Introduction xxx Chapter 1 Single-Area OSPFv2 Concepts 1 Introduction - 1.0 1 Why should I take this module? - 1.0.1 1 What will I learn to do in this module? - 1.0.2 1 OSPF Features and Characteristics - 1.1 1 Introduction to OSPF - 1.1.
1 1 Components of OSPF - 1.1.2 2 Link-State Operation - 1.1.3 3 Single-Area and Multiarea OSPF - 1.1.4 4 Multiarea OSPF - 1.1.
5 4 OSPFv3 - 1.1.6 5 Check Your Understanding - OSPF Features and Characteristics - 1.1.7 6 OSPF Packets - 1.2 6 Video - OSPF Packets - 1.2.1 6 Types of OSPF Packets - 1.
2.2 6 Link-State Updates - 1.2.3 7 Hello Packet - 1.2.4 7 Check Your Understanding - OSPF Packets - 1.2.5 7 OSPF Operation - 1.
3 7 Video - OSPF Operation - 1.3.1 7 OSPF Operational States - 1.3.2 7 Establish Neighbor Adjacencies - 1.3.3 8 Synchronizing OSPF Databases - 1.3.
4 9 The Need for a DR - 1.3.5 10 LSA Flooding With a DR - 1.3.6 11 Check Your Understanding - OPSF Operation - 1.3.7 11 Module Practice and Quiz - 1.4 11 What did I learn in this module? - 1.
4.1 11 Chapter Quiz - Single-Area OSPFv2 Concepts 14 Your Chapter Notes 14 Chapter 2 Single-Area OSPFv2 Configuration 15 Introduction - 2.0 15 Why should I take this module? - 2.0.1 15 What will I learn to do in this module? - 2.0.2 15 OSPF Router ID - 2.1 15 OSPF Reference Topology - 2.
1.1 15 Router Configuration Mode for OSPF - 2.1.2 16 Router IDs - 2.1.3 16 Router ID Order of Precedence - 2.1.4 17 Configure a Loopback Interface as the Router ID - 2.
1.5 17 Explicitly Configure a Router ID - 2.1.6 18 Modify a Router ID - 2.1.7 18 Syntax Checker - Configure R2 and R3 Router IDs - 2.1.8 19 Check Your Understanding - OSPF Router ID - 2.
1.9 19 Point-to-Point OSPF Networks - 2.2 20 The network Command Syntax - 2.2.1 20 The Wildcard Mask - 2.2.2 20 Check Your Understanding - The Wildcard Masks - 2.2.
3 20 Configure OSPF Using the network Command - 2.2.4 20 Syntax Checker - Configure R2 and R3 Using the network Command - 2.2.5 21 Configure OSPF Using the ip ospf Command - 2.2.6 21 Syntax Checker - Configure R2 and R3 Using the ip ospf Command - 2.2.
7 22 Passive Interface - 2.2.8 22 Configure Passive Interfaces - 2.2.9 23 Syntax Checker - Configure R2 and R3 Passive Interfaces - 2.2.10 24 OSPF Point-to-Point Networks - 2.2.
11 24 Loopbacks and Point-to-Point Networks - 2.2.12 26 Packet Tracer - Point-to-Point Single-Area OSPFv2 Configuration - 2.2.13 26 Multiaccess OSPF Networks - 2.3 27 OSPF Network Types - 2.3.1 27 OSPF Designated Router - 2.
3.2 27 OSPF Multiaccess Reference Topology - 2.3.3 27 Verify OSPF Router Roles - 2.3.4 28 Verify DR/BDR Adjacencies - 2.3.5 30 Default DR/BDR Election Process - 2.
3.6 32 DR Failure and Recovery - 2.3.7 33 The ip ospf priority Command - 2.3.8 33 Configure OSPF Priority - 2.3.9 34 Syntax Checker - Configure OSPF Priority - 2.
3.10 35 Packet Tracer - Determine the DR and BDR - 2.3.11 35 Modify Single-Area OSPFv2 - 2.4 36 Cisco OSPF Cost Metric - 2.4.1 36 Adjust the Reference Bandwidth - 2.4.
2 36 OSPF Accumulates Costs - 2.4.3 38 Manually Set OSPF Cost Value - 2.4.4 38 Test Failover to Backup Route - 2.4.5 39 Syntax Checker - Modify the Cost Values for R2 and R3 - 2.4.
6 40 Hello Packet Intervals - 2.4.7 40 Verify Hello and Dead Intervals - 2.4.8 40 Modify OSPFv2 Intervals - 2.4.9 42 Syntax Checker - Modifying Hello and Dead Intervals on R3 - 2.4.
10 43 Packet Tracer - Modify Single-Area OSPFv2 - 2.4.11 43 Default Route Propagation - 2.5 43 Propagate a Default Static Route in OSPFv2 - 2.5.1 43 Verify the Propagated Default Route - 2.5.2 44 Packet Tracer - Propagate a Default Route in OSPFv2 - 2.
5.3 46 Verify Single-Area OSPFv2 - 2.6 46 Verify OSPF Neighbors - 2.6.1 46 Verify OSPF Protocol Settings - 2.6.2 48 Verify OSPF Process Information - 2.6.
3 48 Verify OSPF Interface Settings - 2.6.4 50 Syntax Checker - Verify Single-Area OSPFv2 - 2.6.5 51 Packet Tracer - Verify Single-Area OSPFv2 - 2.6.6 51 Module Practice and Quiz - 2.7 51 Packet Tracer - Single-Area OSPFv2 Configuration - 2.
7.1 51 Lab - Single-Area OSPFv2 Configuration - 2.7.2 51 What did I learn in this module? - 2.7.3 52 Chapter Quiz - Single-Area OSPFv2 Configuration 56 Your Chapter Notes 56 Chapter 3 Network Security Concepts 57 Introduction - 3.0 57 Why should I take this module? - 3.0.
1 57 What will I learn in this module? - 3.0.2 57 Ethical Hacking Statement - 3.0.3 57 Current State of Cybersecurity - 3.1 58 Current State of Affairs - 3.1.1 58 Vectors of Network Attacks - 3.
1.2 58 Data Loss - 3.1.3 59 Check Your Understanding - Current State of Cybersecurity - 3.1.4 60 Threat Actors - 3.2 60 The Hacker - 3.2.
1 60 Evolution of Hackers - 3.2.2 61 Cyber Criminals - 3.2.3 61 Hacktivists - 3.2.4 61 State-Sponsored Hackers - 3.2.
5 61 Check Your Understanding - Threat Actors - 3.2.6 62 Threat Actor Tools - 3.3 62 Video - Threat Actor Tools - 3.3.1 62 Introduction to Attack Tools - 3.3.2 62 Evolution of Security Tools - 3.
3.3 62 Attack Types - 3.3.4 63 Check Your Understanding - Threat Actor Tools - 3.3.5 64 Malware - 3.4 64 Overview of Malware - 3.4.
1 64 Viruses and Trojan Horses - 3.4.2 64 Other Types of Malware - 3.4.3 65 Check Your Understanding - Malware - 3.4.4 66 Common Network Attacks - 3.5 66 Overview of Network Attacks - 3.
5.1 66 Video - Reconnaissance Attacks - 3.5.2 67 Reconnaissance Attacks - 3.5.3 67 Video - Access and Social Engineering Attacks - 3.5.4 68 Access Attacks - 3.
5.5 68 Social Engineering Attacks - 3.5.6 69 Lab - Social Engineering - 3.5.7 70 Video - Denial of Service Attacks - 3.5.8 70 DoS and DDoS Attacks - 3.
5.9 70 Check Your Understanding - Common Network Attacks - 3.5.10 71 IP Vulnerabilities and Threats - 3.6 71 Video - Common IP and ICMP Attacks - 3.6.1 71 IPv4 and IPv6 - 3.6.
2 71 ICMP Attacks - 3.6.3 71 Video - Amplification, Reflection, and Spoofing Attacks - 3.6.4 72 Amplification and Reflection Attacks - 3.6.5 72 Address Spoofing Attacks - 3.6.
6 72 Check Your Understanding - IP Vulnerabilities and Threats - 3.6.7 73 TCP and UDP Vulnerabilities - 3.7 73 TCP Segment Header - 3.7.1 73 TCP Services - 3.7.2 73 TCP Attacks - 3.
7.3 74 UDP Segment Header and Operation - 3.7.4 74 UDP Attacks - 3.7.5 75 Check Your Understanding - TCP and UDP Vulnerabilities - 3.7.6 75 IP Services - 3.
8 75 ARP Vulnerabilities - 3.8.1 75 ARP Cache Poisoning - 3.8.2 76 Video - ARP Spoofing - 3.8.3 76 DNS Attacks - 3.8.
4 76 DNS Tunneling - 3.8.5 78 DHCP - 3.8.6 78 DHCP Attacks - 3.8.7 78 Lab - Explore DNS Traffic - 3.8.
8 79 Network Security Best Practices - 3.9 80 &nb.