CHAPTER 8Protecting the Network
Objectives
Upon completion of this chapter, you will be able to answer the following questions:
How is the defense-in-depth strategy used to protect networks?
What are common security policies, regulations, and standards?
What are access control policies?
How is AAA used to control network access?
What information sources are used to communicate emerging network security threats?
What threat intelligence is used to identify threats and vulnerabilities?
Key Terms
This chapter uses the following key terms. You can find the definitions in the Glossary.
Get CCNA Cybersecurity Operations Companion Guide, First Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.