Automation |
CCNP |
Networking |
Hacking AI Systems
Learn to identify an AI attack and how data breaches impact AI and ML models. Demonstrate real-world knowledge by designing and implementing proactive security measures to protect AI and ML systems from potential attacks.
Access Management
In this sample chapter from Cisco Certified Support Technician (CCST) Cybersecurity 100-160 Official Cert Guide, you will learn how to provide an access management solution using the AAA framework, which outlines the best practices you need to consider when it comes to authentication, authorization, and accounting.
Solving Congestion with Storage I/O Performance Monitoring
This sample chapter from Detecting, Troubleshooting, and Preventing Congestion in Storage Networks explains the use of storage I/O performance monitoring for handling network congestion problems and includes practical case studies.
WAN Availability and QoS
This sample chapter from CCNP Enterprise Design ENSLD 300-420 Official Cert Guide, 2nd Edition covers the selection and use of WAN designs in enterprise networks in addition to QoS strategies and designing end-to-end QoS policies. This chapter covers topics from the ENSLD 300-420 exam.
Measuring Zero Trust Success
This sample chapter from In Zero Trust We Trust focuses on helping you craft standard metrics based on key constructs, such as risk and performance, so that you can showcase the value that Zero Trust brings to the enterprise infrastructure, processes, and people.
Impact of AI in Other Emerging Technologies
This sample chapter from Beyond the Algorithm explains the complex interplay between AI and four other pivotal domains: quantum computing, blockchain technologies, autonomous vehicles and drones, and edge computing.
• Cisco certification information
• Networking Technology series
• Sign up for special offers
• Register your product
• Shipping information
• Schedule your exam with Pearson VUE
• Follow @CiscoPress on Twitter