Objectives

Upon completion of this chapter, you will be able to perform the following tasks:

  • Describe the need for network security

  • Describe the Cisco SAFE Blueprint

  • Understand network attack taxonomy

  • Identify the components of a complete network security policy

  • Identify Cisco network security products

  • Identify Cisco network security management software applications

  • Identify the security issues implicit in common management protocols and functions

  • Identify the three most common methods of implementing NAT and NAT-T

Since the mid-1990s, Internet-enabled business, or e-business, has drastically improved companies' efficiency and revenue growth. E-business applications such as e-commerce, supply-chain management, and remote access enable companies to streamline ...

Get CCSP Self-Study: Securing Cisco IOS Networks (SECUR) now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.