Детальная информация

Название Implementing and Administering Cisco Solutions: 200-301 CCNA exam guide : begin a Successful Career in Networking with 200-301 CCNA Certification
Авторы Singh Glen D.
Коллекция Электронные книги зарубежных издательств ; Общая коллекция
Тематика Computer networks — Study guides. — Examinations ; Telecommunications engineers — Certification. ; Internetworking (Telecommunication) — Study guides. — Examinations ; TCP/IP (Computer network protocol) — Study guides. — Examinations ; EBSCO eBooks
Тип документа Другой
Тип файла PDF
Язык Английский
Права доступа Доступ по паролю из сети Интернет (чтение, печать, копирование)
Ключ записи on1202478914
Дата создания записи 31.10.2020

Разрешенные действия

pdf/2655449.pdf
Действие 'Прочитать' будет доступно, если вы выполните вход в систему или будете работать с сайтом на компьютере в другой сети Действие 'Загрузить' будет доступно, если вы выполните вход в систему или будете работать с сайтом на компьютере в другой сети
epub/2655449.epub
Действие 'Загрузить' будет доступно, если вы выполните вход в систему или будете работать с сайтом на компьютере в другой сети
Группа Анонимные пользователи
Сеть Интернет
Место доступа Группа пользователей Действие
Локальная сеть ИБК СПбПУ Все
Прочитать Печать Загрузить
Интернет Авторизованные пользователи СПбПУ
Прочитать Печать Загрузить
Интернет Анонимные пользователи
  • Cover
  • Title page
  • Copyright and Credits
  • About Packt
  • Table of Contents
    • Contributors
  • Preface
  • Section 1: Network Fundamentals
  • Chapter 1: Introduction to Networking
    • Understanding the evolution of networking and the internet
    • Understanding network sizes – SOHO, LAN, and WAN
    • Learning about network protocol suites
      • OSI reference model
      • Understanding the TCP/IP protocol suite
    • Understanding the functions of network devices
      • Hubs
      • Layer 2 switches
      • Layer 3 switches
      • Routers
      • Next-generation firewalls and IPS
      • Access Points
      • Cisco Wireless LAN Controller (WLC)
      • Endpoints and servers
      • Cisco DNA
    • Network topology architectures
      • 2 Tier
      • 3 Tier
    • Summary
    • Further reading
  • Chapter 2: Getting Started with Cisco IOS Devices
    • Technical requirements
    • Building a Cisco lab environment
      • Cisco Packet Tracer
      • Virtual CCNA Lab
      • Physical labs
    • Getting started with Cisco IOS devices
      • Boot process
    • Accessing a Cisco IOS device
    • Configuring the Cisco IOS
      • Setting up a small Cisco network
    • Performing troubleshooting procedures
    • Summary
    • Questions
    • Further reading
  • Chapter 3: IP Addressing and Subnetting
    • Technical requirements
    • The need for IP addressing
    • Characteristics of IPv4
      • Composition of an IPv4 packet
      • Converting binary into decimal
      • Converting decimal into binary
      • Transmission types
    • Classes of IPv4 addresses
      • Public IPv4 address space
      • Private IPv4 address space
    • Special IPv4 addresses
      • Loopback address
      • Test-Net
      • Link Local
    • Subnet mask
      • Network prefix
      • Identifying the Network ID
    • Subnetting
      • Step 1 – Determining the appropriate IP address
      • Step 2 – Creating new subnets (subnetworks)
      • Step 3 – Assigning subnets to each network
      • Step 4 – Performing Variable-Length Subnet Masking (VLSM)
    • IPv6
      • Types of IPv6 addresses
    • Lab – Configuring IPv6 on a Cisco IOS router
    • Lab – Configuring IPv6 on a Windows computer
    • Testing end-to-end connectivity
    • Summary
    • Further reading
  • Chapter 4: Detecting Physical Issues, Wireless Architectures, and Virtualization
    • Technical requirements
    • Understanding network switch functions
      • Detecting physical issues
      • Wireless technologies
      • 2.4 GHz versus 5 GHz
      • Wireless bands
      • SSID, BSSID, and ESS
    • Cisco wireless architectures
      • Autonomous
      • Cloud-based
      • Split-MAC
    • AP modes
    • Wireless components and management
      • Lab – accessing a Cisco WLC GUI
      • Lab – configuring a wireless network using a Cisco WLC
    • Virtualization fundamentals
      • Type 1 hypervisor
      • Type 2 hypervisor
    • Cloud computing
      • Cloud services
      • SaaS
      • PaaS
      • IaaS
      • Cloud delivery models
    • Summary
    • Questions
    • Further reading
  • Section 2: Network Access
  • Chapter 5: Implementing VLANs, Layer 2 Discovery Protocols, and EtherChannels
    • Technical requirements
    • Understanding VLANs
      • VLAN ranges
      • Types of VLANs
      • Trunk interfaces
      • Inter-VLAN routing
      • Lab – implementing VLANs
      • Lab – creating trunk interfaces
      • Lab – configuring inter-VLAN routing
    • Layer 2 Discovery Protocols
      • Cisco Discovery Protocol (CDP)
      • Link-Layer Discovery Protocol (LLDP)
    • Understanding and configuring EtherChannels
      • Lab – implementing EtherChannels
    • Summary
    • Questions
    • Further reading
  • Chapter 6: Understanding and Configuring Spanning-Tree
    • Technical requirements
    • What is Spanning-Tree Protocol?
      • Bridge Protocol Data Unit
      • Root bridge and secondary root bridge
    • Spanning-tree standards
      • Port roles and states
      • Determining the root bridge and port roles
      • PVST+
      • Rapid-PVST+
      • Lab – implementing Rapid-PVST+ on a Cisco network
      • Lab – configuring PortFast and BPDUguard
    • Summary
    • Questions
    • Further reading
  • Section 3: IP Connectivity
  • Chapter 7: Interpreting Routing Components
    • Technical requirements
    • Understanding IP routing
    • Components of the routing table
      • Routing protocol codes
      • Prefix and network mask
      • Next hop
      • Administrative Distance
      • Routing metrics
      • Gateway of last resort
    • Summary
    • Questions
    • Further reading
  • Chapter 8: Understanding First Hop Redundancy, Static and Dynamic Routing
    • Technical requirements
    • Understanding static routing
      • Do we need static routing?
      • Types of static routes
      • Lab – configuring static routing using IPv4
      • Lab – configuring an IPv4 default route
      • Lab – configuring static routing using IPv6
    • Understanding dynamic routing
      • Types of dynamic routing protocols
      • Open Shortest Path First
      • Lab – configuring OSPFv2
      • Validating OSPF configurations
    • Understanding first hop redundancy
      • Various FHRPs
    • Summary
    • Questions
    • Further reading
  • Section 4: IP Services
  • Chapter 9: Configuring Network Address Translation (NAT)
    • Technical requirements
    • The challenge of using IPv4 on the internet
    • Understanding NAT
      • Understanding NAT operation and terminology
    • Types of NAT
      • Static NAT
      • Dynamic NAT
      • Configuring PAT
    • Lab – implementing NAT overload (PAT)
    • Lab – implementing static NAT with port forwarding
    • Lab – implementing dynamic NAT
    • Summary
    • Questions
    • Further reading
  • Chapter 10: Implementing Network Services and IP Operations
    • Technical requirements
    • Understanding NTP
      • Lab – configuring NTP
    • Understanding DHCP
      • DHCP operations
      • Cisco's DHCP configurations
      • DHCP relay
      • Lab – configuring DHCP and DHCP relay
    • Domain Name System
      • DNS root servers
      • DNS record types
      • Lab – configuring DNS
    • Understanding the benefits of using Syslog
      • Syslog severity levels
      • Lab – configuring Syslog
    • Simple Network Management Protocol
      • SNMP versions
      • Management information base
      • Lab – configuring SNMP
    • QoS traffic classification
      • QoS terminologies
      • Traffic type characteristics
      • QoS queuing algorithms
      • QoS policy models
      • QoS implementation methods
    • Summary
    • Questions
    • Further reading
  • Section 5: Security Fundamentals
  • Chapter 11: Exploring Network Security
    • Technical requirements
    • Security concepts
      • The CIA triad
      • Threats
      • Vulnerabilities
      • Exploits
      • Attacks
    • Authentication, Authorization, and Accounting
      • Lab – Implementing AAA
    • Elements of a security program
    • Wireshark 101
      • Lab – Analyzing packets
    • Summary
    • Questions
    • Further reading
  • Chapter 12: Configuring Device Access Control and VPNs
    • Technical requirements
    • Device access control
      • Securing console access
      • Securing an AUX line
      • VTY line access
      • Securing Privilege Exec mode
      • Encrypting all plaintext passwords
    • Virtual Private Networks
      • Site-to-Site VPNs
      • Remote access VPNs
      • IPsec
      • Lab – Configuring a site-to-site VPN
      • Lab – Configuring a remote access VPN
    • Summary
    • Questions
    • Further reading
  • Chapter 13: Implementing Access Control Lists
    • Technical requirements
    • What are ACLs?
      • Benefits of using ACLs
    • ACL operation
    • ACL wildcard masks
      • Calculating the wildcard mask
      • ACL guidelines and best practices
    • Working with standard ACLs
      • Creating a numbered standard ACL
      • Implementing a named standard ACL
      • Deleting an ACL
      • Lab – implementing a standard numbered ACL
      • Lab – configuring a standard named ACL
      • Lab – securing VTY lines using ACLs
    • Working with extended ACLs
      • Creating a numbered extended ACL
      • Implementing a named extended ACL
      • Lab – implementing extended ACLs
    • Summary
    • Questions
    • Further reading
  • Chapter 14: Implementing Layer 2 and Wireless Security
    • Technical requirements
    • Types of Layer 2 attacks on a network
      • Network attacks
      • Defense in depth
      • Layer 2 threats
    • Protecting against Layer 2 threats
      • Port security
      • DHCP snooping
      • Dynamic ARP inspection
    • Wireless network security
      • Authentication methods
      • Lab – implementing wireless security using a WLC
    • Summary
    • Questions
    • Further reading
  • Section 6: Automation and Programmability
  • Chapter 15: Network Automation and Programmability Techniques
    • Understanding automation
    • Understanding data formats
      • eXtensible Markup Language
      • JavaScript Object Notation
      • YAML Ain't Markup Language
    • Understanding APIs
      • Types of APIs
      • RESTful APIs
    • Understanding network configuration management
      • Fabric, overlay, and underlay
      • Cisco DNA Center
    • Summary
    • Questions
    • Further reading
  • Chapter 16: Mock Exam 1
  • Chapter 17: Mock Exam 2
  • Assessments
  • Other Books You May Enjoy
  • Index
pdf/2655449.pdf

Количество обращений: 1 
За последние 30 дней: 0

Подробная статистика

epub/2655449.epub

Количество обращений: 0 
За последние 30 дней: 0

Подробная статистика