Download CCNA security study guide: exam 210-260 PDF

TitleCCNA security study guide: exam 210-260
File Size5.4 MB
Total Pages358
Table of Contents
                            Title Page
Copyright
Dedication
Acknowledgments
About the Author
Introduction
	What Does This Book Cover?
	Interactive Online Learning Environment and Test Bank
	Who Should Read This Book
	How to Use This Book
	How Do You Go About Taking the Exam?
	Certification Exam Policies
Assessment Test
Answers to Assessment Test
Chapter 1 Understanding Security Fundamentals
	Goals of Security
	Network Topologies
	Common Network Security Zones
	Summary
	Exam Essentials
	Review Questions
Chapter 2 Understanding Security Threats
	Common Network Attacks
	Social Engineering
	Malware
	Data Loss and Exfiltration
	Summary
	Exam Essentials
	Review Questions
Chapter 3 Understanding Cryptography
	Symmetric and Asymmetric Encryption
	Hashing Algorithms
	Key Exchange
	Public Key Infrastructure
	Summary
	Exam Essentials
	Review Questions
Chapter 4 Securing the Routing Process
	Securing Router Access
	Implementing OSPF Routing Update Authentication
	Securing the Control Plane
	Summary
	Exam Essentials
	Review Questions
Chapter 5 Understanding Layer 2 Attacks
	Understanding STP Attacks
	Understanding ARP Attacks
	Understanding MAC Attacks
	Understanding CAM Overflows
	Understanding CDP/LLDP Reconnaissance
	Understanding VLAN Hopping
	Understanding DHCP Spoofing
	Summary
	Exam Essentials
	Review Questions
Chapter 6 Preventing Layer 2 Attacks
	Configuring DHCP Snooping
	Configuring Dynamic ARP Inspection
	Configuring Port Security
	Configuring STP Security Features
	Disabling DTP
	Verifying Mitigations
	Summary
	Exam Essentials
	Review Questions
Chapter 7 VLAN Security
	Native VLANs
	PVLANs
	ACLs on Switches
	Summary
	Exam Essentials
	Review Questions
Chapter 8 Securing Management Traffic
	In-Band and Out-of-Band Management
	Securing Network Management
	Securing Access through SNMP v3
	Securing NTP
	Using SCP for File Transfer
	Summary
	Exam Essentials
	Review Questions
Chapter 9 Understanding 802.1x and AAA
	802.1x Components
	RADIUS and TACACS+ Technologies
	Configuring Administrative Access with TACACS+
	Understanding Authentication and Authorization Using ACS and ISE
	Understanding the Integration of Active Directory with AAA
	Summary
	Exam Essentials
	Review Questions
Chapter 10 Securing a BYOD Initiative
	The BYOD Architecture Framework
	The Function of Mobile Device Management
	Summary
	Exam Essentials
	Review Questions
Chapter 11 Understanding VPNs
	Understanding IPsec
	Understanding Advanced VPN Concepts
	Summary
	Exam Essentials
	Review Questions
Chapter 12 Configuring VPNs
	Configuring Remote Access VPNs
	Configuring Site-to-Site VPNs
	Summary
	Exam Essentials
	Review Questions
Chapter 13 Understanding Firewalls
	Understanding Firewall Technologies
	Stateful vs. Stateless Firewalls
	Summary
	Exam Essentials
	Review Questions
Chapter 14 Configuring NAT and Zone-Based Firewalls
	Implementing NAT on ASA 9.x
	Configuring Zone-Based Firewalls
	Summary
	Exam Essentials
	Review Questions
Chapter 15 Configuring the Firewall on an ASA
	Understanding Firewall Services
	Understanding Modes of Deployment
	Understanding Methods of Implementing High Availability
	Understanding Security Contexts
	Configuring ASA Management Access
	Configuring Cisco ASA Interface Security Levels
	Configuring Security Access Policies
	Configuring Default Cisco Modular Policy Framework (MPF)
	Summary
	Exam Essentials
	Review Questions
Chapter 16 Intrusion Prevention
	IPS Terminology
	Evasion Techniques
	Introducing Cisco FireSIGHT
	Understanding Modes of Deployment
	Positioning of the IPS within the Network
	Understanding False Positives, False Negatives, True Positives, and True Negatives
	Summary
	Exam Essentials
	Review Questions
Chapter 17 Content and Endpoint Security
	Mitigating Email Threats
	Mitigating Web-Based Threats
	Mitigating Endpoint Threats
	Summary
	Exam Essentials
	Review Questions
Appendix Answers to Review Questions
	Chapter 1: Understanding Security Fundamentals
	Chapter 2: Understanding Security Threats
	Chapter 3: Understanding Cryptography
	Chapter 4: Securing the Routing Process
	Chapter 5: Understanding Layer 2 Attacks
	Chapter 6: Preventing Layer 2 Attacks
	Chapter 7: VLAN Security
	Chapter 8: Securing Management Traffic
	Chapter 9: Understanding 802.1x and AAA
	Chapter 10: Securing a BYOD Initiative
	Chapter 11: Understanding VPNs
	Chapter 12: Configuring VPNs
	Chapter 13: Understanding Firewalls
	Chapter 14: Configuring NAT and Zone-Based Firewalls
	Chapter 15: Configuring the Firewall on an ASA
	Chapter 16: Intrusion Prevention
	Chapter 17: Content and Endpoint Security
Advert
EULA
                        

Similer Documents