Chapter 16
Network Security Fundamentals
Objectives
Upon completion of this chapter, you will be able to answer the following questions:
Why are basic security measures necessary on network devices?
How do you identify security vulnerabilities?
How do you identify general mitigation techniques?
How do you configure network devices with device hardening features to mitigate security threats?
Key Terms
This chapter uses the following key terms. You can find the definitions in the glossary at the end of the book.
reconnaissance attack page 547
Get Introduction to Networks Companion Guide (CCNAv7) now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.