless Networks 551 Basic Wireless Devices 553 Wireless Principles 556 Nonoverlapping Wi-Fi channels 565 Radio Frequency (RF) 569 Wireless Security 581 Summary 588 Exam Essentials 588 Review Question 590 Chapter 20 Configuring Wireless Technologies 595 WLAN Deployment Models 596 Setting Up a Wireless LAN Controller (WLC) 602 Joining Access Points (APs) 607 Wireless LAN Controllers (WLC) 610 WLC Port Types 611 WLC Interface Types 614 AP Modes 629 AP and WLC Management Access Connections 633 Summary 655 Exam Essentials 655 Review Questions 657 Chapter 21 Virtualization, Automation, and Programmability 661 Virtual Machine Fundamentals 662 Virtualization Components 665 Virtualization Features 666 Virtualization Types 668 Virtualization Solutions 669 Automation Components 670 Summary 684 Exam Essentials 684 Review Questions 685 Chapter 22 SDN Controllers 689 Traditional Network Monitoring Systems (NMS) 690 Traditional Network Configuration Managers (NCM) 699 Traditional Networking 702 Introduction to SDN 706 Separating the Control Plane 709 Controller-Based Architectures 710 SDN Network Components 712 DNA Center Overview 718 Summary 736 Exam Essentials 737 Review Questions 738 Chapter 23 Configuration Management 743 Team Silos 744 DevOps 748 Infrastructure as Code (IaC) 748 Ansible 750 Ansible Tower/AWX 763 Puppet 764 Chef 772 Summary 781 Exam Essentials 782 Review Questions 783 Appendix Answer to Review Questions 787 Chapter 1: Network Fundamentals 788 Chapter 2: TCP/IP 788 Chapter 3: Easy Subnetting 789 Chapter 4: Troubleshooting IP Addressing 790 Chapter 5: IP Routing 791 Chapter 6: Open Shortest Path First (OSPF) 792 Chapter 7: Layer 2 Switching 792 Chapter 8: VLANs and Inter-VLAN Routing 794 Chapter 9: Enhanced Switched Technologies 795 Chapter 10: Access Lists 796 Chapter 11: Network Address Translation (NAT) 797 Chapter 12: IP Services 797 Chapter 13: Security 798 Chapter 14: First Hop Redundancy Protocol (HSRP) 799 Chapter 15: Virtual Private Networks (VPNs) 800 Chapter 16: Quality of Service (QoS) 801 Chapter 17: Internet Protocol Version 6 (IPv6) 802 Chapter 18: Troubleshooting IP, IPv6, and VLANs 803 Chapter 19: Wireless Technologies 803 Chapter 20: Configuring Wireless Technologies 805 Chapter 21: Virtualization, Automation, and Programmability 806 Chapter 22: SDN Controllers 806 Chapter 23: Configuration Management 808 Index 809

    10 in stock

    £45.90

  • Cisco CCNA Certification 2 Volume Set

    John Wiley & Sons Inc Cisco CCNA Certification 2 Volume Set

    4 in stock

    Book Synopsis

    4 in stock

    £52.50

  • Introduction to Networks Companion Guide v51

    Pearson Education Introduction to Networks Companion Guide v51

    2 in stock

    Book Synopsis

    2 in stock

    £59.48

  • CCNP ROUTE Lab Manual Lab Companion

    Pearson Education CCNP ROUTE Lab Manual Lab Companion

    15 in stock

    Book Synopsis

    15 in stock

    £47.50

  • CCNP TSHOOT Lab Manual

    Pearson Education CCNP TSHOOT Lab Manual

    Out of stock

    Book Synopsis

    Out of stock

    £47.50

  • Scaling Networks v6 Course Booklet

    Pearson Education Scaling Networks v6 Course Booklet

    15 in stock

    Book SynopsisCourse Booklets offer a new way for students enrolled in a Cisco Networking Academy course of the same name to easily read, highlight, and review on the go, wherever the Internet is not available. The text is extracted directly from the online course, with headings that have exact page correlations to the online course. An icon system directs the reader to the online course to take full advantage of the images, labs, Packet Tracer activities, and dynamic Flash-based activities. The books are intended to be used with the course.

    15 in stock

    £20.24

  • Connecting Networks v6 Companion Guide

    Pearson Education Connecting Networks v6 Companion Guide

    15 in stock

    Book Synopsis

    15 in stock

    £66.02

  • CCNA Cybersecurity Operations Course Booklet

    Pearson Education (US) CCNA Cybersecurity Operations Course Booklet

    1 in stock

    Book SynopsisYour Cisco Networking Academy Course Booklet is designed as a study resource you can easily read, highlight, and review on the go, wherever the Internet is not available or practical: · The text is extracted directly, word-for-word, from the online course so you can highlight important points and take notes in the “Your Chapter Notes” section. · Headings with the exact page correlations provide a quick reference to the online course for your classroom discussions and exam preparation. · An icon system directs you to the online curriculum to take full advantage of the images embedded within the Networking Academy online course interface and reminds you to perform the labs, Class Activities, interactive activities, Packet Tracer activities, watch videos, and take the chapter quizzes and exams. The Course Booklet is a basic, economical paper-based resource to help you succeed with the Cisco Networking Academy online course. Table of ContentsChapter 0 Course Introduction 1 0.0 Welcome to CCNA: Cybersecurity Operations 1 0.0.1 Message to the Student 1 Chapter 1 Cybersecurity and the Security Operations Center 5 1.0 Introduction 5 1.1 The Danger 5 1.1.1 War Stories 5 1.1.1.1 Hijacked People 5 1.1.1.2 Ransomed Companies 5 1.1.1.3 Targeted Nations 6 1.1.1.4 Lab - Installing the CyberOps Workstation Virtual Machine 6 1.1.1.5 Lab - Cybersecurity Case Studies 6 1.1.2 Threat Actors 6 1.1.2.1 Amateurs 6 1.1.2.2 Hacktivists 7 1.1.2.3 Financial Gain 7 1.1.2.4 Trade Secrets and Global Politics 7 1.1.2.5 How Secure is the Internet of Things? 7 1.1.2.6 Lab - Learning the Details of Attacks 7 1.1.3 Threat Impact 8 1.1.3.1 PII and PHI 8 1.1.3.2 Lost Competitive Advantage 8 1.1.3.3 Politics and National Security 8 1.1.3.4 Lab - Visualizing the Black Hats 9 1.2 Fighters in the War Against Cybercrime 9 1.2.1 The Modern Security Operations Center 9 1.2.1.1 Elements of a SOC 9 1.2.1.2 People in the SOC 9 1.2.1.3 Process in the SOC 10 1.2.1.4 Technologies in the SOC 10 1.2.1.5 Enterprise and Managed Security 10 1.2.1.6 Security vs. Availability 11 1.2.1.7 Activity - Identify the SOC Terminology 11 1.2.2 Becoming a Defender 11 1.2.2.1 Certifications 11 1.2.2.2 Further Education 12 1.2.2.3 Sources of Career Information 12 1.2.2.4 Getting Experience 13 1.2.2.5 Lab - Becoming a Defender 13 1.3 Summary 13 Chapter 2 Windows Operating System 17 2.0 Introduction 17 2.1 Windows Overview 17 2.1.1 Windows History 17 2.1.1.1 Disk Operating System 17 2.1.1.2 Windows Versions 18 2.1.1.3 Windows GUI 19 2.1.1.4 Operating System Vulnerabilities 19 2.1.2 Windows Architecture and Operations 20 2.1.2.1 Hardware Abstraction Layer 20 2.1.2.2 User Mode and Kernel Mode 21 2.1.2.3 Windows File Systems 21 2.1.2.4 Windows Boot Process 23 2.1.2.5 Windows Startup and Shutdown 24 2.1.2.6 Processes, Threads, and Services 25 2.1.2.7 Memory Allocation and Handles 25 2.1.2.8 The Windows Registry 26 2.1.2.9 Activity - Identify the Windows Registry Hive 27 2.1.2.10 Lab - Exploring Processes, Threads, Handles, and Windows Registry 27 2.2 Windows Administration 27 2.2.1 Windows Configuration and Monitoring 27 2.2.1.1 Run as Administrator 27 2.2.1.2 Local Users and Domains 27 2.2.1.3 CLI and PowerShell 28 2.2.1.4 Windows Management Instrumentation 29 2.2.1.5 The net Command 30 2.2.1.6 Task Manager and Resource Monitor 30 2.2.1.7 Networking 31 2.2.1.8 Accessing Network Resources 33 2.2.1.9 Windows Server 33 2.2.1.10 Lab - Create User Accounts 34 2.2.1.11 Lab - Using Windows PowerShell 34 2.2.1.12 Lab - Windows Task Manager 34 2.2.1.13 Lab - Monitor and Manage System Resources in Windows 34 2.2.2 Windows Security 34 2.2.2.1 The netstat Command 34 2.2.2.2 Event Viewer 35 2.2.2.3 Windows Update Management 35 2.2.2.4 Local Security Policy 35 2.2.2.5 Windows Defender 36 2.2.2.6 Windows Firewall 37 2.2.2.7 Activity - Identify the Windows Command 37 2.2.2.8 Activity - Identify the Windows Tool 37 2.3 Summary 37 Chapter 3 Linux Operating System 41 3.0 Introduction 41 3.1 Linux Overview 41 3.1.1 Linux Basics 41 3.1.1.1 What is Linux? 41 3.1.1.2 The Value of Linux 42 3.1.1.3 Linux in the SOC 42 3.1.1.4 Linux Tools 43 3.1.2 Working in the Linux Shell 43 3.1.2.1 The Linux Shell 43 3.1.2.2 Basic Commands 43 3.1.2.3 File and Directory Commands 44 3.1.2.4 Working with Text Files 44 3.1.2.5 The Importance of Text Files in Linux 44 3.1.2.6 Lab - Working with Text Files in the CLI 45 3.1.2.7 Lab - Getting Familiar with the Linux Shell 45 3.1.3 Linux Servers and Clients 45 3.1.3.1 An Introduction to Client-Server Communications 45 3.1.3.2 Servers, Services, and Their Ports 45 3.1.3.3 Clients 45 3.1.3.4 Lab - Linux Servers 45 3.2 Linux Administration 46 3.2.1 Basic Server Administration 46 3.2.1.1 Service Configuration Files 46 3.2.1.2 Hardening Devices 46 3.2.1.3 Monitoring Service Logs 47 3.2.1.4 Lab - Locating Log Files 48 3.2.2 The Linux File System 48 3.2.2.1 The File System Types in Linux 48 3.2.2.2 Linux Roles and File Permissions 49 3.2.2.3 Hard Links and Symbolic Links 50 3.2.2.4 Lab - Navigating the Linux Filesystem and Permission Settings 50 3.3 Linux Hosts 51 3.3.1 Working with the Linux GUI 51 3.3.1.1 X Window System 51 3.3.1.2 The Linux GUI 51 3.3.2 Working on a Linux Host 52 3.3.2.1 Installing and Running Applications on a Linux Host 52 3.3.2.2 Keeping the System Up To Date 52 3.3.2.3 Processes and Forks 52 3.3.2.4 Malware on a Linux Host 53 3.3.2.5 Rootkit Check 54 3.3.2.6 Piping Commands 54 3.3.2.7 Video Demonstration - Applications, Rootkits, and Piping Commands 55 3.4 Summary 55 Chapter 4 Network Protocols and Services 59 4.0 Introduction 59 4.1 Network Protocols 59 4.1.1 Network Communications Process 59 4.1.1.1 Views of the Network 59 4.1.1.2 Client-Server Communications 60 4.1.1.3 A Typical Session: Student 60 4.1.1.4 A Typical Session: Gamer 61 4.1.1.5 A Typical Session: Surgeon 61 4.1.1.6 Tracing the Path 62 4.1.1.7 Lab - Tracing a Route 62 4.1.2 Communications Protocols 62 4.1.2.1 What are Protocols? 62 4.1.2.2 Network Protocol Suites 63 4.1.2.3 The TCP/IP Protocol Suite 63 4.1.2.4 Format, Size, and Timing 64 4.1.2.5 Unicast, Multicast, and Broadcast 64 4.1.2.6 Reference Models 65 4.1.2.7 Three Addresses 65 4.1.2.8 Encapsulation 65 4.1.2.9 Scenario: Sending and Receiving a Web Page 66 4.1.2.10 Lab - Introduction to Wireshark 67 4.2 Ethernet and Internet Protocol (IP) 67 4.2.1 Ethernet 67 4.2.1.1 The Ethernet Protocol 67 4.2.1.2 The Ethernet Frame 68 4.2.1.3 MAC Address Format 68 4.2.1.4 Activity - Ethernet Frame Fields 68 4.2.2 IPv4 68 4.2.2.1 IPv4 Encapsulation 68 4.2.2.2 IPv4 Characteristics 69 4.2.2.3 Activity - IPv4 Characteristics 70 4.2.2.4 The IPv4 Packet 70 4.2.2.5 Video Demonstration - Sample IPv4 Headers in Wireshark 70 4.2.3 IPv4 Addressing Basics 70 4.2.3.1 IPv4 Address Notation 70 4.2.3.2 IPv4 Host Address Structure 70 4.2.3.3 IPv4 Subnet Mask and Network Address 71 4.2.3.4 Subnetting Broadcast Domains 71 4.2.3.5 Video Demonstration - Network, Host, and Broadcast Addresses 72 4.2.4 Types of IPv4 Addresses 72 4.2.4.1 IPv4 Address Classes and Default Subnet Masks 72 4.2.4.2 Reserved Private Addresses 73 4.2.5 The Default Gateway 73 4.2.5.1 Host Forwarding Decision 73 4.2.5.2 Default Gateway 74 4.2.5.3 Using the Default Gateway 74 4.2.6 IPv6 75 4.2.6.1 Need for IPv6 75 4.2.6.2 IPv6 Size and Representation 75 4.2.6.3 IPv6 Address Formatting 75 4.2.6.4 IPv6 Prefix Length 76 4.2.6.5 Activity - IPv6 Address Notation 76 4.2.6.6 Video Tutorial - Layer 2 and Layer 3 Addressing 76 4.3 Connectivity Verification 76 4.3.1 ICMP 76 4.3.1.1 ICMPv4 Messages 76 4.3.1.2 ICMPv6 RS and RA Messages 77 4.3.2 Ping and Traceroute Utilities 78 4.3.2.1 Ping - Testing the Local Stack 78 4.3.2.2 Ping - Testing Connectivity to the Local LAN 79 4.3.2.3 Ping - Testing Connectivity to Remote Host 79 4.3.2.4 Traceroute - Testing the Path 80 4.3.2.5 ICMP Packet Format 80 4.4 Address Resolution Protocol 81 4.4.1 MAC and IP 81 4.4.1.1 Destination on Same Network 81 4.4.1.2 Destination on Remote Network 82 4.4.2 ARP 82 4.4.2.1 Introduction to ARP 82 4.4.2.2 ARP Functions 82 4.4.2.3 Video - ARP Operation - ARP Request 83 4.4.2.4 Video - ARP Operation - ARP Reply 84 4.4.2.5 Video - ARP Role in Remote Communication 84 4.4.2.6 Removing Entries from an ARP Table 85 4.4.2.7 ARP Tables on Networking Devices 85 4.4.2.8 Lab - Using Wireshark to Examine Ethernet Frames 85 4.4.3 ARP Issues 85 4.4.3.1 ARP Broadcasts 85 4.4.3.2 ARP Spoofing 86 4.5 The Transport Layer 86 4.5.1 Transport Layer Characteristics 86 4.5.1.1 Transport Layer Protocol Role in Network Communication 86 4.5.1.2 Transport Layer Mechanisms 87 4.5.1.3 TCP Local and Remote Ports 87 4.5.1.4 Socket Pairs 88 4.5.1.5 TCP vs UDP 88 4.5.1.6 TCP and UDP Headers 89 4.5.1.7 Activity - Compare TCP and UDP Characteristics 90 4.5.2 Transport Layer Operation 90 4.5.2.1 TCP Port Allocation 90 4.5.2.2 A TCP Session Part I: Connection Establishment and Termination 91 4.5.2.3 Video Demonstration - TCP 3-Way Handshake 92 4.5.2.4 Lab - Using Wireshark to Observe the TCP 3-Way Handshake 92 4.5.2.5 Activity - TCP Connection and Termination Process 92 4.5.2.6 A TCP Session Part II: Data Transfer 92 4.5.2.7 Video Demonstration - Sequence Numbers and Acknowledgments 94 4.5.2.8 Video Demonstration - Data Loss and Retransmission 94 4.5.2.9 A UDP Session 94 4.5.2.10 Lab - Exploring Nmap 95 4.6 Network Services 95 4.6.1 DHCP 95 4.6.1.1 DHCP Overview 95 4.6.1.2 DHCPv4 Message Format 96 4.6.2 DNS 97 4.6.2.1 DNS Overview 97 4.6.2.2 The DNS Domain Hierarchy 97 4.6.2.3 The DNS Lookup Process 97 4.6.2.4 DNS Message Format 98 4.6.2.5 Dynamic DNS 99 4.6.2.6 The WHOIS Protocol 99 4.6.2.7 Lab - Using Wireshark to Examine a UDP DNS Capture 100 4.6.3 NAT 100 4.6.3.1 NAT Overview 100 4.6.3.2 NAT-Enabled Routers 100 4.6.3.3 Port Address Translation 100 4.6.4 File Transfer and Sharing Services 101 4.6.4.1 FTP and TFTP 101 4.6.4.2 SMB 102 4.6.4.3 Lab - Using Wireshark to Examine TCP and UDP Captures 102 4.6.5 Email 102 4.6.5.1 Email Overview 102 4.6.5.2 SMTP 102 4.6.5.3 POP3 103 4.6.5.4 IMAP 103 4.6.6 HTTP 103 4.6.6.1 HTTP Overview 103 4.6.6.2 The HTTP URL 104 4.6.6.3 The HTTP Protocol 104 4.6.6.4 HTTP Status Codes 105 4.6.6.5 Lab - Using Wireshark to Examine HTTP and HTTPS Traffic 105 4.7 Summary 105 Chapter 5 Network Infrastructure 109 5.0 Introduction 109 5.1 Network Communication Devices 109 5.1.1 Network Devices 109 5.1.1.1 End Devices 109 5.1.1.2 Video Tutorial - End Devices 109 5.1.1.3 Routers 110 5.1.1.4 Activity - Match Layer 2 and Layer 3 Addressing 110 5.1.1.5 Router Operation 110 5.1.1.6 Routing Information 111 5.1.1.7 Video Tutorial - Static and Dynamic Routing 112 5.1.1.8 Hubs, Bridges, LAN Switches 112 5.1.1.9 Switching Operation 113 5.1.1.10 Video Tutorial - MAC Address Tables on Connected Switches 114 5.1.1.11 VLANs 114 5.1.1.12 STP 114 5.1.1.13 Multilayer Switching 115 5.1.2 Wireless Communications 116 5.1.2.1 Video Tutorial - Wireless Communications 116 5.1.2.2 Protocols and Features 116 5.1.2.3 Wireless Network Operations 117 5.1.2.4 The Client to AP Association Process 118 5.1.2.5 Activity - Order the Steps in the Client and AP Association Process 119 5.1.2.6 Wireless Devices - AP, LWAP, WLC 119 5.1.2.7 Activity - Identify the LAN Device 119 5.2 Network Security Infrastructure 120 5.2.1 Security Devices 120 5.2.1.1 Video Tutorial - Security Devices 120 5.2.1.2 Firewalls 120 5.2.1.3 Firewall Type Descriptions 120 5.2.1.4 Packet Filtering Firewalls 121 5.2.1.5 Stateful Firewalls 121 5.2.1.6 Next-Generation Firewalls 121 5.2.1.7 Activity - Identify the Type of Firewall 122 5.2.1.8 Intrusion Protection and Detection Devices 122 5.2.1.9 Advantages and Disadvantages of IDS and IPS 122 5.2.1.10 Types of IPS 123 5.2.1.11 Specialized Security Appliances 124 5.2.1.12 Activity - Compare IDS and IPS Characteristics 125 5.2.2 Security Services 125 5.2.2.1 Video Tutorial - Security Services 125 5.2.2.2 Traffic Control with ACLs 125 5.2.2.3 ACLs: Important Features 126 5.2.2.4 Packet Tracer - ACL Demonstration 126 5.2.2.5 SNMP 126 5.2.2.6 NetFlow 127 5.2.2.7 Port Mirroring 127 5.2.2.8 Syslog Servers 128 5.2.2.9 NTP 128 5.2.2.10 AAA Servers 129 5.2.2.11 VPN 130 5.2.2.12 Activity - Identify the Network Security Device or Service 130 5.3 Network Representations 130 5.3.1 Network Topologies 130 5.3.1.1 Overview of Network Components 130 5.3.1.2 Physical and Logical Topologies 131 5.3.1.3 WAN Topologies 131 5.3.1.4 LAN Topologies 131 5.3.1.5 The Three-Layer Network Design Model 132 5.3.1.6 Video Tutorial - Three-Layer Network Design 132 5.3.1.7 Common Security Architectures 133 5.3.1.8 Activity - Identify the Network Topology 134 5.3.1.9 Activity - Identify the Network Design Terminology 134 5.3.1.10 Packet Tracer - Identify Packet Flow 134 5.4 Summary 134 Chapter 6 Principles of Network Security 137 6.0 Introduction 137 6.1 Attackers and Their Tools 137 6.1.1 Who is Attacking Our Network? 137 6.1.1.1 Threat, Vulnerability, and Risk 137 6.1.1.2 Hacker vs. Threat Actor 138 6.1.1.3 Evolution of Threat Actors 138 6.1.1.4 Cybercriminals 139 6.1.1.5 Cybersecurity Tasks 139 6.1.1.6 Cyber Threat Indicators 139 6.1.1.7 Activity - What Color is my Hat? 140 6.1.2 Threat Actor Tools 140 6.1.2.1 Introduction of Attack Tools 140 6.1.2.2 Evolution of Security Tools 140 6.1.2.3 Categories of Attacks 141 6.1.2.4 Activity - Classify Hacking Tools 141 6.2 Common Threats and Attacks 141 6.2.1 Malware 141 6.2.1.1 Types of Malware 141 6.2.1.2 Viruses 141 6.2.1.3 Trojan Horses 141 6.2.1.4 Trojan Horse Classification 142 6.2.1.5 Worms 142 6.2.1.6 Worm Components 143 6.2.1.7 Ransomware 143 6.2.1.8 Other Malware 144 6.2.1.9 Common Malware Behaviors 144 6.2.1.10 Activity - Identify the Malware Type 145 6.2.1.11 Lab - Anatomy of Malware 145 6.2.2 Common Network Attacks 145 6.2.2.1 Types of Network Attacks 145 6.2.2.2 Reconnaissance Attacks 145 6.2.2.3 Sample Reconnaissance Attacks 146 6.2.2.4 Access Attacks 146 6.2.2.5 Types of Access Attacks 147 6.2.2.6 Social Engineering Attacks 147 6.2.2.7 Phishing Social Engineering Attacks 148 6.2.2.8 Strengthening the Weakest Link 149 6.2.2.9 Lab - Social Engineering 149 6.2.2.10 Denial of Service Attacks 149 6.2.2.11 DDoS Attacks 149 6.2.2.12 Example DDoS Attack 150 6.2.2.13 Buffer Overflow Attack 150 6.2.2.14 Evasion Methods 151 6.2.2.15 Activity - Identify the Types of Network Attack 151 6.2.2.16 Activity - Components of a DDoS Attack 151 6.3 Summary 152 Chapter 7 Network Attacks: A Deeper Look 155 7.0 Introduction 155 7.1 Attackers and Their Tools 155 7.1.1 Who is Attacking Our Network? 155 7.1.1.1 Network Security Topology 155 7.1.1.2 Monitoring the Network 156 7.1.1.3 Network Taps 156 7.1.1.4 Traffic Mirroring and SPAN 156 7.1.2 Introduction to Network Monitoring Tools 157 7.1.2.1 Network Security Monitoring Tools 157 7.1.2.2 Network Protocol Analyzers 157 7.1.2.3 NetFlow 158 7.1.2.4 SIEM 159 7.1.2.5 SIEM Systems 159 7.1.2.6 Activity - Identify the Network Monitoring Tool 159 7.1.2.7 Packet Tracer - Logging Network Activity 159 7.2 Attacking the Foundation 160 7.2.1 IP Vulnerabilities and Threats 160 7.2.1.1 IPv4 and IPv6 160 7.2.1.2 The IPv4 Packet Header 160 7.2.1.3 The IPv6 Packet Header 161 7.2.1.4 IP Vulnerabilities 161 7.2.1.5 ICMP Attacks 162 7.2.1.6 DoS Attacks 163 7.2.1.7 Amplification and Reflection Attacks 163 7.2.1.8 DDoS Attacks 163 7.2.1.9 Address Spoofing Attacks 164 7.2.1.10 Activity - Identify the IP Vulnerability 164 7.2.1.11 Lab - Observing a DDoS Attack 164 7.2.2 TCP and UDP Vulnerabilities 165 7.2.2.1 TCP 165 7.2.2.2 TCP Attacks 165 7.2.2.3 UDP and UDP Attacks 166 7.2.2.4 Lab - Observing TCP Anomalies 166 7.3 Attacking What We Do 167 7.3.1 IP Services 167 7.3.1.1 ARP Vulnerabilities 167 7.3.1.2 ARP Cache Poisoning 167 7.3.1.3 DNS Attacks 168 7.3.1.4 DNS Tunneling 169 7.3.1.5 DHCP 169 7.3.1.6 Lab - Exploring DNS Traffic 170 7.3.2 Enterprise Services 170 7.3.2.1 HTTP and HTTPS 170 7.3.2.2 Email 173 7.3.2.3 Web-Exposed Databases 174 7.3.2.4 Lab - Attacking a MySQL Database 176 7.3.2.5 Lab - Reading Server Logs 176 7.3.2.6 Lab - Reading Server Logs 176 7.4 Summary 176 Chapter 8 Protecting the Network 179 8.0 Introduction 179 8.1 Understanding Defense 179 8.1.1 Defense-in-Depth 179 8.1.1.1 Assets, Vulnerabilities, Threats 179 8.1.1.2 Identify Assets 179 8.1.1.3 Identify Vulnerabilities 180 8.1.1.4 Identify Threats 181 8.1.1.5 Security Onion and Security Artichoke Approaches 181 8.1.2 Security Policies 182 8.1.2.1 Business Policies 182 8.1.2.2 Security Policy 182 8.1.2.3 BYOD Policies 183 8.1.2.4 Regulatory and Standard Compliance 184 8.2 Access Control 184 8.2.1 Access Control Concepts 184 8.2.1.1 Communications Security: CIA 184 8.2.1.2 Access Control Models 185 8.2.1.3 Activity - Identify the Access Control Model 185 8.2.2 AAA Usage and Operation 185 8.2.2.1 AAA Operation 185 8.2.2.2 AAA Authentication 186 8.2.2.3 AAA Accounting Logs 187 8.2.2.4 Activity - Identify the Characteristic of AAA 187 8.3 Threat Intelligence 187 8.3.1 Information Sources 187 8.3.1.1 Network Intelligence Communities 187 8.3.1.2 Cisco Cybersecurity Reports 188 8.3.1.3 Security Blogs and Podcasts 188 8.3.2 Threat Intelligence Services 188 8.3.2.1 Cisco Talos 188 8.3.2.2 FireEye 189 8.3.2.3 Automated Indicator Sharing 189 8.3.2.4 Common Vulnerabilities and Exposures Database 189 8.3.2.5 Threat Intelligence Communication Standards 189 8.3.2.6 Activity - Identify the Threat Intelligence Information Source 190 8.4 Summary 190 Chapter 9 Cryptography and the Public Key Infrastructure 193 9.0 Introduction 193 9.1 Cryptography 193 9.1.1 What is Cryptography? 193 9.1.1.1 Securing Communications 193 9.1.1.2 Cryptology 194 9.1.1.3 Cryptography - Ciphers 195 9.1.1.4 Cryptanalysis - Code Breaking 195 9.1.1.5 Keys 196 9.1.1.6 Lab - Encrypting and Decrypting Data Using OpenSSL 197 9.1.1.7 Lab - Encrypting and Decrypting Data Using a Hacker Tool 197 9.1.1.8 Lab - Examining Telnet and SSH in Wireshark 197 9.1.2 Integrity and Authenticity 197 9.1.2.1 Cryptographic Hash Functions 197 9.1.2.2 Cryptographic Hash Operation 198 9.1.2.3 MD5 and SHA 198 9.1.2.4 Hash Message Authentication Code 199 9.1.2.5 Lab - Hashing Things Out 200 9.1.3 Confidentiality 200 9.1.3.1 Encryption 200 9.1.3.2 Symmetric Encryption 200 9.1.3.3 Symmetric Encryption Algorithms 201 9.1.3.4 Asymmetric Encryption Algorithms 202 9.1.3.5 Asymmetric Encryption - Confidentiality 202 9.1.3.6 Asymmetric Encryption - Authentication 203 9.1.3.7 Asymmetric Encryption - Integrity 203 9.1.3.8 Diffie-Hellman 204 9.1.3.9 Activity - Classify the Encryption Algorithms 204 9.2 Public Key Infrastructure 204 9.2.1 Public Key Cryptography 204 9.2.1.1 Using Digital Signatures 204 9.2.1.2 Digital Signatures for Code Signing 206 9.2.1.3 Digital Signatures for Digital Certificates 206 9.2.1.4 Lab - Create a Linux Playground 206 9.2.2 Authorities and the PKI Trust System 206 9.2.2.1 Public Key Management 206 9.2.2.2 The Public Key Infrastructure 207 9.2.2.3 The PKI Authorities System 207 9.2.2.4 The PKI Trust System 208 9.2.2.5 Interoperability of Different PKI Vendors 208 9.2.2.6 Certificate Enrollment, Authentication, and Revocation 209 9.2.2.7 Lab - Certificate Authority Stores 209 9.2.3 Applications and Impacts of Cryptography 210 9.2.3.1 PKI Applications 210 9.2.3.2 Encrypting Network Transactions 210 9.2.3.3 Encryption and Security Monitoring 211 9.3 Summary 212 Chapter 10 Endpoint Security and Analysis 215 10.0 Introduction 215 10.1 Endpoint Protection 215 10.1.1 Antimalware Protection 215 10.1.1.1 Endpoint Threats 215 10.1.1.2 Endpoint Security 216 10.1.1.3 Host-Based Malware Protection 216 10.1.1.4 Network-Based Malware Protection 217 10.1.1.5 Cisco Advanced Malware Protection (AMP) 218 10.1.1.6 Activity - Identify Antimalware Terms and Concepts 218 10.1.2 Host-Based Intrusion Protection 218 10.1.2.1 Host-Based Firewalls 218 10.1.2.2 Host-Based Intrusion Detection 219 10.1.2.3 HIDS Operation 220 10.1.2.4 HIDS Products 220 10.1.2.5 Activity - Identify the Host-Based Intrusion Protection Terminology 220 10.1.3 Application Security 221 10.1.3.1 Attack Surface 221 10.1.3.2 Application Blacklisting and Whitelisting 221 10.1.3.3 System-Based Sandboxing 222 10.1.3.4 Video Demonstration - Using a Sandbox to Launch Malware 222 10.2 Endpoint Vulnerability Assessment 222 10.2.1 Network and Server Profiling 222 10.2.1.1 Network Profiling 222 10.2.1.2 Server Profiling 223 10.2.1.3 Network Anomaly Detection 223 10.2.1.4 Network Vulnerability Testing 224 10.2.1.5 Activity - Identify the Elements of Network Profiling 225 10.2.2 Common Vulnerability Scoring System (CVSS) 225 10.2.2.1 CVSS Overview 225 10.2.2.2 CVSS Metric Groups 225 10.2.2.3 CVSS Base Metric Group 226 10.2.2.4 The CVSS Process 226 10.2.2.5 CVSS Reports 227 10.2.2.6 Other Vulnerability Information Sources 227 10.2.2.7 Activity - Identify CVSS Metrics 228 10.2.3 Compliance Frameworks 228 10.2.3.1 Compliance Regulations 228 10.2.3.2 Overview of Regulatory Standards 228 10.2.3.3 Activity - Identify Regulatory Standards 229 10.2.4 Secure Device Management 230 10.2.4.1 Risk Management 230 10.2.4.2 Activity - Identify the Risk Response 231 10.2.4.3 Vulnerability Management 231 10.2.4.4 Asset Management 231 10.2.4.5 Mobile Device Management 232 10.2.4.6 Configuration Management 232 10.2.4.7 Enterprise Patch Management 233 10.2.4.8 Patch Management Techniques 233 10.2.4.9 Activity - Identify Device Management Activities 234 10.2.5 Information Security Management Systems 234 10.2.5.1 Security Management Systems 234 10.2.5.2 ISO-27001 234 10.2.5.3 NIST Cybersecurity Framework 234 10.2.5.4 Activity - Identify the ISO 27001 Activity Cycle 235 10.2.5.5 Activity - Identify the Stages in the NIST Cybersecurity Framework 235 10.3 Summary 235 Chapter 11 Security Monitoring 239 11.0 Introduction 239 11.1 Technologies and Protocols 239 11.1.1 Monitoring Common Protocols 239 11.1.1.1 Syslog and NTP 239 11.1.1.2 NTP 240 11.1.1.3 DNS 240 11.1.1.4 HTTP and HTTPS 241 11.1.1.5 Email Protocols 241 11.1.1.6 ICMP 242 11.1.1.7 Activity - Identify the Monitored Protocol 242 11.1.2 Security Technologies 242 11.1.2.1 ACLs 242 11.1.2.2 NAT and PAT 242 11.1.2.3 Encryption, Encapsulation, and Tunneling 243 11.1.2.4 Peer-to-Peer Networking and Tor 243 11.1.2.5 Load Balancing 244 11.1.2.6 Activity - Identify the Impact of the Technology on Security and Monitoring 244 11.2 Log Files 244 11.2.1 Types of Security Data 244 11.2.1.1 Alert Data 244 11.2.1.2 Session and Transaction Data 245 11.2.1.3 Full Packet Captures 245 11.2.1.4 Statistical Data 246 11.2.1.5 Activity - Identify Types of Network Monitoring Data 246 11.2.2 End Device Logs 246 11.2.2.1 Host Logs 246 11.2.2.2 Syslog 247 11.2.2.3 Server Logs 248 11.2.2.4 Apache Webserver Access Logs 248 11.2.2.5 IIS Access Logs 249 11.2.2.6 SIEM and Log Collection 249 11.2.2.7 Activity - Identify Information in Logged Events 250 11.2.3 Network Logs 250 11.2.3.1 Tcpdump 250 11.2.3.2 NetFlow 250 11.2.3.3 Application Visibility and Control 251 11.2.3.4 Content Filter Logs 251 11.2.3.5 Logging from Cisco Devices 252 11.2.3.6 Proxy Logs 252 11.2.3.7 NextGen IPS 253 11.2.3.8 Activity - Identify the Security Technology from the Data Description 254 11.2.3.9 Activity - Identify the NextGen IPS Event Type 254 11.2.3.10 Packet Tracer - Explore a NetFlow Implementation 254 11.2.3.11 Packet Tracer - Logging from Multiple Sources 254 11.3 Summary 254 Chapter 12 Intrusion Data Analysis 257 12.0 Introduction 257 12.1 Evaluating Alerts 257 12.1.1 Sources of Alerts 257 12.1.1.1 Security Onion 257 12.1.1.2 Detection Tools for Collecting Alert Data 257 12.1.1.3 Analysis Tools 258 12.1.1.4 Alert Generation 259 12.1.1.5 Rules and Alerts 260 12.1.1.6 Snort Rule Structure 260 12.1.1.7 Lab - Snort and Firewall Rules 261 12.1.2 Overview of Alert Evaluation 262 12.1.2.1 The Need for Alert Evaluation 262 12.1.2.2 Evaluating Alerts 262 12.1.2.3 Deterministic Analysis and Probabilistic Analysis 263 12.1.2.4 Activity - Identify Deterministic and Probabilistic Scenarios 264 12.1.2.5 Activity - Identify the Alert Classification 264 12.2 Working with Network Security Data 264 12.2.1 A Common Data Platform 264 12.2.1.1 ELSA 264 12.2.1.2 Data Reduction 264 12.2.1.3 Data Normalization 265 12.2.1.4 Data Archiving 265 12.2.1.5 Lab - Convert Data into a Universal Format 266 12.2.1.6 Investigating Process or API Calls 266 12.2.2 Investigating Network Data 266 12.2.2.1 Working in Sguil 266 12.2.2.2 Sguil Queries 267 12.2.2.3 Pivoting from Sguil 267 12.2.2.4 Event Handling in Sguil 268 12.2.2.5 Working in ELSA 268 12.2.2.6 Queries in ELSA 269 12.2.2.7 Investigating Process or API Calls 269 12.2.2.8 Investigating File Details 270 12.2.2.9 Lab - Regular Expression Tutorial 270 12.2.2.10 Lab - Extract an Executable from a PCAP 270 12.2.3 Enhancing the Work of the Cybersecurity Analyst 270 12.2.3.1 Dashboards and Visualizations 270 12.2.3.2 Workflow Management 271 12.3 Digital Forensics 271 12.3.1 Evidence Handling and Attack Attribution 271 12.3.1.1 Digital Forensics 271 12.3.1.2 The Digital Forensics Process 272 12.3.1.3 Types of Evidence 272 12.3.1.4 Evidence Collection Order 273 12.3.1.5 Chain of Custody 273 12.3.1.6 Data Integrity and Preservation 274 12.3.1.7 Attack Attribution 274 12.3.1.8 Activity - Identify the Type of Evidence 275 12.3.1.9 Activity - Identify the Forensic Technique Terminology 275 12.4 Summary 275 Chapter 13 Incident Response and Handling 277 13.0 Introduction 277 13.1 Incident Response Models 277 13.1.1 The Cyber Kill Chain 277 13.1.1.1 Steps of the Cyber Kill Chain 277 13.1.1.2 Reconnaissance 278 13.1.1.3 Weaponization 278 13.1.1.4 Delivery 278 13.1.1.5 Exploitation 279 13.1.1.6 Installation 279 13.1.1.7 Command and Control 279 13.1.1.8 Actions on Objectives 279 13.1.1.9 Activity - Identify the Kill Chain Step 279 13.1.2 The Diamond Model of Intrusion 280 13.1.2.1 Diamond Model Overview 280 13.1.2.2 Pivoting Across the Diamond Model 280 13.1.2.3 The Diamond Model and the Cyber Kill Chain 281 13.1.2.4 Activity - Identify the Diamond Model Features 282 13.1.3 The VERIS Schema 282 13.1.3.1 What is the VERIS Schema? 282 13.1.3.2 Create a VERIS Record 282 13.1.3.3 Top-Level and Second-Level Elements 283 13.1.3.4 The VERIS Community Database 285 13.1.3.5 Activity - Apply the VERIS Schema to an Incident 285 13.2 Incident Handling 285 13.2.1 CSIRTs 285 13.2.1.1 CSIRT Overview 285 13.2.1.2 Types of CSIRTs 286 13.2.1.3 CERT 286 13.2.1.4 Activity - Match the CSIRT with the CSIRT Goal 287 13.2.2 NIST 800-61r2 287 13.2.2.1 Establishing an Incident Response Capability 287 13.2.2.2 Incident Response Stakeholders 288 13.2.2.3 NIST Incident Response Life Cycle 288 13.2.2.4 Preparation 289 13.2.2.5 Detection and Analysis 290 13.2.2.6 Containment, Eradication, and Recovery 291 13.2.2.7 Post-Incident Activities 293 13.2.2.8 Incident Data Collection and Retention 294 13.2.2.9 Reporting Requirements and Information Sharing 295 13.2.2.10 Activity - Identify the Incident Response Plan Elements 296 13.2.2.11 Activity - Identify the Incident Handling Term 296 13.2.2.12 Activity - Identify the Incident Handling Step 296 13.2.2.13 Lab - Incident Handling 296 13.3 Summary 296 9781587134371 TOC 3/7/2018

    1 in stock

    £29.10

  • CCNA Cybersecurity Operations Lab Manual

    Pearson Education (US) CCNA Cybersecurity Operations Lab Manual

    Out of stock

    Book SynopsisThe only authorized Lab Manual for the Cisco Networking Academy CCNA Cybersecurity Operations course Curriculum Objectives CCNA Cybersecurity Operations 1.0 covers knowledge and skills needed to successfully handle the tasks, duties, and responsibilities of an associate-level Security Analyst working in a Security Operations Center (SOC). Upon completion of the CCNA Cybersecurity Operations 1.0 course, students will be able to perform the following tasks: Install virtual machines to create a safe environment for implementing and analyzing cybersecurity threat events. Explain the role of the Cybersecurity Operations Analyst in the enterprise. Explain the Windows Operating System features and characteristics needed to support cybersecurity analyses. Explain the features and characteristics of the Linux Operating System. Analyze the operation of network protocols and services. Explain the operation of the network infrastructure. Classify the various types of network attacks. Use network monitoring tools to identify attacks against network protocols and services. Use various methods to prevent malicious access to computer networks, hosts, and data. Explain the impacts of cryptography on network security monitoring. Explain how to investigate endpoint vulnerabilities and attacks. Analyze network intrusion data to verify potential exploits. Apply incident response models to manage network security incidents.Table of ContentsChapter 1. Cybersecurity and the Security Operations Center 1.1 The Danger 1.2 Fighters in the War Against Cybercrime Chapter 2. Windows Operating System 2.1 Windows Overview 2.2 Windows Administration Chapter 3. Linux Operating System 3.1 Linux Overview . 3.2 Linux Administration 3.3 Linux Hosts Chapter 4. Network Protocols and Services 4.1 Network Protocols 4.2 Ethernet and Internet Protocol 4.3 Connectivity Verification 4.4 Address Resolution Protocol 4.5 The Transport Layer 4.6 Network Services Chapter 5. Network Infrastructure 5.1 Network Communication Devices 5.2 Network Security Infrastructure 5.3 Network Representations Chapter 6. Principles of Network Security 6.1 Attackers and Their Tools 6.2 Common Threats and Attacks Chapter 7. Network Attacks: A Deeper Look 7.1 Observing Network Operation 7.2 Attacking the Foundation 7.3 Attacking What We Do Chapter 8. Protecting the Network 8.1 Understanding Defense 8.2 Access Control 8.3 Threat Intelligence Chapter 9. Cryptography and the Public Key Infrastructure 9.1 Cryptography 9.2 Public Key Cryptography Chapter 10. Endpoint Security and Analysis 10.1 Endpoint Protection 10.2 Endpoint Vulnerability Assessment Chapter 11. Security Monitoring 11.1 Technologies and Protocols 11.2 Log Files Chapter 12. Intrusion Data Analysis 12.1 Evaluating Alerts 12.2 Working with Network Security Data 12.3 Digital Forensics Chapter 13. Incident Response and Handling 13.1 Incident Response Models 13.2 CSIRTs and NIST 800-61r2

    Out of stock

    £52.00

  • CCNA Cloud CLDADM 210455 Official Cert Guide

    Pearson Education (US) CCNA Cloud CLDADM 210455 Official Cert Guide

    Out of stock

    Book SynopsisChris Jackson, CCIE No. 6256, is a Distinguished Systems Engineer working in worldwide sales training and enablement and the author of Network Security Auditing (Cisco Press, 2010). Chris is focused on all aspects of Cisco data center and cloud, not only in a technology perspective but through thought leadership in helping Cisco and customers better leverage the business transformational aspects these technologies provide. He holds dual CCIEs in security and routing and switching, CISA, CISSP, ITIL v3, seven SANS certifications, and a bachelor's degree in business administration. Residing in Franklin, Tennessee, Chris enjoys tinkering with RC drones, robotics, and anything else that can be programmed to do his bidding. In addition, he is a black belt in Taekwondo and a rabid Star Wars fan, and has a ridiculous collection of Lego. His wife, Barbara, and three children, Caleb, Sydney, and Savannah, are the true joy of his life and proof that not everything ha

    Out of stock

    £33.28

  • CCNP Enterprise Advanced Routing ENARSI 300410

    Pearson Education (US) CCNP Enterprise Advanced Routing ENARSI 300410

    1 in stock

    Book SynopsisRaymond Lacoste has dedicated his career to developing the skills of those interested in IT. In 2001, he began to mentor hundreds of IT professionals pursuing their Cisco certification dreams. This role led to teaching Cisco courses full time. Raymond is currently master instructor for Cisco Enterprise Routing and Switching, AWS, and ITIL at StormWind Studios. Raymond treats all technologies as an escape room, working to uncover every mystery in the protocols he works with. Along this journey, Raymond has passed more than 110 exams, and his office wall includes certificates from Microsoft, Cisco, ISC2, ITIL, AWS, and CompTIA. If you were visualizing Raymond's office, you'd probably expect the usual network equipment, certifications, and awards. Those certainly take up space, but they aren't his pride and joy. Most impressive, at least to Raymond, is his gemstone and mineral collection; once he starts talking about it, he just can't stop. Who doesn't get excited by a

    1 in stock

    £50.38

  • Integrated Security Technologies and Solutions -

    Pearson Education (US) Integrated Security Technologies and Solutions -

    10 in stock

    Book SynopsisThe essential reference for security pros and CCIE Security candidates: identity, context sharing, encryption, secure connectivity and virtualization Integrated Security Technologies and Solutions – Volume II brings together more expert-level instruction in security design, deployment, integration, and support. It will help experienced security and network professionals manage complex solutions, succeed in their day-to-day jobs, and prepare for their CCIE Security written and lab exams. Volume II focuses on the Cisco Identity Services Engine, Context Sharing, TrustSec, Application Programming Interfaces (APIs), Secure Connectivity with VPNs, and the virtualization and automation sections of the CCIE v5 blueprint. Like Volume I, its strong focus on interproduct integration will help you combine formerly disparate systems into seamless, coherent, next-generation security solutions. Part of the Cisco CCIE Professional Development Series from Cisco Press, it is authored by a team of CCIEs who are world-class experts in their Cisco security disciplines, including co-creators of the CCIE Security v5 blueprint. Each chapter starts with relevant theory, presents configuration examples and applications, and concludes with practical troubleshooting. Review the essentials of Authentication, Authorization, and Accounting (AAA) Explore the RADIUS and TACACS+ AAA protocols, and administer devices with them Enforce basic network access control with the Cisco Identity Services Engine (ISE) Implement sophisticated ISE profiling, EzConnect, and Passive Identity features Extend network access with BYOD support, MDM integration, Posture Validation, and Guest Services Safely share context with ISE, and implement pxGrid and Rapid Threat Containment Integrate ISE with Cisco FMC, WSA, and other devices Leverage Cisco Security APIs to increase control and flexibility Review Virtual Private Network (VPN) concepts and types Understand and deploy Infrastructure VPNs and Remote Access VPNs Virtualize leading Cisco Security products Make the most of Virtual Security Gateway (VSG), Network Function Virtualization (NFV), and microsegmentation Table of Contents Introduction xixPart I Knock, Knock! Who’s There? 1Chapter 1 Who and What: AAA Basics 3 Fundamentals of AAA 3 Understanding the Concept of Triple-A in the Real World 4 Compare and Select AAA Options 4 TACACS+ 7 RADIUS 12 Comparing RADIUS and TACACS+ 15 Summary 16Chapter 2 Basic Network Access Control 17 What Is Cisco ISE? 17 ISE Architecture for Network Access AAA 18 Configuring ISE for Single/Standalone and Multinode Deployments 23 ISE Configuration for Network Access 32 802.1X and Beyond 54 Configuring Wired Network Access with ISE 71 Configuring Wireless Network Access with ISE 115 Verifying Dot1X and MAB 140 Summary 148Chapter 3 Beyond Basic Network Access Control 149 Profiling with ISE 149 ISE Profiler and CoA 175 Profiles in Authorization Policies 178 Passive Identities and EasyConnect 180 Summary 191Chapter 4 Extending Network Access with ISE 193 Get Ready, Get Set, Prerequisites 194 BYOD Onboarding with ISE 197 MDM Onboarding and Enforcement with ISE 236 Posture Assessment and Remediation with ISE 244 Guest Access with ISE 265 TrustSec with ISE 287 Summary 306Chapter 5 Device Administration Control with ISE 307 The Case for Centralized AAA 307 RADIUS Versus TACACS+ for Device Administration 308 Using TACACS+ for Device Administration 309 Using RADIUS for Device Administration 343 Summary 352Part II Spread the Love! 353Chapter 6 Sharing the Context 355 The Many Integration Types of the Ecosystem 356 pxGrid in Depth 361 Summary 406Chapter 7 APIs in Cisco Security 407 APIs 101 407 Firepower Management Center APIs 413 Identity Services Engine APIs 424 Advanced Malware Protection APIs 428 Threat Grid APIs 433 Umbrella APIs 435 Summary 437 References 437Part III c2889775343d1ed91b 439Chapter 8 Security Connectivity 441 Hashing, Ciphers, Cryptography, and PKI 441 Virtual Private Networks 461 Layer 2 Encryption: IEEE 802.1AE/MACsec 470 Summary 474 References 474Chapter 9 Infrastructure VPN 477 IPsec with IKEv1 478 IPsec with IKEv2 484 EzVPN 492 DMVPN 500 FlexVPN 514 GETVPN 532 Summary 541 References 541Chapter 10 Remote Access VPN 543 Remote Access VPN Overview 543 Cisco AnyConnect Secure Mobility Client 546 Client-Based Remote Access VPN 554 Clientless Remote Access VPN 586 Summary 595 References 595Part IV The Red Pill 597Chapter 11 Security Virtualization and Automation 599 Cisco Virtual Solutions and Server Virtualization 599 Virtualization and Automation Solutions 602 Summary 613 References 61497815877147074, TOC, 2/28/19

    10 in stock

    £53.99

  • CCNP BCRAN Exam Certification Guide CCNP

    Pearson Education (US) CCNP BCRAN Exam Certification Guide CCNP

    1 in stock

    Book SynopsisPrepare for the new CCNP 642-821 BCRAN Exam with the official exam preparation guide Learn the remote access design and management topics for the new Cisco CCNP 642-821 BCRAN exam with the only official preparation book Practice with more than 200 test questions, including simulation-based questions on the enclosed CD-ROM CCNP BCRAN Exam Certification Guide Comprehensive coverage of all exam topics ensures readers will arrive at a complete understanding of what they need to master to succeed on the exam. This book follows a logical organization of the BCRAN exam objectives, and is written in a modular, small-chapter format that breaks elements into easy-to-absorb parts. It also contains the other valuable learning elements of an Exam Certification Guide from Cisco Press that ensure concept comprehension and retention. These include pre- and post-chapter quizzes, foundational review sections, scenario-based exercises and a CD-ROM testing

    1 in stock

    £38.96

  • CCNP BSCI Exam Certification Guide CCNP SelfStudy

    Pearson Education (US) CCNP BSCI Exam Certification Guide CCNP SelfStudy

    1 in stock

    Book SynopsisPrepare for the CCNP 642-801 BSCI exam with the only Cisco Systems authorized self-study preparation book. Master advanced routing techniques and practices Prepare for the new exam with the 200-plus question testing engine on CD-ROM that includes simulation-based questions Learn CCNP, CCDP, and CCIP routing topics with proven learning tools from the Exam Certification Guide series With updated technology and testing content, CCNP BSCI Exam Certification Guide (CCNP Self-Study) provides exceptional tutorial learning and exam preparation on advanced routing techniques and practices. It matches all the objectives of the new 642-801 BSCI exam launched in April 2003.Written in smaller, easier to absorb chapters than previous Exam Certification Guides, this book breaks down larger concepts into manageable blocks of learning. This, combined with other new learning elements and a complete rewriting of the material, make it even easier t

    1 in stock

    £49.57

  • Troubleshooting and Maintaining Cisco IP Networks

    Pearson Education Troubleshooting and Maintaining Cisco IP Networks

    Out of stock

    Book Synopsis

    Out of stock

    £67.50

  • CCNA Routing and Switching ICND2 200105 Official

    Pearson Education CCNA Routing and Switching ICND2 200105 Official

    1 in stock

    Book SynopsisWendell Odom, CCIE No. 1624 (Emeritus), has been in the networking industry since 1981. He has worked as a network engineer, consultant, systems engineer, instructor, and course developer; he currently works writing and creating certification study tools. This book is his 27th edition of some product for Pearson, and he is the author of all editions of the CCNA R&S and CCENT Cert Guides from Cisco Press. He has written books about topics from networking basics, certification guides throughout the years for CCENT, CCNA R&S, CCNA DC, CCNP ROUTE, CCNP QoS, and CCIE R&S. He helped develop the popular Pearson Network Simulator. He maintains study tools, links to his blogs, and other resources at www.certskills.com.

    1 in stock

    £27.06

  • CSS in easy steps

    In Easy Steps Limited CSS in easy steps

    1 in stock

    Book SynopsisCSS in easy steps, 4th edition begins by explaining how Cascading Style Sheets (CSS) can determine the presentation of elements within HTML documents. Examples show how style sheet rules can control content position and appearance, and provide dynamic effects with animation, transformations, and transitions. You will also learn how to design responsive web pages that look great viewed on any device. Each chapter builds your knowledge of style sheets. By the end of this book you will have gained a sound understanding of CSS and be able to create your own exciting interactive web pages.CSS in easy steps, 4th edition contains examples that provide clear syntax-highlighted code showing how to selectively style elements of an HTML document and how to endow elements with interactive functionality, to illustrate each aspect of CSS. CSS in easy steps, 4th edition has an easy-to-follow style that will appeal to anyone who wants to begin creating stylish web pages. It will appeal to programmers who want to quickly learn the latest style sheet techniques, and to the student who is studying website design at school or college, and to those seeking a career in web development who need a thorough understanding of CSS.

    1 in stock

    £11.39

© 2026 Book Curl

    • American Express
    • Apple Pay
    • Diners Club
    • Discover
    • Google Pay
    • Maestro
    • Mastercard
    • PayPal
    • Shop Pay
    • Union Pay
    • Visa

    Login

    Forgot your password?

    Don't have an account yet?
    Create account