CCNA Security (210-260) Portable Command Guide

  • ISBN13:


  • ISBN10:


  • Edition: 2nd
  • Format: Paperback
  • Copyright: 2016-04-04
  • Publisher: Cisco Press

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $34.99 Save up to $8.75
  • Rent Book $26.24
    Add to Cart Free Shipping


Supplemental Materials

What is included with this book?

  • The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
  • The Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.


Preparing for the latest CCNA Security exam? Here are all  the CCNA Security (210-260) commands you need in one condensed, portable resource. Filled with valuable, easy-to-access information, the CCNA Security Portable Command Guide, is portable enough for you to use whether you’re in the server room or the equipment closet.

Completely updated to reflect the new CCNA Security 210-260 exam, this quick reference summarizes relevant Cisco IOS® Software commands, keywords, command arguments, and associated prompts, and offers tips and examples for applying these commands to real-world security challenges. Configuration examples, throughout, provide an even deeper understanding of how to use IOS to protect networks.

Topics covered include

  • Networking security fundamentals: concepts, policies, strategy
  •  Protecting network infrastructure: network foundations, security management planes/access; data planes (Catalyst switches and IPv6)
  •  Threat control/containment: protecting endpoints and content; configuring ACLs, zone-based firewalls, and Cisco IOS IPS
  •  Secure connectivity: VPNs, cryptology, asymmetric encryption, PKI, IPsec VPNs, and site-to-site VPN configuration
  •  ASA network security: ASA/ASDM concepts; configuring ASA basic settings, advanced settings, and VPNs

 Access all CCNA Security commands: use as a quick, offline resource for research and solutions

  • Logical how-to topic groupings provide one-stop research
  • Great for review before CCNA Security certification exams
  • Compact size makes it easy to carry with you, wherever you go
  •  “Create Your Own Journal” section with blank, lined pages allows you to personalize the book for your needs
  •  “What Do You Want to Do?” chart inside the front cover helps you to quickly reference specific tasks

Author Biography

Bob Vachon is a professor in the Computer Systems Technology program at Cambrian College in Sudbury, Ontario, Canada, where he teaches networking infrastructure courses. He has worked and taught in the computer networking and information technology field since 1984. He has collaborated on various CCNA, CCNA Security, and CCNP projects for the Cisco Networking Academy as team lead, lead author, and subject matter expert. He enjoys playing the guitar and being outdoors.

Table of Contents

Table of Contents from First Edition


Part I: Networking Security Fundamentals

CHAPTER 1 Networking Security Concepts

CHAPTER 2 Implementing Security Policies Using a Lifecycle Approach

CHAPTER 3 Building a Security Strategy for Borderless Networks


Part II: Protecting the Network Infrastructure

CHAPTER 4 Network Foundation Protection

CHAPTER 5 Protecting the Network Infrastructure Using CCP

CHAPTER 6 Securing the Management Plane

CHAPTER 7 Securing Management Access with AAA

CHAPTER 8 Securing the Data Plane on Catalyst Switches

CHAPTER 9 Securing the Data Plane in IPv6 Environments


Part III: Threat Control and Containment

CHAPTER 10 Planning a Threat Control Strategy

CHAPTER 11 Configuring ACLs for Threat Mitigation

CHAPTER 12 Configuring Zone-Based Firewalls

CHAPTER 13 Configuring Cisco IOS IPS


Part IV: Secure Connectivity

CHAPTER 14 VPNs and Cryptology

CHAPTER 15 Asymmetric Encryption and PKI


CHAPTER 17 Configuring Site-to-Site VPNs


Part V: Securing the Network Using the ASA

CHAPTER 18 Introduction to the ASA

CHAPTER 19 Introduction to ASDM

CHAPTER 20 Configuring Cisco ASA Basic Settings

CHAPTER 21 Configuring Cisco ASA Advanced Settings

CHAPTER 22 Configuring Cisco ASA SSL VPNs

APPENDIX Create Your Own Journal Here

TOC, 9781587204487, 5/1/2012

Rewards Program

Write a Review