Cargando…

CCNA Security 210-260 Certification Guide : Build Your Knowledge of Network Security and Pass Your CCNA Security Exam (210-260).

With a CCNA Security certification, you can demonstrate the skills required to develop a security infrastructure, recognize threats to networks, and mitigate security threats. Geared towards Cisco Security, the practical aspects of this book will help you clear the CCNA Security Exam (210-260) by in...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Singh, Glen D.
Otros Autores: G, Michael Vinod, Anandh, Vijay
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham : Packt Publishing Ltd, 2018.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Mi 4500
001 EBOOKCENTRAL_on1042318729
003 OCoLC
005 20240329122006.0
006 m o d
007 cr |n|---|||||
008 180707s2018 enk o 000 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d MERUC  |d IDB  |d NLE  |d UKMGB  |d OCLCQ  |d RDF  |d OCLCO  |d OCLCF  |d OCLCQ  |d K6U  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL 
016 7 |a 018923025  |2 Uk 
020 |a 9781787124585 
020 |a 1787124584 
029 1 |a AU@  |b 000066229945 
029 1 |a UKMGB  |b 018923025 
035 |a (OCoLC)1042318729 
037 |a 9781787124585  |b Packt Publishing 
050 4 |a T57.85  |b .S564 2018eb 
082 0 4 |a 658.4032  |2 23 
049 |a UAMI 
100 1 |a Singh, Glen D. 
245 1 0 |a CCNA Security 210-260 Certification Guide :  |b Build Your Knowledge of Network Security and Pass Your CCNA Security Exam (210-260). 
260 |a Birmingham :  |b Packt Publishing Ltd,  |c 2018. 
300 |a 1 online resource (509 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Print version record. 
505 0 |a Intro; Title Page; Copyright and Credits; Packt Upsell; Contributors; Table of Contents; Preface; Chapter 1: Exploring Security Threats; Important terms in network security; Threats; Vulnerability; Analyzing vulnerability; Introduction to an attack; Passive attacks; Active attacks; Spoofing attacks; Internet protocol -- the heart of internet communication; How is an IP datagram spoofed?; IP spoofing; Scanning; Hijacking an online session; Flooding; ARP spoofing attacks; Mitigating ARP spoofing attacks; The DHCP process; Why DHCP snooping?; Trusted and untrusted sources; Ping of Death. 
505 8 |a TCP SYN flood attacksPassword attacks; Buffer overflow attacks; Malware; Network security tools; Wireshark; Metasploit; Kali Linux; Summary; Chapter 2: Delving into Security Toolkits; Firewall functions; Rules of a firewall; Types of firewall; Packet-filtering firewall/stateless firewall; Circuit-level gateway firewall/stateful firewall; Application-layer firewall; Zone-based firewall; Intrusion prevention system ; Intrusion detection system ; Virtual Private Network; Benefits of VPN; Site-to-site VPNs; Remote-access VPN; Content security; Content Security Policy. 
505 8 |a Cisco Email Security ApplianceCisco IronPort Web Security Appliance; Endpoint security; Summary; Chapter 3: Understanding Security Policies; Need for a security policy; Five steps for a security policy; Security policy components ; Best example for a security policy -- a password policy; How to develop a policy; Risk; Risk analysis; Benefits of risk analysis; Quantitative risk; Qualitative risk; Vulnerability; Weakness in technology; Weakness in configuration; Weakness in a security policy; Threat; Threat consequence; Disclosure; Threat action -- exposure; Threat action -- interception. 
505 8 |a Threat action -- inferenceThreat action -- intrusion; Deception; Threat action -- masquerade; Threat action -- falsification; Threat action -- repudiation; Disruption; Threat action -- incapacitation; Types of threat; Asset; Why classifying of assets is required; Identifying the asset; Asset accountability; Creating a plan for asset classification; Implementing the plan; Countermeasures; Zones; Planes; Data plane; Control plane; Management plane; Regulatory compliance; Payment Card Industry Data Security Standard (PCI DSS); Health Insurance Portability and Accountability Act (HIPAA). 
505 8 |a Sarbanes-Oxley Act (SOX)Federal Information Security Management Act (FISMA); GLBA; PIPED Act; Data Protection Directive; Digital Millennium Copyright Act (DMCA); Safe Harbor Act; Summary; Chapter 4: Deep Diving into Cryptography; What is cryptography?; Objectives of cryptography; Confidentiality ; Data integrity; Authentication; Non-repudiation; Terminologies; Types of encryption; Symmetric encryption; Asymmetric encryption; Types of cipher; Substitution cipher; Transposition cipher; Block ciphers; Stream ciphers; Key; Encryption algorithms; Data Encryption Standard. 
500 |a Triple Data Encryption Standard (3DES). 
520 |a With a CCNA Security certification, you can demonstrate the skills required to develop a security infrastructure, recognize threats to networks, and mitigate security threats. Geared towards Cisco Security, the practical aspects of this book will help you clear the CCNA Security Exam (210-260) by increasing your knowledge of Network Security. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Network analysis (Planning) 
650 6 |a Analyse de réseau (Planification) 
650 7 |a Network analysis (Planning)  |2 fast 
700 1 |a G, Michael Vinod. 
700 1 |a Anandh, Vijay. 
758 |i has work:  |a CCNA SECURITY 210-260 CERTIFICATION GUIDE;BUILD YOUR KNOWLEDGE OF NETWORK SECURITY AND PASS YOUR CCNA SECURITY EXAM (210-260) (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCXK878K4fJcqgG6CJ6XBMX  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Singh, Glen D.  |t CCNA Security 210-260 Certification Guide : Build Your Knowledge of Network Security and Pass Your CCNA Security Exam (210-260).  |d Birmingham : Packt Publishing Ltd, ©2018  |z 9781787128873 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=5434472  |z Texto completo 
938 |a EBL - Ebook Library  |b EBLB  |n EBL5434472 
994 |a 92  |b IZTAP