CCDA 200-310 Official Cert Guide

CCDA 200-310 Official Cert Guide
Bruno, Anthony
Book – 2016

Design methodologies,

  • PBM,
  • network characterization,
  • top-down/bottom-up approaches

Design objectives:

  • modularity,
  • hierarchy,
  • scalability,
  • resilience,
  • fault domains

Addressing and routing protocols in existing networks

Enterprise network design:

  • campus,
  • enterprise,
  • branch

Expanding existing networks: wireless, security, collaboration, virtualization, programmability, data centers

Intelligence Techniques

Open Source Intelligence Techniques Resources for Searching and Analyzing Online Information, Fifth Edition, By Bazzell, Michael Book – 2016

how to locate:

  • Hidden Social Network Content
  • Cell Phone Subscriber Information
  • Deleted Websites & Posts
  • Missing Facebook Profile Data
  • Full Twitter Account Data
  • Alias Social Network Profiles
  • Free Investigative Software
  • Useful Browser Extensions
  • Alternative Search Engine Results
  • Website Owner Information
  • Photo GPS & Metadata
  • Live Streaming Social Content
  • Social Content by Location
  • IP Addresses of Users
  • Additional User Accounts
  • Sensitive Documents & Photos
  • Private Email Addresses
  • Duplicate Video Posts
  • Mobile App Network Data
  • Unlisted Addresses & #s
  • Public Government Records
  • Document Metadata
  • Rental Vehicle Contracts
  • Online Criminal Activity
  • Personal Radio Communications
  • Compromised Email Information
  • Wireless Routers by Location
  • Hidden Mapping Applications
  • Dark Web Content (Tor)
  • Restricted YouTube Content
  • Hidden Website Details
  • Vehicle Registration Details