Learning by Doing: CCNA Lab Manual Version 4 Volumes 1 and 2
Learning by Doing: CCNA Lab Manual Version 4 Volumes 1 and 2 - By Matthew Basham. | PDF | English | 80Mb
This manual was developed to prepare students for hands-on training to accompany classroom lectures on CISCO networking theory for the CISCO CCNA 3.0 (#640-607) examination. These labs are intended to supplement and enhance the Cisco Networking Academy Program with additional information, explanations, and laboratory materials, not to replace them. If you are looking for a lot of theory, then you have got the wrong book.
All labs and exercises contain four basic parts:
1. An objective section giving a brief topic for exploration in the lab or exercise
2. A tools and materials list
3. Steps needed to complete the lab or exercise
4. Supplemental lab or exercise challenge activities
Some sections include background information if needed. Answers, where required, is included on the companion CD-ROM.
Some of the labs contain guest router names that are borrowed from computer security history. I do this to spice up the labs a bit and give you a cross-reference and some history of computer security.
About the Author
Matthew Basham is the Program Director Main Contact and Lead Instructor for the St. Petersburg College-CISCO Regional Networking Academy in Clearwater, Florida. Mr. Basham has been employed (adjunct and full-time) with SPC since 1996. He has completed his CCAI (CISCO instructor), CCNA 2.0, and CCDA. Currently he is finishing the instructor CCNP 2.0 track. He holds an M.A.M.C. from the University of Florida and a B.A. from Oakland University (Rochester, Michigan). Mr. Basham has been working professionally in networking as a network administrator, technical writer, teacher, and consultant since 1993. He has been using computers since the 1970's and still owns his original Commodore 64. He has held certifications or trained students in Novell 3 and 4, NT 4.0 workstation, TCP/IP, NT 4.0 server, A , Network , COBOL, Fortran, Pascal, DOS, BASIC, and HTML. His hobbies include computer security, cyber-law, and anti-hacking techniques for network administrators and educators. In 2002 he will be a panel member for a discussion of cybersecurity education in Washington D.C. and be attending a summer school session at Harvard Law School on Internet Law.
No Posting Of Mirror
Statistical Methods in Counterterrorism
SSCP (ISC)2 Systems Security Certified Practitioner Official Study Guide
Foundations and Practice of Security
The Values-based Safety Process
Integrated Security Systems Design: Concepts, Specifications, and Implementation
Instant Penetration Testing
Encyclopedia of Cryptography and Security, 2nd edition
Network Technologies for Networked Terrorists
Human Ear Recognition by Computer (Advances in Computer Vision and Pattern Recognition)
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Malware, Rootkits & Botnets A Beginner's G(2213)
The Dark Net Searching: how to search anon(2132)
Tor and The Dark Net: Remain Anonymous Onl(1978)
Tor Browser: The Ultimate Guide To The Tor(1953)
Hacking Made Easy: Hack Your Way Through L(1887)
Cybersecurity for Beginners(1690)
Hacking Google Maps and Google Earth(1676)
Hacking For Dummies(1520)
Computer Virus: Introducing... Computer Vi(1508)
Penetration Testing with Raspberry Pi(1495)
The Artificial Intelligence Conspiracy: Ho(1483)
Principles of Computer Security Lab Manual(1467)
Understanding SSL: Securing Your Website T(1449)
Cyber Security Basics: Protect your organi(1416)
Learning Network Forensics(1413)