The Network Design Cookbook is a guide that provides a structured process that you, as a network engineer or a consultant, can use to meet your critical technical objectives while keeping within the parameters of industry best practices. While it primarily deals with Cisco equipment, the Network Design Cookbook lays out a design process that allows for the incorporation of products from other vendors.
This is the first of a four-part series designed to help you prepare for the International Council of E-Commerce Consultant's Certified Ethical Hacker (CEH) exam. This course focuses on several key areas of knowledge tested in that exam: You will learn how to perform reconnaissance on companies, networks, systems, and people; how to conduct footprinting; how to exercise resource enumeration; how to sniff networks and scan them in order to better understand the attack landscape; and how to ethically gain access to systems, networks and data.
In this Network Technology and Security Fundamentals training course, expert author David Miller teaches you how to secure and protect information as it flows across an enterprise network.
If you share resources across your network or the cloud, you need a firm grasp of all of the security implications. In this Learning Path, you’ll get hands-on experience securing your infrastructure while learning about risk assessment and management, sensitive data, computer forensics, penetration testing, and much more. By the end of this course, you’ll know how to secure your data and keep it that way.
Secure your network with ease by leveraging this step-by-step tutorial on the powerful Wireshark 2.