Chapter 15: Working with Cisco Security Solutions
Throughout the course of this chapter, you will learn how to implement various Cisco security solutions on a network to mitigate various types of threats and attacks. You will learn how to secure various Internet Protocol (IP) services and routing protocols, how to implement various Layer 2 security controls to prevent and mitigate Spanning Tree Protocol (STP), Dynamic Host Configuration Protocol (DHCP), and Man-in-the-Middle (MitM) attacks, and how to complement a Cisco firewall on a network.
In this chapter, we will cover the following topics:
- Implementing secure protocols on Cisco devices
- Deploying Layer 2 security controls
- Configuring a Cisco Adaptive Security Appliance (ASA) firewall
Get Cisco Certified CyberOps Associate 200-201 Certification Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.