TAILIEUCHUNG - CCNA Security 1.0

This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors in the CCNA Security course as part of an official Cisco Networking Academy Program. Network attacks have resulted in the loss of sensitive data and significant network downtime. When a network or the resources in it are inaccessible, worker productivity can suffer, and business income may be lost. Attackers have developed many tools over the | Cisco Networking Academy Mind Wide Open CCNA Security Student Lab Manual This document is exclusive property of Cisco Systems Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors in the CCNA Security course as part of an official Cisco Networking Academy Program. CCNA Security Cisco Networking Academy Mind Wide Open Chapter 1 Lab A Researching Network Attacks and Security Audit Tools Objectives Part 1 Researching Network Attacks Research network attacks that have occurred. Select a network attack and develop a report for presentation to the class. Part 2 Researching Security Audit Tools Research network security audit tools. Select a tool and develop a report for presentation to the class. Background Scenario Network attacks have resulted in the loss of sensitive data and significant network downtime. When a network or the resources in it are inaccessible worker productivity can suffer and business income may be lost. Attackers have developed many tools over the years to attack and compromise the networks of organizations. These attacks take many forms but in most cases they seek to obtain sensitive information destroy resources or deny legitimate users access to resources. To understand how to defend a network against attacks an administrator must first identify network vulnerabilities. Specialized security audit software developed by equipment and software manufacturers can be used to help identify potential weaknesses. In addition the same tools used by attackers can be used to test the ability of a network to mitigate an attack. After the vulnerabilities are known steps can be taken to help mitigate the network attacks. This lab provides a structured research project that is divided into two parts Researching Network Attacks and Researching Security Audit Tools. You can elect to perform Part 1 Part 2 or both. Let your instructor know what you plan to do so to ensure that a variety of .

TỪ KHÓA LIÊN QUAN
TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.