CCNA Security Course Booklet: Version 2

CCNA Security Course Booklet: Version 2

By (author) 

Free delivery worldwide

Available. Dispatched from the UK in 2 business days
When will my order arrive?


Your Cisco(R) Networking Academy(R) Course Booklet is designed as a study resource you can easily read, highlight, and review on the go, wherever the Internet is not available or practical: *The text is extracted directly, word-for-word, from the online course so you can highlight important points and take notes in the "Your Chapter Notes" section.*Headings with the exact page correlations provide a quick reference to the online course for your classroom discussions and exam preparation.*An icon system directs you to the online curriculum to take full advantage of the images imbedded within the Networking Academy online course interface and reminds you to perform the labs and Packet Tracer activities for each chapter. The Course Booklet is a basic, economical paper-based resource to help you succeed with the Cisco Networking Academy online more

Product details

  • Paperback | 552 pages
  • 215 x 276 x 20mm | 756g
  • Pearson Education (US)
  • Cisco Press
  • Indianapolis, United States
  • English
  • 1587133512
  • 9781587133510
  • 596,952

Table of contents

Chapter 1 Modern Network Security Threats 1.0 Introduction 1.1 Fundamental Principles of a Secure Network 1.2 Viruses, Worms, and Trojan horses 1.3 Attack Methodologies 1.4 Cisco Network Foundation Protection Framework 1.5 Chapter Summary Chapter 2 Securing Network Devices 2.0 Chapter Introduction 2.1 Securing Device Access 2.2 Assigning Administrative Roles 2.3 Monitoring and Managing Devices 2.4 Using Automated Security Features 2.5 Summary Chapter 3 Authentication, Authorization, and Accounting 3.0 Introduction 3.1 Purpose of AAA 3.2 Local AAA Authentication 3.3 Server-Based AAA 3.4 Server-Based AAA Authentication 3.5 Server-Based AAA Authorization and Accounting 3.6 Summary Chapter 4 Implementing Firewall Technologies 4.0 Introduction 4.1 Access Control Lists 4.2 Firewall Technologies 4.3 Zone-Based Policy Firewalls 4.4 Summary Chapter 5 Implementing Intrusion Prevention 5.0 Introduction 5.1 IPS Technologies 5.2 IPS Signatures 5.3 Implement IPS 5.4 Verify and Monitor IPS 5.5 Summary Chapter 6 Securing the Local-Area Network 6.0 Introduction 6.1 Endpoint Security 6.2 Layer 2 Security Considerations 6.3 Configuring Layer 2 Security 6.4 Wireless, VoIP, and SAN Security 6.5 Summary Chapter 7 Cryptographic Systems 7.0 Introduction 7.1 Cryptographic Services 7.2 Basic Integrity and Authenticity 7.3 Confidentiality 7.4 Public Key Cryptographyshow more