Chapter Outline: 11.0 Introduction 11.1 Network Security Testing 11.2 Developing a Comprehensive Security Policy 11.3 Summary Section 11.1: Network Security Testing Upon completion of this section,…
Browsing: CCNA Security v2.0
CCNA Security version 2.0 aligning with the newly released Cisco Network Security (IINS) certification exam (210-260). CCNA Routing and Switching topics: Network Topologies and Securing Routing Protocol were added to the course allowing for a smooth transition from the CCENT level directly into CCNA Security. Other new topics introducing Cisco Identify Service Engine (ISE), 802.1x and BYOD, Cloud and virtualization, Cisco Cloud Web Security and Cisco Advanced Malware Protection. Existing content is updated to reflect new security risks, standards and technologies, integration of the new technologies into Cisco Adaptive Security Appliance (ASA), IPS (next-generation IPS), Firewall (next-generation FW), VPNs, End-point Security, and additional practice assessments.
Chapter Outline: 10.0 Introduction 10.1 ASA Security Device Manager 10.2 ASA VPN Configuration 10.3 Summary Section 10.1: ASA Security Device Manager Topic 10.1.1: Introduction to ASDM…
Chapter Outline: 9.0 Introduction 9.1 Introduction to the ASA 9.2 ASA Firewall Configuration 9.3 Summary Section 9.1: Introduction to the ASA Upon completion of this section,…
Chapter Outline: 8.0 Introduction 8.1 VPNs 8.2 IPsec VPN Components and Operations 8.3 Implementing Site-to-Site IPsec VPNs with CLI 8.4 Summary Section 8.1: VPNs Upon completion…
Chapter Outline: 7.0 Introduction 7.1 Cryptographic Services 7.2 Basic Integrity and Authenticity 7.3 Confidentiality 7.4 Public Key Cryptography 7.5 Summary Section 7.1: Cryptographic Services Upon completion…
Chapter Outline: 6.0 Introduction 6.1 Endpoint Security 6.2 Layer 2 Security Threats 6.3 Summary Section 6.1: Endpoint Security Upon completion of this section, you should be…
Chapter Outline: 5.0 Introduction 5.1 IPS Technologies 5.2 IPS Signatures 5.3 Implement IPS 5.4 Summary Section 5.1: IPS Technologies Upon completion of this section, you should…
Chapter Outline: 4.0 Introduction 4.1 Access Control Lists 4.2 Firewall Technologies 4.3 Zone-Based Policy Firewalls 4.4 Summary Section 4.1: Access Control List Upon completion of this…
Chapter Outline: 2.0 Introduction 2.1 Securing Device Access 2.2 Assigning Administrative Roles 2.3 Monitoring and Managing Devices 2.4 Using Automated Security Features 2.5 Securing the Control…
Chapter Outline: 1.0 Introduction 1.1 Securing Networks 1.2 Network Threats 1.3 Mitigating Threats 1.4 Summary Section 1.1: Securing Networks Upon completion of this section, you should…
CCNA Security Final Exam Answers 1. Which security implementation will provide control plane protection for a network device? encryption for remote access connections AAA for authenticating…
CCNA Security Practice Final Exam Answers What is the function of the Hashed Message Authentication Code (HMAC) algorithm in setting up an IPsec VPN? authenticates the…