Implementing Cisco IOS Network Security (IINS 640-554) Foundation Learning Guide (inbunden)
Fler böcker inom
Format
Inbunden (Hardback)
Språk
Engelska
Antal sidor
704
Utgivningsdatum
2012-12-18
Upplaga
2
Förlag
CISCO PRESS
Illustrationer
Illustrationsstrations
Dimensioner
240 x 193 x 40 mm
Vikt
1490 g
Antal komponenter
1
ISBN
9781587142727

Implementing Cisco IOS Network Security (IINS 640-554) Foundation Learning Guide

Inbunden,  Engelska, 2012-12-18

Slutsåld

Implementing Cisco IOS Network Security (IINS) Foundation Learning Guide Second Edition

Foundation learning for the CCNA Security IINS 640-554 exam

Implementing Cisco IOS Network Security (IINS) Foundation Learning Guide, Second Edition, is a Cisco-authorized, self-paced learning tool for CCNA Security 640-554 foundation learning. This book provides you with the knowledge needed to secure Cisco networks. By reading this book, you will gain a thorough understanding of how to develop a security infrastructure, recognize threats and vulnerabilities to networks, and mitigate security threats.

This book focuses on using Cisco IOS routers to protect the network by capitalizing on their advanced features as a perimeter router, firewall, intrusion prevention system, and site-to-site VPN device. The book also covers the use of Cisco Catalyst switches for basic network security, the Cisco Secure Access Control System (ACS), and the Cisco Adaptive Security Appliance (ASA). You learn how to perform basic tasks to secure a small branch office network using Cisco IOS security features available through web-based GUIs (Cisco Configuration Professional) and the CLI
on Cisco routers, switches, and ASAs.

Whether you are preparing for CCNA Security certification or simply want to gain a better understanding of Cisco IOS security fundamentals, you will benefit from the information provided in this book.

Implementing Cisco IOS Network Security (IINS) Foundation Learning Guide, Second Edition, is part of a recommended learning path from Cisco that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led training, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, please visit www.cisco.com/go/authorizedtraining .

-- Develop a comprehensive network security policy to counter threats against information security

-- Secure borderless networks

-- Learn how to use Cisco IOS Network Foundation Protection (NFP) and Cisco Configuration Professional (CCP)

-- Securely implement the management and reporting features of Cisco IOS devices

-- Deploy Cisco Catalyst Switch security features

-- Understand IPv6 security features

-- Plan threat control strategies

-- Filter traffic with access control lists

-- Configure ASA and Cisco IOS zone-based firewalls

-- Implement intrusion prevention systems (IPS) and network address translation (NAT)

-- Secure connectivity with site-to-site IPsec VPNs and remote access VPNs

This volume is in the Foundation Learning Guide Series offered by Cisco Press
Visa hela texten

Kundrecensioner

Har du läst boken? Sätt ditt betyg »

Övrig information

Catherine Paquet is a practitioner and a published author in the field of Internetworking, Network Security and Security Financials. Catherine has in-depth knowledge of security systems, remote access, and routing technology. She is a Cisco Certified Security Professional and a Cisco Certified Network Professional. She is also a Certified Cisco Systems Instructor and a Cisco IronPort Security Systems Instructor with Cisco's largest training partner, Global Knowledge Inc. Her most recent consulting projects include conducting security assessments, performing network designs, configuring and implementing security solutions such as firewalls, virtual private networks, web filters and intrusion prevention solutions. Recently, on the invitation of Cisco Systems, she visited 22 emerging countries as part of a book tour promoting her manuscript her latest Security book. In 2002 and 2003, Catherine volunteered with the United Nations mission in Kabul, Afghanistan, to train Afghan public servants in the area of networking. Catherine holds a Bachelor degree from the Royal Military College of St-Jean and a Masters from York University. Catherine lives in Toronto with her husband. They have two children both attending university.

Innehållsförteckning

Introduction xxviii

Part I Networking Security Fundamentals

Chapter 1 Network Security Concepts and Policies 1

Building Blocks of Information Security 2

Basic Security Assumptions 2

Basic Security Requirements 2

Data, Vulnerabilities, and Countermeasures 3

  Data Classification 4

  Vulnerabilities Classifications 7

  Countermeasures Classification 8

  Need for Network Security 12

  Intent Evolution 13

  Threat Evolution 14

  Trends Affecting Network Security 16

Adversaries, Methodologies, and Classes of Attack 19

  Adversaries 20

  Methodologies 21

  Threats Classification 23

  Man-in-the-Middle Attacks 32

  Overt and Covert Channels 33

  Botnets 37

  DoS and DDoS Attacks 37

Principles of Secure Network Design 39

  Defense in Depth 41

Evaluating and Managing the Risk 42

Levels of Risks 43

Risk Analysis and Management 44

  Risk Analysis 44

  Building Blocks of Risk Analysis 47

  A Lifecycle Approach to Risk Management 49

Regulatory Compliance 50

Security Policies 53

Security Policy Components 55

  Governing Policy 56

  End-User Policies 57

  Technical Policies 57

  Standards, Guidelines, and Procedures 59

  Security Policy Roles and Responsibilities 61

  Security Awareness 62

Secure Network Lifecycle Management 63

IT Governance, Risk Management, and Compliance 64

Secure Network Life Cycle 64

  Initiation Phase 65

  Acquisition and Development Phase 65

  Implementation Phase 66

  Operations and Maintenance Phase 67

  Disposition Phase 67

  Models and Frameworks 67

Network Security Posture 69

Network Security Testing 70

  Security Testing Techniques 70

  Common Testing Tools 71

Incident Response 72

Incident Management 73

  Computer Crime Investigations 74

  Laws and Ethics 75

  Liability 76

Disaster Recovery and Business Continuity Planning 77

     Business Continuity Concepts 78

Summary 79

References 79

Publications 79

Web Resources 80

Review Questions 80

Chapter 2 Security Strategy and Cisco Borderless Network 85

Borderless Networks 85

Cisco Borderless Network Security Architecture 86

Borderless End Zone 88

Borderless Internet 89

Borderless Data Center 90

Policy Management Layer 91

Borderless Network Services 91

Borderless Security Products 92

SecureX, a Context-Aware Security Approach 93

  SecureX Core Components 94