Objectives Upon completion of this chapter, you will be able to answer the following questions: What is the importance of network monitoring? How is network monitoring conducted? How do IP vulnerabilities enable network attacks? How do TCP and UDP vulnerabilities enable network attacks? What are the IP vulnerabilities? …
Objectives Upon completion of this chapter, you will be able to answer the following questions: What is the evolution of network security? What are the various types of attack tools used by threat actors? What is malware? What are some common network attacks? Key Terms This chapter uses …
Objectives Upon completion of this chapter, you will be able to answer the following questions: How do network devices enable network communication? How do wireless devices enable network communication? How are specialized devices used to enhance network security? How do network services enhance network security? How are network …
Objectives Upon completion of this chapter, you will be able to answer the following questions: What is the basic operation of data network communications? How do protocols enable network operations? How does Ethernet support network communication? How does the IPv4 protocol support network communications? How do IP addresses …
Objectives Upon completion of this chapter, you will be able to answer the following questions: Why are Linux skills essential for network security monitoring and investigation? How do you use the Linux shell to manipulate text files? How do client-server networks function? How does a Linux administrator locate …
Objectives Upon completion of this chapter, you will be able to answer the following questions: What is the history of the Windows operating system? What is the architecture of Windows and its operation? How do you configure and monitor Windows? How is Windows kept secure? Key Terms This …
Objectives Upon completion of this chapter, you will be able to answer the following questions: What are some features of examples of cybersecurity incidents? What are the motivations of the threat actors behind specific security incidents? What is the potential impact of network security attacks? What is the …
Contents Campus Network Structure Hierarchical Network Design 1 Access, Distribution and Core Layer (Backbone) Layer 3 in the Access Layer The Cisco Enterprise Campus Architecture The Need for a Core Layer Types of Cisco Switches Comparing Layer 2 and Multilayer Switches MAC Address Forwarding Layer 2 Switch Operation …
This chapter covers the following basic switching topics as a review to CCNA and serves as a teaser for topics covered later in chapter: Hubs and switches Bridges and switches Switches of today Broadcast domains MAC addresses The basic Ethernet frame format Basic switching function VLANs The Spanning …