9780983660781-0983660786-Cisco ASA Security Appliance Hands-On Training for Accidental Administrator: Student Exercise Manual

Cisco ASA Security Appliance Hands-On Training for Accidental Administrator: Student Exercise Manual

ISBN-13: 9780983660781
ISBN-10: 0983660786
Edition: 2.1c
Author: Don R. Crawley
Publication date: 2016
Publisher: soundtraining.net press
Format: Paperback 56 pages
FREE US shipping
Buy

From $21.48

Book details

ISBN-13: 9780983660781
ISBN-10: 0983660786
Edition: 2.1c
Author: Don R. Crawley
Publication date: 2016
Publisher: soundtraining.net press
Format: Paperback 56 pages

Summary

Cisco ASA Security Appliance Hands-On Training for Accidental Administrator: Student Exercise Manual (ISBN-13: 9780983660781 and ISBN-10: 0983660786), written by authors Don R. Crawley, was published by soundtraining.net press in 2016. With an overall rating of 3.5 stars, it's a notable title among other Peripherals (Hardware & DIY, Network Security, Security & Encryption) books. You can easily purchase or rent Cisco ASA Security Appliance Hands-On Training for Accidental Administrator: Student Exercise Manual (Paperback) from BooksRun, along with many other new and used Peripherals books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $0.3.

Description

This is a classroom lab manual. It is not designed for use in a standalone environment.

This is the Cisco ASA Security Appliance student lab manual designed for use in an instructor-led classroom setting. It is the companion to the book Cisco ASA for Accidental Administrators. Includes 72 hands-on exercises including: password recovery, building a configuration from scratch, previewing commands, using ASDM to build a configuration, analyzing the base configuration, backing up and restoring configurations and software images, remote logging options, how to configure Telnet and SSH, setting up login banners, remote authentication using RADIUS, Kerberos, and LDAP, site-to-site VPNs, remote access VPNs, configuring a DMZ, port scanning with nmap, and transparent mode. Each exercise is explained in step-by-step detail in order to create several different firewall configurations, anticipating real world scenarios.

Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book