Cover image for CCSP Complete Study Guide : Exams 642-501, 642-511, 642-521, 642-531, 642-541.
CCSP Complete Study Guide : Exams 642-501, 642-511, 642-521, 642-531, 642-541.
Title:
CCSP Complete Study Guide : Exams 642-501, 642-511, 642-521, 642-531, 642-541.
Author:
Lammle, Todd.
ISBN:
9780782150773
Personal Author:
Edition:
1st ed.
Physical Description:
1 online resource (1213 pages)
Contents:
CCSP Complete Study Guide -- Frontmatter -- Acknowledgments -- Contents at a Glance -- Contents -- Introduction -- Securing Cisco IOS Networks Assessment Test 1 -- Answers to Securing Cisco IOS Networks Assessment Test 1 -- Cisco Secure PIX Firewall Advanced Assessment Test 2 -- Answers to Cisco Secure PIX Firewall Advanced Assessment Test 2 -- Cisco Secure Virtual Private Networks Assessment Test 3 -- Answers to Cisco Secure Virtual Private Networks Assessment Test 3 -- Cisco Secure Intrusion Detection Systems Assessment Test 4 -- Answers to Cisco Secure Intrusion Detection Systems Assessment Test 4 -- Cisco SAFE Implementation Assessment Test 5 -- Answers to Cisco SAFE Implementation Assessment Test 5 -- Part I: Securing Cisco IOS Networks (SECUR) -- Chapter 1: Introduction to Network Security -- Types of Network Security Threats -- Types of Security Weaknesses -- Types of Network Attacks -- The Corporate Security Policy -- Summary -- Exam Essentials -- Chapter 2: Introduction to AAA Security -- Understanding Network Access Server and Cisco AAA -- Authentication Methods -- Configuring the NAS for AAA -- Summary -- Exam Essentials -- Chapter 3: Configuring Cisco Secure ACS and TACACS+ -- Introduction to the Cisco Secure ACS -- Installing Cisco Secure ACS 3.0 -- Administering Cisco Secure ACS -- TACACS+ Overview -- Configuring TACACS+ -- Using RADIUS -- Verifying TACACS+ -- Summary -- Exam Essentials -- Chapter 4: Cisco Perimeter Router Problems and Solutions -- Solving Eavesdropping and Session Replay Problems -- Defending Against Unauthorized Access, Data Manipulation, and Malicious Destruction -- Solving Lack of Legal IP Addresses Problems -- Fighting Rerouting Attacks -- Fighting Denial-of-Service Attacks -- Turning Off and Configuring Network Services -- Summary -- Exam Essentials -- Chapter 5: Contect-Based Access Control Configuration.

Understanding the Cisco IOS Firewall -- Authentication Proxy and IDS -- Context-Based Access Control -- Introduction to CBAC Configuration -- Summary -- Exam Essentials -- Chapter 6: Cisco IOS Firewall Authentication and Intrusion Detection -- Introduction to the Cisco IOS Firewall Authentication Proxy -- Introduction to the Cisco IOS Firewall IDS -- Creating and Applying Audit Rules -- Verifying the Configuration -- Stopping the IOS Firewall IDS -- Summary -- Exam Essentials -- Chapter 7: Understanding Cisco IOS IPSec Support -- What Is a Virtual Private Network? -- Introduction to Cisco IOS IPSec -- The Components of IPSec -- Summary -- Exam Essentials -- Chapter 8: Cisco IOS IPSec Pre-shared Keys and Certificate Authority Support -- Configuring Cisco IOS IPSec for Pre- shared Keys Site- to- Site -- Configuring IPSec Manually -- Configuring Cisco IOS IPSec Certificate Authority Support Site- to- Site -- Summary -- Exam Essentials -- Chapter 9: Cisco IOS Remote Access Using Cisco Easy VPN -- Configuring IOS Remote Access Using Cisco Easy VPN -- Introduction to the Cisco VPN Software Client -- Summary -- Exam Essentials -- Part II: Cisco Secure PIX Firewall Advanced -- Chapter 10: PIX Firewall Basics -- Understanding a FirewallÌs Role in Network Security -- Reviewing Firewall Technologies -- Hardware and Software Components of the Cisco Secure PIX Firewall -- PIX Firewall Operation -- Working with the Firewall Services Module -- Using the PIX Firewall CLI -- Summary -- Exam Essentials -- Chapter 11: PIX Firewall Configuration -- Preparing for Firewall Configuration -- Using Common Global Configuration Commands -- Configuring PIX Firewall Interfaces -- Configuring NAT and PAT -- Configuring Routing -- Summary -- Exam Essentials -- Chapter 12: ACLs, Filtering, Object Grouping, and AAA -- Using PIX Firewall ACLs -- URL Filtering.

PPPoE and the PIX Firewall -- Object Groups -- Authentication, Authorization, and Accounting ( AAA) Services -- Summary -- Exam Essentials -- Chapter 13: Advanced Protocol Handling, Attack Guards, and Intrusion Detection -- Advanced Protocol Handling -- Attack Guards -- Intrusion Detection -- Summary -- Exam Essentials -- Chapter 14: Firewall Failover and PDM -- Fault-Tolerance Concepts -- PIX Firewall Failover -- Cisco PIX Device Manager (PDM) -- Summary -- Exam Essentials -- Chapter 15: VPNs and the PIX Firewall -- Preparing to Configure VPN support -- Configuring IKE on a Firewall -- Configuring IPSec on a Firewall -- Verifying and Troubleshooting IPSec Configuration on a Firewall -- Understanding Remote Access VPN -- Installing and Configuring the Cisco VPN Client -- Using PDM to Create VPNs -- Enterprise PIX Firewall Management and Maintenance -- Summary -- Exam Essentials -- Part III: Cisco Secure Virtual Private Networks -- Chapter 16: Introduction to Virtual Private Networks -- VPN Basics -- Introducing IPSec -- How IPSec Works -- IPSec Troubleshooting -- Summary -- Exam Essentials -- Chapter 17: Introduction to Cisco VPN Devices -- Introducing the VPN 3000 Concentrators -- Introducing the 3002 VPN Hardware Client -- Introducing the VPN Software Clients -- Overview of the Cisco VPN Software Client Auto- Initiation -- Summary -- Exam Essentials -- Chapter 18: Configuring the VPN Concentrator -- Using the CLI for Initial Configuration -- Using Web Quick Configuration Mode -- Configuring User and Policy Management -- Configuring the Use of IPSec Digital Certificates -- Firewall Feature Set for the IPSec Software Client -- Configuring the VPN 3000 Concentrator for IPSec over UDP and IPSec over TCP -- Summary -- Exam Essentials -- Chapter 19: Managing the VPN Concentrator -- Monitoring the VPN Concentrator -- Administering the VPN Concentrator.

Summary -- Exam Essentials -- Part IV: Cisco Secure Intrusion Detection Systems -- Chapter 20: Introduction to Intrusion Detection and Protection -- Understanding Security Threats -- Implementing Network Security -- Understanding Intrusion Detection Basics -- Cisco Secure Intrusion Protection -- Introduction to Cisco Secure IDS -- Summary -- Exam Essentials -- Chapter 21: Installing Cisco Secure IDS Sensors and IDSMs -- Deploying Cisco Secure IDS -- Installing and Configuring Cisco Secure IDS Sensors -- Summary -- Exam Essentials -- Chapter 22: Configuring the Network to Support Cisco Secure IDS Sensors -- Capturing Traffic -- Configuring Traffic Capture for the 4200 Series Sensors -- Configuring Traffic Capture for the IDSM -- Configuring Traffic Capture for the NM- CIDS -- Summary -- Exam Essentials -- Chapter 23: Configuring Cisco Secure IDS Sensors Using the IDS Device Manager -- IDS Device Manager Introduction -- Configuring Cisco Secure IDS Sensors Using the IDM -- Administering and Monitoring Cisco Secure IDS Sensors Using the IDM -- Summary -- Exam Essentials -- Chapter 24: Configuring Signatures and Using the IDS Event Viewer -- Cisco Secure IDS Signatures -- Configuring Cisco Secure IDS Signatures -- Introduction to the IDS Event Viewer -- Configuring the IEV -- Summary -- Exam Essentials -- Chapter 25: Enterprise Cisco Secure IDS Management -- Introduction to CiscoWorks VMS -- Installing CiscoWorks VMS -- Configuring IDS Sensors Using the IDS MC -- Administering the IDS MC -- Summary -- Exam Essentials -- Chapter 26: Enterprise Cisco Secure IDS Monitoring -- Introduction to the Security Monitor -- Configuring the Security Monitor -- Working with Events -- Administering the Security Monitoring Center -- Summary -- Exam Essentials -- Part V: Cisco SAFE Implementation -- Chapter 27: Security Fundamentals.

Identifying the Need for Network Security -- Network Attack Taxonomy -- Network Security Policies -- Management Protocols and Functions -- SAFE Architectural Overview -- SAFE Axioms -- Identifying the Security Wheel -- Summary -- Exam Essentials -- Chapter 28: The Cisco Security Portfolio -- Cisco Security Portfolio Overview -- Secure Connectivity: Virtual Private Network Solutions -- Understanding Intrusion Protection -- Secure Scanner -- Understanding Identity -- Understanding Security Management -- Cisco AVVID -- Summary -- Exam Essentials -- Chapter 29: SAFE Small and Medium Network Designs -- Small Network Design Overview -- Medium Network Design Overview -- Implementation of Key Devices -- Summary -- Exam Essentials -- Chapter 30: SAFE Remote Access Network Design -- Remote Access Network Design Overview -- Implementing the Remote Access Devices -- Summary -- Exam Essentials -- Index -- A -- B -- C -- D -- E -- F -- G -- H -- I -- J -- K -- L -- M -- N -- O -- P -- Q -- R -- S -- T -- U -- V -- W -- X -- Y -- Z.
Abstract:
Wade Edwards, CCIE, has over 15 years of networking experience and has been actively involved in the computer industry for over 24 years. Todd Lammle, CCNP is CEO and Chief Scientist of RouterSim, LLC and President of GlobalNet Training, Inc., and is the author of the best-selling CCNA: Cisco Certified Network Associate Study Guide from Sybex. Tom Lancaster, CCIE, is a consultant with IBM Global Services. Justin Menga, CCIE, is a Network Solutions Architect in the wireless and e-infrastructure field in New Zealand. Eric Quinn, CCSI, CCNP + Voice is an Arizona-based instructor and security consultant. Jason Rohm, CCIE, is a network consultant and adjunct instructor from Green Bay, Wisconsin. Carl Timm, CCIE, has over 10 years of experience in the design and implementation of large scale IP-based internetworks. Bryant Tow has over 15 years of experience in the IT industry as an instructor and entrepreneur.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Electronic Access:
Click to View
Holds: Copies: