<p style="margin: 0px;">Preparing for the latest CCNA Security exam? Here are all ย the CCNA Security (210-260) commands you need in one condensed, portable resource. Filled with valuable, easy-to-access information, the <i>CCNA Security Portable Command Guide, </i>is portable enough for you to use w
CCNA Security Portable Command Guide
โ Scribed by Bob Vachon
- Publisher
- Pearson Education
- Tongue
- English
- Leaves
- 367
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
All the CCNA Security 640-554 commands in one compact, portable resource Preparing for the latest CCNAยฎ Security exam? Here are all the CCNA Security commands you need in one condensed, portable resource. Filled with valuable, easy-to-access information, the CCNA Security Portable Command Guide is portable enough for you to use whether you're in the server room or the equipment closet. Completely updated to reflect the new CCNA Security 640-554 exam, this quick reference summarizes relevant Cisco IOSยฎ Software commands, keywords, command arguments, and associated prompts, and offers tips and examples for applying these commands to real-world security challenges. Throughout, configuration examples provide an even deeper understanding of how to use IOS to protect networks. Topics covered include โข Networking security fundamentals: concepts, policies, strategies, and more โข Securing network infrastructure: network foundations, CCP, management plane and access, and data planes (IPv6/IPv4) โข Secure connectivity: VPNs, cryptography, IPsec, and more โข Threat control and containment: strategies, ACL threat mitigation, zone-based firewalls, and Cisco IOS IPS โข Securing networks with ASA: ASDM, basic and advanced settings, and ASA SSL VPNs Bob Vachon is a professor at Cambrian College. He has held CCNP certification since 2002 and has collaborated on many Cisco Networking Academy courses. He was the lead author for the Academy's CCNA Security v1.1 curriculum that aligns to the Cisco IOS Network Security (IINS) certification exam (640-554). ยท Access all CCNA Security commands: use as a quick, offline resource for research and solutions ยท Logical how-to topic groupings provide one-stop research ยท Great for review before CCNA Security certification exams ยท Compact size makes it easy to carry with you, wherever you go ยท โCreate Your Own Journalโ section with blank, lined pages allows you to personalize the book for your needs ยท โWhat Do You Want to Do?โ chart inside front cover helps you to quickly reference specific tasks This book is part of the Cisco Pressยฎ Certification Self-Study Product Family, which offers readers a self-paced study routine for Ciscoยฎ certification exams. Titles in the Cisco Press Certification Self-Study Product Family are part of a recommended learning program from Cisco that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press.
โฆ Table of Contents
Contents
Introduction
Part I: Networking Security Fundamentals
CHAPTER 1 Networking Security Concepts
Basic Security Concepts
Threat Classification
Drivers for Network Security
Malicious Code: Viruses, Worms, and Trojan Horses
Threats in Borderless Networks
Principles of Secure Network Design
CHAPTER 2 Implementing Security Policies Using a Lifecycle Approach
Risk Analysis
Security Policy
Secure Network Lifecycle Management
Incident Response
Disaster-Recovery and Business-Continuity Planning
CHAPTER 3 Building a Security Strategy for Borderless Networks
Cisco Borderless Network Architecture
Cisco SecureX Architecture and Context-Aware Security
Threat Control and Containment
Cloud Security and Data-Loss Prevention
Secure Connectivity Through VPNs
Security Management
Part II: Protecting the Network Infrastructure
CHAPTER 4 Network Foundation Protection
Threats Against the Network Infrastructure
Cisco Network Foundation Protection Framework
Control Plane Security
Management Plane Security
Data Plane Security
CHAPTER 5 Protecting the Network Infrastructure Using CCP
Cisco Configuration Professional
Cisco Configuration Professional Express
Cisco Configuration Professional
CCP Features and User Interface
Using CCP to Configure IOS Device-Hardening Features
Using the Cisco IOS AutoSecure CLI Feature
CHAPTER 6 Securing the Management Plane
Planning a Secure Management and Reporting Strategy
Securing the Management Plane
Implementing Role-Based Access Control on Cisco Routers
Network Monitoring
CHAPTER 7 Securing Management Access with AAA
Authenticating Administrative Access
Local AAA Authentication
Server-Based AAA Authentication
AAA Authorization
AAA Accounting
Cisco Secure ACS
CHAPTER 8 Securing the Data Plane on Catalyst Switches
Common Threats to the Switching Infrastructure
MAC Address Attacks
Spanning Tree Protocol Attacks
LAN Storm Attacks
VLAN Hopping Attacks
Advanced Layer 2 Security Features
CHAPTER 9 Securing the Data Plane in IPv6 Environments
Overview of IPv6
IPv6 Threats
IPv6 Security Strategy
Part III: Threat Control and Containment
CHAPTER 10 Planning a Threat Control Strategy
Threats
Threat Control Guidelines
Integrated Threat Control Strategy
CHAPTER 11 Configuring ACLs for Threat Mitigation
Access Control List
Configuring ACLs
Enhancing ACL Protection with Object Groups
ACLs in IPv6
CHAPTER 12 Configuring Zone-Based Firewalls
Firewall Fundamentals
Firewall Design
Cisco IOS Zone-Based Policy Firewall
CHAPTER 13 Configuring Cisco IOS IPS
IDS and IPS Fundamentals
Intrusion Prevention Technologies
Configuring IOS IPS
Part IV: Secure Connectivity
CHAPTER 14 VPNs and Cryptology
Virtual Private Networks
Cryptology = Cryptography + Cryptanalysis
Cryptographic Processes in VPNs
Cryptographic Hashes
Digital Signatures
CHAPTER 15 Asymmetric Encryption and PKI
Asymmetric Encryption
Public Key Infrastructure
CHAPTER 16 IPsec VPNs
IPsec Protocol
Internet Key Exchange
IPv6 VPNs
CHAPTER 17 Configuring Site-to-Site VPNs
Site-to-Site IPsec VPNs
Configuring IOS Site-to-Site VPNs
Part V: Securing the Network Using the ASA
CHAPTER 18 Introduction to the ASA
Adaptive Security Appliance
Basic ASA Configuration
CHAPTER 19 Introduction to ASDM
Adaptive Security Device Manager
Installing and Running ASDM
ASDM Wizards
CHAPTER 20 Configuring Cisco ASA Basic Settings
ASA Command-Line Interface
Configuring Basic Settings
Configuring Interfaces
Configuring the Management Plane
Configuring the Control Plane
Basic Settings Example
CHAPTER 21 Configuring Cisco ASA Advanced Settings
ASA DHCP Services
ASA Objects and Object Groups
ASA ACLs
ASA NAT Services
AAA Access Control
Modular Policy Framework Service Policies
CHAPTER 22 Configuring Cisco ASA SSL VPNs
Remote-Access VPNs
ASA SSL VPN
APPENDIX: Create Your Own Journal Here
๐ SIMILAR VOLUMES
Preparing for the CCNAR exam? Here are all the CCNA-level commands you need in one condensed, portable resource. The CCNA Portable Command Guide, Second Edition, is filled with valuable, easy-to-access information and is portable enough for use whether you're in the server room or the equipment clos
All the CCNA-level commands in one compact, portable resource * Access all CCNA commands-use as a quick, offline resource for research and solutions * Logical "how-to" topic groupings provide one-stop research * Great for review before CCNA certification exams * Compact size makes it easy to carry w
Preparing for the latest CCNA Security exam? Here are all the CCNA Security (210-260) commands you need in one condensed, portable resource. Filled with valuable, easy-to-access information, the CCNA Security Portable Command Guide, is portable enough for you to use whether youโre in the server roo
<i>CCNA 200-301 Portable Command Guide</i>is filled with valuable, easy-to-access information-and it's portable enough to use whether you're in the server room or the equipment closet.<br /><br />The guide summarizes all CCNA certification-level Cisco IOS Software commands, keywords, command argumen