Category: CCNA Security 2.0 study materials
Chapter Outline: 11.0 Introduction 11.1 Network Security Testing 11.2 Developing a Comprehensive Security Policy 11.3 Summary Section 11.1: Network Security Testing Upon completion of this section, you should be able to: Describe the techniques used in network security testing. Describe the tools used in network security testing. Topic …
Chapter Outline: 10.0 Introduction 10.1 ASA Security Device Manager 10.2 ASA VPN Configuration 10.3 Summary Section 10.1: ASA Security Device Manager Upon completion of this section, you should be able to: Configure an ASA to provide basic firewall services using ASDM. Configure an ASA to provide additional firewall …
Chapter Outline: 9.0 Introduction 9.1 Introduction to the ASA 9.2 ASA Firewall Configuration 9.3 Summary Section 9.1: Introduction to the ASA Upon completion of this section, you should be able to: Compare ASA solutions to other routing firewall technologies. Explain ASA 5505 operation with the default configuration. Topic …
Chapter Outline: 8.0 Introduction 8.1 VPNs 8.2 IPsec VPN Components and Operations 8.3 Implementing Site-to-Site IPsec VPNs with CLI 8.4 Summary Section 8.1: VPNs Upon completion of this section, you should be able to: Describe VPNs and their benefits. Compare site-to-site and remote-access VPNs. Topic 8.1.1: VPN Overview …
Chapter Outline: 7.0 Introduction 7.1 Cryptographic Services 7.2 Basic Integrity and Authenticity 7.3 Confidentiality 7.4 Public Key Cryptography 7.5 Summary Section 7.1: Cryptographic Services Upon completion of this section, you should be able to: Explain the requirements of secure communications including integrity, authentication, and confidentiality. Explain cryptography. Describe …
Chapter Outline: 6.0 Introduction 6.1 Endpoint Security 6.2 Layer 2 Security Threats 6.3 Summary Section 6.1: Endpoint Security Upon completion of this section, you should be able to: Describe endpoint security and the enabling technologies. Explain how Cisco AMP is used to ensure endpoint security. Explain how Cisco …
Chapter Outline: 5.0 Introduction 5.1 IPS Technologies 5.2 IPS Signatures 5.3 Implement IPS 5.4 Summary Section 5.1: IPS Technologies Upon completion of this section, you should be able to: Explain zero-day attacks. Understand how to monitor, detect and stop attacks. Describe the advantages and disadvantages of IDS and …
Chapter Outline: 4.0 Introduction 4.1 Access Control Lists 4.2 Firewall Technologies 4.3 Zone-Based Policy Firewalls 4.4 Summary Section 4.1: Access Control List Upon completion of this section, you should be able to: Configure standard and extended IPv4 ACLs using CLI. Use ACLs to mitigate common network attacks. Configure …
Chapter Outline: 3.0 Introduction 3.1 Purpose of the AAA 3.2 Local AAA Authentication 3.3 Server-Based AAA 3.4 Server-Based AAA Authentication 3.5 Server-Based Authorization and Accounting 3.6 Summary Section 3.1: Purpose of the AAA Upon completion of this section, you should be able to: Explain why AAA is critical …
Chapter Outline: 2.0 Introduction 2.1 Securing Device Access 2.2 Assigning Administrative Roles 2.3 Monitoring and Managing Devices 2.4 Using Automated Security Features 2.5 Securing the Control Plane 2.6 Summary Section 2.1: Securing Device Access Upon completion of this section, you should be able to: Explain how to secure …