Cargando…

CCNA Security 210-260 Certification Guide : Build Your Knowledge of Network Security and Pass Your CCNA Security Exam (210-260).

With a CCNA Security certification, you can demonstrate the skills required to develop a security infrastructure, recognize threats to networks, and mitigate security threats. Geared towards Cisco Security, the practical aspects of this book will help you clear the CCNA Security Exam (210-260) by in...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Singh, Glen D.
Otros Autores: G, Michael Vinod, Anandh, Vijay
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham : Packt Publishing Ltd, 2018.
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Intro; Title Page; Copyright and Credits; Packt Upsell; Contributors; Table of Contents; Preface; Chapter 1: Exploring Security Threats; Important terms in network security; Threats; Vulnerability; Analyzing vulnerability; Introduction to an attack; Passive attacks; Active attacks; Spoofing attacks; Internet protocol
  • the heart of internet communication; How is an IP datagram spoofed?; IP spoofing; Scanning; Hijacking an online session; Flooding; ARP spoofing attacks; Mitigating ARP spoofing attacks; The DHCP process; Why DHCP snooping?; Trusted and untrusted sources; Ping of Death.
  • TCP SYN flood attacksPassword attacks; Buffer overflow attacks; Malware; Network security tools; Wireshark; Metasploit; Kali Linux; Summary; Chapter 2: Delving into Security Toolkits; Firewall functions; Rules of a firewall; Types of firewall; Packet-filtering firewall/stateless firewall; Circuit-level gateway firewall/stateful firewall; Application-layer firewall; Zone-based firewall; Intrusion prevention system ; Intrusion detection system ; Virtual Private Network; Benefits of VPN; Site-to-site VPNs; Remote-access VPN; Content security; Content Security Policy.
  • Cisco Email Security ApplianceCisco IronPort Web Security Appliance; Endpoint security; Summary; Chapter 3: Understanding Security Policies; Need for a security policy; Five steps for a security policy; Security policy components ; Best example for a security policy
  • a password policy; How to develop a policy; Risk; Risk analysis; Benefits of risk analysis; Quantitative risk; Qualitative risk; Vulnerability; Weakness in technology; Weakness in configuration; Weakness in a security policy; Threat; Threat consequence; Disclosure; Threat action
  • exposure; Threat action
  • interception.
  • Threat action
  • inferenceThreat action
  • intrusion; Deception; Threat action
  • masquerade; Threat action
  • falsification; Threat action
  • repudiation; Disruption; Threat action
  • incapacitation; Types of threat; Asset; Why classifying of assets is required; Identifying the asset; Asset accountability; Creating a plan for asset classification; Implementing the plan; Countermeasures; Zones; Planes; Data plane; Control plane; Management plane; Regulatory compliance; Payment Card Industry Data Security Standard (PCI DSS); Health Insurance Portability and Accountability Act (HIPAA).
  • Sarbanes-Oxley Act (SOX)Federal Information Security Management Act (FISMA); GLBA; PIPED Act; Data Protection Directive; Digital Millennium Copyright Act (DMCA); Safe Harbor Act; Summary; Chapter 4: Deep Diving into Cryptography; What is cryptography?; Objectives of cryptography; Confidentiality ; Data integrity; Authentication; Non-repudiation; Terminologies; Types of encryption; Symmetric encryption; Asymmetric encryption; Types of cipher; Substitution cipher; Transposition cipher; Block ciphers; Stream ciphers; Key; Encryption algorithms; Data Encryption Standard.