CCNA Security (210-260) Portable Command Guide (inbunden)
Fler böcker inom
Format
Häftad (Paperback)
Språk
Engelska
Antal sidor
352
Utgivningsdatum
2016-04-04
Upplaga
2
Förlag
Cisco Press
Dimensioner
226 x 152 x 23 mm
Vikt
454 g
Antal komponenter
1
ISBN
9781587205750

CCNA Security (210-260) Portable Command Guide

Häftad,  Engelska, 2016-04-04

Slutsåld

Preparing for the latest CCNA Security exam? Here are all the CCNA Security (210-260) commands you need in one condensed, portable resource. Filled with valuable, easy-to-access information, the CCNA Security Portable Command Guide, is portable enough for you to use whether youre in the server room or the equipment closet.

Completely updated to reflect the new CCNA Security 210-260 exam, this quick reference summarizes relevant Cisco IOS Software commands, keywords, command arguments, and associated prompts, and offers tips and examples for applying these commands to real-world security challenges. Configuration examples, throughout, provide an even deeper understanding of how to use IOS to protect networks.

Topics covered include
  • Networking security fundamentals: concepts, policies, strategy
  • Protecting network infrastructure: network foundations, security management planes/access; data planes (Catalyst switches and IPv6)
  • Threat control/containment: protecting endpoints and content; configuring ACLs, zone-based firewalls, and Cisco IOS IPS
  • Secure connectivity: VPNs, cryptology, asymmetric encryption, PKI, IPsec VPNs, and site-to-site VPN configuration
  • ASA network security: ASA/ASDM concepts; configuring ASA basic settings, advanced settings, and VPNs
Access all CCNA Security commands: use as a quick, offline resource for research and solutions
  • Logical how-to topic groupings provide one-stop research
  • Great for review before CCNA Security certification exams
  • Compact size makes it easy to carry with you, wherever you go
  • Create Your Own Journal section with blank, lined pages allows you to personalize the book for your needs
  • What Do You Want to Do? chart inside the front cover helps you to quickly reference specific tasks

Kundrecensioner

Har du läst boken? Sätt ditt betyg »

Fler böcker av Bob Vachon

Övrig information

Bob Vachon is a professor in the Computer Systems Technology program at Cambrian College in Sudbury, Ontario, Canada, where he teaches networking infrastructure courses. He has worked and taught in the computer networking and information technology field since 1984. He has collaborated on various CCNA, CCNA Security, and CCNP projects for the Cisco Networking Academy as team lead, lead author, and subject matter expert. He enjoys playing the guitar and being outdoors.

Innehållsförteckning


Introduction xxi


Part I: Networking Security Fundamentals


Chapter 1 Networking Security Concepts 1


Basic Security Concepts 2


  Security Terminology 2


  Confidentiality, Integrity, and Availability (CIA) 2


  Data Classification Criteria 2


  Data Classification Levels 3


  Classification Roles 3


Threat Classification 3


  Trends in Information Security Threats 4


  Preventive, Detective, and Corrective Controls 4


  Risk Avoidance, Transfer, and Retention 4


Drivers for Network Security 5


  Evolution of Threats 5


  Data Loss and Exfiltration 5


  Tracking Threats 6


Malware 6


  Anatomy of a Worm 7


  Mitigating Malware and Worms 7


Threats in Borderless Networks 8


  Hacker Titles 8


  Thinking Like a Hacker 9


  Reconnaissance Attacks 9


  Access Attacks 10


  Password Cracking 11


  Denial-of-Service Attacks 11


  Distributed Denial-of-Service Attacks 12


  Tools Used by Attackers 13


Principles of Secure Network Design 13


  Defense in Depth 14


Chapter 2 Implementing Security Policies 15


Managing Risk 15


  Quantitative Risk Analysis Formula 16


  Quantitative Risk Analysis Example 17


  Regulatory Compliance 17


Security Policy 19


  Standards, Guidelines, and Procedures 20


  Security Policy Audience Responsibilities 21


  Security Awareness 21


Secure Network Lifecycle Management 22


  Models and Frameworks 23


 Assessing and Monitoring the Network Security Posture 23


  Testing the Security Architecture 24


Incident Response 24


  Incident Response Phases 24


  Computer Crime Investigation 25


  Collection of Evidence and Forensics 25


  Law Enforcement and Liability 25


  Ethics 25


Disaster-Recovery and Business-Continuity Planning 26


Chapter 3 Building a Security Strategy 27


Cisco Borderless Network Architecture 27


  Borderless Security Products 28


Cisco SecureX Architec...