skip to content
Implementing Cisco IOS network security (IINS) : (CCNA Security Exam 640-553) (Authorized self-study guide) Preview this item
ClosePreview this item

Implementing Cisco IOS network security (IINS) : (CCNA Security Exam 640-553) (Authorized self-study guide)

Author: Catherine Paquet; David W Chapman; Andrew Whitaker
Publisher: Indianapolis, IN : Cisco Press, ©2009.
Edition/Format:   eBook : Document : EnglishView all editions and formats

An authorized study guide for the new CCNA Security IINS Exam: official foundation learning for every candidate. Comprehensive content developed in conjunction with the Cisco certification team,  Read more...


(not yet rated) 0 with reviews - Be the first.

More like this


Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...


Genre/Form: Electronic books
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Catherine Paquet; David W Chapman; Andrew Whitaker
OCLC Number: 765143583
Notes: Title from title screen.
Description: 1 online resource
Contents: Chapter 1 Introduction to Network Security PrinciplesExamining Network Security Fundamentals The Need for Network Security Network Security Objectives Data Classification Security Controls Response to a Security Breach Laws and EthicsExamining Network Attack Methodologies Adversaries, Motivations, and Classes of Attack Classes of Attack and MethodologyThe Principles of Defense in Depth IP Spoofing Attacks Confidentiality Attacks Integrity Attacks Availability Attacks Best Practices to Defeat Network AttacksExamining Operations Security Secure Network Life Cycle Management Principles of Operations Security Network Security Testing Disaster Recovery and Business Continuity PlanningUnderstanding and Developing a Comprehensive Network Security Policy Security Policy Overview Security Policy Components Standards, Guidelines, and Procedures Security Policy Roles and Responsibilities Risk Analysis and Management Principles of Secure Network Design Security AwarenessCisco Self-Defending Networks Changing Threats and Challenges Building a Cisco Self-Defending Network Cisco Integrated Security PortfolioSummary ReferencesReview Questions Chapter 2 Perimeter SecuritySecuring Administrative Access to Cisco Routers General Router Security Guidelines Introduction to the Cisco Integrated Services Router Family Configuring Secure Administration Access Configuring Multiple Privilege Levels Configuring Role-Based Command-Line Interface AccessSecuring the Cisco IOS Image and Configuration FilesConfiguring Enhanced Support for Virtual Logins Delays Between Successive Login Attempts Login Shutdown if DoS Attacks Are Suspected Generation of System Logging Messages for Login Detection Configuring Banner Messages Introducing Cisco SDM Supporting Cisco SDM and Cisco SDM Express Launching Cisco SDM Express Launching Cisco SDM Navigating the Cisco SDM Interface Cisco SDM Wizards in Configure ModeConfiguring AAA on a Cisco Router Using the Local Database Authentication, Authorization, and Accounting Introduction to AAA for Cisco Routers Using Local Services to Authenticate Router AccessConfiguring AAA on a Cisco Router to Use Cisco Secure ACS Cisco Secure ACS Overview TACACS+ and RADIUS Protocols Installing Cisco Secure ACS for Windows Configuring the Server Configuring TACACS+ Support on a Cisco Router Troubleshooting TACACS+Implementing Secure Management and Reporting Planning Considerations for Secure Management and Reporting Secure Management and Reporting Architecture Using Syslog Logging for Network Security Using Logs to Monitor Network Security Using SNMP to Manage Network Devices Configuring an SSH Daemon for Secure Management and Reporting Enabling Time FeaturesLocking Down the Router Vulnerable Router Services and Interfaces Management Service Vulnerabilities Performing a Security Audit Cisco AutoSecureChapter Summary ReferencesReview Questions Chapter 3 Network Security Using Cisco IOS FirewallsIntroducing Firewall Technologies Firewall Fundamentals Firewalls in a Layered Defense Strategy Static Packet-Filtering Firewalls Application Layer Gateways Dynamic or Stateful Packet-Filtering Firewalls Other Types of Firewalls Cisco Family of Firewalls Developing an Effective Firewall Policy ACL Fundamentals ACL Wildcard Masking Using ACLs to Control Traffic ACL Considerations Configuring ACLs Using SDM Using ACLs to Permit and Deny Network ServicesConfiguring a Cisco IOS Zone-Based Policy Firewall Zone-Based Policy Firewall Overview Configuring Zone-Based Policy Firewalls Using the Basic Firewall Wizard Manually Configuring Zone-Based Policy Firewalls Using Cisco SDMMonitoring a Zone-Based-FirewallSummary ReferencesReview Questions Chapter 4 Fundamentals of CryptographyExamining Cryptographic Services Cryptology Overview Symmetric and Asymmetric Encryption Algorithms Block and Stream Ciphers Encryption Algorithm Selection Cryptographic Hashes Key Management Introducing SSL VPNsExamining Symmetric Encryption Symmetric Encryption Overview DES: Features and Functions 3DES: Features and Functions AES: Features and Functions SEAL: Features and Functions Rivest Ciphers: Features and FunctionsExamining Cryptographic Hashes and Digital Signatures Overview of Hash Algorithms Overview of Hashed Message Authentication Codes MD5: Features and Functions SHA-1: Features and Functions Overview of Digital Signatures DSS: Features and FunctionsExamining Asymmetric Encryption and PKI Asymmetric Encryption Overview RSA: Features and Functions DH: Features and Functions PKI Definitions and Algorithms PKI Standards Certificate AuthoritiesSummary ReferencesReview Questions Chapter 5 Site-to-Site VPNsVPN Overview VPN Types Cisco VPN Product FamilyIntroducing IPsec Encryption Algorithms Diffie-Hellman Exchange Data Integrity Authentication IPsec AdvantagesIPsec Protocol Framework Authentication Header Encapsulating Security Payload Tunnel Mode Versus Transport Mode IPsec FrameworkIKE Protocol IKE Phase 1 IKE Phase 1: Example IKE Phase 2Building a Site-to-Site IPsec VPN Site-to-Site IPsec VPN Operations Configuring IPsec Verifying the IPsec ConfigurationConfiguring IPsec on a Site-to-Site VPN Using Cisco SDM Introducing the Cisco SDM VPN Wizard Interface Site-to-Site VPN Components Using the Cisco SDM Wizards to Configure Site-to-Site VPNs Completing the ConfigurationSummary ReferencesReview Questions Chapter 6 Network Security Using Cisco IOS IPSIntroducing IDS and IPS Types of IDS and IPS Systems IPS Actions Event Monitoring and ManagementCisco IPS Management Software Cisco Router and Security Device Manager Cisco Security Monitoring, Analysis, and Response System Cisco IDS Event Viewer Cisco Security Manager Cisco IPS Device ManagerHost and Network IPS Host-Based IPS Network-Based IPS Comparing HIPS and Network IPSIntroducing Cisco IPS Appliances Cisco IPS 4200 Series Sensors Cisco ASA AIP SSM Cisco Catalyst 6500 Series IDSM-2 Cisco IPS AIMSignatures and Signature Engines Examining Signature Micro-Engines Signature AlarmsIPS Best PracticesConfiguring Cisco IOS IPS Cisco IOS IPS Features Configuring Cisco IOS IPS Using Cisco SDM Configuring Cisco IOS IPS Using CLI Configuring IPS Signatures Monitoring IOS IPSVerifying IPS OperationSummary ReferencesReview Questions Chapter 7 LAN, SAN, Voice, and Endpoint Security OverviewExamining Endpoint Security Operating System Vulnerabilities Application Vulnerabilities Buffer Overflows IronPort Cisco NAC Products Cisco Security Agent Endpoint Security Best PracticesExamining SAN Security Defining SANs SAN Fundamentals SAN Security ScopeExamining Voice Security VoIP Fundamentals Voice Security Threats Defending Against VoIP HackingMitigating Layer 2 Attacks Basic Switch Operation Mitigating VLAN Attacks Preventing Spanning Tree Protocol Manipulation CAM Table Overflow Attacks MAC Address Spoofing Attacks Using Port Security Additional Switch Security Features Layer 2 Best PracticesSummary ReferencesReview Questions Appendix Answers to Chapter Review Questions Index
Other Titles: Authorized self-study guide
Responsibility: Catherine Paquet ; technical reviewers: David Chapman and Andrew Whitaker.


User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...


Be the first.

Similar Items

Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data

Primary Entity

<> # Implementing Cisco IOS network security (IINS) : (CCNA Security Exam 640-553) (Authorized self-study guide)
    a schema:Book, schema:MediaObject, schema:CreativeWork ;
   library:oclcnum "765143583" ;
   library:placeOfPublication <> ; # Indianapolis, IN
   library:placeOfPublication <> ;
   schema:about <> ; # Cisco IOS.
   schema:about <> ;
   schema:about <> ; # Computer networks--Security measures
   schema:about <> ; # Cisco IOS.
   schema:about <> ; # Computer networks--Security measures
   schema:alternateName "Authorized self-study guide" ;
   schema:bookFormat schema:EBook ;
   schema:contributor <> ; # David W. Chapman
   schema:contributor <> ; # Andrew Whitaker
   schema:copyrightYear "2009" ;
   schema:creator <> ; # Catherine Paquet
   schema:datePublished "2009" ;
   schema:exampleOfWork <> ;
   schema:genre "Electronic books"@en ;
   schema:inLanguage "en" ;
   schema:name "Implementing Cisco IOS network security (IINS) : (CCNA Security Exam 640-553) (Authorized self-study guide)"@en ;
   schema:productID "765143583" ;
   schema:publication <> ;
   schema:publisher <> ; # Cisco Press
   schema:url <> ;
   schema:url <> ;
   wdrs:describedby <> ;

Related Entities

<> # David W. Chapman
    a schema:Person ;
   schema:familyName "Chapman" ;
   schema:givenName "David W." ;
   schema:name "David W. Chapman" ;

<> # Catherine Paquet
    a schema:Person ;
   schema:familyName "Paquet" ;
   schema:givenName "Catherine" ;
   schema:name "Catherine Paquet" ;

<> # Andrew Whitaker
    a schema:Person ;
   schema:familyName "Whitaker" ;
   schema:givenName "Andrew" ;
   schema:name "Andrew Whitaker" ;

<> # Indianapolis, IN
    a schema:Place ;
   schema:name "Indianapolis, IN" ;

<> # Computer networks--Security measures
    a schema:Intangible ;
   schema:name "Computer networks--Security measures"@en ;

<> # Cisco IOS.
    a schema:CreativeWork ;
   schema:name "Cisco IOS." ;

<> # Computer networks--Security measures
    a schema:Intangible ;
   schema:name "Computer networks--Security measures"@en ;

    a genont:InformationResource, genont:ContentTypeGenericResource ;
   schema:about <> ; # Implementing Cisco IOS network security (IINS) : (CCNA Security Exam 640-553) (Authorized self-study guide)
   schema:dateModified "2017-10-23" ;
   void:inDataset <> ;

Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.