Limit search to available items
Book Cover
E-book
Author Singh, Glen D

Title CCNA Security 210-260 Certification Guide : Build Your Knowledge of Network Security and Pass Your CCNA Security Exam (210-260)
Published Birmingham : Packt Publishing Ltd, 2018

Copies

Description 1 online resource (509 pages)
Contents Intro; Title Page; Copyright and Credits; Packt Upsell; Contributors; Table of Contents; Preface; Chapter 1: Exploring Security Threats; Important terms in network security; Threats; Vulnerability; Analyzing vulnerability; Introduction to an attack; Passive attacks; Active attacks; Spoofing attacks; Internet protocol -- the heart of internet communication; How is an IP datagram spoofed?; IP spoofing; Scanning; Hijacking an online session; Flooding; ARP spoofing attacks; Mitigating ARP spoofing attacks; The DHCP process; Why DHCP snooping?; Trusted and untrusted sources; Ping of Death
TCP SYN flood attacksPassword attacks; Buffer overflow attacks; Malware; Network security tools; Wireshark; Metasploit; Kali Linux; Summary; Chapter 2: Delving into Security Toolkits; Firewall functions; Rules of a firewall; Types of firewall; Packet-filtering firewall/stateless firewall; Circuit-level gateway firewall/stateful firewall; Application-layer firewall; Zone-based firewall; Intrusion prevention system ; Intrusion detection system ; Virtual Private Network; Benefits of VPN; Site-to-site VPNs; Remote-access VPN; Content security; Content Security Policy
Cisco Email Security ApplianceCisco IronPort Web Security Appliance; Endpoint security; Summary; Chapter 3: Understanding Security Policies; Need for a security policy; Five steps for a security policy; Security policy components ; Best example for a security policy -- a password policy; How to develop a policy; Risk; Risk analysis; Benefits of risk analysis; Quantitative risk; Qualitative risk; Vulnerability; Weakness in technology; Weakness in configuration; Weakness in a security policy; Threat; Threat consequence; Disclosure; Threat action -- exposure; Threat action -- interception
Threat action -- inferenceThreat action -- intrusion; Deception; Threat action -- masquerade; Threat action -- falsification; Threat action -- repudiation; Disruption; Threat action -- incapacitation; Types of threat; Asset; Why classifying of assets is required; Identifying the asset; Asset accountability; Creating a plan for asset classification; Implementing the plan; Countermeasures; Zones; Planes; Data plane; Control plane; Management plane; Regulatory compliance; Payment Card Industry Data Security Standard (PCI DSS); Health Insurance Portability and Accountability Act (HIPAA)
Sarbanes-Oxley Act (SOX)Federal Information Security Management Act (FISMA); GLBA; PIPED Act; Data Protection Directive; Digital Millennium Copyright Act (DMCA); Safe Harbor Act; Summary; Chapter 4: Deep Diving into Cryptography; What is cryptography?; Objectives of cryptography; Confidentiality ; Data integrity; Authentication; Non-repudiation; Terminologies; Types of encryption; Symmetric encryption; Asymmetric encryption; Types of cipher; Substitution cipher; Transposition cipher; Block ciphers; Stream ciphers; Key; Encryption algorithms; Data Encryption Standard
Summary With a CCNA Security certification, you can demonstrate the skills required to develop a security infrastructure, recognize threats to networks, and mitigate security threats. Geared towards Cisco Security, the practical aspects of this book will help you clear the CCNA Security Exam (210-260) by increasing your knowledge of Network Security
Notes Triple Data Encryption Standard (3DES)
Print version record
Subject Network analysis (Planning)
Network analysis (Planning)
Form Electronic book
Author G, Michael Vinod
Anandh, Vijay
ISBN 9781787124585
1787124584