did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9781587134371

CCNA Cybersecurity Operations Course Booklet

by
  • ISBN13:

    9781587134371

  • ISBN10:

    1587134373

  • Edition: 1st
  • Format: Paperback
  • Copyright: 2018-03-27
  • Publisher: Cisco Press

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $36.67 Save up to $7.33
  • Rent Book $29.34
    Add to Cart Free Shipping Icon Free Shipping

    TERM
    PRICE
    DUE
    USUALLY SHIPS IN 2-3 BUSINESS DAYS
    *This item is part of an exclusive publisher rental program and requires an additional convenience fee. This fee will be reflected in the shopping cart.

Supplemental Materials

What is included with this book?

Summary

Your Cisco Networking Academy Course Booklet is designed as a study resource you can easily read, highlight, and review on the go, wherever the Internet is not available or practical:


·         The text is extracted directly, word-for-word, from the online course so you can highlight important points and take notes in the “Your Chapter Notes” section.

·         Headings with the exact page correlations provide a quick reference to the online course for your classroom discussions and exam preparation.

·         An icon system directs you to the online curriculum to take full advantage of the images embedded within the Networking Academy online course interface and reminds you to perform the labs, Class Activities, interactive activities, Packet Tracer activities, watch videos, and take the chapter quizzes and exams.


The Course Booklet is a basic, economical paper-based resource to help you succeed with the Cisco Networking Academy online course.

 

Author Biography

Cisco Networking Academy is an innovative Cisco education initiative that delivers information and communication technology skills to improve career and economic opportunities around the world. The Academy provides online courses, interactive tools, and lab activities to prepare individuals for information technology and networking careers in virtually every industry.

Table of Contents

Chapter 1. Cybersecurity and the Security Operations Center
Explain the role of the Cybersecurity Operations Analyst in the enterprise.
1.1 The Danger Explain why networks and data are attacked.
1.2 Fighters in the War Against Cybercrime Explain how to prepare for a career in Cybersecurity operations.

 

Chapter 2. Windows Operating System
Explain the Windows Operating System features and characteristics needed to support cybersecurity analyses.
2.1 Windows Overview Explain the operation of the Windows Operating System.
2.2 Windows Administration Explain how to secure Windows endpoints.

 

Chapter 3. Linux Operating System
Explain the features and characteristics of the Linux OperatingSystem.
3.1 Linux Overview Perform basic operations in the Linux shell.
3.2 Linux Administration Perform basic Linux administration tasks.
3.3 Linux Hosts Perform basic security-related tasks on a Linux host.

 

Chapter 4. Network Protocols and Services
Analyze the operation of network protocols and services.
4.1 Network Protocols Explain how protocols enable network operations.
4.2 Ethernet and Internet Protocol Explain how the Ethernet and IP protocols support network
communication.
4.3 Connectivity Verification Use common testing utilities to verify and test network connectivity.
4.4 Address Resolution Protocol Explain how the address resolution protocol enables communication
on a network.
4.5 The Transport Layer Explain how transport layer protocols support network functionality.
4.6 Network Services Explain how network services enable network functionality.

 

Chapter 5. Network Infrastructure
Explain the operation of the network infrastructure.
5.1 Network Communication Devices Explain how network devices enable wired and wireless network
communication.
5.2 Network Security Infrastructure Explain how devices and services are used to enhance network
security.
5.3 Network Representations Explain how networks and network topologies are represented.

 

Chapter 6. Principles of Network Security
Classify the various types of network attacks.
6.1 Attackers and Their Tools Explain how networks are attacked.
6.2 Common Threats and Attacks Explain the various types of threats and attacks.

 

Chapter 7. Network Attacks: A Deeper Look
Use network monitoring tools to identify attacks against network protocols and services.
7.1 Observing Network Operation Explain network traffic monitoring.
7.2 Attacking the Foundation Explain how TCP/IP vulnerabilities enable network attacks.
7.3 Attacking What We Do Explain how common network applications and services are vulnerable
to attack.

 

Chapter 8. Protecting the Network
Use various methods to prevent malicious access to computer networks, hosts, and data.
8.1 Understanding Defense Explain approaches to network security defense.
8.2 Access Control Explain access control as a method of protecting a network.
8.3 Threat Intelligence Use various intelligence sources to locate current security threats.

 

Chapter 9. Cryptography and the Public Key Infrastructure
Explain the impacts of cryptography on network security monitoring.
9.1 Cryptography Use tools to encrypt and decrypt data.
9.2 Public Key Cryptography Explain how the public key infrastructure (PKI) supports network
security.

 

Chapter 10. Endpoint Security and Analysis
Explain how to investigate endpoint vulnerabilities and attacks.
10.1 Endpoint Protection Use a malware analysis website to generate a malware analysis
report.
10.2 Endpoint Vulnerability Assessment Classify endpoint vulnerability assessment information.

 

Chapter 11. Security Monitoring
Identify network security alerts.
11.1 Technologies and Protocols Explain how security technologies affect security monitoring.
11.2 Log Files Explain the types of log files used in security monitoring

 

Chapter 12. Intrusion Data Analysis
Analyze network intrusion data to verify potential exploits.
12.1 Evaluating Alerts Explain the process of evaluating alerts.
12.2 Working with Network Security Data Interpret data to determine the source of an alert.
12.3 Digital Forensics Explain how the cybersecurity analyst handles digital forensics and
evidence to ensure proper attack attribution.

 

Chapter 13. Incident Response and Handling
Apply incident response models to manage network security incidents.
13.1 Incident Response Models Apply incident response models to an intrusion event.
13.2 CSIRTs and NIST 800-61r2 Apply standards specified in NIST 800-61r2 to a computer security
incident.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program