Contents

Introduction

Part I Network Concepts

Chapter 1 Fundamentals of Networking Protocols and Networking Devices

“Do I Know This Already?” Quiz

Foundation Topics

TCP/IP and OSI Model

TCP/IP Model

TCP/IP Model Encapsulation

Networking Communication with the TCP/IP Model

Open System Interconnection Model

Layer 2 Fundamentals and Technologies

Ethernet LAN Fundamentals and Technologies

Ethernet Physical Layer

Ethernet Medium Access Control

Ethernet Frame

Ethernet Addresses

Ethernet Devices and Frame-Forwarding Behavior

LAN Hubs and Bridges

LAN Switches

Link Layer Loop and Spanning Tree Protocols

Virtual LAN (VLAN) and VLAN Trunking

Cisco VLAN Trunking Protocol

Inter-VLAN Traffic and Multilayer Switches

Wireless LAN Fundamentals and Technologies

802.11 Architecture and Basic Concepts

802.11 Frame

WLAN Access Point Types and Management

Internet Protocol and Layer 3 Technologies

IPv4 Header

IPv4 Fragmentation

IPv4 Addresses and Addressing Architecture

IP Network Subnetting and Classless Interdomain Routing (CIDR)

Variable-Length Subnet Mask (VLSM)

Public and Private IP Addresses

Special and Reserved IPv4 Addresses

IP Addresses Assignment and DHCP

IP Communication Within a Subnet and Address Resolution Protocol (ARP)

Intersubnet IP Packet Routing

Routing Tables and IP Routing Protocols

Distance Vector

Advanced Distance Vector or Hybrid

Link-State

Using Multiple Routing Protocols

Internet Control Message Protocol (ICMP)

Domain Name System (DNS)

IPv6 Fundamentals

IPv6 Header

IPv6 Addressing and Subnets

Special and Reserved IPv6 Addresses

IPv6 Addresses Assignment, Neighbor Discovery Protocol, and DHCPv6

Transport Layer Technologies and Protocols

Transmission Control Protocol (TCP)

TCP Header

TCP Connection Establishment and Termination

TCP Socket

TCP Error Detection and Recovery

TCP Flow Control

User Datagram Protocol (UDP)

UDP Header

UDP Socket and Known UDP Application

Exam Preparation Tasks

Review All Key Topics

Complete Tables and Lists from Memory

Define Key Terms

Q&A

References and Further Reading

Chapter 2 Network Security Devices and Cloud Services

“Do I Know This Already?” Quiz

Foundation Topics

Network Security Systems

Traditional Firewalls

Packet-Filtering Techniques

Application Proxies

Network Address Translation

Port Address Translation

Static Translation

Stateful Inspection Firewalls

Demilitarized Zones

Firewalls Provide Network Segmentation

High Availability

Firewalls in the Data Center

Virtual Firewalls

Deep Packet Inspection

Next-Generation Firewalls

Cisco Firepower Threat Defense

Personal Firewalls

Intrusion Detection Systems and Intrusion Prevention Systems

Pattern Matching and Stateful Pattern-Matching Recognition

Protocol Analysis

Heuristic-Based Analysis

Anomaly-Based Analysis

Global Threat Correlation Capabilities

Next-Generation Intrusion Prevention Systems

Firepower Management Center

Advance Malware Protection

AMP for Endpoints

AMP for Networks

Web Security Appliance

Email Security Appliance

Cisco Security Management Appliance

Cisco Identity Services Engine

Security Cloud-based Solutions

Cisco Cloud Web Security

Cisco Cloud Email Security

Cisco AMP Threat Grid

Cisco Threat Awareness Service

OpenDNS

CloudLock

Cisco NetFlow

What Is the Flow in NetFlow?

NetFlow vs. Full Packet Capture

The NetFlow Cache

Data Loss Prevention

Exam Preparation Tasks

Review All Key Topics

Complete Tables and Lists from Memory

Define Key Terms

Q&A

Part II Security Concepts

Chapter 3 Security Principles

“Do I Know This Already?” Quiz

Foundation Topics

The Principles of the Defense-in-Depth Strategy

What Are Threats, Vulnerabilities, and Exploits?

Vulnerabilities

Threats

Threat Actors

Threat Intelligence

Exploits

Confidentiality, Integrity, and Availability: The CIA Triad

Confidentiality

Integrity

Availability

Risk and Risk Analysis

Personally Identifiable Information and Protected Health Information

PII

PHI

Principle of Least Privilege and Separation of Duties

Principle of Least Privilege

Separation of Duties

Security Operation Centers

Runbook Automation

Forensics

Evidentiary Chain of Custody

Reverse Engineering

Exam Preparation Tasks

Review All Key Topics

Define Key Terms

Q&A

Chapter 4 Introduction to Access Controls

“Do I Know This Already?” Quiz

Foundation Topics

Information Security Principles

Subject and Object Definition

Access Control Fundamentals

Identification

Authentication

Authentication by Knowledge

Authentication by Ownership

Authentication by Characteristic

Multifactor Authentication

Authorization

Accounting

Access Control Fundamentals: Summary

Access Control Process

Asset Classification

Asset Marking

Access Control Policy

Data Disposal

Information Security Roles and Responsibilities

Access Control Types

Access Control Models

Discretionary Access Control

Mandatory Access Control

Role-Based Access Control

Attribute-Based Access Control

Access Control Mechanisms

Identity and Access Control Implementation

Authentication, Authorization, and Accounting Protocols

RADIUS

TACACS+

Diameter

Port-Based Access Control

Port Security

802.1x

Network Access Control List and Firewalling

VLAN Map

Security Group–Based ACL

Downloadable ACL

Firewalling

Identity Management and Profiling

Network Segmentation

Network Segmentation Through VLAN

Firewall DMZ

Cisco TrustSec

Intrusion Detection and Prevention

Network-Based Intrusion Detection and Protection System

Host-Based Intrusion Detection and Prevention

Antivirus and Antimalware

Exam Preparation Tasks

Review All Key Topics

Complete Tables and Lists from Memory

Define Key Terms

Q&A

References and Additional Reading

Chapter 5 Introduction to Security Operations Management

“Do I Know This Already?” Quiz

Foundation Topics

Introduction to Identity and Access Management

Phases of the Identity and Access Lifecycle

Registration and Identity Validation

Privileges Provisioning

Access Review

Access Revocation

Password Management

Password Creation

Password Storage and Transmission

Password Reset

Password Synchronization

Directory Management

Single Sign-On

Kerberos

Federated SSO

Security Assertion Markup Language

OAuth

OpenID Connect

Security Events and Logs Management

Logs Collection, Analysis, and Disposal

Syslog

Security Information and Event Manager

Assets Management

Assets Inventory

Assets Ownership

Assets Acceptable Use and Return Policies

Assets Classification

Assets Labeling

Assets and Information Handling

Media Management

Introduction to Enterprise Mobility Management

Mobile Device Management

Cisco BYOD Architecture

Cisco ISE and MDM Integration

Cisco Meraki Enterprise Mobility Management

Configuration and Change Management

Configuration Management

Change Management

Vulnerability Management

Vulnerability Identification

Finding Information about a Vulnerability

Vulnerability Scan

Penetration Assessment

Product Vulnerability Management

Vulnerability Analysis and Prioritization

Vulnerability Remediation

Patch Management

References and Additional Readings

Exam Preparation Tasks

Review All Key Topics

Complete Tables and Lists from Memory

Define Key Terms

Q&A

Part III Cryptography

Chapter 6 Fundamentals of Cryptography and Public Key Infrastructure (PKI)

“Do I Know This Already?” Quiz

Foundation Topics

Cryptography

Ciphers and Keys

Ciphers

Keys

Block and Stream Ciphers

Symmetric and Asymmetric Algorithms

Symmetric Algorithms

Asymmetric Algorithms

Hashes

Hashed Message Authentication Code

Digital Signatures

Digital Signatures in Action

Key Management

Next-Generation Encryption Protocols

IPsec and SSL

IPsec

SSL

Fundamentals of PKI

Public and Private Key Pairs

RSA Algorithm, the Keys, and Digital Certificates

Certificate Authorities

Root and Identity Certificates

Root Certificate

Identity Certificate

X.500 and X.509v3 Certificates

Authenticating and Enrolling with the CA

Public Key Cryptography Standards

Simple Certificate Enrollment Protocol

Revoking Digital Certificates

Using Digital Certificates

PKI Topologies

Single Root CA

Hierarchical CA with Subordinate CAs

Cross-certifying CAs

Exam Preparation Tasks

Review All Key Topics

Complete Tables and Lists from Memory

Define Key Terms

Q&A

Chapter 7 Introduction to Virtual Private Networks (VPNs)

“Do I Know This Already?” Quiz

Foundation Topics

What Are VPNs?

Site-to-site vs. Remote-Access VPNs

An Overview of IPsec

IKEv1 Phase 1

IKEv1 Phase 2

IKEv2

SSL VPNs

SSL VPN Design Considerations

User Connectivity

VPN Device Feature Set

Infrastructure Planning

Implementation Scope

Exam Preparation Tasks

Review All Key Topics

Complete Tables and Lists from Memory

Define Key Terms

Q&A

Part IV Host-Based Analysis

Chapter 8 Windows-Based Analysis

“Do I Know This Already?” Quiz

Foundation Topics

Process and Threads

Memory Allocation

Windows Registration

Windows Management Instrumentation

Handles

Services

Windows Event Logs

Exam Preparation Tasks

Review All Key Topics

Define Key Terms

Q&A

References and Further Reading

Chapter 9 Linux- and Mac OS X–Based Analysis

“Do I Know This Already?” Quiz

Foundation Topics

Processes

Forks

Permissions

Symlinks

Daemons

UNIX-Based Syslog

Apache Access Logs

Exam Preparation Tasks

Review All Key Topics

Complete Tables and Lists from Memory

Define Key Terms

Q&A

References and Further Reading

Chapter 10 Endpoint Security Technologies

“Do I Know This Already?” Quiz

Foundation Topics

Antimalware and Antivirus Software

Host-Based Firewalls and Host-Based Intrusion Prevention

Application-Level Whitelisting and Blacklisting

System-Based Sandboxing

Exam Preparation Tasks

Review All Key Topics

Complete Tables and Lists from Memory

Define Key Terms

Q&A

Part V Security Monitoring and Attack Methods

Chapter 11 Network and Host Telemetry

“Do I Know This Already?” Quiz

Foundation Topics

Network Telemetry

Network Infrastructure Logs

Network Time Protocol and Why It Is Important

Configuring Syslog in a Cisco Router or Switch

Traditional Firewall Logs

Console Logging

Terminal Logging

ASDM Logging

Email Logging

Syslog Server Logging

SNMP Trap Logging

Buffered Logging

Configuring Logging on the Cisco ASA

Syslog in Large Scale Environments

Splunk

Graylog

Elasticsearch, Logstash, and Kibana (ELK) Stack

Next-Generation Firewall and Next-Generation IPS Logs

NetFlow Analysis

Commercial NetFlow Analysis Tools

Open Source NetFlow Analysis Tools

Counting, Grouping, and Mating NetFlow Records with Silk

Big Data Analytics for Cyber Security Network Telemetry

Configuring Flexible NetFlow in Cisco IOS and Cisco IOS-XE Devices

Cisco Application Visibility and Control (AVC)

Network Packet Capture

tcpdump

Wireshark

Cisco Prime Infrastructure

Host Telemetry

Logs from User Endpoints

Logs from Servers

Exam Preparation Tasks

Review All Key Topics

Complete Tables and Lists from Memory

Define Key Terms

Q&A

Chapter 12 Security Monitoring Operational Challenges

“Do I Know This Already?” Quiz

Foundation Topics

Security Monitoring and Encryption

Security Monitoring and Network Address Translation

Security Monitoring and Event Correlation Time Synchronization

DNS Tunneling and Other Exfiltration Methods

Security Monitoring and Tor

Security Monitoring and Peer-to-Peer Communication

Exam Preparation Tasks

Review All Key Topics

Define Key Terms

Q&A

Chapter 13 Types of Attacks and Vulnerabilities

“Do I Know This Already?” Quiz

Foundation Topics

Types of Attacks

Reconnaissance Attacks

Social Engineering

Privilege Escalation Attacks

Backdoors

Code Execution

Man-in-the Middle Attacks

Denial-of-Service Attacks

Direct DDoS

Botnets Participating in DDoS Attacks

Reflected DDoS Attacks

Attack Methods for Data Exfiltration

ARP Cache Poisoning

Spoofing Attacks

Route Manipulation Attacks

Password Attacks

Wireless Attacks

Types of Vulnerabilities

Exam Preparation Tasks

Review All Key Topics

Define Key Terms

Q&A

Chapter 14 Security Evasion Techniques

“Do I Know This Already?” Quiz

Foundation Topics

Encryption and Tunneling

Key Encryption and Tunneling Concepts

Resource Exhaustion

Traffic Fragmentation

Protocol-Level Misinterpretation

Traffic Timing, Substitution, and Insertion

Pivoting

Exam Preparation Tasks

Review All Key Topics

Complete Tables and Lists from Memory

Define Key Terms

Q&A

References and Further Reading

Part VI Final Preparation

Chapter 15 Final Preparation

Tools for Final Preparation

Pearson Cert Practice Test Engine and Questions on the Website

Accessing the Pearson Test Prep Software Online

Accessing the Pearson Test Prep Software Offline

Customizing Your Exams

Updating Your Exams

Premium Edition

The Cisco Learning Network

Memory Tables

Chapter-Ending Review Tools

Suggested Plan for Final Review/Study

Summary

Part VII Appendixes

Appendix A Answers to the “Do I Know This Already?” Quizzes and Q&A Questions

Glossary

Index

Elements Available on the Book Website

Appendix B Memory Tables

Appendix C Memory Tables Answer Key

Appendix D Study Planner

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.221.239.148