did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9781587134388

CCNA Cybersecurity Operations Lab Manual

by
  • ISBN13:

    9781587134388

  • ISBN10:

    1587134381

  • Edition: 1st
  • Format: Paperback
  • Copyright: 2018-03-30
  • Publisher: Cisco Press

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $56.67 Save up to $24.37
  • Rent Book $32.30
    Add to Cart Free Shipping Icon Free Shipping

    TERM
    PRICE
    DUE
    USUALLY SHIPS IN 24-48 HOURS
    *This item is part of an exclusive publisher rental program and requires an additional convenience fee. This fee will be reflected in the shopping cart.

Supplemental Materials

What is included with this book?

Summary

The only authorized Lab Manual for the Cisco Networking Academy CCNA Cybersecurity Operations course Curriculum Objectives


CCNA Cybersecurity Operations 1.0 covers knowledge and skills needed to successfully handle the tasks, duties, and responsibilities of an associate-level Security Analyst working in a Security Operations Center (SOC).


Upon completion of the CCNA Cybersecurity Operations 1.0 course, students will be able to perform the following tasks:

  • Install virtual machines to create a safe environment for implementing and analyzing cybersecurity threat events.
  • Explain the role of the Cybersecurity Operations Analyst in the enterprise.
  • Explain the Windows Operating System features and characteristics needed to support cybersecurity analyses.
  • Explain the features and characteristics of the Linux Operating System.
  • Analyze the operation of network protocols and services.
  • Explain the operation of the network infrastructure.
  • Classify the various types of network attacks.
  • Use network monitoring tools to identify attacks against network protocols and services.
  • Use various methods to prevent malicious access to computer networks, hosts, and data.
  • Explain the impacts of cryptography on network security monitoring.
  • Explain how to investigate endpoint vulnerabilities and attacks.
  • Analyze network intrusion data to verify potential exploits.
  • Apply incident response models to manage network security incidents.

Author Biography

Cisco Networking Academy teaches hundreds of thousands of students annually the skills needed to build, design, and maintain, networks, improving their career prospects while filling the global demand for networking professionals. With 10,000 academies in 165 countries, it helps individuals prepare for industry-recognized certifications and entry-level information and communication technology careers in virtually every industry–developing foundational technical skills while acquiring vital 21st-century career skills in problem solving, collaboration, and critical thinking.

Table of Contents

Chapter 1. Cybersecurity and the Security Operations Center
1.1 The Danger Explain why networks and data are attacked.
1.2 Fighters in the War Against Cybercrime Explain how to prepare for a career in Cybersecurity operations.

Chapter 2. Windows Operating System
2.1 Windows Overview Explain the operation of the Windows Operating System.
2.2 Windows Administration Explain how to secure Windows endpoints.

Chapter 3. Linux Operating System
3.1 Linux Overview Perform basic operations in the Linux shell.
3.2 Linux Administration Perform basic Linux administration tasks.
3.3 Linux Hosts Perform basic security-related tasks on a Linux host.

Chapter 4. Network Protocols and Services
4.1 Network Protocols Explain how protocols enable network operations.
4.2 Ethernet and Internet Protocol Explain how the Ethernet and IP protocols support network communication.
4.3 Connectivity Verification Use common testing utilities to verify and test network connectivity.
4.4 Address Resolution Protocol Explain how the address resolution protocol enables communication on a network.
4.5 The Transport Layer Explain how transport layer protocols support network functionality.
4.6 Network Services Explain how network services enable network functionality.

Chapter 5. Network Infrastructure
5.1 Network Communication Devices Explain how network devices enable wired and wireless network communication.
5.2 Network Security Infrastructure Explain how devices and services are used to enhance network security.
5.3 Network Representations Explain how networks and network topologies are represented.

Chapter 6. Principles of Network Security
6.1 Attackers and Their Tools Explain how networks are attacked.
6.2 Common Threats and Attacks Explain the various types of threats and attacks.

Chapter 7. Network Attacks: A Deeper Look
7.1 Observing Network Operation Explain network traffic monitoring.
7.2 Attacking the Foundation Explain how TCP/IP vulnerabilities enable network attacks.
7.3 Attacking What We Do Explain how common network applications and services are vulnerable to attack.

Chapter 8. Protecting the Network
8.1 Understanding Defense Explain approaches to network security defense.
8.2 Access Control Explain access control as a method of protecting a network.
8.3 Threat Intelligence Use various intelligence sources to locate current security threats.

Chapter 9. Cryptography and the Public Key Infrastructure
9.1 Cryptography Use tools to encrypt and decrypt data.
9.2 Public Key Cryptography Explain how the public key infrastructure (PKI) supports network security.

Chapter 10. Endpoint Security and Analysis
10.1 Endpoint Protection Use a malware analysis website to generate a malware analysis report.
10.2 Endpoint Vulnerability Assessment Classify endpoint vulnerability assessment information.

Chapter 11. Security Monitoring
11.1 Technologies and Protocols Explain how security technologies affect security monitoring.
11.2 Log Files Explain the types of log files used in security monitoring

Chapter 12. Intrusion Data Analysis
12.1 Evaluating Alerts Explain the process of evaluating alerts.
12.2 Working with Network Security Data Interpret data to determine the source of an alert.
12.3 Digital Forensics Explain how the cybersecurity analyst handles digital forensics and evidence to ensure proper attack attribution.

Chapter 13. Incident Response and Handling
13.1 Incident Response Models Apply incident response models to an intrusion event.
13.2 CSIRTs and NIST 800-61r2 Apply standards specified in NIST 800-61r2 to a computer security incident.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program