ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب CompTIA Network+ Study Guide

دانلود کتاب راهنمای مطالعه CompTIA Network+

CompTIA Network+ Study Guide

مشخصات کتاب

CompTIA Network+ Study Guide

ویرایش: 3rd edition 
نویسندگان: ,   
سری:  
ISBN (شابک) : 9781119021247, 0538927941 
ناشر: Sybex 
سال نشر: 2015 
تعداد صفحات: 0 
زبان: English 
فرمت فایل : EPUB (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 30 مگابایت 

قیمت کتاب (تومان) : 36,000



کلمات کلیدی مربوط به کتاب راهنمای مطالعه CompTIA Network+: شبکه های کامپیوتری--امتحانات،تکنسین های کامپیوتر--گواهینامه، پرسنل پردازش داده های الکترونیکی--گواهینامه، امتحانات، TCP/IP (پروتکل شبکه کامپیوتری)، راهنماهای مطالعه، انجمن صنعت فناوری محاسباتی - امتحانات - راهنمای مطالعه، پرسنل پردازش داده های الکترونیکی -- صدور گواهینامه -- راهنمای مطالعه، تکنسین های کامپیوتر -- گواهینامه -- راهنمای مطالعه، شبکه های کامپیوتری -- آزمون ها -- راهنمای مطالعه، پرسنل پردازش داده های الکترونیکی -- صدور گواهینامه، فناوری محاسبات



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 16


در صورت تبدیل فایل کتاب CompTIA Network+ Study Guide به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب راهنمای مطالعه CompTIA Network+ نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی درمورد کتاب به خارجی

The CompTIA Network+ Study Guide, 3rd edition, is your one-stop resource for complete coverage of Exam N10-006. This Sybex study guide covers 100% of all exam N10-006 objectives. Content includes assessment tests that check exam readiness, objective map, real-world scenarios, hands-on exercises, key topic exam essentials, and challenging chapter review questions.;Introduction -- Assessment test -- Ch. 1. Introduction to Networks. First Things First: What's a Network?: The local area network ; Common network components ; Wide area network ; Network architecture : peer-to-peer or client-server? -- Physical Network Topologies: Bus topology ; Star topology ; Ring topology ; Mesh topology ; Point-to-point topology ; Point-to-multipoint topology ; Hybrid topology -- Topology Selection, Backbones, and Segments: Selecting the right topology ; The network backbone ; Network segments -- Summary -- Exam Essentials -- Written Labs -- Review questions -- Ch. 2. The Open Systems Interconnection Specifications. Internetworking Models: The layered approach ; Advantages of reference models -- The OSI Reference Model: The application layer ; The presentation layer ; The session layer ; The transport layer ; The network layer ; The data link layer ; The physical layer -- Introduction to encapsulation -- Modulation techniques -- Summary -- Exam essentials -- Written lab -- Review Questions -- Ch. 3. Networking Topologies, Connectors, And Wiring Standards. Physical Media: Coaxial cable ; Twisted-pair cable ; Fiber-optic cable ; Media converters ; Serial cables -- Cable Properties: Transmission speeds ; Distance ; Duplex ; Noise immunity (Security, EMI) ; Frequency -- Wiring Standards: 568A versus 568B ; Straight-through cable ; Crossover cable ; Rolled/rollover cable ; T1 crossover cable -- Installing Wiring Distributions -- Summary -- Exam essentials -- Written lab -- Review questions -- Ch. 4. The Current Ethernet Specifications. Network Basics -- Ethernet Basics: Collision domain ; Broadcast domain ; CSMA/CD ; Broadband/baseband ; Bit rates versus baud rate ; Wavelength ; Sampling-size ; Half-and full-duplex Ethernet -- Ethernet at the Data Link Layer: Binary to decimal and hexadecimal conversion ; Ethernet addressing ; Ethernet frames -- Ethernet at the Physical Layer -- Ethernet Over Other Standards (IEEE 1905.1-2013): Ethernet over power line ; Ethernet over HDMI -- Summary -- Exam essentials -- Written lab -- Review questions -- Ch. 5. Networking Devices. Common Network Connectivity Devices: Network interface card ; Hub ; Bridge ; Switch ; Router ; Firewall ; IDS/IPS ; HIDS ; Access point ; Dynamic host configuration protocol server -- Other Specialized Devices: Multilayer switch ; Load balancer ; Domain name service server ; Proxy server ; Encryption devices ; Analog modem ; Packet shaper ; VPN concentrator -- Planning and Implementing a Basic SOHO Network Using Network Segmentation: Determining requirements ; Switches and bridges at the data link layer ; Hubs at the physical layer ; Environmental considerations -- Summary -- Exam essentials -- Written lab -- Review questions -- Ch. 6. Introduction to the Internet Protocol. Introducing TCP/IP: A brief history of TCP/IP ; TCP/IP and the DoD model ; The process/application layer protocols ; The host-to-host layer protocols ; The Internet layer protocols -- Data Encapsulation -- Summary -- Exam essentials -- Written lab -- Review Questions -- Ch. 7. IP Addressing. IP Terminology -- Hierarchical IP Addressing Scheme: Network addressing ; Private IP addresses (RFC 1918) -- IPv4 Address Types: Layer 2 broadcasts ; Layer 3 broadcasts ; Unicast address ; Multicast address (Class D) -- Internet Protocol Version 6 (IPv6): Why do we need IPv6? ; The benefits of and uses for IPv6 ; IPv6 addressing and expressions ; Shortened expression ; Address types ; Special addresses ; Stateless auto-configuration (EUI-64) ; DHCPv6 (Stateful) ; Migrating to IPv6 -- Summary -- Exam essentials -- Written Lab: Written Lab 7.1 ; Written Lab 7.2 ; Written Lab 7.3 -- Review questions -- Ch. 8. IP Subnetting, Troubleshooting IP, and Introduction to NAT. Subnetting Basics: How to create subnets ; Subnet masks ; Classless Inter-Domain Routing (CIDR) ; Subnetting Class C addresses ; Subnetting Class B addresses -- Troubleshooting IP Addressing: Determining IP address problems -- Introduction To Network Address Translation (NAT): Types of network address translation ; NAT names ; How NAT works -- Summary -- Exam essentials -- Written lab -- Review questions -- Ch. 9. Introduction to IP Routing. Routing basics ; The IP routing process ; Testing your IP routing understanding ; Static and dynamic routing ; Summary -- Exam essentials -- Written lab -- Review questions -- Ch. 10. Routing Protocols. Routing Protocol Basics: Administrative distances ; Classes of routing protocols -- Distance Vector Routing Protocols: Routing Information Protocol (RIP) ; RIP version 2 (RIPv2) ; VLSM and discontinuous networks ; EIGRP ; Border Gateway Protocol (BGP) -- Link State Routing Protocols: Open Shortest Path First (OSPF) ; Intermediate System-To-Intermediate System (IS-IS) -- High Availability: Hot Standby Router Protocol (HSRP) ; Virtual router redundancy protocol -- IPv6 Routing Protocols: RIPng ; EIGRPv6 ; OSPFv3 -- Summary -- Exam essentials -- Written lab -- Review questions -- Ch. 11. Switching and Virtual LANs. Networking before layer 2 switching -- Switching Services: Limitations of layer 2 switching ; Bridging versus LAN switching ; Three switch functions at layer 2 -- Spanning Tree Protocol: Spanning tree port states ; STP convergence ; Rapid spanning tree protocol 802.1w -- Virtual LANs: VLAN basics ; Quality of service ; VLAN memberships ; Static VLANs ; Dynamic VLANs ; Identifying VLANs ; VLAN identification methods -- VLAN Trunking Protocol: VTP modes of operation ; Do we really need to put an IP address on a switch? ; Port security ; Port bonding -- Two Additional Advanced Features of Switches: Power over Ethernet (802.3af, 802.3at) ; Port Mirroring/Spanning (SPAN/RSPAN) -- Summary -- Exam essentials -- Written lab -- Review questions -- Ch. 12. Wireless Networking. Introduction to wireless technology -- The 802.11 Standards: 2.4GHz (802.11b) ; 2.4GHz (802.11g) ; 5GHz (802.11a) ; 5GHz (802.11h) ; 2.4GHz/5GHz (802.11n) ; 5GHz (802.11ac) -- Comparing 802.11 Standards: Range comparisons -- Wireless Network Components: Wireless access points ; Wireless network interface card ; Wireless antennas -- Installing a Wireless Network: Ad hoc mode : independent basic service set ; Infrastructure mode : basic service set ; Wireless controllers ; Mobile hot spots ; Signal degradation ; Other network infrastructure implementations ; Installing and configuring WLAN hardware -- Site survey -- Wireless Security: Wireless threats ; Open access ; Service set identifiers, wired equivalent privacy, and media access control address authentication ; Remote authentication dial-in user service (802.1x) ; Temporal key integrity protocol ; Wi-Fi protected access or WPA2 pare-shared key -- Summary -- Exam essentials -- Written lab -- Review questions -- Ch. 13. Authentication and Access Control. Security Filtering: Access control lists ; Tunneling ; Encryption ; Remote access -- Managing User Account and Password Security: Managing user accounts ; Managing passwords ; Single sign-on ; Multifactor authentication -- User-authentication methods: Public Key Infrastructure (PKI) ; Kerberos ; Authentication, Authorization, and Accounting (AAA) ; Web services ; Unified voice services ; Network controllers ; Network Access Control (NAC) ; Challenge Handshake Authentication Protocol (CHAP) ; MS-CHAP ; Extensible Authentication Protocol (EAP) ; Hashes ; Network access control -- Summary -- Exam essentials -- Written lab -- Review questions --;Ch. 14. Network Threats And Mitigation. Recognizing Security Threats: Denial of service ; Distributed DoS (DDos) ; Authentication issues ; Viruses ; Zero day attacks ; Insider threat/malicious employee -- Vulnerabilities: Unnecessary running services ; Open ports ; Unpatched/legacy systems ; Unencrypted channels ; Clear-text credentials ; TEMPEST/RF emanation ; Malicious users ; Buffer overflow ; Wireless threats ; Attackers and their tools ; Misconfiguration issues ; Social Engineering (Phishing) -- Understanding Mitigation Techniques: Active detection ; Passive detection ; Proactive defense ; Basic forensic concepts -- Policies And Procedures: Security policies ; Security training ; Patches and upgrades ; Firmware updates ; Driver updates ; Upgrading versus downgrading -- Anti-Malware Software: Host-based ; Cloud/server-based ; Configuration backups ; Updating antivirus components ; Fixing an infected computer -- Summary -- Exam essentials -- Written lab -- Review questions -- Ch. 15. Physical Security and Risk. Using hardware and software security devices -- Defining Firewalls: Network-based firewalls ; Host-based firewalls -- Firewall Technologies: Access control lists ; Port security ; Demilitarized zone ; Protocol switching ; Dynamic packet filtering ; Proxy services -- Firewalls at the Application Layer Versus the Network Layer: Stateful versus stateless network layer firewalls ; Application layer firewalls -- Scanning Services and Other Firewall Features: Content filtering ; Signature identification ; Context awareness ; Virtual wire versus routed ; Zones -- Intrusion Detection and Prevention Systems: Network-based IDS ; Host-based IDS ; Vulnerability scanners -- VPN concentrators -- Understanding Problems Affecting Device Security: Physical security ; Logical security configurations ; Risk-related concepts -- Summary -- Exam essentials -- Written lab -- Review questions -- Ch. 16. Wide Area Networks. What's a WAN?: Defining WAN terms ; The public switched telephone network ; WAN connection types ; Bandwidth or speed -- T-Series Connections: The T1 connection ; The T3 connection -- Transmission Media: Wired connections ; Wavelength division multiplexing ; Passive optical network ; Wireless technologies -- Broadband Services: ; DSL technology and xDSL ; Cable modem -- Wireless WAN Technologies: Cellular WAN -- WAN Protocols: Integrated services digital network ; Frame relay technology ; Point-to-point protocol ; Asynchronous transfer mode ; MPLS -- WAN Troubleshooting: Loss of internet connectivity ; Interface errors/monitoring ; Split horizon ; DNS issues ; Router configurations ; Company security policy -- Summary -- Exam essentials -- Written lab -- Review questions -- Ch. 17. Troubleshooting Tools. Protocol analyzers -- Throughput testers -- Connectivity software -- Using Traceroute -- Using ipconfig and ifconfig: Using the ipconfig utility ; Using the ifconfig utility -- Using the ping utility -- Using the Address Resolution Protocol: The Windows ARP table ; Using the arp utility -- Using the nslookup utility -- Resolving names with the hosts table -- Using the Mtr command (pathping) -- Using the route command: Using the route command options ; Some examples of the route command -- Using the nbtstat Utility: The -a switch ; The -A switch ; The -c switch ;The -n switch ; The -r switch ; The -R switch ; The -S switch ; The -s switch -- Using the netstat Utility: The -a switch ; The -e switch ; The -r switch ; The -s switch ; The -p switch ; The -n switch -- Using the File Transfer Protocol: Starting FTP and logging in to an FTP server ; Downloading files ; Uploading files -- Using the Telnet utility: How to enable Telnet in Windows ; Don't use Telnet, use secure shell -- Summary -- Exam essentials -- Written lab -- Review questions -- Ch. 18. Software and Hardware Tools. Understanding Network Scanners: Packet sniffers/network monitors ; Intrusion detection and prevention software ; Port scanners ; Wi-Fi analyzer -- Baseline -- Network Monitoring and Logging: Network monitoring ; SNMP ; Syslog ; SIEM ; Utilization -- Identifying Hardware Tools: Cable testers ; Protocol analyzer ; Certifiers ; Time-domain reflectometer ; Optical time-domain reflectometer ; Multimeter ; Toner probe ; Butt set ; Punch-down tool ; Cable stripper/snips ; Voltage event recorder (power) ; Environmental monitors -- Summary -- Exam essentials -- Written lab -- Review questions -- Ch. 19. Network Troubleshooting. Narrowing Down the Problem: Did you check the super simple stuff? ; Is hardware or software causing the problem? ; Is it a workstation or a server problem? ; Which segments of the network are affected? ; Is it bad cabling? -- Troubleshooting Steps: Step 1: Identify the problem ; Step 2: Establish a theory of probable cause ; Step 3: Test the theory to determine cause ; Step 4: Establish a plan of action to resolve the problem and identify potential effects ; Step 5: Implement the solution or escalate as necessary ; Step 6: Verify full system functionality, and if applicable, implement preventative measures ; Step 7: Document findings, actions, and outcomes -- Troubleshooting Tips: Don't overlook the small stuff ; Prioritize your problems ; Check the software configuration ; Don't overlook physical conditions ; Don't overlook cable problems ; Check for viruses -- Summary -- Exam essentials -- Written lab -- Review questions -- Ch. 20. Management, Monitoring, And Optimization. Managing Network Documentation: Using SNMP ; Schematics and diagrams -- Network Monitoring: Baselines ; On-boarding and off-boarding of mobile devices ; NAC ; Policies, procedures, and regulations ; Safety practices ; Implementing network segmentation -- Network Optimization: Reasons to optimize your network's performance ; How to optimize performance ; Unified communications ; Traffic shaping ; Load balancing ; High availability ; Caching engines ; Fault tolerance ; Archives/backups ; Common address redundancy protocol ; Virtual networking ; Locating and installing equipment ; Change management procedures -- Summary -- Exam essentials -- Written lab -- Review questions -- Appendix A: Answers To the Written Labs: Chapters: 1-7 ; Written Lab: 7.1 ; Written Lab: 7.2 ; Written Lab: 7.3 ; Chapters: 8-20 -- Answers to Review Questions: Chapters: 1-20 -- Appendix C: Subnetting Class A. Subnetting Practice Examples: Class A addresses: Practice Example #1A: 255.255.0.0 (/16) ; Practice Example #2A: 225.255.240.0 (/20) -- Practice Example #3A: 255.255.255.192 (/26) -- Subnetting in your head: Class A addresses -- Written Lab 1 -- Written Lab 2 -- Answers to Written Lab 1 -- Answers to Written Lab 2 -- Index.;



فهرست مطالب

Introduction --
Assessment test --
Ch. 1. Introduction to Networks. First Things First: What's a Network?: The local area network
Common network components
Wide area network
Network architecture : peer-to-peer or client-server? --
Physical Network Topologies: Bus topology
Star topology
Ring topology
Mesh topology
Point-to-point topology
Point-to-multipoint topology
Hybrid topology --
Topology Selection, Backbones, and Segments: Selecting the right topology
The network backbone
Network segments --
Summary --
Exam Essentials --
Written Labs --
Review questions --
Ch. 2. The Open Systems Interconnection Specifications. Internetworking Models: The layered approach
Advantages of reference models --
The OSI Reference Model: The application layer
The presentation layer
The session layer
The transport layer
The network layer
The data link layer
The physical layer --
Introduction to encapsulation --
Modulation techniques --
Summary --
Exam essentials --
Written lab --
Review Questions --
Ch. 3. Networking Topologies, Connectors, And Wiring Standards. Physical Media: Coaxial cable
Twisted-pair cable
Fiber-optic cable
Media converters
Serial cables --
Cable Properties: Transmission speeds
Distance
Duplex
Noise immunity (Security, EMI)
Frequency --
Wiring Standards: 568A versus 568B
Straight-through cable
Crossover cable
Rolled/rollover cable
T1 crossover cable --
Installing Wiring Distributions --
Summary --
Exam essentials --
Written lab --
Review questions --
Ch. 4. The Current Ethernet Specifications. Network Basics --
Ethernet Basics: Collision domain
Broadcast domain
CSMA/CD
Broadband/baseband
Bit rates versus baud rate
Wavelength
Sampling-size
Half-and full-duplex Ethernet --
Ethernet at the Data Link Layer: Binary to decimal and hexadecimal conversion
Ethernet addressing
Ethernet frames --
Ethernet at the Physical Layer --
Ethernet Over Other Standards (IEEE 1905.1-2013): Ethernet over power line
Ethernet over HDMI --
Summary --
Exam essentials --
Written lab --
Review questions --
Ch. 5. Networking Devices. Common Network Connectivity Devices: Network interface card
Hub
Bridge
Switch
Router
Firewall
IDS/IPS
HIDS
Access point
Dynamic host configuration protocol server --
Other Specialized Devices: Multilayer switch
Load balancer
Domain name service server
Proxy server
Encryption devices
Analog modem
Packet shaper
VPN concentrator --
Planning and Implementing a Basic SOHO Network Using Network Segmentation: Determining requirements
Switches and bridges at the data link layer
Hubs at the physical layer
Environmental considerations --
Summary --
Exam essentials --
Written lab --
Review questions --
Ch. 6. Introduction to the Internet Protocol. Introducing TCP/IP: A brief history of TCP/IP
TCP/IP and the DoD model
The process/application layer protocols
The host-to-host layer protocols
The Internet layer protocols --
Data Encapsulation --
Summary --
Exam essentials --
Written lab --
Review Questions --
Ch. 7. IP Addressing. IP Terminology --
Hierarchical IP Addressing Scheme: Network addressing
Private IP addresses (RFC 1918) --
IPv4 Address Types: Layer 2 broadcasts
Layer 3 broadcasts
Unicast address
Multicast address (Class D) --
Internet Protocol Version 6 (IPv6): Why do we need IPv6?
The benefits of and uses for IPv6
IPv6 addressing and expressions
Shortened expression
Address types
Special addresses
Stateless auto-configuration (EUI-64)
DHCPv6 (Stateful)
Migrating to IPv6 --
Summary --
Exam essentials --
Written Lab: Written Lab 7.1
Written Lab 7.2
Written Lab 7.3 --
Review questions --
Ch. 8. IP Subnetting, Troubleshooting IP, and Introduction to NAT. Subnetting Basics: How to create subnets
Subnet masks
Classless Inter-Domain Routing (CIDR)
Subnetting Class C addresses
Subnetting Class B addresses --
Troubleshooting IP Addressing: Determining IP address problems --
Introduction To Network Address Translation (NAT): Types of network address translation
NAT names
How NAT works --
Summary --
Exam essentials --
Written lab --
Review questions --
Ch. 9. Introduction to IP Routing. Routing basics
The IP routing process
Testing your IP routing understanding
Static and dynamic routing
Summary --
Exam essentials --
Written lab --
Review questions --
Ch. 10. Routing Protocols. Routing Protocol Basics: Administrative distances
Classes of routing protocols --
Distance Vector Routing Protocols: Routing Information Protocol (RIP)
RIP version 2 (RIPv2)
VLSM and discontinuous networks
EIGRP
Border Gateway Protocol (BGP) --
Link State Routing Protocols: Open Shortest Path First (OSPF)
Intermediate System-To-Intermediate System (IS-IS) --
High Availability: Hot Standby Router Protocol (HSRP)
Virtual router redundancy protocol --
IPv6 Routing Protocols: RIPng
EIGRPv6
OSPFv3 --
Summary --
Exam essentials --
Written lab --
Review questions --
Ch. 11. Switching and Virtual LANs. Networking before layer 2 switching --
Switching Services: Limitations of layer 2 switching
Bridging versus LAN switching
Three switch functions at layer 2 --
Spanning Tree Protocol: Spanning tree port states
STP convergence
Rapid spanning tree protocol 802.1w --
Virtual LANs: VLAN basics
Quality of service
VLAN memberships
Static VLANs
Dynamic VLANs
Identifying VLANs
VLAN identification methods --
VLAN Trunking Protocol: VTP modes of operation
Do we really need to put an IP address on a switch?
Port security
Port bonding --
Two Additional Advanced Features of Switches: Power over Ethernet (802.3af, 802.3at)
Port Mirroring/Spanning (SPAN/RSPAN) --
Summary --
Exam essentials --
Written lab --
Review questions --
Ch. 12. Wireless Networking. Introduction to wireless technology --
The 802.11 Standards: 2.4GHz (802.11b)
2.4GHz (802.11g)
5GHz (802.11a)
5GHz (802.11h)
2.4GHz/5GHz (802.11n)
5GHz (802.11ac) --
Comparing 802.11 Standards: Range comparisons --
Wireless Network Components: Wireless access points
Wireless network interface card
Wireless antennas --
Installing a Wireless Network: Ad hoc mode : independent basic service set
Infrastructure mode : basic service set
Wireless controllers
Mobile hot spots
Signal degradation
Other network infrastructure implementations
Installing and configuring WLAN hardware --
Site survey --
Wireless Security: Wireless threats
Open access
Service set identifiers, wired equivalent privacy, and media access control address authentication
Remote authentication dial-in user service (802.1x)
Temporal key integrity protocol
Wi-Fi protected access or WPA2 pare-shared key --
Summary --
Exam essentials --
Written lab --
Review questions --
Ch. 13. Authentication and Access Control. Security Filtering: Access control lists
Tunneling
Encryption
Remote access --
Managing User Account and Password Security: Managing user accounts
Managing passwords
Single sign-on
Multifactor authentication --
User-authentication methods: Public Key Infrastructure (PKI)
Kerberos
Authentication, Authorization, and Accounting (AAA)
Web services
Unified voice services
Network controllers
Network Access Control (NAC)
Challenge Handshake Authentication Protocol (CHAP)
MS-CHAP
Extensible Authentication Protocol (EAP)
Hashes
Network access control --
Summary --
Exam essentials --
Written lab --
Review questions --
Ch. 14. Network Threats And Mitigation. Recognizing Security Threats: Denial of service
Distributed DoS (DDos)
Authentication issues
Viruses
Zero day attacks
Insider threat/malicious employee --
Vulnerabilities: Unnecessary running services
Open ports
Unpatched/legacy systems
Unencrypted channels
Clear-text credentials
TEMPEST/RF emanation
Malicious users
Buffer overflow
Wireless threats
Attackers and their tools
Misconfiguration issues
Social Engineering (Phishing) --
Understanding Mitigation Techniques: Active detection
Passive detection
Proactive defense
Basic forensic concepts --
Policies And Procedures: Security policies
Security training
Patches and upgrades
Firmware updates
Driver updates
Upgrading versus downgrading --
Anti-Malware Software: Host-based
Cloud/server-based
Configuration backups
Updating antivirus components
Fixing an infected computer --
Summary --
Exam essentials --
Written lab --
Review questions --
Ch. 15. Physical Security and Risk. Using hardware and software security devices --
Defining Firewalls: Network-based firewalls
Host-based firewalls --
Firewall Technologies: Access control lists
Port security
Demilitarized zone
Protocol switching
Dynamic packet filtering
Proxy services --
Firewalls at the Application Layer Versus the Network Layer: Stateful versus stateless network layer firewalls
Application layer firewalls --
Scanning Services and Other Firewall Features: Content filtering
Signature identification
Context awareness
Virtual wire versus routed
Zones --
Intrusion Detection and Prevention Systems: Network-based IDS
Host-based IDS
Vulnerability scanners --
VPN concentrators --
Understanding Problems Affecting Device Security: Physical security
Logical security configurations
Risk-related concepts --
Summary --
Exam essentials --
Written lab --
Review questions --
Ch. 16. Wide Area Networks. What's a WAN?: Defining WAN terms
The public switched telephone network
WAN connection types
Bandwidth or speed --
T-Series Connections: The T1 connection
The T3 connection --
Transmission Media: Wired connections
Wavelength division multiplexing
Passive optical network
Wireless technologies --
Broadband Services:
DSL technology and xDSL
Cable modem --
Wireless WAN Technologies: Cellular WAN --
WAN Protocols: Integrated services digital network
Frame relay technology
Point-to-point protocol
Asynchronous transfer mode
MPLS --
WAN Troubleshooting: Loss of internet connectivity
Interface errors/monitoring
Split horizon
DNS issues
Router configurations
Company security policy --
Summary --
Exam essentials --
Written lab --
Review questions --
Ch. 17. Troubleshooting Tools. Protocol analyzers --
Throughput testers --
Connectivity software --
Using Traceroute --
Using ipconfig and ifconfig: Using the ipconfig utility
Using the ifconfig utility --
Using the ping utility --
Using the Address Resolution Protocol: The Windows ARP table
Using the arp utility --
Using the nslookup utility --
Resolving names with the hosts table --
Using the Mtr command (pathping) --
Using the route command: Using the route command options
Some examples of the route command --
Using the nbtstat Utility: The -a switch
The -A switch
The -c switch
The -n switch
The -r switch
The -R switch
The -S switch
The -s switch --
Using the netstat Utility: The -a switch
The -e switch
The -r switch
The -s switch
The -p switch
The -n switch --
Using the File Transfer Protocol: Starting FTP and logging in to an FTP server
Downloading files
Uploading files --
Using the Telnet utility: How to enable Telnet in Windows
Don't use Telnet, use secure shell --
Summary --
Exam essentials --
Written lab --
Review questions --
Ch. 18. Software and Hardware Tools. Understanding Network Scanners: Packet sniffers/network monitors
Intrusion detection and prevention software
Port scanners
Wi-Fi analyzer --
Baseline --
Network Monitoring and Logging: Network monitoring
SNMP
Syslog
SIEM
Utilization --
Identifying Hardware Tools: Cable testers
Protocol analyzer
Certifiers
Time-domain reflectometer
Optical time-domain reflectometer
Multimeter
Toner probe
Butt set
Punch-down tool
Cable stripper/snips
Voltage event recorder (power)
Environmental monitors --
Summary --
Exam essentials --
Written lab --
Review questions --
Ch. 19. Network Troubleshooting. Narrowing Down the Problem: Did you check the super simple stuff?
Is hardware or software causing the problem?
Is it a workstation or a server problem?
Which segments of the network are affected?
Is it bad cabling? --
Troubleshooting Steps: Step 1: Identify the problem
Step 2: Establish a theory of probable cause
Step 3: Test the theory to determine cause
Step 4: Establish a plan of action to resolve the problem and identify potential effects
Step 5: Implement the solution or escalate as necessary
Step 6: Verify full system functionality, and if applicable, implement preventative measures
Step 7: Document findings, actions, and outcomes --
Troubleshooting Tips: Don't overlook the small stuff
Prioritize your problems
Check the software configuration
Don't overlook physical conditions
Don't overlook cable problems
Check for viruses --
Summary --
Exam essentials --
Written lab --
Review questions --
Ch. 20. Management, Monitoring, And Optimization. Managing Network Documentation: Using SNMP
Schematics and diagrams --
Network Monitoring: Baselines
On-boarding and off-boarding of mobile devices
NAC
Policies, procedures, and regulations
Safety practices
Implementing network segmentation --
Network Optimization: Reasons to optimize your network's performance
How to optimize performance
Unified communications
Traffic shaping
Load balancing
High availability
Caching engines
Fault tolerance
Archives/backups
Common address redundancy protocol
Virtual networking
Locating and installing equipment
Change management procedures --
Summary --
Exam essentials --
Written lab --
Review questions --
Appendix A: Answers To the Written Labs: Chapters: 1-7
Written Lab: 7.1
Written Lab: 7.2
Written Lab: 7.3
Chapters: 8-20 --
Answers to Review Questions: Chapters: 1-20 --
Appendix C: Subnetting Class A. Subnetting Practice Examples: Class A addresses: Practice Example #1A: 255.255.0.0 (/16)
Practice Example #2A: 225.255.240.0 (/20) --
Practice Example #3A: 255.255.255.192 (/26) --
Subnetting in your head: Class A addresses --
Written Lab 1 --
Written Lab 2 --
Answers to Written Lab 1 --
Answers to Written Lab 2 --
Index.




نظرات کاربران