How This Book Is Organized

This book consists of 10 chapters divided into 3 parts.

Part I, “Hi There! This Is Network Security”

Chapter 1, “Let’s Talk About Network Security”

The book begins with a discussion of the need for security and common security threats. This chapter discusses various common security standards and creating security policies for an organization. It also discusses the Cisco SAFE architecture for implementation of security policy and the benefits of an integrated security architecture.

Chapter 2, “Infrastructure Security and Segmentation”

This chapter discusses the security threats that exist in common network infrastructure and methods to mitigate them. It discusses and demonstrates recommended methods to protect the three planes of a network device, including hardening of Cisco routers and switches.

Chapter 3, “Wireless Security”

This chapter discusses security of Cisco wireless infrastructure. It describes various security risks and mitigation techniques for a wireless network. It also demonstrates configuration required for implementing risk mitigation techniques on Cisco wireless LAN controllers and access points.

Part II, “Deny IP any any”

Chapter 4, “Firewalling with the ASA”

This chapter discusses the Cisco Adaptive Security Appliance (ASA) and its use in securing the perimeter of a network. It describes and demonstrates the configuration required to implement various security mechanisms on the ASA.

Chapter 5, “Next-Gen Firewalls”

This chapter describes various aspects of the Cisco next-generation firewall Firepower Threat Defense (FTD) and the Firepower Management Center (FMC). It describes and demonstrates the configuration required to implement various security mechanisms on FTD and in the FMC.

Chapter 6, “Next-Gen Intrusion Detection and Prevention”

This chapter describes the various aspects of the Cisco next-gen IPS with FTD and FMC. It discusses IPS deployment options with FTD, signature creation, and tuning, as well as analysis and correlation of events on FMC.

Chapter 7, “IOS Firewall and Security Features”

This chapter discusses the firewall features of Cisco IOS, including Zone Based Firewall (ZBF) and address translation. It also demonstrates the configuration and verification required with these features.

Part III, “<HTML> EHLO. You have threat in content </HTML>”

Chapter 8, “Content Security and Advanced Threat Protection”

This chapter discusses the Cisco Web Security Appliance, its deployment, and key configuration options. It also discusses the Cisco Email Security Appliance and its key configuration options.

Chapter 9, “Umbrella and the Secure Internet Gateway”

This chapter discusses DNS security fundamentals, Cisco Umbrella, Cisco Security Internet Gateway, and Cisco Security Connector. It describes the security architecture of Umbrella and the configuration required to use it.

Chapter 10, “Protecting Against Advanced Malware”

This chapter discusses the Cisco Advanced Malware Protection (AMP) product family, various places and methods of deployment, and the detection mechanisms used by AMP. It also discusses Cisco Threat Grid and its integration with AMP.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.147.103.8