دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: [2 ed.]
نویسندگان: Glen D. Singh
سری:
ISBN (شابک) : 180323606X, 9781803236063
ناشر: Packt Publishing
سال نشر: 2022
تعداد صفحات: 692
زبان: English
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود)
حجم فایل: 26 Mb
در صورت تبدیل فایل کتاب CompTIA Network+ N10-008 Certification Guide: The ultimate guide to passing the N10-008 exam, 2nd Edition به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب راهنمای گواهینامه CompTIA Network+ N10-008: راهنمای نهایی برای قبولی در آزمون N10-008، ویرایش دوم نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
با توسعه مهارتهای خود در پیادهسازی شبکه، عملیات و امنیت و در عین حال پوشش دادن همه موضوعات امتحانی برای گواهینامه CompTIA Network+ N10-008 در یک راهنمای آسان، متخصص شبکه شوید.
خرید کتاب چاپی یا Kindle شامل یک کتاب الکترونیکی رایگان در قالب PDF است.
این کتاب به شما کمک می کند تا مفاهیم اصلی شبکه را بدون نیاز به نیاز قبلی به راحتی درک کنید. تجربه یا دانش صنعت در این زمینه مطالعاتی. این ویرایش دوم بهروزرسانی شده راهنمای گواهینامه CompTIA Network+ N10-008 با معرفی شما با مبانی اصلی فناوریها و مفاهیم شبکه، قبل از پیشرفت به موضوعات متوسط و پیشرفته با استفاده از رویکرد دانشآموز محور آغاز میشود.
< p>شما بهترین روشها را برای طراحی و پیادهسازی زیرساخت شبکه انعطافپذیر و مقیاسپذیر برای پشتیبانی از برنامهها و خدمات مدرن بررسی خواهید کرد. علاوه بر این، مفاهیم و فناوری های امنیت شبکه را برای ایمن سازی موثر سازمان ها از حملات و تهدیدات سایبری یاد خواهید گرفت. این کتاب همچنین به شما نشان میدهد که چگونه با استفاده از تکنیکهای رایج عیبیابی، مسائل شبکه را به طور مؤثر کشف و حل کنید.در پایان این کتاب، دانش کافی برای طراحی کارآمد به دست خواهید آورد. زیرساخت شبکه را به عنوان یک متخصص شبکه موفق در صنعت پیاده سازی و حفظ کنید. همچنین در مورد تمامی اهداف آزمون رسمی CompTIA Network+ N10-008، فناوریهای شبکه و نحوه به کارگیری مهارتهای خود در دنیای واقعی اطلاعات کسب کردهاید.
این کتاب برای دانشجویان، مدیران شبکه، شبکه است مهندسین، موتور NOC همکاران، مدیران سیستم ها، متخصصان امنیت سایبری و علاقه مندان. برای شروع کار با این کتاب نیازی به دانش قبلی در زمینه شبکه نیست.
Become a network specialist by developing your skills in network implementation, operations and security while covering all the exam topics for CompTIA Network+ N10-008 certification in an easy-to-follow guide.
Purchase of the print or Kindle book includes a free eBook in the PDF format.
This book helps you to easily understand core networking concepts without the need of prior industry experience or knowledge within this fi eld of study. This updated second edition of the CompTIA Network+ N10-008 Certification Guide begins by introducing you to the core fundamentals of networking technologies and concepts, before progressing to intermediate and advanced topics using a student-centric approach.
You'll explore best practices for designing and implementing a resilient and scalable network infrastructure to support modern applications and services. Additionally, you'll learn network security concepts and technologies to effectively secure organizations from cyber attacks and threats. The book also shows you how to efficiently discover and resolve networking issues using common troubleshooting techniques.
By the end of this book, you'll have gained sufficient knowledge to efficiently design, implement, and maintain a network infrastructure as a successful network professional within the industry. You'll also have gained knowledge of all the official CompTIA Network+ N10-008 exam objectives, networking technologies, and how to apply your skills in the real world.
This book is for students, network administrators, network engineers, NOC engineers, systems administrators, cybersecurity professionals, and enthusiasts. No prior knowledge in networking is required to get started with this book.
Cover Title Page Copyright Dedication Contributors Table of Contents Preface Part 1: Networking Concepts Chapter 1: Exploring the OSI Model and TCP/IP Technical requirements The need for networking models Exploring the OSI model Application layer Presentation layer Session layer Transport layer Network layer Data Link layer Physical layer Understanding TCP/IP Data encapsulation concepts Ethernet header IP headers TCP header UDP headers Analyzing network packets Summary Questions Further reading Chapter 2: Network Topologies and Connections Understanding network topologies Types of network topologies Discovering network types Peer-to-peer Client-server Personal area network Local area network Wide area network Metropolitan area network Wireless local area network Campus area network Storage area network Software-defined wide area network Multiprotocol label switching Multipoint generic routing encapsulation Identifying service-related entry points Comparing provider links Satellite Digital Subscriber Line Cable Leased line Metro optical Summary Questions Further reading Chapter 3: Ethernet Technology and Virtualization Technical requirements Types of connections Copper cables Fiber optic cables Cable management Ethernet standards Virtual network concepts Hypervisors Virtual networking components Lab – creating a virtual machine Summary Questions Further reading Chapter 4: Understanding IPv4 and IPv6 Addressing Technical requirements The need for IP addressing Public versus private address spaces Network Address Translation (NAT) Exploring the structure of IPv4 and IPv6 Fundamentals of IPv4 Fundamentals of IPv6 Types of IPv4 and IPv6 addresses Automatic Private IP Addressing (APIPA) Extended unique identifier (EUI-64) Unicast Multicast Broadcast Anycast Link-local Loopback Unique local address Default gateway Delving into IPv6 concepts Tunneling Dual stack Translation Router advertisement Stateless Address Autoconfiguration (SLAAC) Configuring IP addresses Windows operating system Linux operating system Cisco IOS router Summary Practice questions Further reading Chapter 5: Applied IPv4 Subnetting Understanding the purpose of the subnet mask Delving into network prefixes and subnet masks Determining the network ID Understanding the importance of subnetting IPv4 subnetting and VLSM Step 1 – determining the appropriate IPv4 block Step 2 – creating new subnets (subnetworks) Step 3 – assigning subnets to each network Step 4 – performing Variable-Length Subnet Masking (VLSM) Summary Questions Further reading Chapter 6: Exploring Network Protocols and Services Technical requirements Network protocols File protocols Remote access protocols Email protocols HTTP and HTTPS SQL database protocols Lightweight Directory Access Protocol Syslog Session Initiation Protocol Network protocol types Internet Control Message Protocol TCP UDP Network services Network Time Protocol Dynamic Host Configuration Protocol DNS Simple Network Management Protocol Lab – analyzing FTP packets Lab – analyzing TFTP packets Lab – analyzing SMB packets Lab – analyzing Telnet packets Lab – reassembling a SIP telephone conversation Summary Questions Further reading Chapter 7: Data Center Architecture and Cloud Computing Understanding network architecture Cisco 3-tier architecture Cisco 2-tier architecture Discovering software-defined networking Components of SDN Exploring data center architectures Branch office versus on-premises Spine and leaf Delving into storage area networks Connection types Fundamentals of cloud computing Deployment models Cloud service models Cloud connectivity solutions Summary Questions Further reading Part 2: Network Implementation Chapter 8: Networking Devices Understanding networking devices Hub Layer 2 switch Layer 3 capable switch Bridge Router Access point Wireless LAN controller Load balancer Proxy server Internet modems Repeater Voice gateways and media converters Exploring security appliances Firewall IPS/IDS Types of networked devices Summary Practice questions Further reading Chapter 9: Routing and Switching Concepts Exploring routing concepts Understanding routing protocols Dynamic routing Static routing Bandwidth management Delving into switching concepts PoE Spanning-Tree Port aggregation Neighbor discovery protocol Exploring VLAN Types of VLANs Understanding switch port configurations Duplex and speed Port mirroring Port security Auto MDI-X Summary Questions Further reading Chapter 10: Exploring Wireless Standards and Technologies Exploring wireless networking Beacons, probes, stations, and SSIDs Frequencies, ranges, and channels SSID Antenna types MIMO concepts Delving into wireless security Wireless encryption standards Authentication methods Exploring cellular technologies Summary Questions Further reading Part 3: Network Operations Chapter 11: Assuring Network Availability Network performance metrics SNMP Network device logs Understanding interface issues Checking the link state (up/down) Checking the speed Checking the duplex Checking the uptime/downtime Interface errors or alerts Environmental factors and sensors Summary Practice questions Further reading Chapter 12: Organizational Documents and Policies Plans and procedures Change management Incident response plans The business continuity plan Disaster recovery plans The system life cycle Standard operating procedures Hardening and security policies Password policies Acceptable use policy Bring your own device policies Remote access policies Onboarding and off-boarding policies Security policies Data loss prevention Common documentation Common agreements Summary Practice questions Further reading Chapter 13: High Availability and Disaster Recovery High availability concepts Diverse paths Infrastructure redundancy Active-active versus active-passive configurations First hop redundancy Disaster recovery concepts Recovery sites Facilities and infrastructure support Network device backup/restore Summary Practice questions Further reading Part 4: Network Security and Troubleshooting Chapter 14: Network Security Concepts Understanding network security Confidentiality, integrity, and availability Threats, vulnerabilities, and exploits Least privilege and RBAC Defense in Depth and zero trust Exploring authentication methods Multi-factor authentication Kerberos, single sign-on, and LDAP Risk management Security risk assessments Summary Practice questions Further reading Chapter 15: Exploring Cyberattacks and Threats Exploring network-based attacks Denial of service Botnets On-path attack DNS-based attack VLAN hopping Rogue DHCP Password attacks Understanding wireless attacks Rogue access points and evil twins Deauthentication attacks Delving into human and environmental attacks Social engineering Types of social engineering attacks Summary Practice questions Further reading Chapter 16: Implementing Network Security Network hardening techniques Wireless security techniques SSID considerations Password considerations MAC filtering Antennas and power levels Geofencing and captive portals Client isolation Wireless authentication protocols Installation considerations Remote connectivity methods Remote access methods Importance of physical security Summary Questions Further reading Chapter 17: Network Troubleshooting Network troubleshooting methodology Cable connectivity issues Link lights/status indicators Damaged cables and connectors Incorrect TX/RX alignment Attenuation Crosstalk and Electro-Magnetic Interference (EMI) Bad ports/transceivers VLAN mismatch Sub-optimal performance Wireless connectivity issues Physical layer issues Antenna issues Signal power issues Interference Client configuration issues Common network issues Hardware-based troubleshooting tools Software-based tools and commands Packet sniffer Port scanner Wi-Fi analyzer Bandwidth speed tester Command-line tools Summary Practice questions Further reading Chapter 18: Practice Exam Questions Answers Assessments Chapter 1 – Exploring the OSI Model and TCP/IP Chapter 2 – Network Topologies and Connections Chapter 3 – Ethernet Technology and Virtualization Chapter 4 – Understanding IPv4 and IPv6 Addressing Chapter 5 – Applied IPv4 Subnetting Chapter 6 – Exploring Network Protocols and Services Chapter 7 – Data Center Architecture and Cloud Computing Chapter 8 – Network Devices Chapter 9 – Routing and Switching Concepts Chapter 10 – Exploring Wireless Standards and Technologies Chapter 11 – Assuring Network Availability Chapter 12 – Organizational Documents and Policies Chapter 13 – High Availability and Disaster Recovery Chapter 14 – Network Security Concepts Chapter 15 – Exploring Cyber Attacks and Threats Chapter 16 – Implementing Network Security Chapter 17 – Network Troubleshooting Index About Packt Other Books You May Enjoy