Cargando…

CCNA Security Study Guide : Exam 210-260.

Lay the foundation for a successful career in network security CCNA Security Study Guide offers comprehensive review for Exam 210-260. Packed with concise explanations of core security concepts, this book is designed to help you successfully prepare for the exam. Expert instruction guides you throug...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: McMillan, Troy
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Newark : John Wiley & Sons, Incorporated, 2018.
Edición:2nd ed.
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Intro
  • Title Page
  • Copyright
  • Dedication
  • Acknowledgments
  • About the Author
  • Introduction
  • What Does This Book Cover?
  • Interactive Online Learning Environment and Test Bank
  • Who Should Read This Book
  • How to Use This Book
  • How Do You Go About Taking the Exam?
  • Certification Exam Policies
  • Assessment Test
  • Answers to Assessment Test
  • Chapter 1 Understanding Security Fundamentals
  • Goals of Security
  • Network Topologies
  • Common Network Security Zones
  • Summary
  • Exam Essentials
  • Review Questions
  • Chapter 2 Understanding Security Threats
  • Common Network Attacks
  • Social Engineering
  • Malware
  • Data Loss and Exfiltration
  • Summary
  • Exam Essentials
  • Review Questions
  • Chapter 3 Understanding Cryptography
  • Symmetric and Asymmetric Encryption
  • Hashing Algorithms
  • Key Exchange
  • Public Key Infrastructure
  • Summary
  • Exam Essentials
  • Review Questions
  • Chapter 4 Securing the Routing Process
  • Securing Router Access
  • Implementing OSPF Routing Update Authentication
  • Securing the Control Plane
  • Summary
  • Exam Essentials
  • Review Questions
  • Chapter 5 Understanding Layer 2 Attacks
  • Understanding STP Attacks
  • Understanding ARP Attacks
  • Understanding MAC Attacks
  • Understanding CAM Overflows
  • Understanding CDP/LLDP Reconnaissance
  • Understanding VLAN Hopping
  • Understanding DHCP Spoofing
  • Summary
  • Exam Essentials
  • Review Questions
  • Chapter 6 Preventing Layer 2 Attacks
  • Configuring DHCP Snooping
  • Configuring Dynamic ARP Inspection
  • Configuring Port Security
  • Configuring STP Security Features
  • Disabling DTP
  • Verifying Mitigations
  • Summary
  • Exam Essentials
  • Review Questions
  • Chapter 7 VLAN Security
  • Native VLANs
  • PVLANs
  • ACLs on Switches
  • Summary
  • Exam Essentials
  • Review Questions
  • Chapter 8 Securing Management Traffic.
  • In-Band and Out-of-Band Management
  • Securing Network Management
  • Securing Access through SNMP v3
  • Securing NTP
  • Using SCP for File Transfer
  • Summary
  • Exam Essentials
  • Review Questions
  • Chapter 9 Understanding 802.1x and AAA
  • 802.1x Components
  • RADIUS and TACACS+ Technologies
  • Configuring Administrative Access with TACACS+
  • Understanding Authentication and Authorization Using ACS and ISE
  • Understanding the Integration of Active Directory with AAA
  • Summary
  • Exam Essentials
  • Review Questions
  • Chapter 10 Securing a BYOD Initiative
  • The BYOD Architecture Framework
  • The Function of Mobile Device Management
  • Summary
  • Exam Essentials
  • Review Questions
  • Chapter 11 Understanding VPNs
  • Understanding IPsec
  • Understanding Advanced VPN Concepts
  • Summary
  • Exam Essentials
  • Review Questions
  • Chapter 12 Configuring VPNs
  • Configuring Remote Access VPNs
  • Configuring Site-to-Site VPNs
  • Summary
  • Exam Essentials
  • Review Questions
  • Chapter 13 Understanding Firewalls
  • Understanding Firewall Technologies
  • Stateful vs. Stateless Firewalls
  • Summary
  • Exam Essentials
  • Review Questions
  • Chapter 14 Configuring NAT and Zone-Based Firewalls
  • Implementing NAT on ASA 9.x
  • Configuring Zone-Based Firewalls
  • Summary
  • Exam Essentials
  • Review Questions
  • Chapter 15 Configuring the Firewall on an ASA
  • Understanding Firewall Services
  • Understanding Modes of Deployment
  • Understanding Methods of Implementing High Availability
  • Understanding Security Contexts
  • Configuring ASA Management Access
  • Configuring Cisco ASA Interface Security Levels
  • Configuring Security Access Policies
  • Configuring Default Cisco Modular Policy Framework (MPF)
  • Summary
  • Exam Essentials
  • Review Questions
  • Chapter 16 Intrusion Prevention
  • IPS Terminology
  • Evasion Techniques.
  • Introducing Cisco FireSIGHT
  • Understanding Modes of Deployment
  • Positioning of the IPS within the Network
  • Understanding False Positives, False Negatives, True Positives, and True Negatives
  • Summary
  • Exam Essentials
  • Review Questions
  • Chapter 17 Content and Endpoint Security
  • Mitigating Email Threats
  • Mitigating Web-Based Threats
  • Mitigating Endpoint Threats
  • Summary
  • Exam Essentials
  • Review Questions
  • Appendix Answers to Review Questions
  • Chapter 1: Understanding Security Fundamentals
  • Chapter 2: Understanding Security Threats
  • Chapter 3: Understanding Cryptography
  • Chapter 4: Securing the Routing Process
  • Chapter 5: Understanding Layer 2 Attacks
  • Chapter 6: Preventing Layer 2 Attacks
  • Chapter 7: VLAN Security
  • Chapter 8: Securing Management Traffic
  • Chapter 9: Understanding 802.1x and AAA
  • Chapter 10: Securing a BYOD Initiative
  • Chapter 11: Understanding VPNs
  • Chapter 12: Configuring VPNs
  • Chapter 13: Understanding Firewalls
  • Chapter 14: Configuring NAT and Zone-Based Firewalls
  • Chapter 15: Configuring the Firewall on an ASA
  • Chapter 16: Intrusion Prevention
  • Chapter 17: Content and Endpoint Security
  • Advert
  • EULA.