Jump to ratings and reviews
Rate this book

Implementing and Administering Cisco Solutions: 200-301 CCNA Exam Guide

Rate this book
In the dynamic technology landscape, staying on top of the latest technology trends is a must, especially if you want to build a career in network administration. Achieving CCNA 200-301 certification will validate your knowledge of networking concepts, and this book will help you to do just that.

This exam guide focuses on the fundamentals to help you gain a high-level understanding of networking, security, IP connectivity, IP services, programmability, and automation. Starting with the functions of various networking components, you’ll discover how they are used to build and improve an enterprise network. You’ll then delve into configuring networking devices using a command-line interface (CLI) to provide network access, services, security, connectivity, and management. The book covers important aspects of network engineering using a variety of hands-on labs and real-world scenarios that will help you gain essential practical skills. As you make progress, this CCNA certification study guide will help you get to grips with the solutions and technologies that you need to implement and administer a broad range of modern networks and IT infrastructures.

By the end of this book, you’ll have gained the confidence to pass the Cisco CCNA 200-301 exam on the first attempt and be well-versed in a variety of network administration and security engineering solutions.

764 pages, Kindle Edition

Published November 13, 2020

7 people are currently reading
8 people want to read

About the author

Glen D. Singh

16 books5 followers
Glen D. Singh is a cybersecurity author and lecturer. His areas of expertise are cybersecurity operations, offensive security tactics and enterprise networking. He holds a Master of Science (MSc) in Cyber Security and many industry certifications from top awarding bodies such as EC-Council, Cisco and Check Point.

Glen has trained many professionals in various sectors ranging from regional ISPs to government agencies in the field of cybersecurity. He is the author of many books which focuses on discovering and exploiting vulnerabilities, implementing security solutions to prevent cyber attacks and implementing enterprise networking solutions.

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
0 (0%)
4 stars
1 (50%)
3 stars
1 (50%)
2 stars
0 (0%)
1 star
0 (0%)
No one has reviewed this book yet.

Can't find what you're looking for?

Get help and learn more about the design.