Muutke küpsiste eelistusi

Cyberops Associate Course Booklet [Pehme köide]

  • Formaat: Paperback / softback
  • Ilmumisaeg: 25-Dec-2020
  • Kirjastus: Pearson Education (US)
  • ISBN-10: 013694437X
  • ISBN-13: 9780136944379
  • Pehme köide
  • Hind: 53,60 €*
  • * saadame teile pakkumise kasutatud raamatule, mille hind võib erineda kodulehel olevast hinnast
  • See raamat on trükist otsas, kuid me saadame teile pakkumise kasutatud raamatule.
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Lisa soovinimekirja
Cyberops Associate Course Booklet
  • Formaat: Paperback / softback
  • Ilmumisaeg: 25-Dec-2020
  • Kirjastus: Pearson Education (US)
  • ISBN-10: 013694437X
  • ISBN-13: 9780136944379
Your Cisco Networking Academy Course Booklet is designed as a study resource you can easily read, highlight, and review on the go, wherever the Internet is not available or practical: The text is extracted directly, word-for-word, from the online course so you can highlight important points and take notes in the "Your Chapter Notes" section. Headings with the exact page correlations provide a quick reference to the online course for your classroom discussions and exam preparation. An icon system directs you to the online curriculum to take full advantage of the images embedded within the Networking Academy online course interface and reminds you to perform the labs, Class Activities, interactive activities, Packet Tracer activities, watch videos, and take the chapter quizzes and exams. The Course Booklet is a basic, economical paper-based resource to help you succeed with the Cisco Networking Academy online course.
Previous Edition Table of Contents
Chapter 1 Cybersecurity and the Security Operations Center
Chapter 2 Windows Operating System
Chapter 3 Linux Operating System
Chapter 4 Network Protocols and Services
Chapter 5 Network Infrastructure
Chapter 6 Principles of Network Security
Chapter 7 Network Attacks: A Deeper Look
Chapter 8 Protecting the Network
Chapter 9 Cryptography and the Public Key Infrastructure
Chapter 10 Endpoint Security and Analysis
Chapter 11 Security Monitoring
Chapter 12 Intrusion Data Analysis
Chapter 13 Incident Response and Handling