• Lecture CCNA Security - Chapter 2: Securing Network Devices

    Lecture CCNA Security - Chapter 2: Securing Network Devices

    Learning objectives of this chapter include: Secure the physical installation of and the administrative access to Cisco routers based on different network requirements using the CLI and CCP; configure administrative roles using privilege levels and role-based CLI; Implement the management and reporting features of syslog, SNMP, SSH, and NTP;...

     175 p tvu 23/04/2018 39 1

  • Lecture CCNA Security - Chapter 1: Modern Network Security Threats

    Lecture CCNA Security - Chapter 1: Modern Network Security Threats

    Upon completion of this lesson, the successful participant will be able to: Describe the rationale for network security; describe the three principles of network security; identify risks, threats, vulnerabilities and countermeasures; discuss the three states of information and identify threats and appropriate countermeasures for each state;...

     75 p tvu 23/04/2018 48 0

  • Lecture CCNA Security - Chapter 3: Authentication, Authorization, and Accounting

    Lecture CCNA Security - Chapter 3: Authentication, Authorization, and Accounting

    In this chapter, you learned to: Explain the funtion and operation of the authentication, authorization, and accounting (AAA) protocol; configure a Cisco router to perform AAA authentication with a local database; describe how to configure Cisco ACS to support AAA for Cisco IOS routers; configure server-base AAA.

     78 p tvu 23/04/2018 49 1

  • Lecture CCNA Security - Chapter 4: Implementing Firewall Technologies

    Lecture CCNA Security - Chapter 4: Implementing Firewall Technologies

    Chapter 4 objectives: Describe numbered and named, standard and extended IP ACLs, configure IP ACLs with IOS CLI and CCP, describe TCP established ACL functionality, describe and configure reflexive ACLs, describe and configure dynamic ACLs,... Inviting you to refer.

     132 p tvu 23/04/2018 40 1

  • Lecture CCNA Security - Chapter 5: Implementing Intrusion Prevention

    Lecture CCNA Security - Chapter 5: Implementing Intrusion Prevention

    This chapter describle the underlying IDS and IPS technology that is embedded in the Cisco host-and network-based IDS and IPS solutions, configure Cisco IOS IPS using CLI and CCP, verify Cisco Verify Cisco IOS using CLI and CCP. Inviting you to refer.

     83 p tvu 23/04/2018 34 1

  • Lecture CCNA Security - Chapter 7: Cryptographic systems

    Lecture CCNA Security - Chapter 7: Cryptographic systems

    After completing this chapter, students will be able to: Describe how the types of encryption, hashes, and digital signatures work together to provide confidentiality, integrity, and authentication; describe the mechanisms to ensure data integrity and authentication; describe the mechanisms used to ensure data confidentiality.

     104 p tvu 23/04/2018 53 1

  • Lecture CCNA Security - Chapter 6: Securing the Local Area Network

    Lecture CCNA Security - Chapter 6: Securing the Local Area Network

    The following will be discussed in this chapter: Describle endpoint security with IronPort; describle endpoint security with Network Admission Control; describle endpoint Security with Cisco Security Agent; describle MAC address spoofing attacks, STP manipulation attacks, MAC address overflow attacks, LAN storm attacks, and VLAN attacks;...

     143 p tvu 23/04/2018 35 1

  • Lecture CCNA Security - Chapter 8: Implementing Virtual Private Networks

    Lecture CCNA Security - Chapter 8: Implementing Virtual Private Networks

    Upon completion of this lesson, the successful participant will be able to: Describe the purpose and operation of VPNs, differentiate between the various types of VPNs; identify the Cisco VPN product line and the security features of these products; configure a site-to-site VPN GRE tunnel;... Inviting you to refer.

     124 p tvu 23/04/2018 47 1

  • Lecture CCNA Security - Chapter 9: Managing a Secure Network

    Lecture CCNA Security - Chapter 9: Managing a Secure Network

    This chapter include objectives: Describle the principles of secure network design, describle threat identificaion and risk analysis, describle risk managenment and risk avoidance, describle the Cisco SecureX architecture, describle operation security,...

     82 p tvu 23/04/2018 46 1

  • Lecture CCNA Security - Chapter 10: Implementing the Cisco Adaptive Security Appliance (ASA)

    Lecture CCNA Security - Chapter 10: Implementing the Cisco Adaptive Security Appliance (ASA)

    The ASA is a standalone firewall device that is a primary component of the Cisco SecureX architecture. The following will be discussed in this chapter: Which kind of branch is appropriate for the IOS firewall solution? What is disadvantage of the IOS firewall solution? Inviting you to refer.

     50 p tvu 23/04/2018 42 1

Hướng dẫn khai thác thư viện số
getDocumentFilter3 p_strSchoolCode=tvu
getDocumentFilter3 strKey=LIBTAILIEU2_LIST_FILTERtvu29311842vi
getDocumentFilter3 strKey=LIBTAILIEU2_LIST_FILTERtvu29311842vi
arrDocs 965 intTotalDoc: 10