Computer Networking
English


LOOKING TO PLACE A BULK ORDER?CLICK HERE

Piracy-free
Piracy-free
Assured Quality
Assured Quality
Secure Transactions
Secure Transactions
Fast Delivery
Fast Delivery
Sustainably Printed
Sustainably Printed
Delivery Options
Please enter pincode to check delivery time.
*COD & Shipping Charges may apply on certain items.
Review final details at checkout.

About The Book

<p class=ql-align-justify><strong><em><u>If you want to PASS the CompTIA Network+ Certification this book is for you! </u></em></strong></p><p><strong><em>BUY THIS BOOK NOW AND GET STARTED TODAY!</em></strong></p><p><strong><em> </em></strong></p><p><strong><u>In this book you will discover:</u></strong></p><p><em>Network Concepts and Protocols</em></p><p><em>CompTIA Network+ Exam Information</em></p><p><em>OSI Model & Network Operations</em></p><p><em>Encapsulation and the OSI Model</em></p><p><em>Network Protocols and Port Numbers</em></p><p><em>DHCP DNS & NTP</em></p><p><em>SQL Database Protocols</em></p><p><em>How to Subnet Networks</em></p><p><em>IPv6 Address Fundamentals</em></p><p><em>IPv6 SLAAC & IPv6 DHCP</em></p><p><em>Network Address Translation</em></p><p><em>Dynamic Host Configuration Protocol</em></p><p><em>Domain Name System</em></p><p><em>Ethernet Cabling</em></p><p><em>Coax Cabling and Cable Termination</em></p><p><em>Fiber Optics</em></p><p><em>Multiplexing Fiber Optics</em></p><p><em>Ethernet Fundamentals</em></p><p><em>CSMA/CD</em></p><p><em>Duplex and Speed</em></p><p><em>Ethernet Frame Fundamentals</em></p><p><em>Ethernet Layer 2 Operation</em></p><p><em>Spanning Tree Protocol</em></p><p><em>VLANs and Port Aggregation</em></p><p><em>How to Route IP Traffic</em></p><p><em>Address Resolution Protocol</em></p><p><em>How to Send Ping to Default Gateway</em></p><p><em>How to Build Routing Tables</em></p><p><em>Wireless Networking Fundamentals</em></p><p><em>Wireless 802.11 Protocols</em></p><p><em>Wireless Ethernet Operation</em></p><p><em>Wireless Topologies and Management</em></p><p><em>Wireless Encryption</em></p><p><em>Cellular Wireless</em></p><p><em>Layer 2 Devices and Services</em></p><p><em>Traffic Shaping</em></p><p><em>Neighbor Device Discovery</em></p><p><em>Load Balancer Fundamentals</em></p><p><em>Firewall Fundamentals</em></p><p><em>VoiP & SCADA Systems</em></p><p><em>Network Monitoring</em></p><p><em>Layer 2 Errors</em></p><p><em>Facilities Monitoring</em></p><p><em>Collecting Network Monitoring & Baselining</em></p><p><em>Network Security Fundamentals</em></p><p><em>Threats Vulnerabilities & Exploits</em></p><p><em>How to Reduce Threat Exposure</em></p><p><em>Defense in Depth</em></p><p><em>Authentication Authorization and Accounting</em></p><p><em>Multifactor Authentication</em></p><p><em>Network Access Control</em></p><p><em>Security Assessments</em></p><p><em>How to Assess Risk</em></p><p><em>Human & Technical Exploits</em></p><p><em>WiFi Attacks & Rogue DHCP Servers</em></p><p><em>Password Attacks</em></p><p><em>How to Secure Layer 2</em></p><p><em>Rogue DHCP Servers & Dynamic ARP Inspection</em></p><p><em>How to Secure Layer 3 4 and 7</em></p><p><em>Virtual Private Networks</em></p><p><em>Remote Desktop & Virtual Desktops Connections</em></p><p><em>Network Management Options</em></p><p><em>SAN & Cloud Computing</em></p><p><em>Cloud Services</em></p><p><em>Network Troubleshooting Fundamentals</em></p><p><em>How to Establish a Theory of Cause</em></p><p><em>How to Test the Theory & Establish a Plan of Action</em></p><p><em>How to Test Verify and Document the Solution</em></p><p><em>How to Identify and Troubleshoot Cable Issues</em></p><p><em>Fiber Optic Cables & Tools</em></p><p><em>How to use Ping ARP & Traceroute</em></p><p><em>How to Capture Traffic</em></p><p><em>Wireless Troubleshooting & WiFi Tools</em></p><p><em>Common Wireless Issues</em></p><p><em>Configuration Issues</em></p><p><em>How to Troubleshoot Routing Issues</em></p><p><em>How to use Simple Network Management Protocol</em></p><p><em>How to use Netflow</em></p><p><em>How to use Syslog</em></p><p><em>How to Document IT Procedures and Plans</em></p><p><em>Security and Device Policies</em></p><p><strong><em> </em></strong></p><p><strong><em>BUY THIS BOOK NOW AND GET STARTED TODAY!</em></strong></p>
downArrow

Details