Book description
CCIE Security v4.0 Quick Reference¿provides¿you with detailed information, highlighting the key topics on the latest CCIE Security exam. This fact-filled Quick Reference allows¿you to get all-important information at a glance, helping¿you to focus¿your study on areas of weakness and to enhance memory retention of important concepts. With this book as your guide, you will reinforce your knowledge of and experience with implementation, maintenance, and support of extensive Cisco network security solutions. You will review topics on networking theory, security protocols, hash algorithms, data encryption standards, application protocols, security appliances, and security applications and solutions.
This¿book provides a comprehensive final review for candidates taking the CCIE Security v4.0 exam. It steps through exam objectives one-by-one, providing concise and accurate review for all topics. Using this book, you will be able to easily and effectively review test objectives without having to wade through numerous books and documents to find relevant content for final review.
Table of contents
- About This eBook
- Title Page
- Copyright Page
- About the Author(s)
- About the Technical Reviewers
- Dedications
- Acknowledgments
- Contents at a Glance
- Contents
- Command Syntax Conventions
- Introduction
-
Chapter 1. Infrastructure, Connectivity, Communications, and Network Security
- Networking Basics
- IP Overview
- IPv6
- Transmission Control Protocol
- Routing Protocols
- IP Multicast Overview
- Wireless
- Client Authentication and Association Process
- Rogue Access Points
- Single Sign-On
- One-Time Password
- Lightweight Directory Access Protocol and Active Directory
- Role-Based Access Control
- Questions and Answers
- Chapter 2. Security Protocols
- Chapter 3. Application and Infrastructure Security
-
Chapter 4. Threats, Vulnerability Analysis, and Mitigation
- Recognize and Mitigate Common Attacks
- Software and OS Exploits
- Security and Attack Tools
- Packet Filtering
- Content Filtering
- Endpoint and Posture Assessment
- QoS Marking Attacks
- Questions and Answers
- Chapter 5. Cisco Security Products, Features, and Management
-
Chapter 6. Cisco Security Technologies and Solutions
- Cisco Hardware Overview
- Cisco Router Operating Modes and Management
- Basic Cisco Router Security
- IP Access Lists
- Network-Based Application Recognition
- Control Plane Policing
- Control Plane Protection
- Management Plane Protection
- Modular QoS CLI
- Unicast Reverse Path Forwarding
- Cisco NetFlow
- CAM Table Overflow and MAC Address Spoofing
- VLAN Hopping
- Spanning Tree Protocol Security
- DHCP Starvation Attack
- DNS Spoofing
- Cisco Discovery Protocol
- VLAN Trunking Protocol Security
- Network Segregation
- VPN Solutions
- Load Balancing and Failover
- Questions and Answers
-
Chapter 7. Security Policies and Procedures, Best Practices and Standards
- The Need for Network Security Policy
- Standards Bodies
- Newsgroups
- Information Security Standards
- Attacks, Vulnerabilities, and Common Exploits
- BCP 38
- Intrusion Detection Systems and Configuring Cisco IOS Software for Security Against Intrusion
- Security Audit and Validation
- Risk Assessment/Analysis
- Change Management Process
- Incident Response Teams and Framework
- Computer Security Forensics
- Common RFCs
- Questions and Answers
- Answers Appendix
Product information
- Title: CCIE Security v4.0 Quick Reference, Third Edition
- Author(s):
- Release date: August 2014
- Publisher(s): Cisco Press
- ISBN: 9780133855104
You might also like
video
Introduction to ChatGPT and OpenAI
OpenAI ChatGPT is a powerful language model that uses advanced ML techniques to generate human-like text …
video
Complete Python Course with 10 Real-World Projects
Python is a multi-paradigm programming language with object-oriented and structured programming fully supported, and many features …
book
Mastering Palo Alto Networks - Second Edition
Deploy and manage industry-leading PAN-OS 10.x solutions to secure your users and infrastructure Key Features Understand …
book
Practical Cybersecurity Architecture
Plan and design robust security architectures to secure your organization's technology landscape and the applications you …