CCNA Cybersecurity Operations Companion Guide
- By Allan Johnson, Cisco Networking Academy
- Published Jun 17, 2018 by Cisco Press. Part of the Companion Guide series.
EPUB (Watermarked)
- Sorry, this book is no longer in print.
- About Watermarked eBooks
This EPUB will be accessible from your Account page after purchase.
This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.
Features
- Portable, desk reference for take-home study and reference anytime, anywhere.
- Aligns to the online course chapters.
- Provides students with the only authorized, full-featured textbook for the Cisco Networking Academy course
- Book-based pedagogy that serves as additional reinforcement in helping the student learn the topics covered in the course.
- Copyright 2018
- Pages: 720
- Edition: 1st
- EPUB (Watermarked)
- ISBN-10: 0-13-516624-1
- ISBN-13: 978-0-13-516624-6
CCNA Cybersecurity Operations Companion Guide is the official supplemental textbook for the Cisco Networking Academy CCNA Cybersecurity Operations course.
The course emphasizes real-world practical application, while providing opportunities for you to gain the skills needed to successfully handle the tasks, duties, and responsibilities of an associate-level security analyst working in a security operations center (SOC).
The Companion Guide is designed as a portable desk reference to use anytime, anywhere to reinforce the material from the course and organize your time.
The book’s features help you focus on important concepts to succeed in this course:
· Chapter Objectives—Review core concepts by answering the focus questions listed at the beginning of each chapter.
· Key Terms—Refer to the lists of networking vocabulary introduced and highlighted in context in each chapter.
· Glossary—Consult the comprehensive Glossary with more than 360 terms.
· Summary of Activities and Labs—Maximize your study time with this complete list of all associated practice exercises at the end of each chapter.
· Check Your Understanding—Evaluate your readiness with the end-of-chapter questions that match the style of questions you see in the online course quizzes. The answer key explains each answer.
How To—Look for this icon to study the steps you need to learn to perform certain tasks.
Interactive Activities—Reinforce your understanding of topics with dozens of exercises from the online course identified throughout the book with this icon.
Packet Tracer Activities—Explore and visualize networking concepts using Packet Tracer. There are exercises interspersed throughout the chapters and provided in the accompanying Lab Manual book.
Videos—Watch the videos embedded within the online course.
Hands-on Labs—Develop critical thinking and complex problem-solving skills by completing the labs and activities included in the course and published in the separate Lab Manual.
Table of Contents
- Introduction
- Chapter 1 Cybersecurity and the Security Operations Center
- Chapter 2 Windows Operating System
- Chapter 3 Linux Operating System
- Chapter 4 Network Protocols and Services
- Chapter 5 Network Infrastructure
- Chapter 6 Principles of Network Security
- Chapter 7 Network Attacks: A Deeper Look
- Chapter 8 Protecting the Network
- Chapter 9 Cryptography and the Public Key Infrastructure
- Chapter 10 Endpoint Security and Analysis
- Chapter 11 Security Monitoring
- Chapter 12 Intrusion Data Analysis
- Chapter 13 Incident Response and Handling
- Appendix A Answers to the “Check Your Understanding” Questions
- Glossary