<p>Introduction. . . . . . . . . . . . xviii</p> <p><strong>CHAPTER 1: </strong><strong>Security Concepts</strong><strong>.. . . . . . . . . . . </strong><strong>1</strong></p> <p>Explain Common Threats Against On-Premises and Cloud Environments.. . . . . . . . . 3</p> <p>Compare Common Security Vulnerabilities.. . . . . 19</p> <p>Describe Functions of the Cryptography Components. . . . 25</p> <p>Compare Site-to-Site VPN and Remote Access VPN Deployment Types.. . . . . . . . . 31</p> <p>Describe Security Intelligence Authoring, Sharing, and Consumption.. 38</p> <p>Explain the Role of the Endpoint in Protecting Humans from Phishing and Social Engineering Attacks.. . . . . . 41</p> <p>Explain Northbound and Southbound APIs in the SDN Architecture.. 44</p> <p>Explain DNAC APIs for Network Provisioning, Optimization, Monitoring, and Troubleshooting.. . . . . . . 48</p> <p>Interpret Basic Python Scripts Used to Call Cisco Security Appliance APIs.. . . . . . . . . . 51</p> <p>What Next?.. . . . . . . . . . . 56</p> <p><strong>CHAPTER 2: </strong><strong>Network Security</strong><strong>.. . . . . . . . . . . </strong><strong>57</strong></p> <p>Compare Network Security Solutions and Provide Intrusion Prevention and Firewall Capabilities.. . . . . . 60</p> <p>Describe Deployment Models of Network Security Solutions and Architectures That Provide<br> Intrusion Prevention and Firewall Capabilities.. . . . . . . . . 65</p> <p>Describe the Components, Capabilities, and Benefits of NetFlow and Flexible NetFlow Records.. . . . . . . . 70</p> <p>Traditional NetFlow vs. Flexible NetFlow.. . . . . 74</p> <p>Configure and Verify Network Infrastructure Security Methods (Router, Switch, and Wireless).. . . . . . . 77</p> <p>Implement Segmentation, Access Control Policies, AVC, URL Filtering, and Malware Protection. . . . . . . 89</p> <p>Implement Management Options for Network Security Solutions.. . 93</p> <p>Configure AAA for Device and Network Access.. . . . . 97</p> <p>Configure Secure Network Management of Perimeter Security an Infrastructure Devices.. . . . . . . . . 101</p> <p>Configure and Verify Site-to-Site VPN and Remote Access VPN.. . 106</p> <p>What Next?.. . . . . . . . . . . 119</p> <p><strong>CHAPTER 3: </strong><strong>Securing the Cloud</strong><strong>.. . . . . . . . . . </strong><strong>121</strong></p> <p>Identify Security Solutions for Cloud Environments.. . . . 122</p> <p>Compare Security Responsibilities for the Different Cloud Service Models.. . . . . . . . . . 129</p> <p>Describe the Concepts of DevSecOps (CI/CD Pipeline), Container Orchestration, and Secure<br> Software Development.. . . . 132</p> <p>Implementing Application Security.. . . . . . . 136</p> <p>Identify Security Capabilities, Deployment Models, and Policy Management to Secure the Cloud.. . . . . . . 142</p> <p>Configure Cloud Logging and Monitoring. . . . . . 144</p> <p>Application Security Concepts.. . . . . . . . 146</p> <p>What Next?.. . . . . . . . . . . 150</p> <p><strong>CHAPTER 4: </strong><strong>Content Security</strong><strong>.. . . . . . . . . . . </strong><strong>151</strong></p> <p>Web Proxy Fundamentals. . . . . . . . . 158</p> <p>Web Proxy Identity and Authentication.. . . . . . 167</p> <p>Cisco Secure Web Appliance Identification and Authentication. 167</p> <p>Content Security Overview.. . . . . . . . 171</p> <p>Deploying Cisco Secure Web Appliance and Secure Email Gateway.. 184</p> <p>Secure Email Gateway Configuration.. . . . . . 190</p> <p>Cisco Secure Web Appliance Configuration.. . . . . 202</p> <p>Cisco Umbrella Overview.. . . . . . . . 209</p> <p>Cisco Umbrella Configuration.. . . . . . . . 216</p> <p>What Next?.. . . . . . . . . . . 222</p> <p><strong>CHAPTER 5: </strong><strong>Endpoint Protection and Detection</strong><strong>.. . . . . . . . </strong><strong>223</strong></p> <p>Endpoint Protection and Endpoint Detection and Response. . . 225</p> <p>Cisco Secure Endpoint.. . . . . . . . . 227</p> <p>Outbreak Control and Quarantines.. . . . . . . 230</p> <p>Justifications for Endpoint Security.. . . . . . . 239</p> <p>Endpoint Management and Asset Inventory Tools.. . . . 241</p> <p>Uses and Importance of a Multifactor Authentication Strategy.. . 246</p> <p>Endpoint Posture Assessments to Ensure Endpoint Security. . . 252</p> <p>Endpoint Patching Strategy.. . . . . . . . 254</p> <p>What Next?.. . . . . . . . . . . 256</p> <p><strong>CHAPTER 6: </strong><strong>Secure Network Access, Visibility, and Enforcement</strong><strong>.. . . . </strong><strong>257</strong></p> <p>Identity Management Concepts.. . . . . . . 262</p> <p>AAA Configuration.. . . . . . . . . . 275</p> <p>RADIUS Change of Authorization.. . . . . . . 292</p> <p>RADIUS CoA Use Cases. . . . . . . . 292</p> <p>Application Visibility and Control.. . . . . . . 297</p> <p>Data Exfiltration. . . . . . . . . . 300</p> <p>Network Telemetry.. . . . . . . . . . 305</p> <p>Cisco Security Solutions.. . . . . . . . . 308</p> <p>What Next?.. . . . . . . . . . . 319</p> <p>Cram Sheet. . . . . . . . . . . . 321</p> <p> </p> <p>Online Element:</p> <p>Glossary</p> <p> </p> <p>9780137282517, TOC, 2/19/24</p>