Wiley India Pvt Ltd
|Number of Pages
The CCNA Security Study Guide (With CD) is a helpful guidebook for candidates appearing for the Cisco Certified Network Associate-Security (CCNA-Security) certification examination. This valuable study guide provides details on Cisco developed technologies that have designed to provide maximum network security, and features hands-on lab work, review questions at the end of every chapter, and an objective map which can be used for easy reference of exam objectives. Some of the chapters in the book are Introduction to Network Security, Securing Administrative Access, Securing Your Router, Implementing Cisco IOS Firewall, Introduction to SAN Security, Using Digital Signatures, and Capstone Exercise. The CD included along with the book contains the Sybex Test Engine, and Flashcards for better understanding of the text material. A PDF version of the book is also available on the CD.
The author Tim Boyles, is a CCNA, CISSP, and CISA certified specialist in network administration and security, with over 20 years of experience in the field of IT. Boyles has also conducted sessions on various subjects pertaining to the field of Internet security for the institute's students, such as CISSP training, incident handling, and wireless penetration testing. He worked as the regional Security Practice Leader for BT Global Services, and also consulted with many other top notch IT firms. He has also been an instructor with the SANS Institute, a US based private institute specializing in Internet security training. Currently, Boyles is based in the Dallas-Fort worth area and works as an IT manager.
Was this product information helpful?
TABLE OF CONTENTS
Chapter 1 Introduction to Network Security
Chapter 2 Creating the Secure Network
Chapter 3 Securing Administrative Access
Chapter 4 Configuring AAA Services
Chapter 5 Securing Your Router
Chapter 6 Layer 2 Security
Chapter 7 Implementing Cisco IOS Firewall
Chapter 8 Implementing Cisco IOS Intrusion Prevention
Chapter 9 Understanding Cryptographic Solutions
Chapter 10 Using Digital Signatures
Chapter 11 Using Asymmetric Encryption and PKI
Chapter 12 Implementing Site-to-Site IPsec VPN Solutions
Appendix A Securing Voice Solutions
Appendix B Introduction to SAN Security
Appendix C Exploring Endpoint Security
Appendix D Capstone Exercise
Appendix E About the Companion CD