Chapter 14: Implementing Layer 2 and Wireless Security
Implementing network security practices and configurations should be like second nature to a network engineer. As a professional, it's important that you learn about various Layer 2 threats and how a threat actor can take advantage of vulnerabilities found within various Layer 2 network protocols. Our job is to make the organization's network safe and free from cyber attacks.
During the course of this chapter, you will learn about the need to use a defense-in-depth (DiD) approach to secure both your users and devices on a network. Furthermore, you will learn how to identify various Layer 2 threats and attacks that are used to compromise an organization. Lastly, you will gain the knowledge ...
Get Implementing and Administering Cisco Solutions: 200-301 CCNA Exam Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.