did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9781587205750

CCNA Security (210-260) Portable Command Guide

by
  • ISBN13:

    9781587205750

  • ISBN10:

    1587205750

  • Edition: 2nd
  • Format: Paperback
  • Copyright: 2016-04-04
  • Publisher: Cisco Press

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $34.99 Save up to $24.49
  • Rent Book $11.03
    Add to Cart Free Shipping Icon Free Shipping

    TERM
    PRICE
    DUE
    IN STOCK USUALLY SHIPS WITHIN 24-48 HOURS.
    *This item is part of an exclusive publisher rental program and requires an additional convenience fee. This fee will be reflected in the shopping cart.

Supplemental Materials

What is included with this book?

Summary

Preparing for the latest CCNA Security exam? Here are all  the CCNA Security (210-260) commands you need in one condensed, portable resource. Filled with valuable, easy-to-access information, the CCNA Security Portable Command Guide, is portable enough for you to use whether you’re in the server room or the equipment closet.


Completely updated to reflect the new CCNA Security 210-260 exam, this quick reference summarizes relevant Cisco IOS® Software commands, keywords, command arguments, and associated prompts, and offers tips and examples for applying these commands to real-world security challenges. Configuration examples, throughout, provide an even deeper understanding of how to use IOS to protect networks.


Topics covered include


  • Networking security fundamentals: concepts, policies, strategy
  •  Protecting network infrastructure: network foundations, security management planes/access; data planes (Catalyst switches and IPv6)
  •  Threat control/containment: protecting endpoints and content; configuring ACLs, zone-based firewalls, and Cisco IOS IPS
  •  Secure connectivity: VPNs, cryptology, asymmetric encryption, PKI, IPsec VPNs, and site-to-site VPN configuration
  •  ASA network security: ASA/ASDM concepts; configuring ASA basic settings, advanced settings, and VPNs

 Access all CCNA Security commands: use as a quick, offline resource for research and solutions


  • Logical how-to topic groupings provide one-stop research
  • Great for review before CCNA Security certification exams
  • Compact size makes it easy to carry with you, wherever you go
  •  “Create Your Own Journal” section with blank, lined pages allows you to personalize the book for your needs
  •  “What Do You Want to Do?” chart inside the front cover helps you to quickly reference specific tasks


Author Biography

Bob Vachon is a professor in the Computer Systems Technology program at Cambrian College in Sudbury, Ontario, Canada, where he teaches networking infrastructure courses. He has worked and taught in the computer networking and information technology field since 1984. He has collaborated on various CCNA, CCNA Security, and CCNP projects for the Cisco Networking Academy as team lead, lead author, and subject matter expert. He enjoys playing the guitar and being outdoors.

Table of Contents

Table of Contents from First Edition

 

Part I: Networking Security Fundamentals

CHAPTER 1 Networking Security Concepts

CHAPTER 2 Implementing Security Policies Using a Lifecycle Approach

CHAPTER 3 Building a Security Strategy for Borderless Networks

 

Part II: Protecting the Network Infrastructure

CHAPTER 4 Network Foundation Protection

CHAPTER 5 Protecting the Network Infrastructure Using CCP

CHAPTER 6 Securing the Management Plane

CHAPTER 7 Securing Management Access with AAA

CHAPTER 8 Securing the Data Plane on Catalyst Switches

CHAPTER 9 Securing the Data Plane in IPv6 Environments

  

Part III: Threat Control and Containment

CHAPTER 10 Planning a Threat Control Strategy

CHAPTER 11 Configuring ACLs for Threat Mitigation

CHAPTER 12 Configuring Zone-Based Firewalls

CHAPTER 13 Configuring Cisco IOS IPS

 

Part IV: Secure Connectivity

CHAPTER 14 VPNs and Cryptology

CHAPTER 15 Asymmetric Encryption and PKI

CHAPTER 16 IPsec VPNs

CHAPTER 17 Configuring Site-to-Site VPNs

 

Part V: Securing the Network Using the ASA

CHAPTER 18 Introduction to the ASA

CHAPTER 19 Introduction to ASDM

CHAPTER 20 Configuring Cisco ASA Basic Settings

CHAPTER 21 Configuring Cisco ASA Advanced Settings

CHAPTER 22 Configuring Cisco ASA SSL VPNs

APPENDIX Create Your Own Journal Here

TOC, 9781587204487, 5/1/2012

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program