본문 바로가기

리디 접속이 원활하지 않습니다.
강제 새로 고침(Ctrl + F5)이나 브라우저 캐시 삭제를 진행해주세요.
계속해서 문제가 발생한다면 리디 접속 테스트를 통해 원인을 파악하고 대응 방법을 안내드리겠습니다.
테스트 페이지로 이동하기

Implementing and Administering Cisco Solutions 200-301 CCNA Exam Guide 상세페이지

Implementing and Administering Cisco Solutions 200-301 CCNA Exam Guide

Begin a successful career in networking with 200-301 CCNA certification

  • 관심 0
소장
전자책 정가
23,000원
판매가
23,000원
출간 정보
  • 2020.11.13 전자책 출간
듣기 기능
TTS(듣기) 지원
파일 정보
  • PDF
  • 764 쪽
  • 18.0MB
지원 환경
  • PC뷰어
  • PAPER
ISBN
9781800209985
ECN
-
Implementing and Administering Cisco Solutions 200-301 CCNA Exam Guide

작품 정보

Prepare to take the Cisco Certified Network Associate (200-301 CCNA) exam and get to grips with the essentials of networking, security, and automation

▶Book Description
In the dynamic technology landscape, staying on top of the latest technology trends is a must, especially if you want to build a career in network administration. Achieving CCNA 200-301 certification will validate your knowledge of networking concepts, and this book will help you to do just that.

This exam guide focuses on the fundamentals to help you gain a high-level understanding of networking, security, IP connectivity, IP services, programmability, and automation. Starting with the functions of various networking components, you'll discover how they are used to build and improve an enterprise network. You'll then delve into configuring networking devices using a command-line interface (CLI) to provide network access, services, security, connectivity, and management. The book covers important aspects of network engineering using a variety of hands-on labs and real-world scenarios that will help you gain essential practical skills. As you make progress, this CCNA certification study guide will help you get to grips with the solutions and technologies that you need to implement and administer a broad range of modern networks and IT infrastructures.

By the end of this book, you'll have gained the confidence to pass the Cisco CCNA 200-301 exam on the first attempt and be well-versed in a variety of network administration and security engineering solutions.

▶What You Will Learn
⦁Understand the benefits of creating an optimal network
⦁Create and implement IP schemes in an enterprise network
⦁Design and implement virtual local area networks (VLANs)
⦁Administer dynamic routing protocols, network security, and automation
⦁Get to grips with various IP services that are essential to every network
⦁Discover how to troubleshoot networking devices

▶Key Features
⦁Secure your future in network engineering with this intensive boot camp-style certification guide
⦁Gain knowledge of the latest trends in Cisco networking and security and boost your career prospects
⦁Design and implement a wide range of networking technologies and services using Cisco solutions

▶Who This Book Is For
This guide is for IT professionals looking to boost their network engineering and security administration career prospects. If you want to gain a Cisco CCNA certification and start a career as a network security professional, you'll find this book useful. Although no knowledge about Cisco technologies is expected, a basic understanding of industry-level network fundamentals will help you grasp the topics covered easily.

▶What this book covers
⦁ Chapter 1, Introduction to Networking, introduces various network protocols, devices, and components, and network topology architectures.

⦁ Chapter 2, Getting Started with Cisco IOS Devices, introduces Cisco Internetwork Operating System (Cisco IOS). You will learn how to access the device, perform initial configurations, and learn how to verify the device's settings. Additionally, you will learn how to build your personal learning environment to reduce your expenditure in terms of purchasing expensive equipment.

⦁ Chapter 3, IP Addressing and Subnetting, covers different classes of IP addresses and their assignments. The second half of the chapter will teach you how to use subnetting to break down a large network into smaller subnetworks.

⦁ Chapter 4, Detecting Physical Issues, Wireless Architectures, and Virtualization, covers various Layer 1 issues and takes a deep dive into understanding Cisco Wireless Architectures and deployment models. Additionally, this chapter covers the concept of virtualization and virtual machines.

⦁ Chapter 5, Implementing VLANs, Layer 2 Discovery Protocols, and EtherChannels, introduces you to Virtual Local Area Networks (VLANs), configuring and troubleshooting VLANs on a Cisco network, setting up inter-switch connectivity by configuring Trunk links, and configuring inter-VLAN routing to allow multiple VLANs to inter-communicate. Additionally, you will learn how to use various Layer 2 discovery protocols to map devices on a network and use EtherChannels to perform link aggregation.

⦁ Chapter 6, Understanding and Configuring Spanning-Tree, covers the importance of designing a proper switch network showing devices should be interconnected to ensure redundancy. Furthermore, the chapter introduces you to a Layer 2 loop prevention mechanism known as the Spanning-Tree Protocol (STP). You will learn about the operations, configurations, and troubleshooting of STP in a Cisco environment.

⦁ Chapter 7, Interpreting Routing Components, focuses on the importance of routing and discusses how routers make their forwarding decisions. You will learn all about the components of the routing table and the factors that help a router to choose a preferred path for forwarding packets to their destination.

⦁ Chapter 8, Understanding First Hop Redundancy, Static and Dynamic Routing, continues the discussion on routing but takes a more technical approach, such as demonstrating how to implement static and dynamic routing protocols to ensure IP connectivity between multiple networks in a Cisco environment.

⦁ Chapter 9, Configuring Network Address Translation (NAT), focuses primarily on Network Address Translation (NAT). The chapter will take you from an introduction to use cases onto the configuration of various types of NAT and troubleshooting techniques.

⦁ Chapter 10, Implementing Network Services and IP Operations, introduces you to various network and IP services that are required on almost all enterprise networks and are required knowledge for network engineers. This chapter covers technologies such as NTP, DHCP, DNS, Syslog, and QoS.

⦁ Chapter 11, Exploring Network Security, discusses various topics, such as cybersecurity threats and issues many professionals face each day, such as threats, vulnerabilities, exploits, user training, security awareness, and countermeasures.

⦁ Chapter 12, Configuring Device Access Control and VPNs, focuses on securing your Cisco switches and routers and configuring secure device access. Additionally, this chapter introduces you to remote access and how to configure Virtual Private Networks (VPNs).

⦁ Chapter 13, Implementing Access Control Lists, covers ACLs, which are a mandatory topic for everyone who is starting or is already in the field of networks or security. ACLs are Layer 3 security controls. When implemented on a route, they create a firewall-centric device to filter unwanted traffic.

⦁ Chapter 14, Implementing Layer 2 and Wireless Security, introduces you to various Layer 2 attacks on an enterprise network and explains how to implement countermeasures to create a secure network environment.

⦁ Chapter 15, Network Automation and Programmability Techniques, broaches the fact that the world of networking is moving toward automation and network engineers will now need to learn how automation can improve efficiency in network deployment and management. This chapter introduces you to network automation techniques and programmability.

⦁ Chapter 16, Mock Exam 1, includes a simple mock test containing questions that will help you to prepare for the Cisco CCNA 200-301 examination and will help you identify any topics you need to spend additional time learning about and practicing.

⦁ Chapter 17, Mock Exam 2, includes another mock test containing questions that will help you to prepare for the Cisco CCNA 200-301 examination and will help you identify any topics you need to spend additional time learning about and practicing.

작가 소개

▶About the Author
- Glen D. Singh
Glen D. Singh is a cybersecurity and networking instructor, InfoSec author, and consultant. His areas of expertise are penetration testing, digital forensics, network security, and enterprise networking. He has many certifications, including CEH, CHFI, and 3xCCNA (cyber ops, security, and routing and switching). He loves teaching and mentoring others, and sharing his wealth of knowledge and experience as an author. He has written books on Kali Linux, Kali NetHunter, and CCNA Security.
Glen has trained many professionals in various sectors ranging from ISPs to government agencies in the field of cybersecurity. As an aspiring game-changer, Glen is passionate about increasing cybersecurity awareness in his homeland, Trinidad and Tobago.

리뷰

5.0

구매자 별점
1명 평가

이 작품을 평가해 주세요!

건전한 리뷰 정착 및 양질의 리뷰를 위해 아래 해당하는 리뷰는 비공개 조치될 수 있음을 안내드립니다.
  1. 타인에게 불쾌감을 주는 욕설
  2. 비속어나 타인을 비방하는 내용
  3. 특정 종교, 민족, 계층을 비방하는 내용
  4. 해당 작품의 줄거리나 리디 서비스 이용과 관련이 없는 내용
  5. 의미를 알 수 없는 내용
  6. 광고 및 반복적인 글을 게시하여 서비스 품질을 떨어트리는 내용
  7. 저작권상 문제의 소지가 있는 내용
  8. 다른 리뷰에 대한 반박이나 논쟁을 유발하는 내용
* 결말을 예상할 수 있는 리뷰는 자제하여 주시기 바랍니다.
이 외에도 건전한 리뷰 문화 형성을 위한 운영 목적과 취지에 맞지 않는 내용은 담당자에 의해 리뷰가 비공개 처리가 될 수 있습니다.
아직 등록된 리뷰가 없습니다.
첫 번째 리뷰를 남겨주세요!
'구매자' 표시는 유료 작품 결제 후 다운로드하거나 리디셀렉트 작품을 다운로드 한 경우에만 표시됩니다.
무료 작품 (프로모션 등으로 무료로 전환된 작품 포함)
'구매자'로 표시되지 않습니다.
시리즈 내 무료 작품
'구매자'로 표시되지 않습니다. 하지만 같은 시리즈의 유료 작품을 결제한 뒤 리뷰를 수정하거나 재등록하면 '구매자'로 표시됩니다.
영구 삭제
작품을 영구 삭제해도 '구매자' 표시는 남아있습니다.
결제 취소
'구매자' 표시가 자동으로 사라집니다.

개발/프로그래밍 베스트더보기

  • 한 걸음 앞선 개발자가 지금 꼭 알아야 할 클로드 코드 (조훈, 정찬훈)
  • AI 엔지니어링 (칩 후옌, 변성윤)
  • 헤드 퍼스트 소프트웨어 아키텍처 (라주 간디, 마크 리처드)
  • 블렌더로 애니 그림체 캐릭터를 만들어보자! -모델링편- (나츠모리 카츠, 김모세)
  • 딥러닝 제대로 이해하기 (사이먼 J. D. 프린스, 고연이)
  • AI 프로덕트 기획과 운영 (마릴리 니카, 오성근)
  • 플러터 엔지니어링 (마지드 하지안, 한국 플러터 커뮤니티)
  • 개발자를 위한 생성형 AI 활용 가이드 (핫토리 유우키, 하승민)
  • 블렌더로 애니 그림체 캐릭터를 만들어보자! 카툰 렌더링편 (나츠모리 카츠, 김모세)
  • AI 에이전트 생태계 (이주환)
  • 안티프래질 프런트엔드 (김상철)
  • 소문난 명강의 : 크리핵티브의 한 권으로 끝내는 웹 해킹 바이블 (하동민)
  • 밑바닥부터 시작하는 웹 브라우저 (파벨 판체카, 크리스 해럴슨)
  • 테디노트의 랭체인을 활용한 RAG 비법노트 심화편 (이경록)
  • 조코딩의 랭체인으로 AI 에이전트 서비스 만들기 (우성우, 조동근)
  • LLM을 활용한 실전 AI 애플리케이션 개발 (허정준, 정진호)
  • 게임 시스템 디자인 입문 (댁스 개저웨이, 강세중)
  • 데이터 중심 애플리케이션 설계 (마틴 클레프만, 정재부)
  • 현장에서 통하는 도메인 주도 설계 실전 가이드 (마스다 토오루, 타나카 히사테루)
  • 테디노트의 랭체인을 활용한 RAG 비법노트_기본편 (이경록(테디노트))

본문 끝 최상단으로 돌아가기

spinner
앱으로 연결해서 다운로드하시겠습니까?
닫기 버튼
대여한 작품은 다운로드 시점부터 대여가 시작됩니다.
앱으로 연결해서 보시겠습니까?
닫기 버튼
앱이 설치되어 있지 않으면 앱 다운로드로 자동 연결됩니다.
모바일 버전