Home Page Icon
Home Page
Table of Contents for
EULA
Close
EULA
by Troy McMillan
CCNA Security Study Guide, 2nd Edition
Acknowledgments
About the Author
Introduction
What Does This Book Cover?
Interactive Online Learning Environment and Test Bank
Who Should Read This Book
How to Use This Book
How Do You Go About Taking the Exam?
Certification Exam Policies
Assessment Test
Answers to Assessment Test
Chapter 1 Understanding Security Fundamentals
Goals of Security
Network Topologies
Common Network Security Zones
Summary
Exam Essentials
Review Questions
Chapter 2 Understanding Security Threats
Common Network Attacks
Social Engineering
Malware
Data Loss and Exfiltration
Summary
Exam Essentials
Review Questions
Chapter 3 Understanding Cryptography
Symmetric and Asymmetric Encryption
Hashing Algorithms
Key Exchange
Public Key Infrastructure
Summary
Exam Essentials
Review Questions
Chapter 4 Securing the Routing Process
Securing Router Access
Implementing OSPF Routing Update Authentication
Securing the Control Plane
Summary
Exam Essentials
Review Questions
Chapter 5 Understanding Layer 2 Attacks
Understanding STP Attacks
Understanding ARP Attacks
Understanding MAC Attacks
Understanding CAM Overflows
Understanding CDP/LLDP Reconnaissance
Understanding VLAN Hopping
Understanding DHCP Spoofing
Summary
Exam Essentials
Review Questions
Chapter 6 Preventing Layer 2 Attacks
Configuring DHCP Snooping
Configuring Dynamic ARP Inspection
Configuring Port Security
Configuring STP Security Features
Disabling DTP
Verifying Mitigations
Summary
Exam Essentials
Review Questions
Chapter 7 VLAN Security
Native VLANs
PVLANs
ACLs on Switches
Summary
Exam Essentials
Review Questions
Chapter 8 Securing Management Traffic
In-Band and Out-of-Band Management
Securing Network Management
Securing Access through SNMP v3
Securing NTP
Using SCP for File Transfer
Summary
Exam Essentials
Review Questions
Chapter 9 Understanding 802.1x and AAA
802.1x Components
RADIUS and TACACS+ Technologies
Configuring Administrative Access with TACACS+
Understanding Authentication and Authorization Using ACS and ISE
Understanding the Integration of Active Directory with AAA
Summary
Exam Essentials
Review Questions
Chapter 10 Securing a BYOD Initiative
The BYOD Architecture Framework
The Function of Mobile Device Management
Summary
Exam Essentials
Review Questions
Chapter 11 Understanding VPNs
Understanding IPsec
Understanding Advanced VPN Concepts
Summary
Exam Essentials
Review Questions
Chapter 12 Configuring VPNs
Configuring Remote Access VPNs
Configuring Site-to-Site VPNs
Summary
Exam Essentials
Review Questions
Chapter 13 Understanding Firewalls
Understanding Firewall Technologies
Stateful vs. Stateless Firewalls
Summary
Exam Essentials
Review Questions
Chapter 14 Configuring NAT and Zone-Based Firewalls
Implementing NAT on ASA 9.x
Configuring Zone-Based Firewalls
Summary
Exam Essentials
Review Questions
Chapter 15 Configuring the Firewall on an ASA
Understanding Firewall Services
Understanding Modes of Deployment
Understanding Methods of Implementing High Availability
Understanding Security Contexts
Configuring ASA Management Access
Configuring Cisco ASA Interface Security Levels
Configuring Security Access Policies
Configuring Default Cisco Modular Policy Framework (MPF)
Summary
Exam Essentials
Review Questions
Chapter 16 Intrusion Prevention
IPS Terminology
Evasion Techniques
Introducing Cisco FireSIGHT
Understanding Modes of Deployment
Positioning of the IPS within the Network
Understanding False Positives, False Negatives, True Positives, and True Negatives
Summary
Exam Essentials
Review Questions
Chapter 17 Content and Endpoint Security
Mitigating Email Threats
Mitigating Web-Based Threats
Mitigating Endpoint Threats
Summary
Exam Essentials
Review Questions
Appendix Answers to Review Questions
Chapter 1: Understanding Security Fundamentals
Chapter 2: Understanding Security Threats
Chapter 3: Understanding Cryptography
Chapter 4: Securing the Routing Process
Chapter 5: Understanding Layer 2 Attacks
Chapter 6: Preventing Layer 2 Attacks
Chapter 7: VLAN Security
Chapter 8: Securing Management Traffic
Chapter 9: Understanding 802.1x and AAA
Chapter 10: Securing a BYOD Initiative
Chapter 11: Understanding VPNs
Chapter 12: Configuring VPNs
Chapter 13: Understanding Firewalls
Chapter 14: Configuring NAT and Zone-Based Firewalls
Chapter 15: Configuring the Firewall on an ASA
Chapter 16: Intrusion Prevention
Chapter 17: Content and Endpoint Security
Advert
EULA
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Advert
WILEY END USER LICENSE AGREEMENT
Go to
www.wiley.com/go/eula
to access Wiley’s ebook EULA.
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset