CCNA. Security STUDY GUIDE. Tim Boyles. Covers All Exam Objectives for IINS

Size: px
Start display at page:

Download "CCNA. Security STUDY GUIDE. Tim Boyles. Covers All Exam Objectives for IINS"

Transcription

1 Covers All Exam Objectives for IINS Includes Real-World Scenarios, Hands-On and Written Labs, and Leading-Edge Exam Prep Software Featuring: Custom Test Engine Hundreds of Sample Questions Electronic Flashcards Entire Book in PDF CCNA Security STUDY GUIDE IINS Exam Tim Boyles SERIOUS SKILLS.

2

3 CCNA Security Study Guide Exam IINS OBJECTIVE CHAPTER Describe the security threats facing modern network infrastructures Describe and list mitigation methods for common network attacks 2, 6 Describe and list mitigation methods for Worm, Virus, and Trojan Horse attacks 2, 6 Describe the Cisco Self Defending Network architecture 2 Secure Cisco routers Secure Cisco routers using the SDM Security Audit feature 5 Use the One-Step Lockdown feature in SDM to secure a Cisco router 5 Secure administrative access to Cisco routers by setting strong encrypted passwords, exec timeout, login failure rate and using IOS login enhancements Secure administrative access to Cisco routers by configuring multiple privilege levels 3 3 Secure administrative access to Cisco routers by configuring role based CLI 3 Secure the Cisco IOS image and configuration file 3 Implement AAA on Cisco routers using local router database and external ACS Explain the functions and importance of AAA 4 Describe the features of TACACS+ and RADIUS AAA protocols 4 Configure AAA authentication 4 Configure AAA authorization 4 Configure AAA accounting 4 Mitigate threats to Cisco routers and networks using ACLs Explain the functionality of standard, extended, and named IP ACLs used by routers to filter packets Configure and verify IP ACLs to mitigate given threats (filter IP traffic destined for Telnet, SNMP, and DDoS attacks) in a network using CLI 7 7 Configure IP ACLs to prevent IP address spoofing using CLI 7 Discuss the caveats to be considered when building ACLs 7

4 OBJECTIVE Implement secure network management and reporting Use CLI and SDM to configure SSH on Cisco routers to enable secured management access Use CLI and SDM to configure Cisco routers to send Syslog messages to a Syslog server CHAPTER 5 5 Mitigate common Layer 2 attacks Describe how to prevent layer 2 attacks by configuring basic Catalyst switch security features 6 Implement the Cisco IOS firewall feature set using SDM Describe the operational strengths and weaknesses of the different firewall technologies 7 Explain stateful firewall operations and the function of the state table 7 Implement Zone Based Firewall using SDM 7 Implement the Cisco IOS IPS feature set using SDM Define network based vs. host based intrusion detection and prevention 8 Explain IPS technologies, attack responses, and monitoring options 8 Enable and verify Cisco IOS IPS operations using SDM 8 Implement site-to-site VPNs on Cisco Routers using SDM Explain the different methods used in cryptography 9, 10 Explain IKE protocol functionality and phases 10 Describe the building blocks of IPSec and the security functions it provides 12 Configure and verify an IPSec site-to-site VPN with pre-shared key authentication using SDM 12 Exam specifications and content are subject to change at any time without prior notice and at Cisco s sole discretion. Please visit Cisco s website ( for the most current information on exam content.

5 CCNA Security Study Guide Tim Boyles

6 Acquisitions Editor: Jeff Kellum Development Editor: Stef Jones Technical Editors: Chris Carson, Billy Haines Production Editor: Angela Smith Copy Editor: Judy Flynn Editorial Manager: Pete Gaughan Production Manager: Tim Tate Vice President and Executive Group Publisher: Richard Swadley Vice President and Publisher: Neil Edde Media Project Manager 1: Laura Moss-Hollister Media Associate Producer: Doug Kuhn Media Quality Assurance: Josh Frank Book Designers: Judy Fung and Bill Gibson Proofreader: Rebecca Rider Indexer: Jack Lewis Project Coordinator, Cover: Lynsey Stanford Cover Designer: Ryan Sneed Copyright 2010 by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada ISBN: No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) , fax (978) Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) , fax (201) , or online at Limit of Liability/Disclaimer of Warranty: The publisher and the author make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation warranties of fitness for a particular purpose. No warranty may be created or extended by sales or promotional materials. The advice and strategies contained herein may not be suitable for every situation. This work is sold with the understanding that the publisher is not engaged in rendering legal, accounting, or other professional services. If professional assistance is required, the services of a competent professional person should be sought. Neither the publisher nor the author shall be liable for damages arising herefrom. The fact that an organization or Web site is referred to in this work as a citation and/or a potential source of further information does not mean that the author or the publisher endorses the information the organization or Web site may provide or recommendations it may make. Further, readers should be aware that Internet Web sites listed in this work may have changed or disappeared between when this work was written and when it is read. For general information on our other products and services or to obtain technical support, please contact our Customer Care Department within the U.S. at (877) , outside the U.S. at (317) or fax (317) Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic books. Library of Congress Cataloging-in-Publication Data is available from publisher. TRADEMARKS: Wiley, the Wiley logo, and the Sybex logo are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates, in the United States and other countries, and may not be used without written permission. CCNA is a registered trademark of Cisco Technology, Inc. All other trademarks are the property of their respective owners. Wiley Publishing, Inc., is not associated with any product or vendor mentioned in this book

7 To God and my family. Without the support and love from both, I would not be able to do what I do. Thanks for the many blessings. Acknowledgments When you take on a project like this, there are always a number of people involved, and this one is no exception. I could not have done this book without the help and support of several folks. First, I d like to thank my technical editor, Chris Carson, for keeping me honest and offering candid feedback. Chris also contributed to this book by writing Chapter 10 and Chapter 11. His help was invaluable. I would also like to thank Patrick Conlan, who provided access to most of the equipment used in the writing of this book. A special thanks goes out to Stef Jones, this book s developmental editor. Stef was the one to keep me in line and was a tremendous help in shaping up some of the more difficult chapters. And last but not least, thanks to the team at Sybex for supporting me in this endeavor: Pete Gaughan, editorial manager; Jeff Kellum, acquisitions editor; and Jenni Housh, Connor O Brien, and Angela Smith, who are all on the editorial team. I m sure I gave Jeff plenty of cause for concern over the course of the better part of a year, but we all survived I think. Also, thanks to copyeditor Judy Flynn, proofreader Rebecca Rider, and indexer Jack Lewis.

8 About The Author Tim Boyles is an IT manager at a large retailer based in the Dallas Fort Worth Metroplex. He has been involved in networking and security for over 20 years. He is the holder of many certifications, including CISSP, CISA, CISM, GCIH, GAWN, and of course CCNA and CCNA-Security. Tim has worked on many networking and security books. He was previously the security practice leader for the South Central operation of BT Global Services and has been engaged with consulting for a number of years with numerous large corporate clients. He is also a mentor instructor for the SANS Institute, having conducted sessions on CISSP training, Incident Handling, Wireless Penetration Testing, and Web Application Security. About the Contributor Chris L. Carson, CCIE #19511, is a principal at Ethical Networks, a network and security consulting provider in the Dallas Ft. Worth area. He has been in the network and security industry for more than 17 years and holds over 20 industry certifications, including CCIE, CCSP, CEH, and CCNA-Security. Most of his career has been spent working for large Cisco Gold partners throughout the United States. Chris s previous position as a security practice manager and principal for one of the largest Cisco partners in North Texas has provided him with expertise in designing, implementing, and troubleshooting solutions for many Fortune 500 customers.

9 Contents at a Glance Introduction Assessment Test xvii xxiv Chapter 1 Introduction to Network Security 1 Chapter 2 Creating the Secure Network 25 Chapter 3 Securing Administrative Access 51 Chapter 4 Configuring AAA Services 77 Chapter 5 Securing Your Router 117 Chapter 6 Layer 2 Security 159 Chapter 7 Implementing Cisco IOS Firewall 193 Chapter 8 Implementing Cisco IOS Intrusion Prevention 245 Chapter 9 Understanding Cryptographic Solutions 281 Chapter 10 Using Digital Signatures 299 Chapter 11 Using Asymmetric Encryption and PKI 323 Chapter 12 Implementing Site-to-Site IPsec VPN Solutions 377 Appendix A Securing Voice Solutions 425 Appendix B Introduction to SAN Security 441 Appendix C Exploring Endpoint Security 451 Appendix D Capstone Exercise 461 Appendix E About the Companion CD 483 Glossary 487 Index 495

10

11 Contents Introduction Assessment Test xvii xxiv Chapter 1 Introduction to Network Security 1 Threats to Network Security 2 External Threats 3 Internal Threats 5 Application Security 6 Network Security Objectives 6 Classification of Data 8 Security Controls 11 Security Controls by Type 11 Security Controls by Purpose 12 Incident Response 13 Preparation 13 Identification 15 Containment 16 Eradication 17 Recovery 17 Lessons Learned 17 Law and Ethics 18 Legal Matters 18 Intellectual Property 19 Ethics 20 Review Questions 21 Answers to Review Questions 23 Chapter 2 Creating the Secure Network 25 Creating a Security Policy 26 Goals of a Security Policy 26 Policies and Procedures 27 Other Documents 28 Managing Risk 28 Secure Network Design 32 Creating Security Awareness 34 Maintaining Operational Security 35 Defining the Systems Development Life Cycle 35 Review of Operations Security 37 Evolution of Threats 38

12 viii Contents The Cisco Self-Defending Network 39 Characteristics of the Cisco Self-Defending Network 40 Components of the Cisco Self-Defending Network 42 Summary 42 Exam Essentials 42 Written Lab 43 Review Questions 44 Answers to Review Questions 48 Answers to Written Lab 50 Chapter 3 Securing Administrative Access 51 Securing Administrative Access 52 Methods of Accessing the Router 52 Modes of Interaction with the Router 52 Configuring Passwords 54 Configuring Privilege Levels 56 CLI Views 56 Securing Router Files 58 Login Features for Virtual Connections 58 Configuring a Banner Message 59 Cisco ISR Routers 61 Cisco Security Device Manager (SDM) 62 Prerequisites for Running SDM 62 Introduction to SDM 64 Summary 67 Exam Essentials 68 Written Lab 68 Hands-on Lab 69 Hands-on Lab 3.1: Configuring Passwords 69 Review Questions 70 Answers to Review Questions 74 Answers to Written Lab 75 Chapter 4 Configuring AAA Services 77 Defining AAA Services 78 Defining RADIUS and TACACS+ 79 RADIUS 80 TACACS+ 81 Configuring AAA Using Cisco Secure ACS 82 Introduction to Cisco Secure ACS for Windows 83 Preparation and Installation of Cisco Secure ACS for Windows 86

13 Contents ix Configuring Authentication 91 AAA Local User Authentication 92 Using Method Lists 93 Configuring Authorization 94 Configuring Accounting 95 Configuring TACACS+ 96 Configuring AAA Services from the Command Line 97 Configuring AAA Services with Cisco SDM 98 Troubleshooting AAA on Cisco Routers 104 Summary 106 Exam Essentials 106 Written Lab 107 Hands-on Labs 108 Hands-on Lab 4.1: Configuring AAA Authentication with a Local Database 108 Hands-on Lab 4.2: Configuring TACACS+ Authentication, Authorization, and Accounting 109 Review Questions 110 Answers to Review Questions 114 Answers to Written Lab 116 Chapter 5 Securing Your Router 117 Using the Command-Line Interface to Lock Down the Router 118 Locking Down the Management Plane 118 Locking Down the Forwarding Plane 121 Understanding One-Step Lockdown 128 Configuring One-Step Lockdown with SDM 128 Differences between One-Step Lockdown and AutoSecure 131 Securing Management and Logging 131 Configuring Syslog Support on a Cisco Router 131 Using SNMP v3 to Secure Management Traffic 134 Securing Administration Using SSH 136 Using SDM to Configure a Syslog Server, SSH, SNMP, and NTP 138 Summary 149 Exam Essentials 150 Written Lab 151 Hands-on Lab 151 Hands-on Lab 5.1: Configuring a Router for SSH Administrative Access 151 Review Questions 153 Answers to Review Questions 157 Answers to Written Lab 158

14 x Contents Chapter 6 Layer 2 Security 159 Basic Protection of Layer 2 Switches 160 How to Prevent VLAN Attacks 161 Double Tagging 161 Switch Spoofing 162 Mitigating STP Attacks 163 Mitigating DHCP Server Spoofing 165 Configuring DCHP Snooping 166 Dynamic ARP Inspection 166 Protecting against CAM Table Attacks 167 Preventing MAC Spoofing 168 Configuring Port Security 169 Configuring SPAN, RSPAN, and Storm Control 173 Configuring Switched Port Analyzer (SPAN) 173 Configuring Remote Switched Port Analyzer (RSPAN) 175 Configuring Storm Control 178 Summary 179 Exam Essentials 179 Written Lab 181 Hands-on Labs 181 Hands-on Lab 6.1: Configuring Protection against a Spanning Tree Attack 181 Hands-on Lab 6.2: Configuring SPAN on a Cisco Switch to Do Troubleshooting 182 Hands-on Lab 6.3: Configuring Port Security on a Cisco Switch 183 Review Questions 185 Answers to Review Questions 189 Answers to Written Lab 191 Chapter 7 Implementing Cisco IOS Firewall 193 Firewall Basics 194 Packet Filtering Firewall 196 Application-Layer Firewall 197 Stateful Firewall 197 Access Control Lists 198 Basic ACLs 198 Turbo ACLs 200 How to Develop ACLs 201 Applying ACLs to Router Interfaces 201 Filtering Traffic with ACLs 202 Logical and Performance Considerations for ACLs 204

15 Contents xi The Cisco IOS Firewall 205 Authentication Proxy 206 Transparent Firewall 206 Stateful Packet Inspection 206 Configure Cisco IOS Firewall with SDM 211 Basic Firewall 212 Advanced Firewall 218 Verify Cisco IOS Firewall Configurations 226 Basic Firewall 227 Advanced Firewall 231 Implementing Zone-Based Firewall 235 Summary 236 Exam Essentials 237 Written Lab 237 Hands-on Lab 238 Hands-on Lab 7.1: Configuring an Access List 238 Review Questions 239 Answers to Review Questions 242 Answers to Written Lab 243 Chapter 8 Implementing Cisco IOS Intrusion Prevention 245 IDS and IPS 246 Introducing the Intrusion Detection System 246 Basic Functions of the Intrusion Prevention System 247 Using IDS and IPS Together 249 Benefits and Drawbacks of IPS/IDS Sensors 250 Types of IDS and IPS Sensors 250 IPS Signatures 254 Configuring IOS IPS 259 Summary 273 Exam Essentials 273 Written Lab 274 Hands-on Lab 274 Hands-on Lab 8.1: Configuring an IPS Policy Using Cisco SDM 274 Review Questions 275 Answers to Review Questions 278 Answers to Written Lab 280 Chapter 9 Understanding Cryptographic Solutions 281 Introduction to Cryptography 282 Caesar s Cipher 282 Vigenère Cipher 284

Study Guide. Robert Schmidt Dane Charlton

Study Guide. Robert Schmidt Dane Charlton Study Guide Study Guide Robert Schmidt Dane Charlton Senior Acquisitions Editor: Kenyon Brown Development Editor: Candace English Technical Editors: Eric Biller and Brian Atkinson Production Editor: Christine

More information

MCITP Windows Server 2008 Server Administrator Study Guide

MCITP Windows Server 2008 Server Administrator Study Guide MCITP Windows Server 2008 Server Administrator Study Guide Darril Gibson MCITP Windows Server 2008 Server Administrator Study Guide MCITP Windows Server 2008 Server Administrator Study Guide Darril Gibson

More information

MCTS. Microsoft Windows 7 Configuration STUDY GUIDE. William Panek. Covers All Objectives for Exam Exam

MCTS. Microsoft Windows 7 Configuration STUDY GUIDE. William Panek. Covers All Objectives for Exam Exam Covers All Objectives for Exam 70-680 Includes Real-World Scenarios, Hands-On Exercises, and Leading-Edge Exam Prep Software Featuring: Custom Test Engine Hundreds of Sample Questions Electronic Flashcards

More information

Windows. 7 Desktop Support and Administration. Real World Skills for MCITP Certification and Beyond. Darril Gibson

Windows. 7 Desktop Support and Administration. Real World Skills for MCITP Certification and Beyond. Darril Gibson Windows 7 Desktop Support and Administration Real World Skills for MCITP Certification and Beyond Darril Gibson Acquisitions Editor: Jeff Kellum Development Editor: Gary Schwartz Technical Editors: Troy

More information

7 Windows Tweaks. A Comprehensive Guide to Customizing, Increasing Performance, and Securing Microsoft Windows 7. Steve Sinchak

7 Windows Tweaks. A Comprehensive Guide to Customizing, Increasing Performance, and Securing Microsoft Windows 7. Steve Sinchak Take control of Windows 7 Unlock hidden settings Rev up your network Disable features you hate, for good Fine-tune User Account control Turbocharge online speed Master the taskbar and start button Customize

More information

Join the p2p.wrox.com. Wrox Programmer to Programmer. Beginning PHP 5.3. Matt Doyle

Join the p2p.wrox.com. Wrox Programmer to Programmer. Beginning PHP 5.3. Matt Doyle Join the discussion @ p2p.wrox.com Wrox Programmer to Programmer Beginning PHP 5.3 Matt Doyle Programmer to Programmer Get more out of WROX.com Interact Take an active role online by participating in our

More information

Linux Command Line and Shell Scripting Bible

Linux Command Line and Shell Scripting Bible Linux Command Line and Shell Scripting Bible Richard Blum Wiley Publishing, Inc. Linux Command Line and Shell Scripting Bible Linux Command Line and Shell Scripting Bible Richard Blum Wiley Publishing,

More information

Implementing Security and Tokens: Current Standards, Tools, and Practices

Implementing  Security and Tokens: Current Standards, Tools, and Practices Implementing Email Security and Tokens: Current Standards, Tools, and Practices Sean Turner Russ Housley Wiley Publishing, Inc. Implementing Email Security and Tokens: Current Standards, Tools, and Practices

More information

Linux. The book you need to succeed! Boot up to Ubuntu, Fedora, KNOPPIX, Debian, opensuse, and 13 Other Distributions Edition.

Linux. The book you need to succeed! Boot up to Ubuntu, Fedora, KNOPPIX, Debian, opensuse, and 13 Other Distributions Edition. DVD and CD-ROM Included Run or install 18 different Linux distributions from the multi-boot DVD and CD-ROM! Christopher Negus Linux 2009 Edition Boot up to Ubuntu, Fedora, KNOPPIX, Debian, opensuse, and

More information

SYLLABUS. DIVISION: Business and Engineering Technology REVISED: FALL 2015 CREDIT HOURS: 4 HOURS/WK LEC: 4 HOURS/WK LAB: 0 LEC/LAB COMB: 4

SYLLABUS. DIVISION: Business and Engineering Technology REVISED: FALL 2015 CREDIT HOURS: 4 HOURS/WK LEC: 4 HOURS/WK LAB: 0 LEC/LAB COMB: 4 SYLLABUS DIVISION: Business and Engineering Technology REVISED: FALL 2015 CURRICULA IN WHICH COURSE IS TAUGHT: IST, Information Systems Technology COURSE NUMBER AND TITLE: ITN 262 Cisco CCNA Security CREDIT

More information

Linux Command Line and Shell Scripting Bible. Third Edtion

Linux Command Line and Shell Scripting Bible. Third Edtion Linux Command Line and Shell Scripting Bible Third Edtion Linux Command Line and Shell Scripting BIBLE Third Edition Richard Blum Christine Bresnahan Linux Command Line and Shell Scripting Bible, Third

More information

Beginning Web Programming with HTML, XHTML, and CSS. Second Edition. Jon Duckett

Beginning Web Programming with HTML, XHTML, and CSS. Second Edition. Jon Duckett Beginning Web Programming with HTML, XHTML, and CSS Second Edition Jon Duckett Beginning Web Programming with HTML, XHTML, and CSS Introduction............................................... xxiii Chapter

More information

Beginning Transact-SQL with SQL Server 2000 and Paul Turley with Dan Wood

Beginning Transact-SQL with SQL Server 2000 and Paul Turley with Dan Wood Beginning Transact-SQL with SQL Server 2000 and 2005 Paul Turley with Dan Wood Beginning Transact-SQL with SQL Server 2000 and 2005 Beginning Transact-SQL with SQL Server 2000 and 2005 Paul Turley with

More information

The IINS acronym to this exam will remain but the title will change slightly, removing IOS from the title, making the new title.

The IINS acronym to this exam will remain but the title will change slightly, removing IOS from the title, making the new title. I n t r o d u c t i o n The CCNA Security IINS exam topics have been refreshed from version 2.0 to version 3.0. This document will highlight exam topic changes between the current 640-554 IINS exam and

More information

Informal Write-up on CCNA Security. October, 2009 (V1.0)

Informal Write-up on CCNA Security. October, 2009 (V1.0) Informal Write-up on CCNA Security October, 2009 (V1.0) Methodology: This document uses the Cisco Press CCNA Security Official Exam Certification Guide (otherwise referred to as the Security ECG in this

More information

Mastering UNIX Shell Scripting

Mastering UNIX Shell Scripting Mastering UNIX Shell Scripting Bash, Bourne, and Korn Shell Scripting for Programmers, System Administrators, and UNIX Gurus Second Edition Randal K. Michael Wiley Publishing, Inc. Mastering UNIX Shell

More information

Securing SCADA Systems. Ronald L. Krutz

Securing SCADA Systems. Ronald L. Krutz Securing SCADA Systems Ronald L. Krutz Securing SCADA Systems Securing SCADA Systems Ronald L. Krutz Securing SCADA Systems Published by Wiley Publishing, Inc. 10475 Crosspoint Boulevard Indianapolis,

More information

Implementing Cisco Network Security (IINS) 3.0

Implementing Cisco Network Security (IINS) 3.0 Implementing Cisco Network Security (IINS) 3.0 COURSE OVERVIEW: Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles and technologies, using

More information

Professional ASP.NET 2.0 Databases. Thiru Thangarathinam

Professional ASP.NET 2.0 Databases. Thiru Thangarathinam Professional ASP.NET 2.0 Databases Thiru Thangarathinam Professional ASP.NET 2.0 Databases Professional ASP.NET 2.0 Databases Thiru Thangarathinam Professional ASP.NET 2.0 Databases Published by Wiley

More information

CASP CompTIA. Advanced Security Practitioner. Study Guide

CASP CompTIA. Advanced Security Practitioner. Study Guide CASP CompTIA Advanced Security Practitioner Study Guide CASP CompTIA Advanced Security Practitioner Study Guide Michael Gregg Billy Haines Senior Acquisitions Editor: Jeff Kellum Development Editor: Dick

More information

Hands-On Oracle Application Express Security

Hands-On Oracle Application Express Security Hands-On Oracle Application Express Security BUILDING SECURE APEX APPLICATIONS Recx Hands-On Oracle Application Express Security: Building Secure Apex Applications Published by John Wiley & Sons, Inc.

More information

Real-Time Optimization by Extremum-Seeking Control

Real-Time Optimization by Extremum-Seeking Control Real-Time Optimization by Extremum-Seeking Control Real-Time Optimization by Extremum-Seeking Control KARTIK B. ARIYUR MIROSLAV KRSTIĆ A JOHN WILEY & SONS, INC., PUBLICATION Copyright 2003 by John Wiley

More information

CCNA CCNA Security Official Cert Guide. Course Outline. CCNA Security Official Cert Guide.

CCNA CCNA Security Official Cert Guide. Course Outline. CCNA Security Official Cert Guide. Course Outline CCNA Security 210-260 Official Cert 23 Apr 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led Training

More information

CISCO QUAD Cisco CCENT/CCNA/CCDA/CCNA Security (QUAD)

CISCO QUAD Cisco CCENT/CCNA/CCDA/CCNA Security (QUAD) Our Learning Exclusive Custom exam prep software and materials Exam delivery in classroom with 98% success Course specific thinqtank Learning publications to promote fun exciting learning Extended hours

More information

Cloud Phone Systems. Andrew Moore. Making Everything Easier! Nextiva Special Edition. Learn:

Cloud Phone Systems. Andrew Moore. Making Everything Easier! Nextiva Special Edition. Learn: Making Everything Easier! Nextiva Special Edition Cloud Phone Systems Learn: What cloud phone systems are and how they can benefit your company About the many advantages a cloud phone system offers Features

More information

iwork DUMmIES 2ND EDITION FOR

iwork DUMmIES 2ND EDITION FOR iwork FOR DUMmIES 2ND EDITION iwork FOR DUMmIES 2ND EDITION by Jesse Feiler iwork For Dummies, 2nd Edition Published by John Wiley & Sons, Inc. 111 River Street Hoboken, NJ 07030-5774 www.wiley.com Copyright

More information

CISSP. DUMmIES 4TH EDITION FOR

CISSP. DUMmIES 4TH EDITION FOR CISSP FOR DUMmIES 4TH EDITION CISSP FOR DUMmIES 4TH EDITION by Lawrence Miller and Peter H. Gregory CISSP For Dummies, 4th Edition Published by John Wiley & Sons, Inc. 111 River Street Hoboken, NJ 07030-5774

More information

PHP & MySQL. Learn to: Janet Valade. Making Everything Easier! 4th Edition. Create well-formed PHP code that s compliant with PHP 4, 5, and 6

PHP & MySQL. Learn to: Janet Valade. Making Everything Easier! 4th Edition. Create well-formed PHP code that s compliant with PHP 4, 5, and 6 Making Everything Easier! 4th Edition PHP & MySQL Learn to: Create well-formed PHP code that s compliant with PHP 4, 5, and 6 Easily install and set up PHP and MySQL using XAMPP Choose a Web host and secure

More information

CISCO CCNP Cisco Certified Network Professional v2.0

CISCO CCNP Cisco Certified Network Professional v2.0 Our Learning Exclusive Custom exam prep software and materials Exam delivery in classroom with 98% success Course specific thinqtank Learning publications to promote a fun exciting learning Extended hours

More information

Fundamentals of Network Security v1.1 Scope and Sequence

Fundamentals of Network Security v1.1 Scope and Sequence Fundamentals of Network Security v1.1 Scope and Sequence Last Updated: September 9, 2003 This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document

More information

COSO Enterprise Risk Management

COSO Enterprise Risk Management COSO Enterprise Risk Management COSO Enterprise Risk Management Establishing Effective Governance, Risk, and Compliance Processes Second Edition ROBERT R. MOELLER John Wiley & Sons, Inc. Copyright # 2007,

More information

CompTIA Security+ SY Course Outline. CompTIA Security+ SY May 2018

CompTIA Security+ SY Course Outline. CompTIA Security+ SY May 2018 Course Outline 09 May 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led Training 5. ADA Compliant & JAWS Compatible

More information

UniNets CCNA Security LAB MANUAL UNiNets CCNA Cisco Certified Network Associate Security LAB MANUAL UniNets CCNA LAB MANUAL

UniNets CCNA Security LAB MANUAL UNiNets CCNA Cisco Certified Network Associate Security LAB MANUAL UniNets CCNA LAB MANUAL UNiNets CCNA Cisco Certified Network Associate Security LAB MANUAL Contents: UniNets CCNA Security LAB MANUAL Section 1 Securing Layer 2 Lab 1-1 Configuring Native VLAN on a Trunk Links Lab 1-2 Disabling

More information

Agile Database Techniques Effective Strategies for the Agile Software Developer. Scott W. Ambler

Agile Database Techniques Effective Strategies for the Agile Software Developer. Scott W. Ambler Agile Database Techniques Effective Strategies for the Agile Software Developer Scott W. Ambler Agile Database Techniques Effective Strategies for the Agile Software Developer Agile Database Techniques

More information

Creating Web Pages. Learn to: Bud E. Smith. Making Everything Easier! 9th Edition. Design, build, and post a Web page

Creating Web Pages. Learn to: Bud E. Smith. Making Everything Easier! 9th Edition. Design, build, and post a Web page Making Everything Easier! 9th Edition Creating Web Pages Learn to: Design, build, and post a Web page Build pages using HTML, Web design software, and online tools Optimize photos, video, and audio for

More information

"Charting the Course... Interconnecting Cisco Networking Devices Accelerated 3.0 (CCNAX) Course Summary

Charting the Course... Interconnecting Cisco Networking Devices Accelerated 3.0 (CCNAX) Course Summary Description Course Summary The Cisco CCNA curriculum includes a third course, Interconnecting Cisco Networking Devices: Accelerated (CCNAX), consisting of Interconnecting Cisco Networking Devices, Part

More information

Take the Next Step in Your IT Career. Save 10% on Exam Vouchers * (up to a $35 value) Get details at sybex.com/go/comptiavoucher

Take the Next Step in Your IT Career. Save 10% on Exam Vouchers * (up to a $35 value) Get details at sybex.com/go/comptiavoucher Take the Next Step in Your IT Career Save 10% on Exam Vouchers * (up to a $35 value) Get details at sybex.com/go/comptiavoucher *Some restrictions apply. See web page for details. CLOUD ESSENTIALS CompTIA

More information

XSLT 2.0 and XPath 2.0

XSLT 2.0 and XPath 2.0 Wrox Programmer to Programmer TM Michael Kay Michael Kay has been working in the XML field since 1997. He became a member of the XSL Working Group soon after the publication of XSLT 1.0 and took over as

More information

Ruby on Rails. Bible

Ruby on Rails. Bible Ruby on Rails Bible Ruby on Rails Bible Timothy Fisher Ruby on Rails Bible Published by Wiley Publishing, Inc. 10475 Crosspoint Boulevard Indianapolis, IN 46256 www.wiley.com Copyright 2008 by Wiley Publishing,

More information

Designing Security Architecture Solutions Jay Ramachandran Wiley Computer Publishing John Wiley & Sons, Inc. Designing Security Architecture Solutions Designing Security Architecture Solutions Jay Ramachandran

More information

HASHING IN COMPUTER SCIENCE FIFTY YEARS OF SLICING AND DICING

HASHING IN COMPUTER SCIENCE FIFTY YEARS OF SLICING AND DICING HASHING IN COMPUTER SCIENCE FIFTY YEARS OF SLICING AND DICING Alan G. Konheim JOHN WILEY & SONS, INC., PUBLICATION HASHING IN COMPUTER SCIENCE HASHING IN COMPUTER SCIENCE FIFTY YEARS OF SLICING AND DICING

More information

CCNA Security. 2.0 Secure Access. 1.0 Security Concepts

CCNA Security. 2.0 Secure Access. 1.0 Security Concepts 1.0 Security Concepts 1.1 Common security principles 1.1.a Describe confidentiality, integrity, availa bility (CIA) 1.1.b Describe SIEM technology 1.1.c Identify common security terms 1.1.d Identify common

More information

Chapter 3 Network Foundation Protection (NFP) Overview 39. Configuring and Implementing Switched Data Plane Security Solutions 57

Chapter 3 Network Foundation Protection (NFP) Overview 39. Configuring and Implementing Switched Data Plane Security Solutions 57 00_9781587142802_fm.qxd 4/25/11 2:23 PM Page viii viii CCNP Security SECURE 642-637 Official Cert Guide Contents at a Glance Introduction xxxiii Part I Network Security Technologies Overview Chapter 1

More information

IC Internet and Computing Core Certification Living Online. Study Guide

IC Internet and Computing Core Certification Living Online. Study Guide IC Internet and Computing 3 Core Certification Living Online Study Guide IC Internet and Computing 3 Core Certification Living Online Study Guide Ciprian Adrian Rusen Senior Acquisitions Editor: Ken Brown

More information

Training Kit Administering Microsoft SQL Server 2012 Databases. Training Kit EXAM SQL Server 2012 Databases

Training Kit Administering Microsoft SQL Server 2012 Databases. Training Kit EXAM SQL Server 2012 Databases spine = 1.47 EXAM 70-462 Administering Microsoft SQL Server 2012 Databases Microsoft Certified Solutions Associate The new MCSA certifications validate the core technical skills required to build a sustainable

More information

Security+ SY0-501 Study Guide Table of Contents

Security+ SY0-501 Study Guide Table of Contents Security+ SY0-501 Study Guide Table of Contents Course Introduction Table of Contents About This Course About CompTIA Certifications Module 1 / Threats, Attacks, and Vulnerabilities Module 1 / Unit 1 Indicators

More information

CCSP: Secure Intrusion Detection and SAFE Implementation. Study Guide

CCSP: Secure Intrusion Detection and SAFE Implementation. Study Guide CCSP: Secure Intrusion Detection and SAFE Implementation Study Guide This page intentionally left blank CCSP : Secure Intrusion Detection and SAFE Implementation Study Guide Justin Menga Carl Timm San

More information

Course Outline. CISSP - Certified Information Systems Security Professional

Course Outline. CISSP - Certified Information Systems Security Professional Course Outline CISSP - Certified Information Systems Security 10 Jan 2019 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led

More information

OVER 750 QUESTIONS AND 55 TASK-BASED SIMULATIONS! CPA EXAM REVIEW. Auditing and Attestation. O. Ray Whittington, CPA, PhD Patrick R.

OVER 750 QUESTIONS AND 55 TASK-BASED SIMULATIONS! CPA EXAM REVIEW. Auditing and Attestation. O. Ray Whittington, CPA, PhD Patrick R. OVER 750 QUESTIONS AND 55 TASK-BASED SIMULATIONS! 2012 CPA EXAM REVIEW Auditing and Attestation O. Ray Whittington, CPA, PhD Patrick R. Delaney, CPA, PhD WILEY CPA EXAM REVIEW WILEY EXAM REVIEW Auditing

More information

MCTS. Windows Server 2008 Applications Infrastructure Configuration. Study Guide. Joel Stidley. Wiley Publishing, Inc.

MCTS. Windows Server 2008 Applications Infrastructure Configuration. Study Guide. Joel Stidley. Wiley Publishing, Inc. MCTS Windows Server 2008 Applications Infrastructure Configuration Study Guide Joel Stidley Wiley Publishing, Inc. MCTS Windows Server 2008 Applications Infrastructure Configuration Study Guide MCTS

More information

Cisco Associate-Level Certifications

Cisco Associate-Level Certifications Cisco Associate-Level Certifications Widely respected throughout the world, Cisco Certifications substantiate the knowledge and skills of certified individuals. They rank among the most sought-after qualifications

More information

Pearson CISSP Cert Guide with Labs. Course Outline. Pearson CISSP Cert Guide with Labs. 17 Oct

Pearson CISSP Cert Guide with Labs. Course Outline. Pearson CISSP Cert Guide with Labs. 17 Oct Course Outline Pearson CISSP Cert Guide with Labs 17 Oct 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led Training

More information

Google Voice. Learn to: Bud E. Smith Chris Dannen. Making Everything Easier! Set up and use Google Voice

Google Voice. Learn to: Bud E. Smith Chris Dannen. Making Everything Easier! Set up and use Google Voice Making Everything Easier! Google Voice Learn to: Set up and use Google Voice Integrate Google Voice with other Google services such as Gmail and Google Chat Combine Google Voice with your existing phone

More information

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107) Overview This course is intended for those wishing to qualify with CompTIA Security+. CompTIA's Security+ Certification is a foundation-level certificate designed for IT administrators with 2 years' experience

More information

CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline

CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker Learn to find security vulnerabilities before the bad guys do! The Certified Ethical Hacker (CEH) class immerses students in an interactive environment

More information

TASK SCHEDULING FOR PARALLEL SYSTEMS

TASK SCHEDULING FOR PARALLEL SYSTEMS TASK SCHEDULING FOR PARALLEL SYSTEMS Oliver Sinnen Department of Electrical and Computer Engineering The University of Aukland New Zealand TASK SCHEDULING FOR PARALLEL SYSTEMS TASK SCHEDULING FOR PARALLEL

More information

Unit code: D/601/1956 QCF Level 5: BTEC Higher National Credit value: 15

Unit code: D/601/1956 QCF Level 5: BTEC Higher National Credit value: 15 Unit 46: Network Security Unit code: D/601/1956 QCF Level 5: BTEC Higher National Credit value: 15 Aim To provide learners with opportunities to manage, support and implement a secure network infrastructure

More information

LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS

LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS LEGITIMATE APPLICATIONS

More information

Pearson CompTIA: Security+ SY0-401 (Course & Lab) Course Outline. Pearson CompTIA: Security+ SY0-401 (Course & Lab)

Pearson CompTIA: Security+ SY0-401 (Course & Lab) Course Outline. Pearson CompTIA: Security+ SY0-401 (Course & Lab) Course Outline Pearson CompTIA: Security+ SY0-401 (Course & Lab) 03 May 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led

More information

Matt Walker s All in One Course for the CEH Exam. Course Outline. Matt Walker s All in One Course for the CEH Exam.

Matt Walker s All in One Course for the CEH Exam. Course Outline. Matt Walker s All in One Course for the CEH Exam. Course Outline Matt Walker s All in One Course for the CEH Exam 03 May 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led

More information

Ethical Hacking and Prevention

Ethical Hacking and Prevention Ethical Hacking and Prevention This course is mapped to the popular Ethical Hacking and Prevention Certification Exam from US-Council. This course is meant for those professionals who are looking for comprehensive

More information

MacBook Air PORTABLE GENIUS

MacBook Air PORTABLE GENIUS MacBook Air PORTABLE GENIUS MacBook Air PORTABLE GENIUS MacBook Air PORTABLE GENIUS by Paul McFedries MacBook Air Portable Genius Published by Wiley Publishing, Inc. 10475 Crosspoint Blvd. Indianapolis,

More information

J2EE TM Best Practices Java TM Design Patterns, Automation, and Performance

J2EE TM Best Practices Java TM Design Patterns, Automation, and Performance J2EE TM Best Practices Java TM Design Patterns, Automation, and Performance Darren Broemmer Wiley Publishing, Inc. Dear Valued Customer, The WILEY advantage We realize you re a busy professional with

More information

Oracle PL/SQL. DUMmIES. by Michael Rosenblum and Dr. Paul Dorsey FOR

Oracle PL/SQL. DUMmIES. by Michael Rosenblum and Dr. Paul Dorsey FOR Oracle PL/SQL FOR DUMmIES by Michael Rosenblum and Dr. Paul Dorsey Oracle PL/SQL For Dummies Published by Wiley Publishing, Inc. 111 River Street Hoboken, NJ 07030-5774 www.wiley.com Copyright 2006 by

More information

Security for Microsoft Windows System Administrators

Security for Microsoft Windows System Administrators Security for Microsoft Windows System Administrators Security for Microsoft Windows System Administrators Introduction to Key Information Security Concepts Derrick Rountree Rodney Buike, Technical Editor

More information

LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION

LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS LEGITIMATE APPLICATIONS

More information

OCA. Database 11g Administrator Certified Associate. Oracle. Study Guide

OCA. Database 11g Administrator Certified Associate. Oracle. Study Guide OCA Oracle Database 11g Administrator Certified Associate Study Guide OCA Oracle Database 11g Administrator Certified Associate Study Guide Biju Thomas Acquisitions Editor: Jeff Kellum Development Editor:

More information

CCNA Security Official Cert Guide First Edition. Copyright 2015 Cisco Systems, Inc. ISBN-10: ISBN-13:

CCNA Security Official Cert Guide First Edition. Copyright 2015 Cisco Systems, Inc. ISBN-10: ISBN-13: CCNA Security 210-260 Official Cert Guide First Edition Copyright 2015 Cisco Systems, Inc. ISBN-10: 1-58720-566-1 ISBN-13: 978-1-58720-566-8 Warning and Disclaimer Every effort has been made to make this

More information

Course Outline. CISSP - Certified Information Systems Security Professional 2015 (Course & Labs)

Course Outline. CISSP - Certified Information Systems Security Professional 2015 (Course & Labs) Course Outline CISSP - Certified Information Systems Security Professional 2015 (Course & Labs) 09 Nov 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number

More information

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led Certification: Certified Network Defender Exam: 312-38 Course Description This course is a vendor-neutral, hands-on,

More information

Cisco Ccnp Security Firewall Student Lab Guide

Cisco Ccnp Security Firewall Student Lab Guide CISCO CCNP SECURITY FIREWALL STUDENT LAB GUIDE PDF - Are you looking for cisco ccnp security firewall student lab guide Books? Now, you will be happy that at this time cisco ccnp security firewall student

More information

CASP CompTIA Advanced Security Practitioner Study Guide: (Exam CAS-001)

CASP CompTIA Advanced Security Practitioner Study Guide: (Exam CAS-001) CASP CompTIA Advanced Security Practitioner Study Guide: (Exam CAS-001) Gregg, Michael ISBN-13: 9781118083192 Table of Contents Foreword xxi Introduction xxvii Assessment Test xliv Chapter 1 Cryptographic

More information

Course 831 Certified Ethical Hacker v9

Course 831 Certified Ethical Hacker v9 Course 831 Certified Ethical Hacker v9 Duration: 5 days What You Get: CEH v9 Certification exam voucher 5 days of high quality classroom training 18 comprehensive modules 40% of class hours dedicated to

More information

CISCO EXAM QUESTIONS & ANSWERS

CISCO EXAM QUESTIONS & ANSWERS CISCO 300-206 EXAM QUESTIONS & ANSWERS Number: 300-206 Passing Score: 800 Time Limit: 120 min File Version: 35.2 http://www.gratisexam.com/ Exam Code: 300-206 Exam Name: Implementing Cisco Edge Network

More information

Enforcing PCI Data Security Standard Compliance Marco Misitano, CISSP, CISA, CISM Business Development Manager Security Cisco Italy

Enforcing PCI Data Security Standard Compliance Marco Misitano, CISSP, CISA, CISM Business Development Manager Security Cisco Italy Enforcing PCI Data Security Standard Compliance Marco Misitano, CISSP, CISA, CISM Business Development Manager Security Cisco Italy 2008 Cisco Systems, Inc. All rights reserved. 1 1 The PCI Data Security

More information

Cisco 5921 Embedded Services Router

Cisco 5921 Embedded Services Router Data Sheet Cisco 5921 Embedded Services Router The Cisco 5921 Embedded Services Router (ESR) is a Cisco IOS software router. It is designed to operate on small, low-power, Linux-based platforms to extend

More information

Implementing Cisco IP Switched Networks (SWITCH)

Implementing Cisco IP Switched Networks (SWITCH) Implementing Cisco IP Switched Networks (SWITCH) COURSE OVERVIEW: Implementing Cisco Switched Networks (SWITCH) v2.0 is a five-day instructor-led training course developed to help students prepare for

More information

FileMaker. Pro 10. The book you need to succeed! Companion Web Site. Ray Cologon. Go from basics to full-scale development

FileMaker. Pro 10. The book you need to succeed! Companion Web Site. Ray Cologon. Go from basics to full-scale development Companion Web Site Example FileMaker Pro 10 application Demos, tips, and additional resources Ray Cologon FileMaker Pro 10 Go from basics to full-scale development Write your own FileMaker applications

More information

Cisco Exam Implementing Cisco Network Security Version: 12.0 [ Total Questions: 186 ]

Cisco Exam Implementing Cisco Network Security Version: 12.0 [ Total Questions: 186 ] s@lm@n Cisco Exam 210-260 Implementing Cisco Network Security Version: 12.0 [ Total Questions: 186 ] Cisco 210-260 : Practice Test Question No : 1 When an IPS detects an attack, which action can the IPS

More information

Relational Database Index Design and the Optimizers

Relational Database Index Design and the Optimizers Relational Database Index Design and the Optimizers DB2, Oracle, SQL Server, et al. Tapio Lahdenmäki Michael Leach A JOHN WILEY & SONS, INC., PUBLICATION Relational Database Index Design and the Optimizers

More information

CCNA Wireless. Study Guide

CCNA Wireless. Study Guide CCNA Wireless Study Guide CCNA Wireless Study Guide Todd Lammle Acquisitions Editor: Jeff Kellum Development Editor: Amy Breguet Technical Editors: Keith Parsons, Benjamin Miller, Patrick Conlan, and

More information

CCNA Security 1.0 Student Packet Tracer Manual

CCNA Security 1.0 Student Packet Tracer Manual 1.0 Student Packet Tracer Manual This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors

More information

Security Hardening Checklist for Cisco Routers/Switches in 10 Steps

Security Hardening Checklist for Cisco Routers/Switches in 10 Steps Security Hardening Checklist for Cisco Routers/Switches in 10 Steps Network infrastructure devices (routers, switches, load balancers, firewalls etc) are among the assets of an enterprise that play an

More information

IT Exam Training online / Bootcamp

IT Exam Training online / Bootcamp DumpCollection IT Exam Training online / Bootcamp http://www.dumpcollection.com PDF and Testing Engine, study and practice Exam : 210-260 Title : Implementing Cisco Network Security Vendor : Cisco Version

More information

COMPONENT-ORIENTED PROGRAMMING

COMPONENT-ORIENTED PROGRAMMING COMPONENT-ORIENTED PROGRAMMING COMPONENT-ORIENTED PROGRAMMING ANDY JU AN WANG KAI QIAN Southern Polytechnic State University Marietta, Georgia A JOHN WILEY & SONS, INC., PUBLICATION Copyright 2005 by John

More information

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD SEGURIDAD EN REDES. NIVEL II. VERSION 2.0

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD SEGURIDAD EN REDES. NIVEL II. VERSION 2.0 ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD SEGURIDAD EN REDES. NIVEL II. VERSION 2.0 Module 1: Intrusion Detection and Prevention Technology 1.1 Overview of Intrusion

More information

Certified Ethical Hacker (CEH)

Certified Ethical Hacker (CEH) Certified Ethical Hacker (CEH) COURSE OVERVIEW: The most effective cybersecurity professionals are able to predict attacks before they happen. Training in Ethical Hacking provides professionals with the

More information

ASACAMP - ASA Lab Camp (5316)

ASACAMP - ASA Lab Camp (5316) ASACAMP - ASA Lab Camp (5316) Price: $4,595 Cisco Course v1.0 Cisco Security Appliance Software v8.0 Based on our enhanced FIREWALL and VPN courses, this exclusive, lab-based course is designed to provide

More information

OpenSolaris. The book you need to succeed! Nicholas A. Solter, Gerald Jelinek, and David Miner. Explore the OpenSolaris operating environment

OpenSolaris. The book you need to succeed! Nicholas A. Solter, Gerald Jelinek, and David Miner. Explore the OpenSolaris operating environment Nicholas A. Solter, Gerald Jelinek, and David Miner OpenSolaris Explore the OpenSolaris operating environment Master networking and systems administration Deploy web services using open source applications

More information

DIFFERENTIAL EQUATION ANALYSIS IN BIOMEDICAL SCIENCE AND ENGINEERING

DIFFERENTIAL EQUATION ANALYSIS IN BIOMEDICAL SCIENCE AND ENGINEERING DIFFERENTIAL EQUATION ANALYSIS IN BIOMEDICAL SCIENCE AND ENGINEERING DIFFERENTIAL EQUATION ANALYSIS IN BIOMEDICAL SCIENCE AND ENGINEERING ORDINARY DIFFERENTIAL EQUATION APPLICATIONS WITH R William E. Schiesser

More information

Course Outline. CompTIA Network+ N Pearson ucertify Course and Labs. CompTIA Network+ N Pearson ucertify Course and Labs

Course Outline. CompTIA Network+ N Pearson ucertify Course and Labs.  CompTIA Network+ N Pearson ucertify Course and Labs Course Outline CompTIA Network+ N10-007 Pearson ucertify Course 06 Jul 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led

More information

McAfee Network Security Platform Administration Course

McAfee Network Security Platform Administration Course McAfee Network Security Platform Administration Course Education Services administration course The McAfee Network Security Platform Administration course from McAfee Education Services is an essential

More information

Course 831 EC-Council Certified Ethical Hacker v10 (CEH)

Course 831 EC-Council Certified Ethical Hacker v10 (CEH) Course 831 EC-Council Certified Ethical Hacker v10 (CEH) Duration: 5 days What You Get: CEH v10 Certification exam voucher 5 days of high quality classroom training 18 comprehensive modules 40% of class

More information

CCNA ICND Pearson ucertify Course and Labs CCNA ICND Pearson ucertify Course and Labs

CCNA ICND Pearson ucertify Course and Labs CCNA ICND Pearson ucertify Course and Labs Course Outline CCNA ICND2 200-105 Pearson ucertify Course and 04 Aug 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led

More information

CCIE Security. Course Outline. CCIE Security. 07 Oct

CCIE Security. Course Outline. CCIE Security. 07 Oct Course Outline 07 Oct 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led Training 5. ADA Compliant & JAWS Compatible

More information

Modern Experimental Design

Modern Experimental Design Modern Experimental Design THOMAS P. RYAN Acworth, GA Modern Experimental Design Modern Experimental Design THOMAS P. RYAN Acworth, GA Copyright C 2007 by John Wiley & Sons, Inc. All rights reserved.

More information

CISCO EXAM QUESTIONS & ANSWERS

CISCO EXAM QUESTIONS & ANSWERS CISCO 300-206 EXAM QUESTIONS & ANSWERS Number: 300-206 Passing Score: 800 Time Limit: 120 min File Version: 35.2 http://www.gratisexam.com/ Exam Code: 300-206 Exam Name: Implementing Cisco Edge Network

More information

Practical Database Programming with Visual Basic.NET

Practical Database Programming with Visual Basic.NET Practical Database Programming with Visual Basic.NET IEEE Press 445 Hoes Lane Piscataway, NJ 08854 IEEE Press Editorial Board Lajos Hanzo, Editor in Chief R. Abari M. El-Hawary S. Nahavandi J. Anderson

More information

CIW: Web Security Associate. Course Outline. CIW: Web Security Associate. 12 Oct ( Add-On )

CIW: Web Security Associate. Course Outline. CIW: Web Security Associate. 12 Oct ( Add-On ) Course Outline 12 Oct 2018 ( Add-On ) Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led Training 5. ADA Compliant

More information

Pearson CompTIA: Network+ (Course & Lab) Course Outline. Pearson CompTIA: Network+ (Course & Lab) 15 Jul 2018

Pearson CompTIA: Network+ (Course & Lab) Course Outline. Pearson CompTIA: Network+ (Course & Lab)  15 Jul 2018 Course Outline Pearson CompTIA: Network+ (Course & Lab) 15 Jul 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led

More information