Home Page Icon
Home Page
Table of Contents for
Exam Preparation Tasks
Close
Exam Preparation Tasks
by Omar Santos, John Stuppi
Santos:CCNA Sec 210-260 OCG
About This eBook
Title Page
Copyright Page
About the Authors
About the Technical Reviewers
Dedications
Acknowledgments
Contents at a Glance
Contents
Command Syntax Conventions
Introduction
About the CCNA Security Implementing Cisco Network Security (IINS) 210-260 Exam
CCNA Security Exam
About the CCNA Security 210-260 Official Cert Guide
Objectives and Methods
Book Features
How This Book Is Organized
Premium Edition eBook and Practice Test
Part I: Fundamentals of Network Security
Chapter 1. Networking Security Concepts
“Do I Know This Already?” Quiz
Foundation Topics
Understanding Network and Information Security Basics
Network Security Objectives
Confidentiality, Integrity, and Availability
Cost-Benefit Analysis of Security
Classifying Assets
Classifying Vulnerabilities
Classifying Countermeasures
What Do We Do with the Risk?
Recognizing Current Network Threats
Potential Attackers
Attack Methods
Attack Vectors
Man-in-the-Middle Attacks
Other Miscellaneous Attack Methods
Applying Fundamental Security Principles to Network Design
Guidelines
Network Topologies
Network Security for a Virtual Environment
How It All Fits Together
Exam Preparation Tasks
Review All the Key Topics
Complete the Tables and Lists from Memory
Define Key Terms
Chapter 2. Common Security Threats
“Do I Know This Already?” Quiz
Foundation Topics
Network Security Threat Landscape
Distributed Denial-of-Service Attacks
Social Engineering Methods
Social Engineering Tactics
Defenses Against Social Engineering
Malware Identification Tools
Methods Available for Malware Identification
Data Loss and Exfiltration Methods
Summary
Exam Preparation Tasks
Review All the Key Topics
Complete the Tables and Lists from Memory
Define Key Terms
Part II: Secure Access
Chapter 3. Implementing AAA in Cisco IOS
“Do I Know This Already?” Quiz
Foundation Topics
Cisco Secure ACS, RADIUS, and TACACS
Why Use Cisco ACS?
On What Platform Does ACS Run?
What Is ISE?
Protocols Used Between the ACS and the Router
Protocol Choices Between the ACS Server and the Client (the Router)
Configuring the ACS Server to Interoperate with a Router
Verifying and Troubleshooting Router-to-ACS Server Interactions
Exam Preparation Tasks
Review All the Key Topics
Complete the Tables and Lists from Memory
Define Key Terms
Command Reference to Check Your Memory
Chapter 4. Bring Your Own Device (BYOD)
“Do I Know This Already?” Quiz
Foundation Topics
Bring Your Own Device Fundamentals
BYOD Architecture Framework
BYOD Solution Components
Mobile Device Management
MDM Deployment Options
Review All the Key Topics
Complete the Tables and Lists from Memory
Define Key Terms
Part III: Virtual Private Networks (VPN)
Chapter 5. Fundamentals of VPN Technology and Cryptography
“Do I Know This Already?” Quiz
Foundation Topics
Understanding VPNs and Why We Use Them
What Is a VPN?
Types of VPNs
Main Benefits of VPNs
Cryptography Basic Components
Ciphers and Keys
Block and Stream Ciphers
Symmetric and Asymmetric Algorithms
Hashes
Hashed Message Authentication Code
Digital Signatures
Key Management
IPsec and SSL
Public Key Infrastructure
RSA Algorithm, the Keys, and Digital Certificates
Certificate Authorities
Root and Identity Certificates
Authenticating and Enrolling with the CA
Public Key Cryptography Standards
Simple Certificate Enrollment Protocol
Revoked Certificates
Uses for Digital Certificates
PKI Topologies
Putting the Pieces of PKI to Work
ASA’s Default Certificate
Viewing the Certificates in ASDM
Adding a New Root Certificate
Easier Method for Installing Both Root and Identity Certificates
Exam Preparation Tasks
Review All the Key Topics
Complete the Tables and Lists from Memory
Define Key Terms
Command Reference to Check Your Memory
Chapter 6. Fundamentals of IP Security
“Do I Know This Already?” Quiz
Foundation Topics
IPsec Concepts, Components, and Operations
The Goal of IPsec
The Internet Key Exchange (IKE) Protocol
The Play by Play for IPsec
Summary of the IPsec Story
Configuring and Verifying IPsec
Tools to Configure the Tunnels
Start with a Plan
Viewing the CLI Equivalent at the Router
Completing and Verifying IPsec
Exam Preparation Tasks
Review All the Key Topics
Complete the Tables and Lists from Memory
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Note
Next
Next Chapter
Review All the Key Topics
Exam Preparation Tasks
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset