1 / 283
文档名称:

CCNA Security Student Lab Manual - Cisco Systems.pdf

格式:pdf   页数:283
下载后只包含 1 个 PDF 格式的文档,没有任何的图纸或源代码,查看文件列表

如果您已付费下载过本站文档,您可以点这里二次下载

CCNA Security Student Lab Manual - Cisco Systems.pdf

上传人:bolee65 2014/7/17 文件大小:0 KB

下载得到文件列表

CCNA Security Student Lab Manual - Cisco Systems.pdf

文档介绍

文档介绍:CCNA Security
Student Lab Manual







This document is exclusive property of Cisco Systems, Inc. Permission is granted
to print and copy this document for mercial distribution and exclusive
use by instructors in NA Security course as part of an official Cisco
Networking Academy Program.
CCNA Security

Chapter 1 Lab A: work Attacks and Security Audit
Tools
Objectives
Part 1: work Attacks
• work attacks that have occurred.
• Select work attack and develop a report for presentation to the class.
Part 2: Researching Security Audit Tools
• work security audit tools.
• Select a tool and develop a report for presentation to the class.
Background/Scenario
Network attacks have resulted in the loss of sensitive data and work downtime. When work
or the resources in it are essible, worker productivity can suffer, and business e may be lost.
Attackers have developed many tools over the years to attack promise works anizations.
These attacks take many forms, but in most cases, they seek to obtain sensitive information, destroy
resources, or deny legitimate users access to resources.
To understand how to defend work against attacks, an administrator must first work
vulnerabilities. Specialized security audit software developed by equipment and software manufacturers can
be used to help identify potential weaknesses. In addition, the same tools used by attackers can be used to
test the ability of work to mitigate an attack. After the vulnerabilities are known, steps can be taken to
help mitigate work attacks.
This lab provides a structured research project that is divided into two parts: work Attacks
and Researching Security Audit Tools. You can elect to perform Part 1, Part 2, or both. Let your instructor
know what you plan to do so to ensure that a variety work attacks and vulnerability tools are reported on
by the members of the class.
In Part 1, you research work attacks