Loading…

CCNA Security Study Guide : Exam 210-260.

Lay the foundation for a successful career in network security CCNA Security Study Guide offers comprehensive review for Exam 210-260. Packed with concise explanations of core security concepts, this book is designed to help you successfully prepare for the exam. Expert instruction guides you throug...

Full description

Bibliographic Details
Call Number:Libro Electrónico
Main Author: McMillan, Troy
Format: Electronic eBook
Language:Inglés
Published: Newark : John Wiley & Sons, Incorporated, 2018.
Edition:2nd ed.
Subjects:
Online Access:Texto completo
Table of Contents:
  • Intro
  • Title Page
  • Copyright
  • Dedication
  • Acknowledgments
  • About the Author
  • Introduction
  • What Does This Book Cover?
  • Interactive Online Learning Environment and Test Bank
  • Who Should Read This Book
  • How to Use This Book
  • How Do You Go About Taking the Exam?
  • Certification Exam Policies
  • Assessment Test
  • Answers to Assessment Test
  • Chapter 1 Understanding Security Fundamentals
  • Goals of Security
  • Network Topologies
  • Common Network Security Zones
  • Summary
  • Exam Essentials
  • Review Questions
  • Chapter 2 Understanding Security Threats
  • Common Network Attacks
  • Social Engineering
  • Malware
  • Data Loss and Exfiltration
  • Summary
  • Exam Essentials
  • Review Questions
  • Chapter 3 Understanding Cryptography
  • Symmetric and Asymmetric Encryption
  • Hashing Algorithms
  • Key Exchange
  • Public Key Infrastructure
  • Summary
  • Exam Essentials
  • Review Questions
  • Chapter 4 Securing the Routing Process
  • Securing Router Access
  • Implementing OSPF Routing Update Authentication
  • Securing the Control Plane
  • Summary
  • Exam Essentials
  • Review Questions
  • Chapter 5 Understanding Layer 2 Attacks
  • Understanding STP Attacks
  • Understanding ARP Attacks
  • Understanding MAC Attacks
  • Understanding CAM Overflows
  • Understanding CDP/LLDP Reconnaissance
  • Understanding VLAN Hopping
  • Understanding DHCP Spoofing
  • Summary
  • Exam Essentials
  • Review Questions
  • Chapter 6 Preventing Layer 2 Attacks
  • Configuring DHCP Snooping
  • Configuring Dynamic ARP Inspection
  • Configuring Port Security
  • Configuring STP Security Features
  • Disabling DTP
  • Verifying Mitigations
  • Summary
  • Exam Essentials
  • Review Questions
  • Chapter 7 VLAN Security
  • Native VLANs
  • PVLANs
  • ACLs on Switches
  • Summary
  • Exam Essentials
  • Review Questions
  • Chapter 8 Securing Management Traffic.
  • In-Band and Out-of-Band Management
  • Securing Network Management
  • Securing Access through SNMP v3
  • Securing NTP
  • Using SCP for File Transfer
  • Summary
  • Exam Essentials
  • Review Questions
  • Chapter 9 Understanding 802.1x and AAA
  • 802.1x Components
  • RADIUS and TACACS+ Technologies
  • Configuring Administrative Access with TACACS+
  • Understanding Authentication and Authorization Using ACS and ISE
  • Understanding the Integration of Active Directory with AAA
  • Summary
  • Exam Essentials
  • Review Questions
  • Chapter 10 Securing a BYOD Initiative
  • The BYOD Architecture Framework
  • The Function of Mobile Device Management
  • Summary
  • Exam Essentials
  • Review Questions
  • Chapter 11 Understanding VPNs
  • Understanding IPsec
  • Understanding Advanced VPN Concepts
  • Summary
  • Exam Essentials
  • Review Questions
  • Chapter 12 Configuring VPNs
  • Configuring Remote Access VPNs
  • Configuring Site-to-Site VPNs
  • Summary
  • Exam Essentials
  • Review Questions
  • Chapter 13 Understanding Firewalls
  • Understanding Firewall Technologies
  • Stateful vs. Stateless Firewalls
  • Summary
  • Exam Essentials
  • Review Questions
  • Chapter 14 Configuring NAT and Zone-Based Firewalls
  • Implementing NAT on ASA 9.x
  • Configuring Zone-Based Firewalls
  • Summary
  • Exam Essentials
  • Review Questions
  • Chapter 15 Configuring the Firewall on an ASA
  • Understanding Firewall Services
  • Understanding Modes of Deployment
  • Understanding Methods of Implementing High Availability
  • Understanding Security Contexts
  • Configuring ASA Management Access
  • Configuring Cisco ASA Interface Security Levels
  • Configuring Security Access Policies
  • Configuring Default Cisco Modular Policy Framework (MPF)
  • Summary
  • Exam Essentials
  • Review Questions
  • Chapter 16 Intrusion Prevention
  • IPS Terminology
  • Evasion Techniques.
  • Introducing Cisco FireSIGHT
  • Understanding Modes of Deployment
  • Positioning of the IPS within the Network
  • Understanding False Positives, False Negatives, True Positives, and True Negatives
  • Summary
  • Exam Essentials
  • Review Questions
  • Chapter 17 Content and Endpoint Security
  • Mitigating Email Threats
  • Mitigating Web-Based Threats
  • Mitigating Endpoint Threats
  • Summary
  • Exam Essentials
  • Review Questions
  • Appendix Answers to Review Questions
  • Chapter 1: Understanding Security Fundamentals
  • Chapter 2: Understanding Security Threats
  • Chapter 3: Understanding Cryptography
  • Chapter 4: Securing the Routing Process
  • Chapter 5: Understanding Layer 2 Attacks
  • Chapter 6: Preventing Layer 2 Attacks
  • Chapter 7: VLAN Security
  • Chapter 8: Securing Management Traffic
  • Chapter 9: Understanding 802.1x and AAA
  • Chapter 10: Securing a BYOD Initiative
  • Chapter 11: Understanding VPNs
  • Chapter 12: Configuring VPNs
  • Chapter 13: Understanding Firewalls
  • Chapter 14: Configuring NAT and Zone-Based Firewalls
  • Chapter 15: Configuring the Firewall on an ASA
  • Chapter 16: Intrusion Prevention
  • Chapter 17: Content and Endpoint Security
  • Advert
  • EULA.