A. Scrill Final Practice- PKT –
- PKT ANSWER –
- PKT ANSWER (PDF) –
|
B. LAB Final- PKT –
- PKT ANSWER –
- PKT ANSWER (PDF) –
|
1.2.4.12 Lab – Social Engineering- PDF – 1.2.4.12 Lab – Social Engineering
- PKT – 1.2.4.12 Lab – Social Engineering
- PKT ANSWER – 1.2.4.12 Lab – Social Engineering
- PKT ANSWER (PDF) -1.2.4.12 Lab – Social Engineering
|
1.4.1.1 Lab – Researching Network Attacks and Security Audit Tools- PDF – 1.4.1.1 Lab – Researching Network Attacks and Security Audit Tools
- PKT – 1.4.1.1 Lab – Researching Network Attacks and Security Audit Tools
- PKT ANSWER – 1.4.1.1 Lab – Researching Network Attacks and Security Audit Tools
- PKT ANSWER (PDF) -1.4.1.1 Lab – Researching Network Attacks and Security Audit Tools
|
2.6.1.2 Lab – Securing the Router for Administrative Access- PDF – 2.6.1.2 Lab – Securing the Router for Administrative Access
- PKT – 2.6.1.2 Lab – Securing the Router for Administrative Access
- PKT ANSWER – 2.6.1.2 Lab – Securing the Router for Administrative Access
- PKT ANSWER (PDF) -2.6.1.2 Lab – Securing the Router for Administrative Access
|
2.6.1.3 Packet Tracer – Configure Cisco Routers for Syslog, NTP, and SSH Operations- PDF – 2.6.1.3 Packet Tracer – Configure Cisco Routers for Syslog, NTP, and SSH Operations
- PKT – 2.6.1.3 Packet Tracer – Conf. Cisco Routers for Syslog, NTP, and SSH Operations
- PKT ANSWER -2.6.1.3 Packet Tracer – Conf. Cisco Routers for Syslog, NTP, and SSH Operations
- PKT ANSWER (PDF) -2.6.1.3 Packet Tracer – Conf. Cisco Routers for Syslog, NTP, and SSH
|
3.6.1.1 Lab – Securing Administrative Access Using AAA and RADIUS- PDF – 3.6.1.1 Lab – Securing Administrative Access Using AAA and RADIUS
- PKT – 3.6.1.1 Lab – Securing Administrative Access Using AAA and RADIUS
- PKT ANSWER – 3.6.1.1 Lab – Securing Administrative Access Using AAA and RADIUS
- PKT ANSWER (PDF) -3.6.1.1 Lab – Securing Administrative Access Using AAA and RADIUS
|
3.6.1.2 Packet Tracer – Configure AAA Authentication on Cisco Routers- PDF – 3.6.1.2 Packet Tracer – Configure AAA Authentication on Cisco Routers
- PKT – 3.6.1.2 Packet Tracer – Configure AAA Authentication on Cisco Routers
- PKT ANSWER – 3.6.1.2 Packet Tracer – Configure AAA Authentication on Cisco Routers
- PKT ANSWER (PDF) – 3.6.1.2 Packet Tracer – Configure AAA Authentication on Cisco Routers
|
4.1.1.10 Packet Tracer – Configuring Extended ACLs Scenario 1- PDF – 4.1.1.10 Packet Tracer – Configuring Extended ACLs Scenario 1
- PKT – 4.1.1.10 Packet Tracer – Configuring Extended ACLs Scenario 1
- PKT ANSWER – 4.1.1.10 Packet Tracer – Configuring Extended ACLs Scenario 1
- PKT ANSWER (PDF) – 4.1.1.10 Packet Tracer – Configuring Extended ACLs Scenario 1
|
4.1.1.11 Packet Tracer – Configuring Extended ACLs Scenario 2- PDF – 4.1.1.11 Packet Tracer – Configuring Extended ACLs Scenario 2
- PKT – 4.1.1.11 Packet Tracer – Configuring Extended ACLs Scenario 2
- PKT ANSWER – 4.1.1.11 Packet Tracer – Configuring Extended ACLs Scenario 2
- PKT ANSWER (PDF) – 4.1.1.11 Packet Tracer – Configuring Extended ACLs Scenario 2
|
4.1.2.5 Packet Tracer – Configure IP ACLs to Mitigate Attacks- PDF – 4.1.2.5 Packet Tracer – Configure IP ACLs to Mitigate Attacks
- PKT – 4.1.2.5 Packet Tracer – Configure IP ACLs to Mitigate Attacks
- PKT ANSWER – 4.1.2.5 Packet Tracer – Configure IP ACLs to Mitigate Attacks
- PKT ANSWER (PDF) – 4.1.2.5 Packet Tracer – Configure IP ACLs to Mitigate Attacks
|
4.1.3.4 Packet Tracer – Configuring IPv6 ACLs- PDF – 4.1.3.4 Packet Tracer – Configuring IPv6 ACLs
- PKT – 4.1.3.4 Packet Tracer – Configuring IPv6 ACLs
- PKT ANSWER – 4.1.3.4 Packet Tracer – Configuring IPv6 ACLs
- PKT ANSWER (PDF) – 4.1.3.4 Packet Tracer – Configuring IPv6 ACLs
|
4.4.1.1 Packet Tracer – Configuring a Zone-Based Policy Firewall (ZPF)- PDF – 4.4.1.1 Packet Tracer – Configuring a Zone-Based Policy Firewall (ZPF)
- PKT – 4.4.1.1 Packet Tracer – Configuring a Zone-Based Policy Firewall (ZPF)
- PKT ANSWER – 4.4.1.1 Packet Tracer – Configuring a Zone-Based Policy Firewall (ZPF)
- PKT ANSWER (PDF) – 4.4.1.1 Packet Tracer – Configuring a Zone-Based Policy Firewall (ZPF)
|
4.4.1.2 Lab – Configuring Zone-Based Policy Firewalls- PDF – 4.4.1.2 Lab – Configuring Zone-Based Policy Firewalls
- PKT – 4.4.1.2 Lab – Configuring Zone-Based Policy Firewalls
- PKT ANSWER – 4.4.1.2 Lab – Configuring Zone-Based Policy Firewalls
- PKT ANSWER (PDF) – 4.4.1.2 Lab – Configuring Zone-Based Policy Firewalls
|
5.4.1.1 Lab – Configure an Intrusion Prevention System (IPS)- PDF – 5.4.1.1 Lab – Configure an Intrusion Prevention System (IPS)
- PKT – 5.4.1.1 Lab – Configure an Intrusion Prevention System (IPS)
- PKT ANSWER – 5.4.1.1 Lab – Configure an Intrusion Prevention System (IPS)
- PKT ANSWER (PDF) – 5.4.1.1 Lab – Configure an Intrusion Prevention System (IPS)
|
5.4.1.2 Packet Tracer – Configure IOS Intrusion Prevention System (IPS) Using CLI- PDF – 5.4.1.2 Packet Tracer – Configure IOS Intrusion Prevention System (IPS) Using CLI
- PKT – 5.4.1.2 Packet Tracer – Conf. IOS Intrusion Prevention System (IPS) Using CLI
- PKT ANSWER – 5.4.1.2 Packet Tracer – Conf. IOS Intrusion Prevention System (IPS) Using CLI
- PKT ANSWER (PDF) – 5.4.1.2 PT – Conf. IOS Intrusion Prevention System (IPS) Using CLI
|
6.3.1.1 Lab – Securing Layer 2 Switches- PDF – 6.3.1.1 Lab – Securing Layer 2 Switches
- PKT – 6.3.1.1 Lab – Securing Layer 2 Switches
- PKT ANSWER – 6.3.1.1 Lab – Securing Layer 2 Switches
- PKT ANSWER (PDF) – 6.3.1.1 Lab – Securing Layer 2 Switches
|
6.3.1.2 Packet Tracer – Layer 2 Security- PDF – 6.3.1.2 Packet Tracer – Layer 2 Security
- PKT – 6.3.1.2 Packet Tracer – Layer 2 Security
- PKT ANSWER – 6.3.1.2 Packet Tracer – Layer 2 Security
- PKT ANSWER (PDF) – 6.3.1.2 Packet Tracer – Layer 2 Security
|
6.3.1.3 Packet Tracer – Layer 2 VLAN Security- PDF – 6.3.1.3 Packet Tracer – Layer 2 VLAN Security
- PKT – 6.3.1.3 Packet Tracer – Layer 2 VLAN Security
- PKT ANSWER – 6.3.1.3 Packet Tracer – Layer 2 VLAN Security
- PKT ANSWER (PDF) – 6.3.1.3 Packet Tracer – Layer 2 VLAN Security
|
7.5.1.2 Lab – Exploring Encryption Methods- PDF – 7.5.1.2 Lab – Exploring Encryption Methods
- PKT – 7.5.1.2 Lab – Exploring Encryption Methods
- PKT ANSWER – 7.5.1.2 Lab – Exploring Encryption Methods
- PKT ANSWER (PDF) – 7.5.1.2 Lab – Exploring Encryption Methods
|
8.4.1.2 Packet Tracer – Configure and Verify a Site-to-Site IPsec VPN Using CLI- PDF – 8.4.1.2 Packet Tracer – Configure and Verify a Site-to-Site IPsec VPN using CLI
- PKT – 8.4.1.2 Packet Tracer – Configure and Verify a Site-to-Site IPsec VPN Using CLI
- PKT ANSWER – 8.4.1.2 Packet Tracer – Configure and Verify a Site-to-Site IPsec VPN Using CLI
- PKT ANSWER (PDF) – 8.4.1.2 PT – Configure and Verify a Site-to-Site IPsec VPN Using CLI
|
8.4.1.3 Lab -Configure Site-to-Site VPN using CLI- PDF – 8.4.1.3 Lab -Configure Site-to-Site VPN using CLI
- PKT – 8.4.1.3 Lab -Configure Site-to-Site VPN using CLI
- PKT ANSWER – 8.4.1.3 Lab -Configure Site-to-Site VPN using CLI
- PKT ANSWER (PDF) – 8.4.1.3 Lab -Configure Site-to-Site VPN using CLI
|
9.3.1.1 Packet Tracer – Configuring ASA Basic Settings and Firewall Using CLI- PDF – 9.3.1.1 Packet Tracer – Configuring ASA Basic Settings and Firewall Using CLI
- PKT – 9.3.1.1 Packet Tracer – Configuring ASA Basic Settings and Firewall Using CLI
- PKT ANSWER – 9.3.1.1 Packet Tracer – Configuring ASA Basic Settings and Firewall Using CLI
- PKT ANSWER (PDF) – 9.3.1.1 Packet Tracer – Configuring ASA Basic Settings and Firewall Using CLI
|
9.3.1.2 Lab – Configure ASA Basic Settings and Firewall Using CLI- PDF – 9.3.1.2 Lab – Configure ASA Basic Settings and Firewall Using CLI
- PKT – 9.3.1.2 Lab – Configure ASA Basic Settings and Firewall Using CLI
- PKT ANSWER – 9.3.1.2 Lab – Configure ASA Basic Settings and Firewall Using CLI
- PKT ANSWER (PDF) – 9.3.1.2 Lab – Configure ASA Basic Settings and Firewall Using CLI
|
10.1.4.8 Lab A – Configure ASA Basic Settings and Firewall Using ASDM- PDF – 10.1.4.8 Lab A – Configure ASA Basic Settings and Firewall Using ASDM
- PKT – 10.1.4.8 Lab A – Configure ASA Basic Settings and Firewall Using ASDM
- PKT ANSWER – 10.1.4.8 Lab A – Configure ASA Basic Settings and Firewall Using ASDM
- PKT ANSWER (PDF) – 10.1.4.8 Lab A – Configure ASA Basic Settings and Firewall Using ASDM
|
10.2.1.9 Lab B – Configure a Site-to-Site IPsec VPN Using ISR CLI and ASA ASDM- PDF – 10.2.1.9 Lab B – Configure a Site-to-Site IPsec VPN Using ISR CLI and ASA ASDM
- PKT – 10.2.1.9 Lab B – Configure a Site-to-Site IPsec VPN Using ISR CLI and ASA ASDM
- PKT ANSWER – 10.2.1.9 Lab B – Configure a Site-to-Site IPsec VPN Using ISR CLI and ASA ASDM
- PKT ANSWER (PDF) – 10.2.1.9 Lab B – Configure a Site-to-Site IPsec VPN Using ISR CLI and ASA ASDM
|
10.3.1.1 Lab C – Configure Clientless Remote Access SSL VPNs Using ASDM- PDF – 10.3.1.1 Lab C – Configure Clientless Remote Access SSL VPNs Using ASDM
- PKT – 10.3.1.1 Lab C – Configure Clientless Remote Access SSL VPNs Using ASDM
- PKT ANSWER – 10.3.1.1 Lab C – Configure Clientless Remote Access SSL VPNs Using ASDM
- PKT ANSWER (PDF) – 10.3.1.1 Lab C – Configure Clientless Remote Access SSL VPNs Using ASDM
|
10.3.1.2 Lab D – Configure AnyConnect Remote Access SSL VPN Using ASDM- PDF – 10.3.1.2 Lab D – Configure AnyConnect Remote Access SSL VPN Using ASDM
- PKT – 10.3.1.2 Lab D – Configure AnyConnect Remote Access SSL VPN Using ASDM
- PKT ANSWER – 10.3.1.2 Lab D – Configure AnyConnect Remote Access SSL VPN Using ASDM
- PKT ANSWER (PDF) – 10.3.1.2 Lab D – Configure AnyConnect Remote Access SSL VPN Using ASDM
|
11.3.1.1 Packet Tracer – Skills Integration Challenge- PDF – 11.3.1.1 Packet Tracer – Skills Integration Challenge
- PKT – 11.3.1.1 Packet Tracer – Skills Integration Challenge
- PKT ANSWER – 11.3.1.1 Packet Tracer – Skills Integration Challenge
- PKT ANSWER (PDF) – 11.3.1.1 Packet Tracer – Skills Integration Challenge
|
11.3.1.2 – CCNA Security Comprehensive Lab- PDF – 11.3.1.2 – CCNA Security Comprehensive Lab
- PKT – 11.3.1.2 – CCNA Security Comprehensive Lab
- PKT ANSWER – 11.3.1.2 – CCNA Security Comprehensive Lab
- PKT ANSWER (PDF) – 11.3.1.2 – CCNA Security Comprehensive Lab
|