SØG - mellem flere end 8 millioner bøger:

Søg på: Titel, forfatter, forlag - gerne i kombination.
Eller blot på isbn, hvis du kender dette.

Viser: CCNP and CCIE Security Core SCOR 350-701 Exam Cram

CCNP and CCIE Security Core SCOR 350-701 Exam Cram

CCNP and CCIE Security Core SCOR 350-701 Exam Cram

Joseph Mlodzianowski, Eddie Mendonca og Nick Kelly
(2024)
Sprog: Engelsk
Cisco Press
312,00 kr.
ikke på lager, Bestil nu og få den leveret
om ca. 15 hverdage

Detaljer om varen

  • Paperback: 384 sider
  • Udgiver: Cisco Press (April 2024)
  • Forfattere: Joseph Mlodzianowski, Eddie Mendonca og Nick Kelly
  • ISBN: 9780137282517

CCNP and CCIE Security Core SCOR 350-701 Exam Cram is the perfect study guide to help you pass the CCNP and CCIE Security Core SCOR 350-701 exam, providing coverage and practice questions for every exam topic. The book contains an extensive set of preparation tools, including topic overviews, exam alerts, CramSavers, CramQuizzes, chapter-ending review questions, author notes, tips, and an extensive glossary.

 

The book also contains the extremely useful Cram Sheet: a collection of essential facts in an easy to review format. Complementing all these great study tools is the powerful Pearson Test Prep practice test software, complete with hundreds of exam-realistic practice questions. This assessment software offers you a wealth of customization options and reporting features, allowing you to test your knowledge in study mode, practice mode, or flashcard mode.

 

Covers the critical information you'll need to know to score higher on your CCNP and CCIE Security Core SCOR 350-701 exam

 

  • Compare common security vulnerabilities such as software bugs, weak or hardcoded passwords, OWASP top ten, missing encryption ciphers, buffer overflow, path traversal, cross-site scripting/forgery
  • Configure AAA for device and network access such as TACACS+ and RADIUS
  • Implement segmentation, access control policies, AVC, URL filtering, malware protection, and intrusion policies
  • Identify security capabilities, deployment models, and policy management to secure the cloud
  • Configure cloud logging and monitoring methodologies
  • Implement traffic redirection and capture methods for web proxy
  • Describe the components, capabilities, and benefits of the Cisco Umbrella
  • Configure endpoint antimalware protection using Cisco Secure Endpoint
  • Describe the uses and importance of a multifactor authentication (MFA) strategy
Introduction.
.
.
.
.
.
.
.
.
.
.
. xviii
CHAPTER 1: Security Concepts..
.
.
.
.
.
.
.
.
.
. 1 Explain Common Threats Against On-Premises and Cloud Environments..
.
.
.
.
.
.
.
. 3 Compare Common Security Vulnerabilities..
.
.
.
. 19 Describe Functions of the Cryptography Components.
.
.
. 25 Compare Site-to-Site VPN and Remote Access VPN Deployment Types..
.
.
.
.
.
.
.
. 31 Describe Security Intelligence Authoring, Sharing, and Consumption.. 38 Explain the Role of the Endpoint in Protecting Humans from Phishing and Social Engineering Attacks..
.
.
.
.
. 41 Explain Northbound and Southbound APIs in the SDN Architecture.. 44 Explain DNAC APIs for Network Provisioning, Optimization, Monitoring, and Troubleshooting..
.
.
.
.
.
. 48 Interpret Basic Python Scripts Used to Call Cisco Security Appliance APIs..
.
.
.
.
.
.
.
.
. 51 What Next?..
.
.
.
.
.
.
.
.
.
. 56
CHAPTER 2: Network Security..
.
.
.
.
.
.
.
.
.
. 57 Compare Network Security Solutions and Provide Intrusion Prevention and Firewall Capabilities..
.
.
.
.
. 60 Describe Deployment Models of Network Security Solutions and Architectures That Provide Intrusion Prevention and Firewall Capabilities..
.
.
.
.
.
.
.
. 65 Describe the Components, Capabilities, and Benefits of NetFlow and Flexible NetFlow Records..
.
.
.
.
.
.
. 70 Traditional NetFlow vs. Flexible NetFlow..
.
.
.
. 74 Configure and Verify Network Infrastructure Security Methods (Router, Switch, and Wireless)..
.
.
.
.
.
. 77 Implement Segmentation, Access Control Policies, AVC, URL Filtering, and Malware Protection.
.
.
.
.
.
. 89 Implement Management Options for Network Security Solutions..
. 93 Configure AAA for Device and Network Access..
.
.
.
. 97 Configure Secure Network Management of Perimeter Security an Infrastructure Devices..
.
.
.
.
.
.
.
. 101 Configure and Verify Site-to-Site VPN and Remote Access VPN..
. 106 What Next?..
.
.
.
.
.
.
.
.
.
. 119
CHAPTER 3: Securing the Cloud..
.
.
.
.
.
.
.
.
. 121 Identify Security Solutions for Cloud Environments..
.
.
. 122 Compare Security Responsibilities for the Different Cloud Service Models..
.
.
.
.
.
.
.
.
. 129 Describe the Concepts of DevSecOps (CI/CD Pipeline), Container Orchestration, and Secure Software Development..
.
.
. 132 Implementing Application Security..
.
.
.
.
.
. 136 Identify Security Capabilities, Deployment Models, and Policy Management to Secure the Cloud..
.
.
.
.
.
. 142 Configure Cloud Logging and Monitoring.
.
.
.
.
. 144 Application Security Concepts..
.
.
.
.
.
.
. 146 What Next?..
.
.
.
.
.
.
.
.
.
. 150
CHAPTER 4: Content Security..
.
.
.
.
.
.
.
.
.
. 151 Web Proxy Fundamentals.
.
.
.
.
.
.
.
. 158 Web Proxy Identity and Authentication..
.
.
.
.
. 167 Cisco Secure Web Appliance Identification and Authentication. 167 Content Security Overview..
.
.
.
.
.
.
. 171 Deploying Cisco Secure Web Appliance and Secure Email Gateway.. 184 Secure Email Gateway Configuration..
.
.
.
.
. 190 Cisco Secure Web Appliance Configuration..
.
.
.
. 202 Cisco Umbrella Overview..
.
.
.
.
.
.
. 209 Cisco Umbrella Configuration..
.
.
.
.
.
.
. 216 What Next?..
.
.
.
.
.
.
.
.
.
. 222
CHAPTER 5: Endpoint Protection and Detection..
.
.
.
.
.
.
. 223 Endpoint Protection and Endpoint Detection and Response.
.
. 225 Cisco Secure Endpoint..
.
.
.
.
.
.
.
. 227 Outbreak Control and Quarantines..
.
.
.
.
.
. 230 Justifications for Endpoint Security..
.
.
.
.
.
. 239 Endpoint Management and Asset Inventory Tools..
.
.
. 241 Uses and Importance of a Multifactor Authentication Strategy..
. 246 Endpoint Posture Assessments to Ensure Endpoint Security.
.
. 252 Endpoint Patching Strategy..
.
.
.
.
.
.
. 254 What Next?..
.
.
.
.
.
.
.
.
.
. 256
CHAPTER 6: Secure Network Access, Visibility, and Enforcement..
.
.
. 257 Identity Management Concepts..
.
.
.
.
.
. 262 AAA Configuration..
.
.
.
.
.
.
.
.
. 275 RADIUS Change of Authorization..
.
.
.
.
.
. 292 RADIUS CoA Use Cases.
.
.
.
.
.
.
. 292 Application Visibility and Control..
.
.
.
.
.
. 297 Data Exfiltration.
.
.
.
.
.
.
.
.
. 300 Network Telemetry..
.
.
.
.
.
.
.
.
. 305 Cisco Security Solutions..
.
.
.
.
.
.
.
. 308 What Next?..
.
.
.
.
.
.
.
.
.
. 319 Cram Sheet.
.
.
.
.
.
.
.
.
.
.
. 321 Online Element: Glossary 9780137282517, TOC, 2/19/24
De oplyste priser er inkl. moms

Polyteknisk Boghandel

har gennem mere end 50 år været studieboghandlen på DTU og en af Danmarks førende specialister i faglitteratur.

 

Vi lagerfører et bredt udvalg af bøger, ikke bare inden for videnskab og teknik, men også f.eks. ledelse, IT og meget andet.

Læs mere her


Fysisk eller digital bog?

Ud over trykte bøger tilbyder vi tre forskellige typer af digitale bøger:

 

Vital Source Bookshelf: En velfungerende ebogsplatform, hvor bogen downloades til din computer og/eller mobile enhed.

 

Du skal bruge den gratis Bookshelf software til at læse læse bøgerne - der er indbygget gode værktøjer til f.eks. søgning, overstregning, notetagning mv. I langt de fleste tilfælde vil du samtidig have en sideløbende 1825 dages online adgang. Læs mere om Vital Source bøger

 

Levering: I forbindelse med købet opretter du et login. Når du har installeret Bookshelf softwaren, logger du blot ind og din bog downloades automatisk.

 

 

Adobe ebog: Dette er Adobe DRM ebøger som downloades til din lokale computer eller mobil enhed.

 

For at læse bøgerne kræves særlig software, som understøtter denne type. Softwaren er gratis, men du bør sikre at du har rettigheder til installere software på den maskine du påtænker at anvende den på. Læs mere om Adobe DRM bøger

 

Levering: Et download link sendes pr email umiddelbart efter købet.

 


Ibog: Dette er en online bog som kan læses på udgiverens website. 

Der kræves ikke særlig software, bogen læses i en almindelig browser.

 

Levering: Vores medarbejder sender dig en adgangsnøgle pr email.

 

Vi gør opmærksom på at der ikke er retur/fortrydelsesret på digitale varer.