intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Lecture CCNA Security

Xem 1-15 trên 15 kết quả Lecture CCNA Security
  • This chapter describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components of any data network. Identify the opportunities and challenges posed by converged networks. Describe the characteristics of network architectures: fault tolerance, scalability, quality of service and security. Install and use IRC clients and a Wikiserver.

    pdf55p youcanletgo_01 04-01-2016 57 5   Download

  • This chapter summarize the operation of Ethernet as defined for 100/1000 Mbps LANs in the IEEE 802.3 standard. Explain the functions that enable a switch to forward Ethernet frames in a LAN. Configure a switch for operation in a network designed to support voice, video, and data transmissions. Configure basic security on a switch that will operate in a network designed to support voice, video, and data transmissions.

    pdf163p youcanletgo_01 04-01-2016 59 5   Download

  • Describe the components and operations of basic wireless LAN topologies. Describe the components and operations of basic wireless LAN security. Configure and verify basic wireless LAN access. Configure and troubleshoot wireless client access.

    pdf97p youcanletgo_01 04-01-2016 53 6   Download

  • In this chapter, you will learn to: Identify security threats to enterprise networks. Describe methods to mitigate security threats to enterprise networks. Configure basic router security. Disable unused router services and interfaces. Use the Cisco SDM one-step lockdown feature. Manage files and software images with the Cisco IOS Integrated File System (IFS).

    pdf157p youcanletgo_01 04-01-2016 43 5   Download

  • In this chapter, you will learn to: Explain how ACLs are used to secure a medium-size enterprise branch office network, including the concept of packet filtering, the purpose of ACLs, how ACLs are used to control access, and the types of Cisco ACLs. Configure standard ACLs in a medium-size enterprise branch office network, including defining filtering criteria, configuring standard ACLs to filter traffic, and applying standard ACLs to router interfaces,...

    pdf86p youcanletgo_01 04-01-2016 58 5   Download

  • Learning objectives of this chapter include: Secure the physical installation of and the administrative access to Cisco routers based on different network requirements using the CLI and CCP; configure administrative roles using privilege levels and role-based CLI; Implement the management and reporting features of syslog, SNMP, SSH, and NTP;...

    pdf175p youcanletgo_01 04-01-2016 51 6   Download

  • In this chapter, you learned to: Explain the funtion and operation of the authentication, authorization, and accounting (AAA) protocol; configure a Cisco router to perform AAA authentication with a local database; describe how to configure Cisco ACS to support AAA for Cisco IOS routers; configure server-base AAA.

    pdf78p youcanletgo_01 04-01-2016 42 6   Download

  • Upon completion of this lesson, the successful participant will be able to: Describe the rationale for network security; describe the three principles of network security; identify risks, threats, vulnerabilities and countermeasures; discuss the three states of information and identify threats and appropriate countermeasures for each state;...

    pdf75p youcanletgo_01 04-01-2016 61 4   Download

  • This chapter describle the underlying IDS and IPS technology that is embedded in the Cisco host-and network-based IDS and IPS solutions, configure Cisco IOS IPS using CLI and CCP, verify Cisco Verify Cisco IOS using CLI and CCP. Inviting you to refer.

    pdf83p youcanletgo_01 04-01-2016 67 5   Download

  • The following will be discussed in this chapter: Describle endpoint security with IronPort; describle endpoint security with Network Admission Control; describle endpoint Security with Cisco Security Agent; describle MAC address spoofing attacks, STP manipulation attacks, MAC address overflow attacks, LAN storm attacks, and VLAN attacks;...

    pdf143p youcanletgo_01 04-01-2016 71 5   Download

  • Chapter 4 objectives: Describe numbered and named, standard and extended IP ACLs, configure IP ACLs with IOS CLI and CCP, describe TCP established ACL functionality, describe and configure reflexive ACLs, describe and configure dynamic ACLs,... Inviting you to refer.

    pdf132p youcanletgo_01 04-01-2016 55 4   Download

  • Upon completion of this lesson, the successful participant will be able to: Describe the purpose and operation of VPNs, differentiate between the various types of VPNs; identify the Cisco VPN product line and the security features of these products; configure a site-to-site VPN GRE tunnel;... Inviting you to refer.

    pdf124p youcanletgo_01 04-01-2016 74 5   Download

  • After completing this chapter, students will be able to: Describe how the types of encryption, hashes, and digital signatures work together to provide confidentiality, integrity, and authentication; describe the mechanisms to ensure data integrity and authentication; describe the mechanisms used to ensure data confidentiality.

    pdf104p youcanletgo_01 04-01-2016 36 4   Download

  • This chapter include objectives: Describle the principles of secure network design, describle threat identificaion and risk analysis, describle risk managenment and risk avoidance, describle the Cisco SecureX architecture, describle operation security,...

    pdf82p youcanletgo_01 04-01-2016 73 4   Download

  • The ASA is a standalone firewall device that is a primary component of the Cisco SecureX architecture. The following will be discussed in this chapter: Which kind of branch is appropriate for the IOS firewall solution? What is disadvantage of the IOS firewall solution? Inviting you to refer.

    pdf50p youcanletgo_01 04-01-2016 49 5   Download

CHỦ ĐỀ BẠN MUỐN TÌM

TOP DOWNLOAD
207 tài liệu
1455 lượt tải
ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2