Название: Cisco Certified Support Technician (CCST) Cybersecurity 100-160 Official Cert Guide (Early Release) Автор: Shane Sexton, Raymond Lacoste Издательство: Cisco Press/Pearson Год: 2024 Страниц: 555 Язык: английский Формат: epub Размер: 24.5 MB
Trust the best-selling Official Cert Guide series from Cisco Press to help you learn, prepare, and practice for the Cisco Certified Support Technician (CCST) Cybersecurity - 100-160 exam. Well regarded for its level of detail, study plans, assessment features, and challenging review questions and exercises, Cisco Certified Support Technician (CCST) Cybersecurity - 100-160 Official Cert Guide helps you master the concepts and techniques that ensure your exam success and is the only self-study resource approved by Cisco. Expert author Shane Sexton and Raymond Lacoste shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills.
To provide secure network communications, you must be familiar with the fundamentals of network communications. In addition, you have to be familiar with the different types of protocols and services that are required for network communication so that you can uncover any and all vulnerabilities associated with them and mitigate those vulnerabilities. This chapter begins by introducing the TCP/IP stack and the OSI reference model. You will learn what each layer provides for network communication. The Chapter 2 also explores vulnerabilities and vulnerability mitigation techniques for various TCP/IP protocols and services, such as TCP, UDP, HTTP, ARP, ICMP, DHCP, and DNS. In addition, this chapter explores how network addressing impacts network security. It covers IPv4 and IPv6 addresses, MAC addresses, network segmentation, CIDR notation, NAT, and public versus private networks.
The TCP/IP stack, also known as the Internet Protocol suite, is a set of communication protocols that form the foundation of the Internet and many other computer networks. Think of it as a blueprint, but one that outlines a standardized way for devices to communicate and exchange data over networks, ensuring reliable and efficient transmission of information. The purpose of the TCP/IP stack is to facilitate reliable, scalable, and interoperable communication between devices on a network. It enables the Internet and other networks to function by providing a standardized set of protocols that define how data is transmitted, routed, and received. The TCP/IP stack is named for its two primary protocols: Transmission Control Protocol (TCP) and Internet Protocol (IP). These protocols work together and operate at specific layers of the protocol stack to handle various aspects of network communication.
Introduction Part I: Introduction to Cybersecurity Part II: Network Security Part III: Endpoint Security Part IV: CCST Cybersecurity Preparation Appendix A. Answers to the “Do I Know This Already?” Quizzes and Review Questions Glossary Appendix B. Memory Tables Appendix C. Memory Tables Answer Key
Скачать Cisco Certified Support Technician (CCST) Cybersecurity 100-160 Official Cert Guide (Early Release)
Внимание
Уважаемый посетитель, Вы зашли на сайт как незарегистрированный пользователь.
Мы рекомендуем Вам зарегистрироваться либо войти на сайт под своим именем.
Информация
Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.