Chapter 15: Working with Cisco Security Solutions

Throughout the course of this chapter, you will learn how to implement various Cisco security solutions on a network to mitigate various types of threats and attacks. You will learn how to secure various Internet Protocol (IP) services and routing protocols, how to implement various Layer 2 security controls to prevent and mitigate Spanning Tree Protocol (STP), Dynamic Host Configuration Protocol (DHCP), and Man-in-the-Middle (MitM) attacks, and how to complement a Cisco firewall on a network.

In this chapter, we will cover the following topics:

  • Implementing secure protocols on Cisco devices
  • Deploying Layer 2 security controls
  • Configuring a Cisco Adaptive Security Appliance (ASA) firewall

Get Cisco Certified CyberOps Associate 200-201 Certification Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.