Chapter 7. Implementing Endpoint Security
This chapter covers the following topics:
Examining endpoint security: This section begins the discussion by examining a variety of threats faced by endpoints in a network environment. It also introduces a series of techniques that can help safeguard your systems from common operating system vulnerabilities. Furthermore, this chapter examines the destructive nature of buffer overflows, viruses, worms, and Trojan horses and discusses why it is important to guard against each of these.
Securing endpoints with Cisco technologies: Cisco has developed specific technologies to help you defend your endpoints against the forms of attack introduced in the first section, as well as against ...
Get CCNA Security Official Exam Certification Guide (Exam 640-553) now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.