Computer Networking: Network+ Certification Study Guide for N10-008 Exam 4 Books in 1
Author | : Richie Miller |
Publisher | : Richie Miller |
Total Pages | : 500 |
Release | : |
Genre | : Computers |
ISBN | : 1839381426 |
If you want to PASS the CompTIA Network+ Certification, this book is for you! BUY THIS BOOK NOW AND GET STARTED TODAY! In this book you will discover: · Network Concepts and Protocols · CompTIA Network+ Exam Information · OSI Model & Network Operations · Encapsulation and the OSI Model · Network Protocols and Port Numbers · DHCP, DNS & NTP · SQL Database Protocols · TCP & UDP Protocols · Binary and Hexadecimal Numbers · How to Convert Decimal to Binary · IPv4 Addressing Fundamentals · Classless & Classfull Addressing · IP Address Types · How to Subnet Networks · IPv6 Address Fundamentals · IPv6 SLAAC & IPv6 DHCP · Network Address Translation · Dynamic Host Configuration Protocol · Domain Name System · Ethernet Cabling · Coax Cabling and Cable Termination · Fiber Optics · Multiplexing Fiber Optics · Ethernet Fundamentals · CSMA/CD · Duplex and Speed · Ethernet Frame Fundamentals · Ethernet Layer 2 Operation · Spanning Tree Protocol · VLANs and Port Aggregation · How to Route IP Traffic · Address Resolution Protocol · How to Send Ping to Default Gateway · How to Build Routing Tables · Wireless Networking Fundamentals · Wireless 802.11 Protocols · Wireless Ethernet Operation · Wireless Topologies and Management · Wireless Encryption · Cellular Wireless · Layer 2 Devices and Services · Traffic Shaping · Neighbor Device Discovery · Load Balancer Fundamentals · Firewall Fundamentals · VoiP & SCADA Systems · Network Monitoring · Layer 2 Errors · Facilities Monitoring · Collecting Network Monitoring & Baselining · Network Security Fundamentals · Threats, Vulnerabilities & Exploits · How to Reduce Threat Exposure · Defense in Depth · Authentication, Authorization, and Accounting · Multifactor Authentication · Network Access Control · Security Assessments · How to Assess Risk · Human & Technical Exploits · WiFi Attacks & Rogue DHCP Servers · Password Attacks · How to Secure Layer 2 · Rogue DHCP Servers & Dynamic ARP Inspection · How to Secure Layer 3 & Layer 4 · How to Secure Layer 7 · Password & Wireless Security · Geofencing · Remote Access & Security · Virtual Private Networks · Remote Desktop & Virtual Desktops Connections · Network Management Options · Video Surveillance & Asset Tracking · Network Topologies & Types · Blank Area Networks · WAN Technologies · Virtualized Networks · Data Center Networks · Software Defined Networking · SAN & Cloud Computing · Cloud Services · Network Troubleshooting Fundamentals · How to Establish a Theory of Cause · How to Test the Theory & Establish a Plan of Action · How to Test, Verify and Document the Solution · How to Identify and Troubleshoot Cable Issues · Fiber Optic Cables & Tools · How to use Ping, ARP & Traceroute · How to Capture Traffic · Wireless Troubleshooting & WiFi Tools · Common Wireless Issues · Configuration Issues · How to Troubleshoot Routing Issues · How to use Simple Network Management Protocol · How to use Netflow · How to use Syslog · How to Document IT Procedures and Plans · Security and Device Policies · Data Center Diagrams · MDF & IDF Diagrams · Logical Network Diagrams · Disaster Recovery · Backups and Snapshots · Service Level Agreement Fundamentals BUY THIS BOOK NOW AND GET STARTED TODAY!