My Account Log in

2 options

CCNA security 210-260 certification guide : build your knowledge of network security and pass your CCNA security exam (210-260) / Glen D. Singh, Michael Vinod and Vijay Anandh.

EBSCOhost Academic eBook Collection (North America) Available online

View online

Ebook Central Academic Complete Available online

View online
Format:
Book
Author/Creator:
Singh, Glen D., author.
Vinod, Michael, author.
Anandh, Vijay, author.
Language:
English
Subjects (All):
Network analysis (Planning).
Physical Description:
1 online resource (509 pages)
Edition:
1st edition
Other Title:
Cisco Certified Network Associate security 210-260 certification guide
Place of Publication:
Birmingham ; Mumbai : Packt Publishing, 2018.
System Details:
text file
Summary:
Become a Cisco security specialist by developing your skills in network security and explore advanced security technologies About This Book Enhance your skills in network security by learning about Cisco's device configuration and installation Unlock the practical aspects of CCNA security to secure your devices Explore tips and tricks to help you achieve the CCNA Security 210-260 Certification Who This Book Is For CCNA Security 210-260 Certification Guide can help you become a network security engineer, a cyber security professional, or a security administrator. You should have valid CCENT or CCNA Routing and Switching certification before taking your CCNA Security exam. What You Will Learn Grasp the fundamentals of network security Configure routing protocols to secure network devices Mitigate different styles of security attacks using Cisco devices Explore the different types of firewall technologies Discover the Cisco ASA functionality and gain insights into some advanced ASA configurations Implement IPS on a Cisco device and understand the concept of endpoint security In Detail With CCNA Security certification, a network professional can demonstrate the skills required to develop security infrastructure, recognize threats and vulnerabilities to networks, and mitigate security threats. The CCNA Security 210-260 Certification Guide will help you grasp the fundamentals of network security and prepare you for the Cisco CCNA Security Certification exam. You'll begin by getting a grip on the fundamentals of network security and exploring the different tools available. Then, you'll see how to securely manage your network devices by implementing the AAA framework and configuring different management plane protocols. Next, you'll learn about security on the data link layer by implementing various security toolkits. You'll be introduced to various firewall technologies and will understand how to configure a zone-based firewall on a Cisco IOS device. You'll configure a site-to-site VPN on a Cisco device and get familiar with different types of VPNs and configurations. Finally, you'll delve into the concepts of IPS and endpoint security to secure your organization's network infrastructure. By the end of this book, you'll be ready to take the CCNA Security Exam (210-260). Style and approach This book is a step-by-step certification guide that ensures you secure organization's network and also helps you in clearing this certification. The practical aspe...
Contents:
Intro
Title Page
Copyright and Credits
Packt Upsell
Contributors
Table of Contents
Preface
Chapter 1: Exploring Security Threats
Important terms in network security
Threats
Vulnerability
Analyzing vulnerability
Introduction to an attack
Passive attacks
Active attacks
Spoofing attacks
Internet protocol - the heart of internet communication
How is an IP datagram spoofed?
IP spoofing
Scanning
Hijacking an online session
Flooding
ARP spoofing attacks
Mitigating ARP spoofing attacks
The DHCP process
Why DHCP snooping?
Trusted and untrusted sources
Ping of Death
TCP SYN flood attacks
Password attacks
Buffer overflow attacks
Malware
Network security tools
Wireshark
Metasploit
Kali Linux
Summary
Chapter 2: Delving into Security Toolkits
Firewall functions
Rules of a firewall
Types of firewall
Packet-filtering firewall/stateless firewall
Circuit-level gateway firewall/stateful firewall
Application-layer firewall
Zone-based firewall
Intrusion prevention system
Intrusion detection system
Virtual Private Network
Benefits of VPN
Site-to-site VPNs
Remote-access VPN
Content security
Content Security Policy
Cisco Email Security Appliance
Cisco IronPort Web Security Appliance
Endpoint security
Chapter 3: Understanding Security Policies
Need for a security policy
Five steps for a security policy
Security policy components
Best example for a security policy - a password policy
How to develop a policy
Risk
Risk analysis
Benefits of risk analysis
Quantitative risk
Qualitative risk
Weakness in technology
Weakness in configuration
Weakness in a security policy
Threat
Threat consequence
Disclosure
Threat action - exposure.
Threat action - interception
Threat action - inference
Threat action - intrusion
Deception
Threat action - masquerade
Threat action - falsification
Threat action - repudiation
Disruption
Threat action - incapacitation
Types of threat
Asset
Why classifying of assets is required
Identifying the asset
Asset accountability
Creating a plan for asset classification
Implementing the plan
Countermeasures
Zones
Planes
Data plane
Control plane
Management plane
Regulatory compliance
Payment Card Industry Data Security Standard (PCI DSS)
Health Insurance Portability and Accountability Act (HIPAA)
Sarbanes-Oxley Act (SOX)
Federal Information Security Management Act (FISMA)
GLBA
PIPED Act
Data Protection Directive
Digital Millennium Copyright Act (DMCA)
Safe Harbor Act
Chapter 4: Deep Diving into Cryptography
What is cryptography?
Objectives of cryptography
Confidentiality
Data integrity
Authentication
Non-repudiation
Terminologies
Types of encryption
Symmetric encryption
Asymmetric encryption
Types of cipher
Substitution cipher
Transposition cipher
Block ciphers
Stream ciphers
Key
Encryption algorithms
Data Encryption Standard
Triple Data Encryption Standard (3DES)
Advanced Encryption Standard (AES)
Rivest Cipher 4
RSA (Rivest, Shamir, Adleman)
Hashing algorithms
Message Digest 5 (MD5)
Secure Hashing Algorithm (SHA)
Hashed Message Authentication Code (HMAC)
Cryptographic systems
Digital signature
Secure Sockets Layer (SSL)
Transport Layer Security
Pretty Good Privacy
Public Key Infrastructure
Public Key Infrastructure components
Certificate Authority
Certificate management system
Digital certificate
X.509
Registration Authority (RA).
Putting the components of PKI together
Chapter 5: Implementing the AAA Framework
Components of AAA
Implementing Cisco AAA - authentication
Implementing authentication using local services
Implementing authentication using external services
TACACS+
Configuring TACACS+
Using AAA with TACACS+
RADIUS
Configuring RADIUS
Using AAA with RADIUS
Example of AAA using local authentication
Choosing a protocol between the ACS server and the router
Example of AAA authentication using the TACACS+ server
Command list
Issues with authentication
Encryption
Implementing Cisco AAA - authorization
Prerequisites for authorization
Configuring method lists for authorization
Different methods of authorization
Configuring the privilege level for AAA authorization
Example of AAA authorization with privilege levels
Implementing Cisco AAA - accounting
Configuring AAA - authorization and accounting
Step 1
Step 2
Step 3
Step 4
Chapter 6: Securing the Control and Management Planes
Introducing the security policy
Phases of secure network life cycle
Initiation phase
Security categorization
Initial risk assessment
Acquisition and development phase
Risk assessment
Requirements analysis of security functions
Cost considerations and reporting
Security control development
Developmental security test and evaluation
Implementation phase
Operations and maintenance phase
Configuration management and control
Continuous monitoring
Disposal phase
Technologies to implement secure management network
Syslog protocol
Facility
Severity
Hostname
Timestamp
Message
Configuring Cisco router for syslog server
Network Time Protocol
Secure Shell (SSH).
Simple Network Management Protocol version 3
SNMP basic terminologies
SNMP view
SNMP group
SNMP user
SNMPv3 lab execution
Planning considerations for secure management
Guidelines for secure management and reporting
Log messaging implementation for security
Control Plane Policing
Implementing class-map
Chapter 7: Protecting Layer 2 Protocols
Layer 2 attack mitigation
Features of the Virtual Local Area Network
VLAN tagging
Features of trunking
Trunking modes
VLAN Trunking Protocol
Spanning Tree Protocol fundamentals
Port states
Steps in implementing STP
Root bridge election
Root port election
Designated port election
Alternative port election
Cisco Discovery Protocol
Layer 2 protection toolkit
Protecting with a BPDU guard
Protecting with root guard
Combating DHCP server spoofing
Mitigating CAM-table overflow attacks
MAC spoofing attack
Port security configuration
Protect
Restrict
Shutdown
LAB: securing Layer 2 switches
Lab-port security
Chapter 8: Protecting the Switch Infrastructure
Private VLANs VACL trunking vulnerabilities port security
What is a private VLAN?
Private VLAN lab
Access Control List
VLAN ACLs (VACLs)
Steps for configuring VACL:
Trunking-related attacks
VLAN hopping
Double-tagging
Chapter 9: Exploring Firewall Technologies
Services offered by the firewall
Static-packet filtering
Circuit-level firewalls
Proxy server
Application server
Network Address Translation
Stateful inspection
Firewalls in a layered defense strategy
Transparent firewall
Application-layer firewalls
Authenticates individuals and not devices
It's more difficult to spoof and implement DoS attacks
Can monitor and filter application data.
Logging information in more detail
Working with the application-layer firewall
Application-level proxy server
Typical proxy server deployment
Areas of opportunity
Packet filtering and the OSI model
Chapter 10: Cisco ASA
Cisco ASA portfolio
ASA features
Stateful filtering
Packet filtering
Routing
Dynamic Host Configuration Protocol
Botnet filtering
Advanced Malware Protection
Authentication, authorization, and accounting
Class map and policy map
Basic ASA configuration
Viewing the filesystem
Setting a hostname
Setting the clock
Assigning a domain name to the ASA
Securing access to the privilege exec mode
Saving the configurations
Setting a banner
Assigning IP addresses on the interfaces
Setting a default static route
Creating a local user account
Remote access
Setting up SSH
Setting up Telnet
Configuring Port Address Translation
Setting up the Adaptive Security Device Manager
Getting familiar with the ASDM
Chapter 11: Advanced ASA Configuration
Routing on the ASA
Static routing
Configuring static routing using the CLI
Adding a default route using the ASDM
Adding a default route using the CLI
Open Shortest Path First
Configuring OSPF using the CLI
Routing Information Protocol
Configuring RIP using the CLI
Enhanced Interior Gateway Routing Protocol
Configuring EIGRP using the CLI
Device name, passwords, and domain name
Setting banners using the ASDM
Configuring interfaces
System time and Network Time Protocol
Configuring NTP using the CLI
Configuring DHCP using the CLI
Access control list on the ASA
Types of ACLs
Standard ACL
Applying an ACL on an interface
Extended ACL.
Using the ASDM to create ACLs.
Notes:
Includes index.
Description based on print version record.
ISBN:
9781787124585
1787124584
OCLC:
1042318729

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account