skip to content
Implementing Cisco IOS network security (IINS) : (CCNA Security Exam 640-553) (Authorized self-study guide) Preview this item
ClosePreview this item

Implementing Cisco IOS network security (IINS) : (CCNA Security Exam 640-553) (Authorized self-study guide)

Author: Catherine Paquet; David W Chapman; Andrew Whitaker
Publisher: Indianapolis, IN : Cisco Press, ©2009.
Edition/Format:   eBook : Document : EnglishView all editions and formats

An authorized study guide for the new CCNA Security IINS Exam: official foundation learning for every candidate. Comprehensive content developed in conjunction with the Cisco certification team,  Read more...


(not yet rated) 0 with reviews - Be the first.

More like this


Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...


Genre/Form: Electronic books
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Catherine Paquet; David W Chapman; Andrew Whitaker
OCLC Number: 765143583
Notes: Title from title screen.
Description: 1 online resource
Contents: Chapter 1 Introduction to Network Security Principles Examining Network Security Fundamentals The Need for Network Security Network Security Objectives Data Classification Security Controls Response to a Security Breach Laws and Ethics Examining Network Attack Methodologies Adversaries, Motivations, and Classes of Attack Classes of Attack and Methodology The Principles of Defense in Depth IP Spoofing Attacks Confidentiality Attacks Integrity Attacks Availability Attacks Best Practices to Defeat Network Attacks Examining Operations Security Secure Network Life Cycle Management Principles of Operations Security Network Security Testing Disaster Recovery and Business Continuity Planning Understanding and Developing a Comprehensive Network Security Policy Security Policy Overview Security Policy Components Standards, Guidelines, and Procedures Security Policy Roles and Responsibilities Risk Analysis and Management Principles of Secure Network Design Security Awareness Cisco Self-Defending Networks Changing Threats and Challenges Building a Cisco Self-Defending Network Cisco Integrated Security Portfolio Summary References Review Questions Chapter 2 Perimeter Security Securing Administrative Access to Cisco Routers General Router Security Guidelines Introduction to the Cisco Integrated Services Router Family Configuring Secure Administration Access Configuring Multiple Privilege Levels Configuring Role-Based Command-Line Interface Access Securing the Cisco IOS Image and Configuration Files Configuring Enhanced Support for Virtual Logins Delays Between Successive Login Attempts Login Shutdown if DoS Attacks Are Suspected Generation of System Logging Messages for Login Detection Configuring Banner Messages Introducing Cisco SDM Supporting Cisco SDM and Cisco SDM Express Launching Cisco SDM Express Launching Cisco SDM Navigating the Cisco SDM Interface Cisco SDM Wizards in Configure Mode Configuring AAA on a Cisco Router Using the Local Database Authentication, Authorization, and Accounting Introduction to AAA for Cisco Routers Using Local Services to Authenticate Router Access Configuring AAA on a Cisco Router to Use Cisco Secure ACS Cisco Secure ACS Overview TACACS+ and RADIUS Protocols Installing Cisco Secure ACS for Windows Configuring the Server Configuring TACACS+ Support on a Cisco Router Troubleshooting TACACS+ Implementing Secure Management and Reporting Planning Considerations for Secure Management and Reporting Secure Management and Reporting Architecture Using Syslog Logging for Network Security Using Logs to Monitor Network Security Using SNMP to Manage Network Devices Configuring an SSH Daemon for Secure Management and Reporting Enabling Time Features Locking Down the Router Vulnerable Router Services and Interfaces Management Service Vulnerabilities Performing a Security Audit Cisco AutoSecure Chapter Summary References Review Questions Chapter 3 Network Security Using Cisco IOS Firewalls Introducing Firewall Technologies Firewall Fundamentals Firewalls in a Layered Defense Strategy Static Packet-Filtering Firewalls Application Layer Gateways Dynamic or Stateful Packet-Filtering Firewalls Other Types of Firewalls Cisco Family of Firewalls Developing an Effective Firewall Policy ACL Fundamentals ACL Wildcard Masking Using ACLs to Control Traffic ACL Considerations Configuring ACLs Using SDM Using ACLs to Permit and Deny Network Services Configuring a Cisco IOS Zone-Based Policy Firewall Zone-Based Policy Firewall Overview Configuring Zone-Based Policy Firewalls Using the Basic Firewall Wizard Manually Configuring Zone-Based Policy Firewalls Using Cisco SDM Monitoring a Zone-Based-Firewall Summary References Review Questions Chapter 4 Fundamentals of Cryptography Examining Cryptographic Services Cryptology Overview Symmetric and Asymmetric Encryption Algorithms Block and Stream Ciphers Encryption Algorithm Selection Cryptographic Hashes Key Management Introducing SSL VPNs Examining Symmetric Encryption Symmetric Encryption Overview DES: Features and Functions 3DES: Features and Functions AES: Features and Functions SEAL: Features and Functions Rivest Ciphers: Features and Functions Examining Cryptographic Hashes and Digital Signatures Overview of Hash Algorithms Overview of Hashed Message Authentication Codes MD5: Features and Functions SHA-1: Features and Functions Overview of Digital Signatures DSS: Features and Functions Examining Asymmetric Encryption and PKI Asymmetric Encryption Overview RSA: Features and Functions DH: Features and Functions PKI Definitions and Algorithms PKI Standards Certificate Authorities Summary References Review Questions Chapter 5 Site-to-Site VPNs VPN Overview VPN Types Cisco VPN Product Family Introducing IPsec Encryption Algorithms Diffie-Hellman Exchange Data Integrity Authentication IPsec Advantages IPsec Protocol Framework Authentication Header Encapsulating Security Payload Tunnel Mode Versus Transport Mode IPsec Framework IKE Protocol IKE Phase 1 IKE Phase 1: Example IKE Phase 2 Building a Site-to-Site IPsec VPN Site-to-Site IPsec VPN Operations Configuring IPsec Verifying the IPsec Configuration Configuring IPsec on a Site-to-Site VPN Using Cisco SDM Introducing the Cisco SDM VPN Wizard Interface Site-to-Site VPN Components Using the Cisco SDM Wizards to Configure Site-to-Site VPNs Completing the Configuration Summary References Review Questions Chapter 6 Network Security Using Cisco IOS IPS Introducing IDS and IPS Types of IDS and IPS Systems IPS Actions Event Monitoring and Management Cisco IPS Management Software Cisco Router and Security Device Manager Cisco Security Monitoring, Analysis, and Response System Cisco IDS Event Viewer Cisco Security Manager Cisco IPS Device Manager Host and Network IPS Host-Based IPS Network-Based IPS Comparing HIPS and Network IPS Introducing Cisco IPS Appliances Cisco IPS 4200 Series Sensors Cisco ASA AIP SSM Cisco Catalyst 6500 Series IDSM-2 Cisco IPS AIM Signatures and Signature Engines Examining Signature Micro-Engines Signature Alarms IPS Best Practices Configuring Cisco IOS IPS Cisco IOS IPS Features Configuring Cisco IOS IPS Using Cisco SDM Configuring Cisco IOS IPS Using CLI Configuring IPS Signatures Monitoring IOS IPS Verifying IPS Operation Summary References Review Questions Chapter 7 LAN, SAN, Voice, and Endpoint Security Overview Examining Endpoint Security Operating System Vulnerabilities Application Vulnerabilities Buffer Overflows IronPort Cisco NAC Products Cisco Security Agent Endpoint Security Best Practices Examining SAN Security Defining SANs SAN Fundamentals SAN Security Scope Examining Voice Security VoIP Fundamentals Voice Security Threats Defending Against VoIP Hacking Mitigating Layer 2 Attacks Basic Switch Operation Mitigating VLAN Attacks Preventing Spanning Tree Protocol Manipulation CAM Table Overflow Attacks MAC Address Spoofing Attacks Using Port Security Additional Switch Security Features Layer 2 Best Practices Summary References Review Questions Appendix Answers to Chapter Review Questions Index
Other Titles: Authorized self-study guide
Responsibility: Catherine Paquet ; technical reviewers: David Chapman and Andrew Whitaker.


User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...


Be the first.

Similar Items

Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data

Primary Entity

<> # Implementing Cisco IOS network security (IINS) : (CCNA Security Exam 640-553) (Authorized self-study guide)
    a schema:Book, schema:MediaObject, schema:CreativeWork ;
    library:oclcnum "765143583" ;
    library:placeOfPublication <> ; # Indianapolis, IN
    library:placeOfPublication <> ;
    schema:about <> ; # Cisco IOS.
    schema:about <> ;
    schema:about <> ; # Computer networks--Security measures
    schema:about <> ; # Cisco IOS.
    schema:about <> ; # Computer networks--Security measures
    schema:alternateName "Authorized self-study guide" ;
    schema:bookFormat schema:EBook ;
    schema:contributor <> ; # David W. Chapman
    schema:contributor <> ; # Andrew Whitaker
    schema:copyrightYear "2009" ;
    schema:creator <> ; # Catherine Paquet
    schema:datePublished "2009" ;
    schema:exampleOfWork <> ;
    schema:genre "Electronic books"@en ;
    schema:inLanguage "en" ;
    schema:name "Implementing Cisco IOS network security (IINS) : (CCNA Security Exam 640-553) (Authorized self-study guide)"@en ;
    schema:productID "765143583" ;
    schema:publication <> ;
    schema:publisher <> ; # Cisco Press
    schema:url <> ;
    wdrs:describedby <> ;

Related Entities

<> # David W. Chapman
    a schema:Person ;
    schema:familyName "Chapman" ;
    schema:givenName "David W." ;
    schema:name "David W. Chapman" ;

<> # Catherine Paquet
    a schema:Person ;
    schema:familyName "Paquet" ;
    schema:givenName "Catherine" ;
    schema:name "Catherine Paquet" ;

<> # Andrew Whitaker
    a schema:Person ;
    schema:familyName "Whitaker" ;
    schema:givenName "Andrew" ;
    schema:name "Andrew Whitaker" ;

<> # Indianapolis, IN
    a schema:Place ;
    schema:name "Indianapolis, IN" ;

<> # Computer networks--Security measures
    a schema:Intangible ;
    schema:name "Computer networks--Security measures"@en ;

<> # Cisco IOS.
    a schema:CreativeWork ;
    schema:name "Cisco IOS." ;

<> # Computer networks--Security measures
    a schema:Intangible ;
    schema:name "Computer networks--Security measures"@en ;

    a genont:InformationResource, genont:ContentTypeGenericResource ;
    schema:about <> ; # Implementing Cisco IOS network security (IINS) : (CCNA Security Exam 640-553) (Authorized self-study guide)
    schema:dateModified "2016-09-02" ;
    void:inDataset <> ;

Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.