CCNP Security Virtual Private Networks SVPN 300-730 Official Cert Guide

فهرست مطالب:

Introduction

Part I: Virtual Private Networks (VPN)

Chapter 1. Understanding the Implementing Secure Solutions with Virtual

Private Networks SVPN 300-730 Exam

Chapter 2. Introduction to Virtual Private Networks (VPN)

Part II: Site-to-Site VPN

Chapter 3. Site-to-Site VPNs

Chapter 4. Group Encrypted Transport VPN (GETVPN)

Chapter 5. Dynamic Multipoint Virtual Private Network (DMVPN)

Chapter 6. FlexVPN Configuration and Troubleshooting

Part III: Remote Access Virtual Private Network

Chapter 7. Remote Access VPNs

Chapter 8. Clientless Remote Access SSLVPNs on the ASA

Chapter 9. AnyConnect VPNs on the ASA and IOS

Chapter 10. Troubleshooting Remote Access VPNs

Part IV: SVPN Preparation

Chapter 11. Final Preparation

Part V: Appendixes

Appendix A. Answers to the “Do I Know This Already?” Quizzes

Appendix B. Exam Updates

Appendix C. Memory Tables

Appendix D. Memory Table Answer Key

Appendix E. Study Planner

Glossary of Key Terms

CCNP Security VPN 642-648 Official Cert Guide

فهرست مطالب:

Part I ASA Architecture and Technologies Overview

Part II Cisco Clientless Remote-Access VPN Solutions

Part III Cisco AnyConnect Remote-Access VPN Solutions

Part IV Cisco Secure Desktop

Part V Cisco IPsec Remote-Access Client Solutions

Part VI Cisco Easy VPN Solutions

Part VII Cisco IPsec Site-to-Site VPN Solutions

Part VIII Exam Preparation

Part IX Appendixes

CCNP SPCOR 350-501 Official Cert Guide

فهرست مطالب کتاب CCNP SPCOR 350-501 Official Cert Guide:

Introduction

Part I Architectures

Chapter 1 Service Provider Architectures

Chapter 2 Software Architectures

Chapter 3 Service Provider Virtualization

Part II Routing

Chapter 4 Routing Fundamentals

Chapter 5 IS-IS

Chapter 6 OSPF

Chapter 7 BGP Fundamentals

Chapter 8 BGP Optimization and Convergence

Chapter 9 Multicast

Part III Transport Protocols

Chapter 10 MPLS Fundamentals

Chapter 11 MPLS L2VPNs

Chapter 12 MPLS L3VPNs

Chapter 13 Advanced MPLS Services

Chapter 14 MPLS Traffic Engineering

Chapter 15 Segment Routing

Part IV Service Provider Security

Chapter 16 Securing Control Plane

Chapter 17 Securing Management Plane

Chapter 18 Securing Data Plane

Part V Critical Operational Elements

Chapter 19 IPv6 Transitions

Chapter 20 High Availability Designs

Chapter 21 Quality of Service

Part VI Automation and Orchestration

Chapter 22 Automation and Assurance

Part VII Final Preparation

Chapter 23 Final Preparation

Chapter 24 CCNP SPCOR (350-501) Exam Updates

Part VIII Appendix

Appendix A Answers to the “Do I Know This Already?” Quizzes and Review Questions8

Index

Online Elements

Appendix B Memory Tables

Appendix C Memory Tables Answer Key

Appendix D Study Planner

Glossary of Key Terms

CCNP Switch Portable Command Guide: All the Switch 642-813 Commands in One Compact, Portable Resource

فهرست مطالب:

Chapter 1 Analyzing Campus Network Designs

Chapter 2 Implementing VLANs in a Campus Network

Chapter 3 Implementing Spanning Tree

Chapter 4 Implementing Inter-VLAN Routing

Chapter 5 Implementing a Highly Available Network

Chapter 6 Implementing a First Hop Redundancy Protocols Solution

Chapter 7 Minimizing Service Loss and Data Theft in a Campus Network

Chapter 8 Accommodating Voice and Video in Campus Networks

Chapter 9 Integrating Wireless LANs into a Campus Network

Appendix A Private VLAN Catalyst Switch Support Matrix

Appendix B Create Your Own Journal Here

CCNP TSHOOT 642-832 Official Certification Guide

فهرست مطالب:

Foreword

Introduction

Chapter 1 Introduction to Network Maintenance

Chapter 2 Introduction to Troubleshooting Processes

Chapter 3 The Maintenance and Troubleshooting Toolbox

Chapter 4 Basic Cisco Catalyst Switch Troubleshooting

Chapter 5 Advanced Cisco Catalyst Switch Troubleshooting

Chapter 6 Introduction to Troubleshooting Routing Protocols

Chapter 7 OSPF and Route Redistribution Troubleshooting

Chapter 8 Troubleshooting BGP and Router Performance Issues

Chapter 9 Security Troubleshooting

Chapter 10 IP Services Troubleshooting

Chapter 11 IP Communications Troubleshooting

Chapter 12 IPv6 Troubleshooting

Chapter 13 Advanced Services Troubleshooting

Chapter 14 Large Enterprise Network Troubleshooting

Chapter 15 Final Preparation

Appendix A Answers to the “Do I Know This Already?” Quizzes

Glossary

Index

Appendix B Memory Tables

Appendix C Memory Tables Answer Key

CCST Cisco Certified Support Technician Study Guide: Networking Exam

فهرست مطالب:

Introduction

Assessment Test

Chapter 1 Internetworking

Chapter 2 Introduction to TCP/IP

Chapter 3 Easy Subnetting

Chapter 4 Network Address Translation (NAT) & IPv6

Chapter 5 IP Routing

Chapter 6 Switching

Chapter 7 Cables and Connectors

Chapter 8 Wireless Technologies

Chapter 9 Cisco Devices

Chapter 10 Security

Chapter 11 Cloud & IoT

Chapter 12 Troubleshooting

Appendix Answers to Review Questions

Index

CEH v10 Certified Ethical Hacker Study Guide

فهرست مطالب:

Introduction

Assessment Test

Chapter 1: Ethical Hacking

Chapter 2: Networking Foundations

Chapter 3: Security Foundations

Chapter 4: Footprinting and Reconnaissance

Chapter 5: Scanning Networks

Chapter 6: Enumeration

Chapter 7: System Hacking

Chapter 8: Malware

Chapter 9: Sniffing

Chapter 10: Social Engineering

Chapter 11: Wireless Security

Chapter 12: Attack and Defense

Chapter 13: Cryptography

Chapter 14: Security Architecture and Design

Appendix: Answers to Review Questions

Index

CEH v11 Certified Ethical Hacker Study Guide

فهرست مطالب:

Introduction

Assessment Test

Chapter 1: Ethical Hacking

Chapter 2: Networking Foundations

Chapter 3: Security Foundations

Chapter 4: Footprinting and Reconnaissance

Chapter 5: Scanning Networks

Chapter 6: Enumeration

Chapter 7: System Hacking

Chapter 8: Malware

Chapter 9: Sniffing

Chapter 10: Social Engineering

Chapter 11: Wireless Security

Chapter 12: Attack and Defense

Chapter 13: Cryptography

Chapter 14: Security Architecture and Design

Chapter 15: Cloud Computing and the Internet of Things

Appendix: Answers to Review Questions

Index

Cert Guide Advance your IT career with hands-on learning – Red Hat RHCSA 9 (EX200)-min

فهرست مطالب کتاب Cert Guide RHCSA 9:

Introduction

Part I Performing Basic System Management Tasks

CHAPTER 1 Installing Red Hat Enterprise Linux

CHAPTER 2 Using Essential Tools

CHAPTER 3 Essential File Management Tools

CHAPTER 4 Working with Text Files

CHAPTER 5 Connecting to Red Hat Enterprise Linux 9

CHAPTER 6 User and Group Management

CHAPTER 7 Permissions Management

CHAPTER 8 Configuring Networking

Part II Operating Running Systems

CHAPTER 9 Managing Software

CHAPTER 10 Managing Processes

CHAPTER 11 Working with Systemd

CHAPTER 12 Scheduling Tasks

CHAPTER 13 Configuring Logging

CHAPTER 14 Managing Storage

CHAPTER 15 Managing Advanced Storage

Part III Performing Advanced System Administration Tasks

CHAPTER 16 Basic Kernel Management

CHAPTER 17 Managing and Understanding the Boot Procedure

CHAPTER 18 Essential Troubleshooting Skills

CHAPTER 19 An Introduction to Automation with Bash Scripting

Part IV Managing Network Services

CHAPTER 20 Configuring SSH

CHAPTER 21 Managing Apache HTTP Services

CHAPTER 22 Managing SELinux

CHAPTER 23 Configuring a Firewall

CHAPTER 24 Accessing Network Storage

CHAPTER 25 Configuring Time Services

CHAPTER 26 Managing Containers

CHAPTER 27 Final Preparation

CHAPTER 28 Theoretical Pre-Assessment Exam

Part V RHCSA 9 Practice Exams

RHCSA Practice Exam A

RHCSA Practice Exam B

APPENDIX A: Answers to the “Do I Know This Already?”

Quizzes and Review Questions

APPENDIX B: Red Hat RHCSA 9 Cert Guide: EX200 Exam

Updates

Glossary

Index

Certified Ethical Hacker (CEH) Preparation Guide

فهرست مطالب:

About the Author

About the Technical Reviewer

Introduction

Chapter 1: Introduction to Ethical Hacking

Chapter 2: Footprinting and Reconnaissance/Scanning Networks

Chapter 3: Enumeration

Chapter 4: System Hacking

Chapter 5: Trojans, Backdoors, Viruses, and Worms

Chapter 6: Sniffers and Social Engineering

Chapter 7: Denial of Service

Chapter 8: Session Hijacking

Chapter 9: Hacking Webservers

Chapter 10: Hacking Web Applications

Chapter 11: SQL Injections

CHAPTER 12: Hacking Wireless Networks

CHAPTER 13: Evading Intrusion Detection Systems, Firewalls, and Honeypots

CHAPTER 14: Buffer Overflow

CHAPTER 15: Cryptography

CHAPTER 16: Penetration Testing

Index

CISA Certified Information Systems Auditor Study Guide

فهرست مطالب کتاب CISA Certified Information Systems Auditor Study Guide:

Introduction

Assessment Test

Chapter 1: IT Governance and Management

Chapter 2: The Audit Process

Chapter 3: IT Life Cycle Management

Chapter 4: IT Service Management

Chapter 5: IT Infrastructure

Chapter 6: Business Continuity and Disaster Recovery

Chapter 7: Information Security Management

Chapter 8: Identity and Access Management

Index