Learning by Doing: CCNA Lab Manual Version 4 Volumes 1 and 2
Learning by Doing: CCNA Lab Manual Version 4 Volumes 1 and 2 - By Matthew Basham. | PDF | English | 80Mb
This manual was developed to prepare students for hands-on training to accompany classroom lectures on CISCO networking theory for the CISCO CCNA 3.0 (#640-607) examination. These labs are intended to supplement and enhance the Cisco Networking Academy Program with additional information, explanations, and laboratory materials, not to replace them. If you are looking for a lot of theory, then you have got the wrong book.
All labs and exercises contain four basic parts:
1. An objective section giving a brief topic for exploration in the lab or exercise
2. A tools and materials list
3. Steps needed to complete the lab or exercise
4. Supplemental lab or exercise challenge activities
Some sections include background information if needed. Answers, where required, is included on the companion CD-ROM.
Some of the labs contain guest router names that are borrowed from computer security history. I do this to spice up the labs a bit and give you a cross-reference and some history of computer security.
About the Author
Matthew Basham is the Program Director Main Contact and Lead Instructor for the St. Petersburg College-CISCO Regional Networking Academy in Clearwater, Florida. Mr. Basham has been employed (adjunct and full-time) with SPC since 1996. He has completed his CCAI (CISCO instructor), CCNA 2.0, and CCDA. Currently he is finishing the instructor CCNP 2.0 track. He holds an M.A.M.C. from the University of Florida and a B.A. from Oakland University (Rochester, Michigan). Mr. Basham has been working professionally in networking as a network administrator, technical writer, teacher, and consultant since 1993. He has been using computers since the 1970's and still owns his original Commodore 64. He has held certifications or trained students in Novell 3 and 4, NT 4.0 workstation, TCP/IP, NT 4.0 server, A , Network , COBOL, Fortran, Pascal, DOS, BASIC, and HTML. His hobbies include computer security, cyber-law, and anti-hacking techniques for network administrators and educators. In 2002 he will be a panel member for a discussion of cybersecurity education in Washington D.C. and be attending a summer school session at Harvard Law School on Internet Law.
No Posting Of Mirror
Bulletproof SSL and TLS: Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Appli
Agile Information Security: Using Scrum to Survive In and Secure a Rapidly Changing Environment
Hadoop Security: Protecting Your Big Data Platform
Multicast and Group Security
Invasion of Privacy! Big Brother and the Company Hackers
Autonomic Computing: Concepts, Infrastructure, and Applications
Hackers: Heroes of the Computer Revolutio
Introduction to Forensic Psychology: Issues and Controversies in Crime and Justice
Investigative Data Mining for Security and Criminal Detection
CISSP : Certified Information Systems Security Professional Study Guide
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Understanding Network Hacks: Attack and De(2422)
Security in Computing (5th Edition)(2391)
C++ For Hackers(2347)
Tor and the Dark Art of Anonymity(2220)
Hacking Secret Ciphers with Python(2218)
Guide to Computer Network Security, 3rd ed(2147)
Gray Hat Hacking The Ethical Hacker's Hand(2087)
Hack Web Design in 1 Day: A Thesis Theme 2(1976)
Your Ultimate Security Guide(1942)
The Hacker's Handbook: The Strategy Behind(1844)
The Mobile Application Hacker's Handbook(1806)
Understanding Network Hacks: Attack and De(1784)
Python Network Hacking Essentials(1752)
Linux 101 Hacks (Repost & Update)(1728)