Book description
The essential reference for security pros and CCIE Security candidates: policies, standards, infrastructure/perimeter and content security, and threat protection
Integrated Security Technologies and Solutions – Volume I offers one-stop expert-level instruction in security design, deployment, integration, and support methodologies to help security professionals manage complex solutions and prepare for their CCIE exams. It will help security pros succeed in their day-to-day jobs and also get ready for their CCIE Security written and lab exams.
Part of the Cisco CCIE Professional Development Series from Cisco Press, it is authored by a team of CCIEs who are world-class experts in their Cisco security disciplines, including co-creators of the CCIE Security v5 blueprint. Each chapter starts with relevant theory, presents configuration examples and applications, and concludes with practical troubleshooting.
Volume 1 focuses on security policies and standards; infrastructure security; perimeter security (Next-Generation Firewall, Next-Generation Intrusion Prevention Systems, and Adaptive Security Appliance [ASA]), and the advanced threat protection and content security sections of the CCIE Security v5 blueprint. With a strong focus on interproduct integration, it also shows how to combine formerly disparate systems into a seamless, coherent next-generation security solution.
- Review security standards, create security policies, and organize security with Cisco SAFE architecture
- Understand and mitigate threats to network infrastructure, and protect the three planes of a network device
- Safeguard wireless networks, and mitigate risk on Cisco WLC and access points
- Secure the network perimeter with Cisco Adaptive Security Appliance (ASA)
- Configure Cisco Next-Generation Firewall Firepower Threat Defense (FTD) and operate security via Firepower Management Center (FMC)
- Detect and prevent intrusions with Cisco Next-Gen IPS, FTD, and FMC
- Configure and verify Cisco IOS firewall features such as ZBFW and address translation
- Deploy and configure the Cisco web and email security appliances to protect content and defend against advanced threats
- Implement Cisco Umbrella Secure Internet Gateway in the cloud as your first line of defense against internet threats
- Protect against new malware with Cisco Advanced Malware Protection and Cisco ThreatGrid
Table of contents
- Cover Page
- Title Page
- Copyright Page
- About This E-Book
- About the Authors
- About the Technical Reviewer
- Dedication
- Acknowledgments
- Contents at a Glance
- Table of Contents
- Icons Used in This Book
- Command Syntax Conventions
- Reader Services
- Who Should Read This Book?
- How This Book Is Organized
- Introduction
-
Part I Hi There! This Is Network Security
- Chapter 1 Let’s Talk About Network Security
- Chapter 2 Infrastructure Security and Segmentation
-
Chapter 3 Wireless Security
- What Is Wireless?
- Wireless Security Overview
- Securing the WLAN
- Configuring Wireless Protection Policies
- Management and Control Plane Protection
- Integrating a WLC with Other Security Solutions
- Summary
- References
-
Part II Deny IP any any
-
Chapter 4 Firewalling with the ASA
- ASA Fundamentals
- Traffic with the ASA
- ASA Advanced Features
- Advanced Firewall Tuning
- Troubleshooting the ASA
- Summary
- References
- Chapter 5 Next-Gen Firewalls
- Chapter 6 Next-Gen Intrusion Detection and Prevention
-
Chapter 7 IOS Firewall and Security Features
- Network Address Translation (NAT)
- Zone-Based Firewall (ZBF)
- IOS Advanced Security Features
- Summary
- References
-
Chapter 4 Firewalling with the ASA
-
Part III <HTML> EHLO. You have threat in content </HTML>
-
Chapter 8 Content Security and Advanced Threat Protection
- Content Security Overview
- Web Security Appliance
- Email Security Appliance
- Security Management Appliance
- Summary
- References
- Chapter 9 Umbrella and the Secure Internet Gateway
-
Chapter 10 Protecting Against Advanced Malware
- Introduction to Advanced Malware Protection (AMP)
- Role of the AMP Cloud
- Doing Security Differently
- The Cloud
- Cloud Proxy Mode
- Air Gap Mode
- Threat Grid
- The Clean Interface
- The Administrative Interface
- The Dirty Interface
- Comparing Public and Private Deployments
- AMP for Networks
- AMP for Endpoints
- Custom Detections
- AMP for Windows
- Mac Policies
- Linux Policies
- AMP for Android
- Groups, Groups, and More Groups
- The Download Connector Screen
- Distributing via Cisco AnyConnect
- Installing AMP for Windows
- Installing AMP for Mac
- Installing AMP for Linux
- Proxy Complications
- AMP for Content Security
- Configuring the Web Security Appliance (WSA) Devices
- Configuring the Email Security Appliance (ESA) Devices
- AMP Reports
- Summary
-
Chapter 8 Content Security and Advanced Threat Protection
- Index
- Code Snippets
Product information
- Title: Integrated Security Technologies and Solutions - Volume I: Cisco Security Solutions for Advanced Threat Protection with Next Generation Firewall, Intrusion Prevention, AMP, and Content Security, First edition
- Author(s):
- Release date: July 2018
- Publisher(s): Cisco Press
- ISBN: 9780134807577
You might also like
book
CCNP Security Cisco Secure Firewall and Intrusion Prevention System Official Cert Guide
The official Cisco Press Certification Guide designed to help candidates prepare for the new SNCF 300-710 …
book
Integrated Security Technologies and Solutions - Volume II: Cisco Security Solutions for Network Access Control, Segmentation, Context Sharing, Secure Connectivity and Virtualization
The essential reference for security pros and CCIE Security candidates: identity, context sharing, encryption, secure connectivity …
video
Cisco Firepower and Advanced Malware Protection LiveLessons
Overview More than 6 hours of video training covering everything you need to know to design, …
book
CCNP Security Virtual Private Networks SVPN 300-730 Official Cert Guide
Trust the best-selling Official Cert Guide series from Cisco Press to help you learn, prepare, and …