9781587134388-1587134381-CCNA Cybersecurity Operations Lab Manual (Lab Companion)

CCNA Cybersecurity Operations Lab Manual (Lab Companion)

ISBN-13: 9781587134388
ISBN-10: 1587134381
Edition: 1
Author: Cisco Networking Academy
Publication date: 2018
Publisher: Cisco Press
Format: Paperback 400 pages
FREE US shipping
Rent
35 days
from $18.62 USD
FREE shipping on RENTAL RETURNS
Buy

From $45.41

Rent

From $18.62

Book details

ISBN-13: 9781587134388
ISBN-10: 1587134381
Edition: 1
Author: Cisco Networking Academy
Publication date: 2018
Publisher: Cisco Press
Format: Paperback 400 pages

Summary

CCNA Cybersecurity Operations Lab Manual (Lab Companion) (ISBN-13: 9781587134388 and ISBN-10: 1587134381), written by authors Cisco Networking Academy, was published by Cisco Press in 2018. With an overall rating of 4.3 stars, it's a notable title among other Cisco (Computer Certification) books. You can easily purchase or rent CCNA Cybersecurity Operations Lab Manual (Lab Companion) (Paperback, Used) from BooksRun, along with many other new and used Cisco books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $19.44.

Description

The only authorized Lab Manual for the Cisco Networking Academy CCNA Cybersecurity Operations course Curriculum Objectives


CCNA Cybersecurity Operations 1.0 covers knowledge and skills needed to successfully handle the tasks, duties, and responsibilities of an associate-level Security Analyst working in a Security Operations Center (SOC).


Upon completion of the CCNA Cybersecurity Operations 1.0 course, students will be able to perform the following tasks:

  • Install virtual machines to create a safe environment for implementing and analyzing cybersecurity threat events.
  • Explain the role of the Cybersecurity Operations Analyst in the enterprise.
  • Explain the Windows Operating System features and characteristics needed to support cybersecurity analyses.
  • Explain the features and characteristics of the Linux Operating System.
  • Analyze the operation of network protocols and services.
  • Explain the operation of the network infrastructure.
  • Classify the various types of network attacks.
  • Use network monitoring tools to identify attacks against network protocols and services.
  • Use various methods to prevent malicious access to computer networks, hosts, and data.
  • Explain the impacts of cryptography on network security monitoring.
  • Explain how to investigate endpoint vulnerabilities and attacks.
  • Analyze network intrusion data to verify potential exploits.
  • Apply incident response models to manage network security incidents.
Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book