CCNA Security Course Booklet Version 2

CCNA Security Course Booklet Version 2

Free delivery worldwide

Available. Dispatched from the UK in 1 business day
When will my order arrive?


Your Cisco (R) Networking Academy (R) Course Booklet is designed as a study resource you can easily read, highlight, and review on the go, wherever the Internet is not available or practical:

The text is extracted directly, word-for-word, from the online course so you can highlight important points and take notes in the "Your Chapter Notes" section.
Headings with the exact page correlations provide a quick reference to the online course for your classroom discussions and exam preparation.
An icon system directs you to the online curriculum to take full advantage of the images imbedded within the Networking Academy online course interface and reminds you to perform the labs and Packet Tracer activities for each chapter.

The Course Booklet is a basic, economical paper-based resource to help you succeed with the Cisco Networking Academy online course.
show more

Product details

  • Paperback | 552 pages
  • 220 x 280 x 20mm | 710g
  • Cisco Press
  • Indianapolis, United States
  • English
  • 1587133512
  • 9781587133510
  • 788,614

Table of contents

Chapter 1 Modern Network Security Threats

1.0 Introduction

1.1 Fundamental Principles of a Secure Network

1.2 Viruses, Worms, and Trojan horses

1.3 Attack Methodologies

1.4 Cisco Network Foundation Protection Framework

1.5 Chapter Summary

Chapter 2 Securing Network Devices

2.0 Chapter Introduction

2.1 Securing Device Access

2.2 Assigning Administrative Roles

2.3 Monitoring and Managing Devices

2.4 Using Automated Security Features

2.5 Summary

Chapter 3 Authentication, Authorization, and Accounting

3.0 Introduction

3.1 Purpose of AAA

3.2 Local AAA Authentication

3.3 Server-Based AAA

3.4 Server-Based AAA Authentication

3.5 Server-Based AAA Authorization and Accounting

3.6 Summary

Chapter 4 Implementing Firewall Technologies

4.0 Introduction

4.1 Access Control Lists

4.2 Firewall Technologies

4.3 Zone-Based Policy Firewalls

4.4 Summary

Chapter 5 Implementing Intrusion Prevention

5.0 Introduction

5.1 IPS Technologies

5.2 IPS Signatures

5.3 Implement IPS

5.4 Verify and Monitor IPS

5.5 Summary

Chapter 6 Securing the Local-Area Network

6.0 Introduction

6.1 Endpoint Security

6.2 Layer 2 Security Considerations

6.3 Configuring Layer 2 Security

6.4 Wireless, VoIP, and SAN Security

6.5 Summary

Chapter 7 Cryptographic Systems

7.0 Introduction

7.1 Cryptographic Services

7.2 Basic Integrity and Authenticity

7.3 Confidentiality

7.4 Public Key Cryptography
show more