Objectives
Upon completion of this chapter, you will be able to perform the following tasks:
Describe the need for network security
Describe the Cisco SAFE Blueprint
Understand network attack taxonomy
Identify the components of a complete network security policy
Identify Cisco network security products
Identify Cisco network security management software applications
Identify the security issues implicit in common management protocols and functions
Identify the three most common methods of implementing NAT and NAT-T
Since the mid-1990s, Internet-enabled business, or e-business, has drastically improved companies' efficiency and revenue growth. E-business applications such as e-commerce, supply-chain management, and remote access enable companies to streamline ...
Get CCSP Self-Study: Securing Cisco IOS Networks (SECUR) now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.