Description

Book Synopsis
The only authorized Lab Manual for the Cisco Networking Academy CCNA Cybersecurity Operations course Curriculum Objectives CCNA Cybersecurity Operations 1.0 covers knowledge and skills needed to successfully handle the tasks, duties, and responsibilities of an associate-level Security Analyst working in a Security Operations Center (SOC). Upon completion of the CCNA Cybersecurity Operations 1.0 course, students will be able to perform the following tasks: Install virtual machines to create a safe environment for implementing and analyzing cybersecurity threat events. Explain the role of the Cybersecurity Operations Analyst in the enterprise. Explain the Windows Operating System features and characteristics needed to support cybersecurity analyses. Explain the features and characteristics of the Linux Operating System. Analyze the operation of network protocols and services. Explain the operation of the network infrastructure. Classify the various types of network attacks. Use network monitoring tools to identify attacks against network protocols and services. Use various methods to prevent malicious access to computer networks, hosts, and data. Explain the impacts of cryptography on network security monitoring. Explain how to investigate endpoint vulnerabilities and attacks. Analyze network intrusion data to verify potential exploits. Apply incident response models to manage network security incidents.

Table of Contents
Chapter 1. Cybersecurity and the Security Operations Center 1.1 The Danger 1.2 Fighters in the War Against Cybercrime Chapter 2. Windows Operating System 2.1 Windows Overview 2.2 Windows Administration Chapter 3. Linux Operating System 3.1 Linux Overview . 3.2 Linux Administration 3.3 Linux Hosts Chapter 4. Network Protocols and Services 4.1 Network Protocols 4.2 Ethernet and Internet Protocol 4.3 Connectivity Verification 4.4 Address Resolution Protocol 4.5 The Transport Layer 4.6 Network Services Chapter 5. Network Infrastructure 5.1 Network Communication Devices 5.2 Network Security Infrastructure 5.3 Network Representations Chapter 6. Principles of Network Security 6.1 Attackers and Their Tools 6.2 Common Threats and Attacks Chapter 7. Network Attacks: A Deeper Look 7.1 Observing Network Operation 7.2 Attacking the Foundation 7.3 Attacking What We Do Chapter 8. Protecting the Network 8.1 Understanding Defense 8.2 Access Control 8.3 Threat Intelligence Chapter 9. Cryptography and the Public Key Infrastructure 9.1 Cryptography 9.2 Public Key Cryptography Chapter 10. Endpoint Security and Analysis 10.1 Endpoint Protection 10.2 Endpoint Vulnerability Assessment Chapter 11. Security Monitoring 11.1 Technologies and Protocols 11.2 Log Files Chapter 12. Intrusion Data Analysis 12.1 Evaluating Alerts 12.2 Working with Network Security Data 12.3 Digital Forensics Chapter 13. Incident Response and Handling 13.1 Incident Response Models 13.2 CSIRTs and NIST 800-61r2

CCNA Cybersecurity Operations Lab Manual

Product form

£52.00

Includes FREE delivery

Order before 4pm tomorrow for delivery by Wed 28 Jan 2026.

A Paperback / softback by Cisco Networking Academy

Out of stock


    View other formats and editions of CCNA Cybersecurity Operations Lab Manual by Cisco Networking Academy

    Publisher: Pearson Education (US)
    Publication Date: 02/05/2018
    ISBN13: 9781587134388, 978-1587134388
    ISBN10: 1587134381

    Description

    Book Synopsis
    The only authorized Lab Manual for the Cisco Networking Academy CCNA Cybersecurity Operations course Curriculum Objectives CCNA Cybersecurity Operations 1.0 covers knowledge and skills needed to successfully handle the tasks, duties, and responsibilities of an associate-level Security Analyst working in a Security Operations Center (SOC). Upon completion of the CCNA Cybersecurity Operations 1.0 course, students will be able to perform the following tasks: Install virtual machines to create a safe environment for implementing and analyzing cybersecurity threat events. Explain the role of the Cybersecurity Operations Analyst in the enterprise. Explain the Windows Operating System features and characteristics needed to support cybersecurity analyses. Explain the features and characteristics of the Linux Operating System. Analyze the operation of network protocols and services. Explain the operation of the network infrastructure. Classify the various types of network attacks. Use network monitoring tools to identify attacks against network protocols and services. Use various methods to prevent malicious access to computer networks, hosts, and data. Explain the impacts of cryptography on network security monitoring. Explain how to investigate endpoint vulnerabilities and attacks. Analyze network intrusion data to verify potential exploits. Apply incident response models to manage network security incidents.

    Table of Contents
    Chapter 1. Cybersecurity and the Security Operations Center 1.1 The Danger 1.2 Fighters in the War Against Cybercrime Chapter 2. Windows Operating System 2.1 Windows Overview 2.2 Windows Administration Chapter 3. Linux Operating System 3.1 Linux Overview . 3.2 Linux Administration 3.3 Linux Hosts Chapter 4. Network Protocols and Services 4.1 Network Protocols 4.2 Ethernet and Internet Protocol 4.3 Connectivity Verification 4.4 Address Resolution Protocol 4.5 The Transport Layer 4.6 Network Services Chapter 5. Network Infrastructure 5.1 Network Communication Devices 5.2 Network Security Infrastructure 5.3 Network Representations Chapter 6. Principles of Network Security 6.1 Attackers and Their Tools 6.2 Common Threats and Attacks Chapter 7. Network Attacks: A Deeper Look 7.1 Observing Network Operation 7.2 Attacking the Foundation 7.3 Attacking What We Do Chapter 8. Protecting the Network 8.1 Understanding Defense 8.2 Access Control 8.3 Threat Intelligence Chapter 9. Cryptography and the Public Key Infrastructure 9.1 Cryptography 9.2 Public Key Cryptography Chapter 10. Endpoint Security and Analysis 10.1 Endpoint Protection 10.2 Endpoint Vulnerability Assessment Chapter 11. Security Monitoring 11.1 Technologies and Protocols 11.2 Log Files Chapter 12. Intrusion Data Analysis 12.1 Evaluating Alerts 12.2 Working with Network Security Data 12.3 Digital Forensics Chapter 13. Incident Response and Handling 13.1 Incident Response Models 13.2 CSIRTs and NIST 800-61r2

    Recently viewed products

    © 2026 Book Curl

      • American Express
      • Apple Pay
      • Diners Club
      • Discover
      • Google Pay
      • Maestro
      • Mastercard
      • PayPal
      • Shop Pay
      • Union Pay
      • Visa

      Login

      Forgot your password?

      Don't have an account yet?
      Create account