Category: CCNA Security 2.0 study materials
CCNA Security 2.0 Study Material – Chapter 1: Modern Network Security Threats 1.0 Introduction 1.0.1 Welcome 1.0.1.1 1.0.1.1 Chapter 1: Modern Network Security Threats Network security is now an integral part of computer networking. Network security involves protocols, technologies, devices, tools, and techniques to secure data and mitigate …
CCNA Security 2.0 Study Material – Chapter 2: Securing Network Devices 2.0 Introduction 2.0.1 Welcome 2.0.1.1 Securing Network Devices Configure a Network Operating System Every computer requires an operating system to function, including computer-based network devices such as switches, routers, access points, and firewalls. These network devices use …
CCNA Security 2.0 Study Material – Chapter 3: Authentication, Authorization, and Accounting 3.0 Introduction 3.0.1 Welcome 3.0.1.1 Chapter 3: Authentication, Authorization, and Accounting Chapter 3: Network Protocols and Communications More and more, it is networks that connect us. People communicate online from everywhere. Conversations in classrooms spill into …
CCNA Security 2.0 Study Material – Chapter 4: Implementing Firewall Technologies 4.0 Introduction 4.0.1 Welcome 4.0.1.1 Chapter 4: Implementing Firewall Technologies Chapter 4: Network Access To support our communication, the OSI model divides the functions of a data network into layers. Each layer works with the layers above …
CCNA Security 2.0 Study Material – Chapter 5: Implementing Intrusion Prevention 5.0 Introduction 5.0.1 Welcome 5.0.1.1 Chapter 5: Implementing Intrusion Prevention Chapter 5: Ethernet The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media. Ethernet …
CCNA Security 2.0 Study Material – Chapter 6: Securing the Local Area Network 6.0 Introduction 6.0.1 Welcome 6.0.1.1 Chapter 6: Securing the Local Area Network Chapter 6: Network Layer Network applications and services on one end device can communicate with applications and services running on another end device. …
7.0 Introduction 7.0.1 Welcome 7.0.1.1 Chapter 7: Cryptographic Systems Chapter 7: IP Addressing Addressing is a critical function of network layer protocols. Addressing enables data communication between hosts, regardless of whether the hosts are on the same network, or on different networks. Both Internet Protocol version 4 (IPv4) …
8.0 Introduction 8.0.1 Welcome 8.0.1.1 Chapter 8: Implementing Virtual Private Networks Designing, implementing and managing an effective IP addressing plan ensures that networks can operate effectively and efficiently. This is especially true as the number of host connections to a network increases. Understanding the hierarchical structure of the …
9.0 Introduction 9.0.1 Welcome 9.0.1.1 Chapter 9: Implementing the Cisco Adaptive Security Appliance Transport Layer Data networks and the Internet support the human network by supplying reliable communication between people. On a single device, people can use multiple applications and services such as email, the web, and instant …
10.0 Introduction 10.0.1 Welcome 10.0.1.1 Chapter 10: Advanced Cisco Adaptive Security Appliance Applications, such as web browsers, online gaming, chatting with and emailing friends, enable us to send and receive data with relative ease. Typically we can access and use these applications without knowing how they work. However, …