CCNA Security Study Guide : Exam 210-260.
Lay the foundation for a successful career in network security CCNA Security Study Guide offers comprehensive review for Exam 210-260. Packed with concise explanations of core security concepts, this book is designed to help you successfully prepare for the exam. Expert instruction guides you throug...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Newark :
John Wiley & Sons, Incorporated,
2018.
|
Edición: | 2nd ed. |
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Intro
- Title Page
- Copyright
- Dedication
- Acknowledgments
- About the Author
- Introduction
- What Does This Book Cover?
- Interactive Online Learning Environment and Test Bank
- Who Should Read This Book
- How to Use This Book
- How Do You Go About Taking the Exam?
- Certification Exam Policies
- Assessment Test
- Answers to Assessment Test
- Chapter 1 Understanding Security Fundamentals
- Goals of Security
- Network Topologies
- Common Network Security Zones
- Summary
- Exam Essentials
- Review Questions
- Chapter 2 Understanding Security Threats
- Common Network Attacks
- Social Engineering
- Malware
- Data Loss and Exfiltration
- Summary
- Exam Essentials
- Review Questions
- Chapter 3 Understanding Cryptography
- Symmetric and Asymmetric Encryption
- Hashing Algorithms
- Key Exchange
- Public Key Infrastructure
- Summary
- Exam Essentials
- Review Questions
- Chapter 4 Securing the Routing Process
- Securing Router Access
- Implementing OSPF Routing Update Authentication
- Securing the Control Plane
- Summary
- Exam Essentials
- Review Questions
- Chapter 5 Understanding Layer 2 Attacks
- Understanding STP Attacks
- Understanding ARP Attacks
- Understanding MAC Attacks
- Understanding CAM Overflows
- Understanding CDP/LLDP Reconnaissance
- Understanding VLAN Hopping
- Understanding DHCP Spoofing
- Summary
- Exam Essentials
- Review Questions
- Chapter 6 Preventing Layer 2 Attacks
- Configuring DHCP Snooping
- Configuring Dynamic ARP Inspection
- Configuring Port Security
- Configuring STP Security Features
- Disabling DTP
- Verifying Mitigations
- Summary
- Exam Essentials
- Review Questions
- Chapter 7 VLAN Security
- Native VLANs
- PVLANs
- ACLs on Switches
- Summary
- Exam Essentials
- Review Questions
- Chapter 8 Securing Management Traffic.
- In-Band and Out-of-Band Management
- Securing Network Management
- Securing Access through SNMP v3
- Securing NTP
- Using SCP for File Transfer
- Summary
- Exam Essentials
- Review Questions
- Chapter 9 Understanding 802.1x and AAA
- 802.1x Components
- RADIUS and TACACS+ Technologies
- Configuring Administrative Access with TACACS+
- Understanding Authentication and Authorization Using ACS and ISE
- Understanding the Integration of Active Directory with AAA
- Summary
- Exam Essentials
- Review Questions
- Chapter 10 Securing a BYOD Initiative
- The BYOD Architecture Framework
- The Function of Mobile Device Management
- Summary
- Exam Essentials
- Review Questions
- Chapter 11 Understanding VPNs
- Understanding IPsec
- Understanding Advanced VPN Concepts
- Summary
- Exam Essentials
- Review Questions
- Chapter 12 Configuring VPNs
- Configuring Remote Access VPNs
- Configuring Site-to-Site VPNs
- Summary
- Exam Essentials
- Review Questions
- Chapter 13 Understanding Firewalls
- Understanding Firewall Technologies
- Stateful vs. Stateless Firewalls
- Summary
- Exam Essentials
- Review Questions
- Chapter 14 Configuring NAT and Zone-Based Firewalls
- Implementing NAT on ASA 9.x
- Configuring Zone-Based Firewalls
- Summary
- Exam Essentials
- Review Questions
- Chapter 15 Configuring the Firewall on an ASA
- Understanding Firewall Services
- Understanding Modes of Deployment
- Understanding Methods of Implementing High Availability
- Understanding Security Contexts
- Configuring ASA Management Access
- Configuring Cisco ASA Interface Security Levels
- Configuring Security Access Policies
- Configuring Default Cisco Modular Policy Framework (MPF)
- Summary
- Exam Essentials
- Review Questions
- Chapter 16 Intrusion Prevention
- IPS Terminology
- Evasion Techniques.
- Introducing Cisco FireSIGHT
- Understanding Modes of Deployment
- Positioning of the IPS within the Network
- Understanding False Positives, False Negatives, True Positives, and True Negatives
- Summary
- Exam Essentials
- Review Questions
- Chapter 17 Content and Endpoint Security
- Mitigating Email Threats
- Mitigating Web-Based Threats
- Mitigating Endpoint Threats
- Summary
- Exam Essentials
- Review Questions
- Appendix Answers to Review Questions
- Chapter 1: Understanding Security Fundamentals
- Chapter 2: Understanding Security Threats
- Chapter 3: Understanding Cryptography
- Chapter 4: Securing the Routing Process
- Chapter 5: Understanding Layer 2 Attacks
- Chapter 6: Preventing Layer 2 Attacks
- Chapter 7: VLAN Security
- Chapter 8: Securing Management Traffic
- Chapter 9: Understanding 802.1x and AAA
- Chapter 10: Securing a BYOD Initiative
- Chapter 11: Understanding VPNs
- Chapter 12: Configuring VPNs
- Chapter 13: Understanding Firewalls
- Chapter 14: Configuring NAT and Zone-Based Firewalls
- Chapter 15: Configuring the Firewall on an ASA
- Chapter 16: Intrusion Prevention
- Chapter 17: Content and Endpoint Security
- Advert
- EULA.