| Week 8 40 pages and 30 multiple choice questions
Read Chapters 16, 17 and 18 again |
|||||||
|---|---|---|---|---|---|---|---|
| Chapter 19 – Summarize various types of attacks and their impact to the network – 13 pages
Chapter 20- Given a scenario, apply network security features, defense techniques, and solutions – 14 pages Chapter 21 – Explain the troubleshooting methodology – 13 pages |
|||||||
| Action – Ian’s Book | Key Elements | ||||||
|
DOS/DDoS
VLAN hopping MAC flooding ARP poisoning ARP spoofing DNS poisoning DNS spoofing Rogue devices and services Evil twin On-path attack Social Engineering Malware Device hardening NAC Security rules Zones Troubleshooting
urity operations Technical Implications Documentation Version Control
|
||||||