Learning by Doing: CCNA Lab Manual Version 4 Volumes 1 and 2
Learning by Doing: CCNA Lab Manual Version 4 Volumes 1 and 2 - By Matthew Basham. | PDF | English | 80Mb
This manual was developed to prepare students for hands-on training to accompany classroom lectures on CISCO networking theory for the CISCO CCNA 3.0 (#640-607) examination. These labs are intended to supplement and enhance the Cisco Networking Academy Program with additional information, explanations, and laboratory materials, not to replace them. If you are looking for a lot of theory, then you have got the wrong book.
All labs and exercises contain four basic parts:
1. An objective section giving a brief topic for exploration in the lab or exercise
2. A tools and materials list
3. Steps needed to complete the lab or exercise
4. Supplemental lab or exercise challenge activities
Some sections include background information if needed. Answers, where required, is included on the companion CD-ROM.
Some of the labs contain guest router names that are borrowed from computer security history. I do this to spice up the labs a bit and give you a cross-reference and some history of computer security.
About the Author
Matthew Basham is the Program Director Main Contact and Lead Instructor for the St. Petersburg College-CISCO Regional Networking Academy in Clearwater, Florida. Mr. Basham has been employed (adjunct and full-time) with SPC since 1996. He has completed his CCAI (CISCO instructor), CCNA 2.0, and CCDA. Currently he is finishing the instructor CCNP 2.0 track. He holds an M.A.M.C. from the University of Florida and a B.A. from Oakland University (Rochester, Michigan). Mr. Basham has been working professionally in networking as a network administrator, technical writer, teacher, and consultant since 1993. He has been using computers since the 1970's and still owns his original Commodore 64. He has held certifications or trained students in Novell 3 and 4, NT 4.0 workstation, TCP/IP, NT 4.0 server, A , Network , COBOL, Fortran, Pascal, DOS, BASIC, and HTML. His hobbies include computer security, cyber-law, and anti-hacking techniques for network administrators and educators. In 2002 he will be a panel member for a discussion of cybersecurity education in Washington D.C. and be attending a summer school session at Harvard Law School on Internet Law.
No Posting Of Mirror
Security in Ad-hoc and Sensor Networks
VizSEC 2007: Proceedings of the Workshop on Visualization for Computer Security
Mobile Application Security
Security of e-Systems and Computer Networks
CCNP ONT Official Exam Certification Guide
Computer Network Security: 5th International Conference, on Mathematical Methods, Models
Hacking Windows Vista: ExtremeTech
Stealing the Network: How to Own a Continent
Joachim Biskup, "Security in Computing Systems: Challenges, Approaches and Solutions"
Security in Computing (5th Edition)
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
10 Don'ts on Your Digital Devices: The Non(3519)
How to Hack: Hacking Secrets Exposed: A Be(2909)
Hacking Secrets Exposed - A Beginners Guid(2765)
How Hacker's Hack Facebook & any Pc? (How (2719)
Facebook and Website Hacking - Be Safe(2613)
AARP Protecting Yourself Online For Dummie(2390)
Hacking Secrets Exposed - A Beginners Guid(2338)
Hackers: Heroes of the Computer Revolution(2279)
Secure Development for Mobile Apps: How to(2250)
Malware Protection and Removal(2161)
Android Security Internals: An In-Depth Gu(1851)
Security in Computing (5th Edition)(1822)
Security in Computing (5th Edition)(1806)
Hacking Exposed Wireless: Wireless Securit(1755)
Cyberterrorism: Understanding, Assessment,(1682)