menu
{ "item_title" : "Computer Networking", "item_author" : [" Richie Miller "], "item_description" : "If you want to PASS the CompTIA Network+ Certification, this book is for youBUY THIS BOOK NOW AND GET STARTED TODAY In this book you will discover: Network Concepts and ProtocolsCompTIA Network+ Exam InformationOSI Model & Network OperationsEncapsulation and the OSI ModelNetwork Protocols and Port NumbersDHCP, DNS & NTPSQL Database ProtocolsHow to Subnet NetworksIPv6 Address FundamentalsIPv6 SLAAC & IPv6 DHCPNetwork Address TranslationDynamic Host Configuration ProtocolDomain Name SystemEthernet CablingCoax Cabling and Cable TerminationFiber OpticsMultiplexing Fiber OpticsEthernet FundamentalsCSMA/CDDuplex and SpeedEthernet Frame FundamentalsEthernet Layer 2 OperationSpanning Tree ProtocolVLANs and Port AggregationHow to Route IP TrafficAddress Resolution ProtocolHow to Send Ping to Default GatewayHow to Build Routing TablesWireless Networking FundamentalsWireless 802.11 ProtocolsWireless Ethernet OperationWireless Topologies and ManagementWireless EncryptionCellular WirelessLayer 2 Devices and ServicesTraffic ShapingNeighbor Device DiscoveryLoad Balancer FundamentalsFirewall FundamentalsVoiP & SCADA SystemsNetwork MonitoringLayer 2 ErrorsFacilities MonitoringCollecting Network Monitoring & BaseliningNetwork Security FundamentalsThreats, Vulnerabilities & ExploitsHow to Reduce Threat ExposureDefense in DepthAuthentication, Authorization, and AccountingMultifactor AuthenticationNetwork Access ControlSecurity AssessmentsHow to Assess RiskHuman & Technical ExploitsWiFi Attacks & Rogue DHCP ServersPassword AttacksHow to Secure Layer 2Rogue DHCP Servers & Dynamic ARP InspectionHow to Secure Layer 3, 4 and 7Virtual Private NetworksRemote Desktop & Virtual Desktops ConnectionsNetwork Management OptionsSAN & Cloud ComputingCloud ServicesNetwork Troubleshooting FundamentalsHow to Establish a Theory of CauseHow to Test the Theory & Establish a Plan of ActionHow to Test, Verify and Document the SolutionHow to Identify and Troubleshoot Cable IssuesFiber Optic Cables & ToolsHow to use Ping, ARP & TracerouteHow to Capture TrafficWireless Troubleshooting & WiFi ToolsCommon Wireless IssuesConfiguration IssuesHow to Troubleshoot Routing IssuesHow to use Simple Network Management ProtocolHow to use NetflowHow to use SyslogHow to Document IT Procedures and PlansSecurity and Device Policies BUY THIS BOOK NOW AND GET STARTED TODAY ", "item_img_path" : "https://covers3.booksamillion.com/covers/bam/1/83/938/163/1839381639_b.jpg", "price_data" : { "retail_price" : "31.38", "online_price" : "31.38", "our_price" : "31.38", "club_price" : "31.38", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : "" } }
Computer Networking|Richie Miller

Computer Networking : Enterprise Network Infrastructure, Network Security & Network Troubleshooting Fundamentals

local_shippingShip to Me
In Stock.
FREE Shipping for Club Members help

Overview

If you want to PASS the CompTIA Network+ Certification, this book is for you

BUY THIS BOOK NOW AND GET STARTED TODAY

In this book you will discover:

Network Concepts and Protocols

CompTIA Network+ Exam Information

OSI Model & Network Operations

Encapsulation and the OSI Model

Network Protocols and Port Numbers

DHCP, DNS & NTP

SQL Database Protocols

How to Subnet Networks

IPv6 Address Fundamentals

IPv6 SLAAC & IPv6 DHCP

Network Address Translation

Dynamic Host Configuration Protocol

Domain Name System

Ethernet Cabling

Coax Cabling and Cable Termination

Fiber Optics

Multiplexing Fiber Optics

Ethernet Fundamentals

CSMA/CD

Duplex and Speed

Ethernet Frame Fundamentals

Ethernet Layer 2 Operation

Spanning Tree Protocol

VLANs and Port Aggregation

How to Route IP Traffic

Address Resolution Protocol

How to Send Ping to Default Gateway

How to Build Routing Tables

Wireless Networking Fundamentals

Wireless 802.11 Protocols

Wireless Ethernet Operation

Wireless Topologies and Management

Wireless Encryption

Cellular Wireless

Layer 2 Devices and Services

Traffic Shaping

Neighbor Device Discovery

Load Balancer Fundamentals

Firewall Fundamentals

VoiP & SCADA Systems

Network Monitoring

Layer 2 Errors

Facilities Monitoring

Collecting Network Monitoring & Baselining

Network Security Fundamentals

Threats, Vulnerabilities & Exploits

How to Reduce Threat Exposure

Defense in Depth

Authentication, Authorization, and Accounting

Multifactor Authentication

Network Access Control

Security Assessments

How to Assess Risk

Human & Technical Exploits

WiFi Attacks & Rogue DHCP Servers

Password Attacks

How to Secure Layer 2

Rogue DHCP Servers & Dynamic ARP Inspection

How to Secure Layer 3, 4 and 7

Virtual Private Networks

Remote Desktop & Virtual Desktops Connections

Network Management Options

SAN & Cloud Computing

Cloud Services

Network Troubleshooting Fundamentals

How to Establish a Theory of Cause

How to Test the Theory & Establish a Plan of Action

How to Test, Verify and Document the Solution

How to Identify and Troubleshoot Cable Issues

Fiber Optic Cables & Tools

How to use Ping, ARP & Traceroute

How to Capture Traffic

Wireless Troubleshooting & WiFi Tools

Common Wireless Issues

Configuration Issues

How to Troubleshoot Routing Issues

How to use Simple Network Management Protocol

How to use Netflow

How to use Syslog

How to Document IT Procedures and Plans

Security and Device Policies

BUY THIS BOOK NOW AND GET STARTED TODAY

This item is Non-Returnable

Details

  • ISBN-13: 9781839381638
  • ISBN-10: 1839381639
  • Publisher: Pastor Publishing Ltd
  • Publish Date: December 2022
  • Dimensions: 9 x 6 x 1.01 inches
  • Shipping Weight: 1.46 pounds
  • Page Count: 502

Related Categories

You May Also Like...

    1

BAM Customer Reviews