De som köpt den här boken har ofta också köpt The Let Them Theory av Mel Robbins (inbunden).
Köp båda 2 för 787 krScott Empson is the chair of the Bachelor of Applied Information Systems Technology degree program at the Northern Alberta Institute of Technology in Edmonton, Alberta, Canada, where he teaches Cisco routing, switching, network design, and leadership courses in a variety of different programs (certificate, diploma, and applied degree) at the postsecondary level. Scott is also the program coordinator of the Cisco Networking Academy Program at NAIT, an Area Support Centre for the province of Alberta. He has been with the Cisco Academy since 2000. He has a Masters of Education degree along with three undergraduate degrees: a Bachelor of Arts, with a major in English; a Bachelor of Education, again with a major in English/Language Arts; and a Bachelor of Applied Information Systems Technology, with a major in Network Management. He currently holds several industry certifications, including CCNP, CCDP, CCAI, C|EH, and Network+. Before instructing at NAIT, he was a junior/senior high school English/language arts/computer science teacher at different schools throughout Northern Alberta. Scott lives in Edmonton, Alberta, with his wife Trina and two children, Zachariah and Shaelyn.
CHAPTER 1 IPv4 Addressing-How It Works CHAPTER 2 How to Subnet IPv4 Addresses CHAPTER 3 Variable Length Subnet Masking (VLSM) CHAPTER 4 Route Summarization CHAPTER 5 IPv6 Addressing-How It Works CHAPTER 6 Cables and Connections CHAPTER 7 The Command-Line Interface CHAPTER 8 Configuring a Switch CHAPTER 9 VLANs CHAPTER 10 VLAN Trunking Protocol and Inter-VLAN Communication CHAPTER 11 Spanning Tree Protocol CHAPTER 12 EtherChannel CHAPTER 13 Cisco Discovery Protocol (CDP) and Link Layer Discovery Protocol (LLDP) CHAPTER 14 Configuring a Cisco Router CHAPTER 15 Static Routing CHAPTER 16 Open Shortest Path First (OSPF) CHAPTER 17 DHCP CHAPTER 18 Network Address Translation (NAT) CHAPTER 19 Configuring Network Time Protocol (NTP) CHAPTER 20 Layer Two Security Features CHAPTER 21 Managing Traffic Using Access Control Lists (ACLs) CHAPTER 22 Device Monitoring and Hardening CHAPTER 23 Configuring and Securing a WLAN AP APPENDIX A How to Count in Decimal, Binary, and Hexadecimal APPENDIX B How to Convert Between Number Systems APPENDIX C Binary/Hex/Decimal Conversion Chart APPENDIX D Create Your Own Journal Here