Coverart for item
The Resource CompTIA Network+ study guide : [exam N10-006], Todd Lammle

CompTIA Network+ study guide : [exam N10-006], Todd Lammle

Label
CompTIA Network+ study guide : [exam N10-006]
Title
CompTIA Network+ study guide
Title remainder
[exam N10-006]
Statement of responsibility
Todd Lammle
Title variation
  • Network plus study guide
  • Exam N10-006
Creator
Author
Subject
Genre
Language
eng
Summary
The ultimate Network+ exam prep The CompTIA Network+ Deluxe Study Guide is your CompTIA. Authorized resource for preparing for the Network+ exam N10-006. Bestselling author and networking Guru Todd Lammle guides you through 100% of all exam objectives. Coverage includes network technologies, installation and configuration, media and topologies, security, and much more, plus practical examples drawn from real-world situations. This Deluxe edition is packed with bonus study aids, including an online interactive learning environment with practice exams, flashcards, and e-book files in multiple formats. Practice without buying expensive equipment, and review exam material on the go. CompTIA's Network+ certification covers advances in networking technology and reflects changes in associated job tasks. T he exam emphasizes network implementation and support, and includes expanded coverage of wireless networking topics. This guide is the ultimate in Network+ prep, with expert insight, clear explanation, full coverage, and bonus tools. Review 100% of the Network+ exam objectives. -- Get clear, concise insight on crucial networking maintenance topics. -- Study practical examples drawn from real-world experience. The CompTIA Network+ Deluxe Study Guide gives you the guidance and tools you need to prepare for the exam
Cataloging source
YDXCP
http://library.link/vocab/creatorName
Lammle, Todd
Dewey number
004.6/076
Illustrations
illustrations
Index
index present
LC call number
TK7887
LC item number
.L366 2015
Literary form
non fiction
http://library.link/vocab/subjectName
  • Computing Technology Industry Association
  • Electronic data processing personnel
  • Computer technicians
  • Computer networks
  • TCP/IP (Computer network protocol)
  • Electronic data processing personnel
Label
CompTIA Network+ study guide : [exam N10-006], Todd Lammle
Instantiates
Publication
Copyright
Note
  • Includes index
  • "Exam N10-006"--Cover
Carrier category
volume
Carrier category code
  • nc
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
  • Introduction -- Assessment test -- Introduction To Networks: -- First Things First: What's a Network?: -- Local area network -- Common network components -- Wide area network -- Network architecture: peer-to-peer or client-server? -- Physical Network Topologies: -- Bus topology -- Star topology -- Ring topology -- Mesh topology -- Point-to-point topology -- Point-to-multipoint topology -- Hybrid topology -- Topology Selection, Backbones, and Segments: -- Selecting the right topology -- Network backbone -- Network segments -- Summary -- Exam Essentials -- Written Labs -- Review questions -- Open Systems Interconnection Specifications: -- Internetworking Models: -- Layered approach -- Advantages of reference models -- OSI Reference Model: -- Application layer -- Presentation layer -- Session layer -- Transport layer -- Network layer -- Data link layer -- Physical layer -- Introduction to encapsulation -- Modulation techniques -- Summary -- Exam essentials -- Written lab -- Review Questions -- Networking Topologies, Connectors, And Wiring Standards: -- Physical Media: -- Coaxial cable -- Twisted-pair cable -- Fiber-optic cable -- Media converters -- Serial cables -- Cable Properties: -- Transmission speeds -- Distance -- Duplex -- Noise immunity (Security, EMI) -- Frequency -- Wiring Standards: -- 568A versus 568B -- Straight-through cable -- Crossover cable -- Rolled/rollover cable -- T1 crossover cable -- Installing Wiring Distributions: -- Summary -- Exam essentials -- Written lab -- Review questions -- Current Ethernet Specifications: -- Network Basics -- Ethernet Basics -- Collision domain -- Broadcast domain -- CSMA/CD -- Broadband/baseband -- Bit rates versus baud rate -- Wavelength -- Sampling-size -- Half-and full-duplex Ethernet -- Ethernet At The Data Link Layer: -- Binary to decimal and hexadecimal conversion Ethernet addressing -- Ethernet frames -- Ethernet At The Physical Layer -- Ethernet Over Other Standards (IEEE 1905-1-2013): -- Ethernet over power line -- Ethernet over HDMI -- Summary -- Exam essentials -- Written lab -- Review questions -- Networking Devices: -- Common Network Connectivity Devices: -- Network interface card -- Hub -- Bridge -- Switch -- Router -- Firewall -- IDS/IPS -- HIDS -- Access point -- Dynamic host configuration protocol server -- Other Specialized Devices: -- Multilayer switch -- Load balancer -- Domain name service server -- Proxy server -- Encryption devices -- Analog modem -- Packet shaper -- VPN concentrator -- Planning And Implementing A Basic SOHO Network Using Network Segmentation: -- Determining requirements -- Switches and bridges at the data link layer -- Hubs at the physical layer -- Environmental considerations -- Summary -- Exam essentials -- Written lab -- Review questions -- Introduction To The Internet Protocol: -- Introducing TCP/IP: -- Brief history of TCP/IP -- TCP/IP and the DoD model -- Process/application layer protocols -- Host-to-host layer protocols -- Internet layer protocols -- Data Encapsulation -- Summary -- Exam essentials -- Written lab -- IP Addressing: -- IP Terminology -- Hierarchical IP Addressing Scheme: -- Network addressing -- Private IP addresses (RFC 1918) -- IPv4 Address Types: -- Layer 2 broadcasts -- Layer 3 broadcasts -- Unicast address -- Multicast address (Class D) -- Internet Protocol Version 6 (IPv6): -- Why do we need IPv6? -- Benefits of and uses for IPv6 -- IPv6 addressing and expressions -- Shortened expression -- Address types -- Special addresses -- Stateless auto-configuration (EUI-64) -- DHCPv6 (Stateful) -- Migrating to IPv6 -- Summary -- Exam essentials -- Written Lab:-- Written Lab 7-1 -- Written Lab 7-2 -- Written Lab 7-3 -- Review questions -- IP Subnetting, Troubleshooting IP, And Introduction To NAT: -- Subnetting Basics: -- How to create subnets -- Subnet masks -- Classless Inter-Domain Routing (CIDR) -- Subnetting Class C addresses -- Subnetting Class B addresses -- Troubleshooting IP Addressing: -- Determining IP address problems -- Introduction To Network Address Translation (NAT): -- Types of network address translation -- NAT names -- How NAT works -- Summary -- Exam essentials -- Written lab -- Review questions -- Introduction To IP Routing: -- Routing basics -- IP routing process -- Testing your IP routing understanding -- Static and dynamic routing -- Summary -- Exam essentials -- Written lab -- Review questions -- Routing Protocols: -- Routing Protocol Basics: -- Administrative distances -- Classes of routing protocols -- Distance Vector Routing Protocols: -- Routing Information Protocol (RIP) -- RIP version 2 (RIPv2) -- VLSM and discontinuous networks -- EIFRP -- Border Gateway Protocol (BGP) -- Link State Routing Protocols: -- Open shortest Path First (OSPF) -- Intermediate System-To-Intermediate System (IS-IS) -- High Availability: -- Hot Standby Router Protocol (HSRP) -- Virtual router redundancy protocol -- IPv6 Routing Protocols: -- RIPng -- EIGRPv6 -- OSPFv3 -- Summary -- Exam essentials -- Written lab -- Review questions -- Switching And Virtual LANs: -- Networking before layer 2 switching -- Switching Services: -- Limitations of layer 2 switching -- Bridging versus LAN switching -- Three switch functions at layer 2 -- Spanning Tree Protocol: -- Spanning tree port states -- STP convergence -- Rapid spanning tree protocol 802-1w -- Virtual LANs: -- VLAN basics -- Quality of service -- VLAN memberships -- Static VLANs -- Dynamic VLANs -- Identifying VLANs -- VLAN identification methods -- VLAN Trunking Protocol: -- VTP modes of operation -- Do we really need to put an IP address on a switch? -- Port security -- Port bonding -- Two Additional Advanced Features Of Switches: -- Power over Ethernet (802-3af, 802-3at) -- Port Mirroring/Spanning (SPAN/RSPAN) -- Summary -- Exam essentials -- Written lab -- Review questions -- Wireless Networking: -- Introduction to wireless technology -- 802-11 Standards: -- 2-4GHz (802-11b) -- 2-4GHz (802-11g) -- 5GHz (802-11a) -- 5GHz (802-11h) -- 2-4GHz/5GHz (802-11n) -- 5GHz (802-11ac) -- Comparing 802-11 Standards: -- Range comparison -- Wireless Network Components: -- Wireless access points -- Wireless network interface card -- Wireless antennas -- Installing A Wireless Network: -- Ad hoc mode: independent basic service set -- Infrastructure mode: basic service set -- Wireless controllers -- Mobile hot spots -- Signal degradation -- Other network infrastructure implementations -- Installing and configuring WLAN hardware -- Site survey -- Wireless Security: -- Wireless threats -- Open access -- Service set identifiers, wired equivalent privacy, and media access control address authentication -- Remote authentication dial-in user service (802-1x) -- Temporal key integrity protocol -- Wi-Fi protected access or WPA2 pare-shared key -- Summary -- Exam essentials -- Written lab -- Review questions -- Authentication And Access Control: -- Security Filtering: -- Access control lists -- Tunneling -- Encryption -- Remote access -- Managing User Account And Password Security: -- Managing user accounts -- Managing passwords -- Single sign-on -- Multifactor authentication -- User-authentication methods: -- Public key Infrastructure (PKI) -- Kerberos -- Authentication, Authorization, And Accounting (AAA) -- Web services -- Unified voice services -- Network controller -- Network Access Control (NAC) -- Challenge Handshake Authentication Protocol (CHAP) -- MS-CHAP -- Extensible Authentication Protocol (EAP) -- Hashes -- Network access control -- Summary -- Exam essentials -- Written lab -- Review questions --
  • Network Threats And Mitigation: -- Recognizing Security Threats: -- Denial of service -- Distributed DoS (DDos) -- Authentication issues -- Viruses -- Zero day attacks -- Insider threat/malicious employee -- Vulnerabilities: -- Unnecessary running services -- Open ports -- Unpatched/legacy systems -- Unencrypted channels -- Clear-text credentials -- TEMPEST/RF emanation -- Malicious users -- Buffer overflow -- Wireless threats -- Attackers and their tools -- Misconfiguration issues -- Social Engineering (Phishing) -- Understanding Mitigation Techniques: -- Active detection -- Passive detection -- Proactive defense -- Basic forensic concepts -- Policies And Procedures: -- Security policies -- Security training -- Patches and upgrades -- Firmware updates -- Driver updates -- Upgrading versus downgrading -- Anti-Malware Software: -- Host-based -- Cloud/server-based -- Configurations backups -- Updating antivirus computers -- Fixing an infected computer -- Summary -- Exam essentials -- Written lab -- Review questions -- Physical Security And Risk: -- Using hardware and software security devices -- Defining Firewalls -- Network-based firewalls -- Host-based firewalls -- Firewall Technologies: -- Access control lists -- Port security -- Demilitarized zone -- Protocol switching -- Dynamic packet filtering -- Proxy services -- Firewalls At The Application Layer Versus The Network Layer: -- Stateful versus stateless network layer firewalls -- Application layer firewalls -- Scanning Services And Other Firewall Features: -- Content filtering -- Signature identification -- Context awareness -- Virtual wire versus routed -- Zones -- Intrusion Detection And Prevention Systems: -- Network-based IDS -- Host-based IDS -- Vulnerability scanners -- VPN concentrators -- Understanding Problems Affecting Device Security: -- Physical security -- Logical security configurations -- Risk-related concepts -- Summary -- Exam essentials -- Written lab -- Review questions -- Wide Area Networks: -- What's a WAN?: -- Defining WAN terms -- Public switched telephone network -- WAN connection types -- Bandwidth or speed -- T-Series Connections: -- T1 connections -- T3 connection -- Transmission Media: -- Wired connections -- Wavelength division multiplexing -- Passive optical network -- Wireless technologies -- Broadband Services: -- DSL technology and xDSL -- Cable modem -- Wireless WAN Technologies: -- Cellular WAN -- WAN Protocols: -- Integrated services digital network -- Frame relay technology -- Point-to-point protocol -- Asynchronous transfer mode -- MPLS -- WAN Troubleshooting: -- Loss of internet connectivity -- Interface errors/monitoring -- Split horizon -- DNS issues -- Router configurations -- Company security policy -- Summary -- Exam essentials -- Written lab -- Review questions -- Troubleshooting Tools: -- Protocol analyzers -- Throughput testers -- Connectivity software -- Using traceroute -- Using ipconfig and ifconfig: -- Using the ipconfig utility -- Using the ifconfig utility -- Using the ping utility -- Using The Address Resolution Protocol: -- Windows ARP table -- Using the arp utility -- Using the nslookup utility -- Resolving names with the hosts table -- Using the Mtr command (pathping) -- Using The Route Command: -- Using the route command options -- Some examples of the route command -- Using The nbtstat Utility: -- a Switch -- A switch -- c Switch -- n Switch -- r Switch -- R switch -- S switch -- s Switch -- Using The netstat Utility: -- a Switch -- e Switch -- r Switch -- s Switch -- p Switch -- n Switch -- Using The File Transfer Protocol: -- Starting FTP and logging in to an FTP server -- Downloading files -- Uploading files -- Using The telnet Utility: -- How to enable telnet in windows -- Don't use telnet, use secure shell -- Summary -- Exam essentials -- Written lab -- Review questions -- Software And Hardware Tools: -- Understanding Network Scanners: -- Packet sniffers/network monitors -- Intrusion detection and prevention software -- Port scanners -- Wi-Fi analyzer -- Baseline -- Network Monitoring And Logging: -- Network monitoring -- SNMP -- Syslog -- SIEM -- Utilization -- Identifying Hardware Tools: -- Cable testers -- Protocol analyzer -- Certifiers -- Time-domain reflectometer -- Optical time-domain reflectometer -- Multimeter -- Toner probe -- Butt set -- Punch-down tool -- Cable stripper/snips -- Voltage event recorder (power) -- Environmental monitors -- Summary -- Exam essentials -- Written lab -- Review questions -- Network Troubleshooting: -- Narrowing Down The Problem: -- Did you check the super simple stuff? -- Is hardware or software causing the problem? -- Is it a workstation or a server problem? -- Which segments of the network are affected? -- Is it bad cabling? -- Troubleshooting Steps: -- Step 1: Identify the problem -- Step 2: Establish a theory of probable cause -- Step 3: Test the theory to determine cause -- Step 4: Establish a plan of action to resolve the problem and identify potential effects -- Step 5: Implement the solution or escalate as necessary -- Step 6: Verify fill system functionality, and if applicable, implement preventative measures -- Step 7: Document findings, actions, and outcomes -- Troubleshooting Tips: -- Don't overlook the small stuff -- Prioritize your problems -- Check the software configuration -- Don't overlook physical conditions -- Don't overlook cable problems -- Check for viruses -- Summary -- Exam essentials -- Written lab -- Review questions -- Management, Monitoring, And Optimization: -- Managing Network Documentation: -- Using SNMP -- Schematics and diagrams -- Network Monitoring: -- Baselines -- On-boarding and off-boarding of mobile devices -- NAC -- Policies, procedures, and regulations -- Safety practices -- Implementing network segmentation -- Network Optimization: -- Reasons to optimize your network's performance -- How to optimize performance -- Unified communications -- Traffic shaping -- Load balancing -- High availability -- Caching engines -- Fault tolerance -- Archives/backups -- Common address redundancy protocol -- Virtual networking -- Locating and installing equipment -- Change management procedures -- Summary -- Exam essentials -- Written lab -- Review questions -- Appendix A: Answers To The Written Labs: -- Chapters: 1-7 -- Written Lab: 7-1 -- Written Lab: 7-2 -- Written Lab: 7-3 -- Chapters: 8-20 -- Answers To Review Questions: -- Chapters: 1-20 -- Appendix C: Subnetting Class A: -- Subnetting Practice Examples: Class A Addresses: -- Practice Example # 1A: 255-255-0-0 (/16) -- Practice Example #2A: 225-255-240-0 (/20) -- Practice Example #3A: 255-255-255-192 (/26) -- Subnetting in your head: Class A addresses -- Written Lab 1 -- Written Lab 2 -- Answers to Written Lab 1 -- Answers to Written Lab 2 -- Index
Control code
ocn908802329
Dimensions
24 cm
Edition
Third edition.
Extent
l, 906 pages
Isbn
9781119021247
Lccn
2014958356
Media category
unmediated
Media MARC source
rdamedia
Media type code
  • n
Other physical details
illustrations
System control number
  • (Sirsi) o908802329
  • (OCoLC)908802329
Label
CompTIA Network+ study guide : [exam N10-006], Todd Lammle
Publication
Copyright
Note
  • Includes index
  • "Exam N10-006"--Cover
Carrier category
volume
Carrier category code
  • nc
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
  • Introduction -- Assessment test -- Introduction To Networks: -- First Things First: What's a Network?: -- Local area network -- Common network components -- Wide area network -- Network architecture: peer-to-peer or client-server? -- Physical Network Topologies: -- Bus topology -- Star topology -- Ring topology -- Mesh topology -- Point-to-point topology -- Point-to-multipoint topology -- Hybrid topology -- Topology Selection, Backbones, and Segments: -- Selecting the right topology -- Network backbone -- Network segments -- Summary -- Exam Essentials -- Written Labs -- Review questions -- Open Systems Interconnection Specifications: -- Internetworking Models: -- Layered approach -- Advantages of reference models -- OSI Reference Model: -- Application layer -- Presentation layer -- Session layer -- Transport layer -- Network layer -- Data link layer -- Physical layer -- Introduction to encapsulation -- Modulation techniques -- Summary -- Exam essentials -- Written lab -- Review Questions -- Networking Topologies, Connectors, And Wiring Standards: -- Physical Media: -- Coaxial cable -- Twisted-pair cable -- Fiber-optic cable -- Media converters -- Serial cables -- Cable Properties: -- Transmission speeds -- Distance -- Duplex -- Noise immunity (Security, EMI) -- Frequency -- Wiring Standards: -- 568A versus 568B -- Straight-through cable -- Crossover cable -- Rolled/rollover cable -- T1 crossover cable -- Installing Wiring Distributions: -- Summary -- Exam essentials -- Written lab -- Review questions -- Current Ethernet Specifications: -- Network Basics -- Ethernet Basics -- Collision domain -- Broadcast domain -- CSMA/CD -- Broadband/baseband -- Bit rates versus baud rate -- Wavelength -- Sampling-size -- Half-and full-duplex Ethernet -- Ethernet At The Data Link Layer: -- Binary to decimal and hexadecimal conversion Ethernet addressing -- Ethernet frames -- Ethernet At The Physical Layer -- Ethernet Over Other Standards (IEEE 1905-1-2013): -- Ethernet over power line -- Ethernet over HDMI -- Summary -- Exam essentials -- Written lab -- Review questions -- Networking Devices: -- Common Network Connectivity Devices: -- Network interface card -- Hub -- Bridge -- Switch -- Router -- Firewall -- IDS/IPS -- HIDS -- Access point -- Dynamic host configuration protocol server -- Other Specialized Devices: -- Multilayer switch -- Load balancer -- Domain name service server -- Proxy server -- Encryption devices -- Analog modem -- Packet shaper -- VPN concentrator -- Planning And Implementing A Basic SOHO Network Using Network Segmentation: -- Determining requirements -- Switches and bridges at the data link layer -- Hubs at the physical layer -- Environmental considerations -- Summary -- Exam essentials -- Written lab -- Review questions -- Introduction To The Internet Protocol: -- Introducing TCP/IP: -- Brief history of TCP/IP -- TCP/IP and the DoD model -- Process/application layer protocols -- Host-to-host layer protocols -- Internet layer protocols -- Data Encapsulation -- Summary -- Exam essentials -- Written lab -- IP Addressing: -- IP Terminology -- Hierarchical IP Addressing Scheme: -- Network addressing -- Private IP addresses (RFC 1918) -- IPv4 Address Types: -- Layer 2 broadcasts -- Layer 3 broadcasts -- Unicast address -- Multicast address (Class D) -- Internet Protocol Version 6 (IPv6): -- Why do we need IPv6? -- Benefits of and uses for IPv6 -- IPv6 addressing and expressions -- Shortened expression -- Address types -- Special addresses -- Stateless auto-configuration (EUI-64) -- DHCPv6 (Stateful) -- Migrating to IPv6 -- Summary -- Exam essentials -- Written Lab:-- Written Lab 7-1 -- Written Lab 7-2 -- Written Lab 7-3 -- Review questions -- IP Subnetting, Troubleshooting IP, And Introduction To NAT: -- Subnetting Basics: -- How to create subnets -- Subnet masks -- Classless Inter-Domain Routing (CIDR) -- Subnetting Class C addresses -- Subnetting Class B addresses -- Troubleshooting IP Addressing: -- Determining IP address problems -- Introduction To Network Address Translation (NAT): -- Types of network address translation -- NAT names -- How NAT works -- Summary -- Exam essentials -- Written lab -- Review questions -- Introduction To IP Routing: -- Routing basics -- IP routing process -- Testing your IP routing understanding -- Static and dynamic routing -- Summary -- Exam essentials -- Written lab -- Review questions -- Routing Protocols: -- Routing Protocol Basics: -- Administrative distances -- Classes of routing protocols -- Distance Vector Routing Protocols: -- Routing Information Protocol (RIP) -- RIP version 2 (RIPv2) -- VLSM and discontinuous networks -- EIFRP -- Border Gateway Protocol (BGP) -- Link State Routing Protocols: -- Open shortest Path First (OSPF) -- Intermediate System-To-Intermediate System (IS-IS) -- High Availability: -- Hot Standby Router Protocol (HSRP) -- Virtual router redundancy protocol -- IPv6 Routing Protocols: -- RIPng -- EIGRPv6 -- OSPFv3 -- Summary -- Exam essentials -- Written lab -- Review questions -- Switching And Virtual LANs: -- Networking before layer 2 switching -- Switching Services: -- Limitations of layer 2 switching -- Bridging versus LAN switching -- Three switch functions at layer 2 -- Spanning Tree Protocol: -- Spanning tree port states -- STP convergence -- Rapid spanning tree protocol 802-1w -- Virtual LANs: -- VLAN basics -- Quality of service -- VLAN memberships -- Static VLANs -- Dynamic VLANs -- Identifying VLANs -- VLAN identification methods -- VLAN Trunking Protocol: -- VTP modes of operation -- Do we really need to put an IP address on a switch? -- Port security -- Port bonding -- Two Additional Advanced Features Of Switches: -- Power over Ethernet (802-3af, 802-3at) -- Port Mirroring/Spanning (SPAN/RSPAN) -- Summary -- Exam essentials -- Written lab -- Review questions -- Wireless Networking: -- Introduction to wireless technology -- 802-11 Standards: -- 2-4GHz (802-11b) -- 2-4GHz (802-11g) -- 5GHz (802-11a) -- 5GHz (802-11h) -- 2-4GHz/5GHz (802-11n) -- 5GHz (802-11ac) -- Comparing 802-11 Standards: -- Range comparison -- Wireless Network Components: -- Wireless access points -- Wireless network interface card -- Wireless antennas -- Installing A Wireless Network: -- Ad hoc mode: independent basic service set -- Infrastructure mode: basic service set -- Wireless controllers -- Mobile hot spots -- Signal degradation -- Other network infrastructure implementations -- Installing and configuring WLAN hardware -- Site survey -- Wireless Security: -- Wireless threats -- Open access -- Service set identifiers, wired equivalent privacy, and media access control address authentication -- Remote authentication dial-in user service (802-1x) -- Temporal key integrity protocol -- Wi-Fi protected access or WPA2 pare-shared key -- Summary -- Exam essentials -- Written lab -- Review questions -- Authentication And Access Control: -- Security Filtering: -- Access control lists -- Tunneling -- Encryption -- Remote access -- Managing User Account And Password Security: -- Managing user accounts -- Managing passwords -- Single sign-on -- Multifactor authentication -- User-authentication methods: -- Public key Infrastructure (PKI) -- Kerberos -- Authentication, Authorization, And Accounting (AAA) -- Web services -- Unified voice services -- Network controller -- Network Access Control (NAC) -- Challenge Handshake Authentication Protocol (CHAP) -- MS-CHAP -- Extensible Authentication Protocol (EAP) -- Hashes -- Network access control -- Summary -- Exam essentials -- Written lab -- Review questions --
  • Network Threats And Mitigation: -- Recognizing Security Threats: -- Denial of service -- Distributed DoS (DDos) -- Authentication issues -- Viruses -- Zero day attacks -- Insider threat/malicious employee -- Vulnerabilities: -- Unnecessary running services -- Open ports -- Unpatched/legacy systems -- Unencrypted channels -- Clear-text credentials -- TEMPEST/RF emanation -- Malicious users -- Buffer overflow -- Wireless threats -- Attackers and their tools -- Misconfiguration issues -- Social Engineering (Phishing) -- Understanding Mitigation Techniques: -- Active detection -- Passive detection -- Proactive defense -- Basic forensic concepts -- Policies And Procedures: -- Security policies -- Security training -- Patches and upgrades -- Firmware updates -- Driver updates -- Upgrading versus downgrading -- Anti-Malware Software: -- Host-based -- Cloud/server-based -- Configurations backups -- Updating antivirus computers -- Fixing an infected computer -- Summary -- Exam essentials -- Written lab -- Review questions -- Physical Security And Risk: -- Using hardware and software security devices -- Defining Firewalls -- Network-based firewalls -- Host-based firewalls -- Firewall Technologies: -- Access control lists -- Port security -- Demilitarized zone -- Protocol switching -- Dynamic packet filtering -- Proxy services -- Firewalls At The Application Layer Versus The Network Layer: -- Stateful versus stateless network layer firewalls -- Application layer firewalls -- Scanning Services And Other Firewall Features: -- Content filtering -- Signature identification -- Context awareness -- Virtual wire versus routed -- Zones -- Intrusion Detection And Prevention Systems: -- Network-based IDS -- Host-based IDS -- Vulnerability scanners -- VPN concentrators -- Understanding Problems Affecting Device Security: -- Physical security -- Logical security configurations -- Risk-related concepts -- Summary -- Exam essentials -- Written lab -- Review questions -- Wide Area Networks: -- What's a WAN?: -- Defining WAN terms -- Public switched telephone network -- WAN connection types -- Bandwidth or speed -- T-Series Connections: -- T1 connections -- T3 connection -- Transmission Media: -- Wired connections -- Wavelength division multiplexing -- Passive optical network -- Wireless technologies -- Broadband Services: -- DSL technology and xDSL -- Cable modem -- Wireless WAN Technologies: -- Cellular WAN -- WAN Protocols: -- Integrated services digital network -- Frame relay technology -- Point-to-point protocol -- Asynchronous transfer mode -- MPLS -- WAN Troubleshooting: -- Loss of internet connectivity -- Interface errors/monitoring -- Split horizon -- DNS issues -- Router configurations -- Company security policy -- Summary -- Exam essentials -- Written lab -- Review questions -- Troubleshooting Tools: -- Protocol analyzers -- Throughput testers -- Connectivity software -- Using traceroute -- Using ipconfig and ifconfig: -- Using the ipconfig utility -- Using the ifconfig utility -- Using the ping utility -- Using The Address Resolution Protocol: -- Windows ARP table -- Using the arp utility -- Using the nslookup utility -- Resolving names with the hosts table -- Using the Mtr command (pathping) -- Using The Route Command: -- Using the route command options -- Some examples of the route command -- Using The nbtstat Utility: -- a Switch -- A switch -- c Switch -- n Switch -- r Switch -- R switch -- S switch -- s Switch -- Using The netstat Utility: -- a Switch -- e Switch -- r Switch -- s Switch -- p Switch -- n Switch -- Using The File Transfer Protocol: -- Starting FTP and logging in to an FTP server -- Downloading files -- Uploading files -- Using The telnet Utility: -- How to enable telnet in windows -- Don't use telnet, use secure shell -- Summary -- Exam essentials -- Written lab -- Review questions -- Software And Hardware Tools: -- Understanding Network Scanners: -- Packet sniffers/network monitors -- Intrusion detection and prevention software -- Port scanners -- Wi-Fi analyzer -- Baseline -- Network Monitoring And Logging: -- Network monitoring -- SNMP -- Syslog -- SIEM -- Utilization -- Identifying Hardware Tools: -- Cable testers -- Protocol analyzer -- Certifiers -- Time-domain reflectometer -- Optical time-domain reflectometer -- Multimeter -- Toner probe -- Butt set -- Punch-down tool -- Cable stripper/snips -- Voltage event recorder (power) -- Environmental monitors -- Summary -- Exam essentials -- Written lab -- Review questions -- Network Troubleshooting: -- Narrowing Down The Problem: -- Did you check the super simple stuff? -- Is hardware or software causing the problem? -- Is it a workstation or a server problem? -- Which segments of the network are affected? -- Is it bad cabling? -- Troubleshooting Steps: -- Step 1: Identify the problem -- Step 2: Establish a theory of probable cause -- Step 3: Test the theory to determine cause -- Step 4: Establish a plan of action to resolve the problem and identify potential effects -- Step 5: Implement the solution or escalate as necessary -- Step 6: Verify fill system functionality, and if applicable, implement preventative measures -- Step 7: Document findings, actions, and outcomes -- Troubleshooting Tips: -- Don't overlook the small stuff -- Prioritize your problems -- Check the software configuration -- Don't overlook physical conditions -- Don't overlook cable problems -- Check for viruses -- Summary -- Exam essentials -- Written lab -- Review questions -- Management, Monitoring, And Optimization: -- Managing Network Documentation: -- Using SNMP -- Schematics and diagrams -- Network Monitoring: -- Baselines -- On-boarding and off-boarding of mobile devices -- NAC -- Policies, procedures, and regulations -- Safety practices -- Implementing network segmentation -- Network Optimization: -- Reasons to optimize your network's performance -- How to optimize performance -- Unified communications -- Traffic shaping -- Load balancing -- High availability -- Caching engines -- Fault tolerance -- Archives/backups -- Common address redundancy protocol -- Virtual networking -- Locating and installing equipment -- Change management procedures -- Summary -- Exam essentials -- Written lab -- Review questions -- Appendix A: Answers To The Written Labs: -- Chapters: 1-7 -- Written Lab: 7-1 -- Written Lab: 7-2 -- Written Lab: 7-3 -- Chapters: 8-20 -- Answers To Review Questions: -- Chapters: 1-20 -- Appendix C: Subnetting Class A: -- Subnetting Practice Examples: Class A Addresses: -- Practice Example # 1A: 255-255-0-0 (/16) -- Practice Example #2A: 225-255-240-0 (/20) -- Practice Example #3A: 255-255-255-192 (/26) -- Subnetting in your head: Class A addresses -- Written Lab 1 -- Written Lab 2 -- Answers to Written Lab 1 -- Answers to Written Lab 2 -- Index
Control code
ocn908802329
Dimensions
24 cm
Edition
Third edition.
Extent
l, 906 pages
Isbn
9781119021247
Lccn
2014958356
Media category
unmediated
Media MARC source
rdamedia
Media type code
  • n
Other physical details
illustrations
System control number
  • (Sirsi) o908802329
  • (OCoLC)908802329

Library Locations

    • Cy-Fair LibraryBorrow it
      9191 Barker-Cypress Road, Cypress, TX, 77433, US
      29.911273 -95.686197
Processing Feedback ...