Enterprise Networking, Security, and Automation Course Booklet (CCNAv7)
Enterprise Networking, Security, and Automation Course Booklet (CCNAv7)
Click to enlarge
Author(s): Cisco Networking Academy, Cisco Networking
Johnson, Allan
ISBN No.: 9780136634737
Pages: 416
Year: 202008
Format: Trade Paper
Price: $ 55.20
Dispatch delay: Dispatched between 7 to 15 days
Status: Available

Introduction xxx Chapter 1 Single-Area OSPFv2 Concepts 1 Introduction - 1.0 1 Why should I take this module? - 1.0.1 1 What will I learn to do in this module? - 1.0.2 1 OSPF Features and Characteristics - 1.1 1 Introduction to OSPF - 1.1.


1 1 Components of OSPF - 1.1.2 2 Link-State Operation - 1.1.3 3 Single-Area and Multiarea OSPF - 1.1.4 4 Multiarea OSPF - 1.1.


5 4 OSPFv3 - 1.1.6 5 Check Your Understanding - OSPF Features and Characteristics - 1.1.7 6 OSPF Packets - 1.2 6 Video - OSPF Packets - 1.2.1 6 Types of OSPF Packets - 1.


2.2 6 Link-State Updates - 1.2.3 7 Hello Packet - 1.2.4 7 Check Your Understanding - OSPF Packets - 1.2.5 7 OSPF Operation - 1.


3 7 Video - OSPF Operation - 1.3.1 7 OSPF Operational States - 1.3.2 7 Establish Neighbor Adjacencies - 1.3.3 8 Synchronizing OSPF Databases - 1.3.


4 9 The Need for a DR - 1.3.5 10 LSA Flooding With a DR - 1.3.6 11 Check Your Understanding - OPSF Operation - 1.3.7 11 Module Practice and Quiz - 1.4 11 What did I learn in this module? - 1.


4.1 11 Chapter Quiz - Single-Area OSPFv2 Concepts 14 Your Chapter Notes 14 Chapter 2 Single-Area OSPFv2 Configuration 15 Introduction - 2.0 15 Why should I take this module? - 2.0.1 15 What will I learn to do in this module? - 2.0.2 15 OSPF Router ID - 2.1 15 OSPF Reference Topology - 2.


1.1 15 Router Configuration Mode for OSPF - 2.1.2 16 Router IDs - 2.1.3 16 Router ID Order of Precedence - 2.1.4 17 Configure a Loopback Interface as the Router ID - 2.


1.5 17 Explicitly Configure a Router ID - 2.1.6 18 Modify a Router ID - 2.1.7 18 Syntax Checker - Configure R2 and R3 Router IDs - 2.1.8 19 Check Your Understanding - OSPF Router ID - 2.


1.9 19 Point-to-Point OSPF Networks - 2.2 20 The network Command Syntax - 2.2.1 20 The Wildcard Mask - 2.2.2 20 Check Your Understanding - The Wildcard Masks - 2.2.


3 20 Configure OSPF Using the network Command - 2.2.4 20 Syntax Checker - Configure R2 and R3 Using the network Command - 2.2.5 21 Configure OSPF Using the ip ospf Command - 2.2.6 21 Syntax Checker - Configure R2 and R3 Using the ip ospf Command - 2.2.


7 22 Passive Interface - 2.2.8 22 Configure Passive Interfaces - 2.2.9 23 Syntax Checker - Configure R2 and R3 Passive Interfaces - 2.2.10 24 OSPF Point-to-Point Networks - 2.2.


11 24 Loopbacks and Point-to-Point Networks - 2.2.12 26 Packet Tracer - Point-to-Point Single-Area OSPFv2 Configuration - 2.2.13 26 Multiaccess OSPF Networks - 2.3 27 OSPF Network Types - 2.3.1 27 OSPF Designated Router - 2.


3.2 27 OSPF Multiaccess Reference Topology - 2.3.3 27 Verify OSPF Router Roles - 2.3.4 28 Verify DR/BDR Adjacencies - 2.3.5 30 Default DR/BDR Election Process - 2.


3.6 32 DR Failure and Recovery - 2.3.7 33 The ip ospf priority Command - 2.3.8 33 Configure OSPF Priority - 2.3.9 34 Syntax Checker - Configure OSPF Priority - 2.


3.10 35 Packet Tracer - Determine the DR and BDR - 2.3.11 35 Modify Single-Area OSPFv2 - 2.4 36 Cisco OSPF Cost Metric - 2.4.1 36 Adjust the Reference Bandwidth - 2.4.


2 36 OSPF Accumulates Costs - 2.4.3 38 Manually Set OSPF Cost Value - 2.4.4 38 Test Failover to Backup Route - 2.4.5 39 Syntax Checker - Modify the Cost Values for R2 and R3 - 2.4.


6 40 Hello Packet Intervals - 2.4.7 40 Verify Hello and Dead Intervals - 2.4.8 40 Modify OSPFv2 Intervals - 2.4.9 42 Syntax Checker - Modifying Hello and Dead Intervals on R3 - 2.4.


10 43 Packet Tracer - Modify Single-Area OSPFv2 - 2.4.11 43 Default Route Propagation - 2.5 43 Propagate a Default Static Route in OSPFv2 - 2.5.1 43 Verify the Propagated Default Route - 2.5.2 44 Packet Tracer - Propagate a Default Route in OSPFv2 - 2.


5.3 46 Verify Single-Area OSPFv2 - 2.6 46 Verify OSPF Neighbors - 2.6.1 46 Verify OSPF Protocol Settings - 2.6.2 48 Verify OSPF Process Information - 2.6.


3 48 Verify OSPF Interface Settings - 2.6.4 50 Syntax Checker - Verify Single-Area OSPFv2 - 2.6.5 51 Packet Tracer - Verify Single-Area OSPFv2 - 2.6.6 51 Module Practice and Quiz - 2.7 51 Packet Tracer - Single-Area OSPFv2 Configuration - 2.


7.1 51 Lab - Single-Area OSPFv2 Configuration - 2.7.2 51 What did I learn in this module? - 2.7.3 52 Chapter Quiz - Single-Area OSPFv2 Configuration 56 Your Chapter Notes 56 Chapter 3 Network Security Concepts 57 Introduction - 3.0 57 Why should I take this module? - 3.0.


1 57 What will I learn in this module? - 3.0.2 57 Ethical Hacking Statement - 3.0.3 57 Current State of Cybersecurity - 3.1 58 Current State of Affairs - 3.1.1 58 Vectors of Network Attacks - 3.


1.2 58 Data Loss - 3.1.3 59 Check Your Understanding - Current State of Cybersecurity - 3.1.4 60 Threat Actors - 3.2 60 The Hacker - 3.2.


1 60 Evolution of Hackers - 3.2.2 61 Cyber Criminals - 3.2.3 61 Hacktivists - 3.2.4 61 State-Sponsored Hackers - 3.2.


5 61 Check Your Understanding - Threat Actors - 3.2.6 62 Threat Actor Tools - 3.3 62 Video - Threat Actor Tools - 3.3.1 62 Introduction to Attack Tools - 3.3.2 62 Evolution of Security Tools - 3.


3.3 62 Attack Types - 3.3.4 63 Check Your Understanding - Threat Actor Tools - 3.3.5 64 Malware - 3.4 64 Overview of Malware - 3.4.


1 64 Viruses and Trojan Horses - 3.4.2 64 Other Types of Malware - 3.4.3 65 Check Your Understanding - Malware - 3.4.4 66 Common Network Attacks - 3.5 66 Overview of Network Attacks - 3.


5.1 66 Video - Reconnaissance Attacks - 3.5.2 67 Reconnaissance Attacks - 3.5.3 67 Video - Access and Social Engineering Attacks - 3.5.4 68 Access Attacks - 3.


5.5 68 Social Engineering Attacks - 3.5.6 69 Lab - Social Engineering - 3.5.7 70 Video - Denial of Service Attacks - 3.5.8 70 DoS and DDoS Attacks - 3.


5.9 70 Check Your Understanding - Common Network Attacks - 3.5.10 71 IP Vulnerabilities and Threats - 3.6 71 Video - Common IP and ICMP Attacks - 3.6.1 71 IPv4 and IPv6 - 3.6.


2 71 ICMP Attacks - 3.6.3 71 Video - Amplification, Reflection, and Spoofing Attacks - 3.6.4 72 Amplification and Reflection Attacks - 3.6.5 72 Address Spoofing Attacks - 3.6.


6 72 Check Your Understanding - IP Vulnerabilities and Threats - 3.6.7 73 TCP and UDP Vulnerabilities - 3.7 73 TCP Segment Header - 3.7.1 73 TCP Services - 3.7.2 73 TCP Attacks - 3.


7.3 74 UDP Segment Header and Operation - 3.7.4 74 UDP Attacks - 3.7.5 75 Check Your Understanding - TCP and UDP Vulnerabilities - 3.7.6 75 IP Services - 3.


8 75 ARP Vulnerabilities - 3.8.1 75 ARP Cache Poisoning - 3.8.2 76 Video - ARP Spoofing - 3.8.3 76 DNS Attacks - 3.8.


4 76 DNS Tunneling - 3.8.5 78 DHCP - 3.8.6 78 DHCP Attacks - 3.8.7 78 Lab - Explore DNS Traffic - 3.8.


8 79 Network Security Best Practices - 3.9 80 &nb.


To be able to view the table of contents for this publication then please subscribe by clicking the button below...
To be able to view the full description for this publication then please subscribe by clicking the button below...