In this book you will discover:
Network Security Fundamentals
Threats, Vulnerabilities & Exploits
How to Reduce Threat Exposure
Defense in Depth
Authentication, Authorization, and Accounting
Multifactor Authentication
Network Access Control
Security Assessments
How to Assess Risk
Human & Technical Exploits
WiFi Attacks & Rogue DHCP Servers
Password Attacks
How to Secure Layer 2
Rogue DHCP Servers & Dynamic ARP Inspection
How to Secure Layer 3 & Layer 4
How to Secure Layer 7
Password & Wireless Security
Geofencing
Remote Access & Security
Virtual Private Networks
Remote Desktop & Virtual Desktops Connections
Network Management Options
Video Surveillance & Asset Tracking
Network Topologies & Types
Blank Area Networks
WAN Technologies
Virtualized Networks
Data Center Networks
Software Defined Networking
SAN & Cloud Computing
Cloud Services
Network Troubleshooting Fundamentals
How to Establish a Theory of Cause
How to Test the Theory & Establish a Plan of Action
How to Test, Verify and Document the Solution
How to Identify and Troubleshoot Cable Issues
Fiber Optic Cables & Tools
How to use Ping, ARP & Traceroute
How to Capture Traffic
Wireless Troubleshooting & WiFi Tools
Common Wireless Issues
Configuration Issues
How to Troubleshoot Routing Issues
How to use Simple Network Management Protocol
How to use Netflow
How to use Syslog
How to Document IT Procedures and Plans
Security and Device Policies
Data Center Diagrams
MDF & IDF Diagrams
Logical Network Diagrams
Disaster Recovery
Backups and Snapshots
Service Level Agreement Fundamentals
BUY THIS BOOK NOW AND GET STARTED TODAY!
Share This Book: