, ,

CCNP and CCIE Security Core SCOR 350-701 Exam Cram

Specificaties
Paperback, blz. | Engels
Pearson Education | e druk, 2024
ISBN13: 9780137282517
Rubricering
Pearson Education e druk, 2024 9780137282517
Onderdeel van serie Exam Cram
€ 50,14
Levertijd ongeveer 8 werkdagen

Samenvatting

CCNP and CCIE Security Core SCOR 350-701 Exam Cram is the perfect study guide to help you pass the CCNP and CCIE Security Core SCOR 350-701 exam, providing coverage and practice questions for every exam topic. The book contains an extensive set of preparation tools, including topic overviews, exam alerts, CramSavers, CramQuizzes, chapter-ending review questions, author notes, tips, and an extensive glossary.

 

The book also contains the extremely useful Cram Sheet: a collection of essential facts in an easy to review format. Complementing all these great study tools is the powerful Pearson Test Prep practice test software, complete with hundreds of exam-realistic practice questions. This assessment software offers you a wealth of customization options and reporting features, allowing you to test your knowledge in study mode, practice mode, or flashcard mode.

 

Covers the critical information you’ll need to know to score higher on your CCNP and CCIE Security Core SCOR 350-701 exam

  Compare common security vulnerabilities such as software bugs, weak or hardcoded passwords, OWASP top ten, missing encryption ciphers, buffer overflow, path traversal, cross-site scripting/forgery Configure AAA for device and network access such as TACACS+ and RADIUS Implement segmentation, access control policies, AVC, URL filtering, malware protection, and intrusion policies Identify security capabilities, deployment models, and policy management to secure the cloud Configure cloud logging and monitoring methodologies Implement traffic redirection and capture methods for web proxy Describe the components, capabilities, and benefits of the Cisco Umbrella Configure endpoint antimalware protection using Cisco Secure Endpoint Describe the uses and importance of a multifactor authentication (MFA) strategy

Specificaties

ISBN13:9780137282517
Taal:Engels
Bindwijze:Paperback
Serie:Exam Cram

Inhoudsopgave

<p>Introduction. . . . . . . . . . . . xviii</p> <p><strong>CHAPTER 1: </strong><strong>Security Concepts</strong><strong>.. . . . . . . . . . . </strong><strong>1</strong></p> <p>Explain Common Threats Against On-Premises and Cloud Environments.. . . . . . . . . 3</p> <p>Compare Common Security Vulnerabilities.. . . . . 19</p> <p>Describe Functions of the Cryptography Components. . . . 25</p> <p>Compare Site-to-Site VPN and Remote Access VPN Deployment Types.. . . . . . . . . 31</p> <p>Describe Security Intelligence Authoring, Sharing, and Consumption.. 38</p> <p>Explain the Role of the Endpoint in Protecting Humans from Phishing and Social Engineering Attacks.. . . . . . 41</p> <p>Explain Northbound and Southbound APIs in the SDN Architecture.. 44</p> <p>Explain DNAC APIs for Network Provisioning, Optimization, Monitoring, and Troubleshooting.. . . . . . . 48</p> <p>Interpret Basic Python Scripts Used to Call Cisco Security Appliance APIs.. . . . . . . . . . 51</p> <p>What Next?.. . . . . . . . . . . 56</p> <p><strong>CHAPTER 2: </strong><strong>Network Security</strong><strong>.. . . . . . . . . . . </strong><strong>57</strong></p> <p>Compare Network Security Solutions and Provide Intrusion Prevention and Firewall Capabilities.. . . . . . 60</p> <p>Describe Deployment Models of Network Security Solutions and Architectures That Provide<br> &nbsp;&nbsp;&nbsp; Intrusion Prevention and Firewall Capabilities.. . . . . . . . . 65</p> <p>Describe the Components, Capabilities, and Benefits of NetFlow and Flexible NetFlow Records.. . . . . . . . 70</p> <p>Traditional NetFlow vs. Flexible NetFlow.. . . . . 74</p> <p>Configure and Verify Network Infrastructure Security Methods (Router, Switch, and Wireless).. . . . . . . 77</p> <p>Implement Segmentation, Access Control Policies, AVC, URL&nbsp; Filtering, and Malware Protection. . . . . . . 89</p> <p>Implement Management Options for Network Security Solutions.. . 93</p> <p>Configure AAA for Device and Network Access.. . . . . 97</p> <p>Configure Secure Network Management of Perimeter Security an Infrastructure Devices.. . . . . . . . . 101</p> <p>Configure and Verify Site-to-Site VPN and Remote Access VPN.. . 106</p> <p>What Next?.. . . . . . . . . . . 119</p> <p><strong>CHAPTER 3: </strong><strong>Securing the Cloud</strong><strong>.. . . . . . . . . . </strong><strong>121</strong></p> <p>Identify Security Solutions for Cloud Environments.. . . . 122</p> <p>Compare Security Responsibilities for the Different Cloud Service Models.. . . . . . . . . . 129</p> <p>Describe the Concepts of DevSecOps (CI/CD Pipeline), Container Orchestration, and Secure<br> &nbsp;&nbsp;&nbsp;&nbsp; Software Development.. . . . 132</p> <p>Implementing Application Security.. . . . . . . 136</p> <p>Identify Security Capabilities, Deployment Models, and Policy Management to Secure the Cloud.. . . . . . . 142</p> <p>Configure Cloud Logging and Monitoring. . . . . . 144</p> <p>Application Security Concepts.. . . . . . . . 146</p> <p>What Next?.. . . . . . . . . . . 150</p> <p><strong>CHAPTER 4: </strong><strong>Content Security</strong><strong>.. . . . . . . . . . . </strong><strong>151</strong></p> <p>Web Proxy Fundamentals. . . . . . . . . 158</p> <p>Web Proxy Identity and Authentication.. . . . . . 167</p> <p>Cisco Secure Web Appliance Identification and Authentication. 167</p> <p>Content Security Overview.. . . . . . . . 171</p> <p>Deploying Cisco Secure Web Appliance and Secure Email Gateway.. 184</p> <p>Secure Email Gateway Configuration.. . . . . . 190</p> <p>Cisco Secure Web Appliance Configuration.. . . . . 202</p> <p>Cisco Umbrella Overview.. . . . . . . . 209</p> <p>Cisco Umbrella Configuration.. . . . . . . . 216</p> <p>What Next?.. . . . . . . . . . . 222</p> <p><strong>CHAPTER 5: </strong><strong>Endpoint Protection and Detection</strong><strong>.. . . . . . . . </strong><strong>223</strong></p> <p>Endpoint Protection and Endpoint Detection and Response. . . 225</p> <p>Cisco Secure Endpoint.. . . . . . . . . 227</p> <p>Outbreak Control and Quarantines.. . . . . . . 230</p> <p>Justifications for Endpoint Security.. . . . . . . 239</p> <p>Endpoint Management and Asset Inventory Tools.. . . . 241</p> <p>Uses and Importance of a Multifactor Authentication Strategy.. . 246</p> <p>Endpoint Posture Assessments to Ensure Endpoint Security. . . 252</p> <p>Endpoint Patching Strategy.. . . . . . . . 254</p> <p>What Next?.. . . . . . . . . . . 256</p> <p><strong>CHAPTER 6: </strong><strong>Secure Network Access, Visibility, and Enforcement</strong><strong>.. . . . </strong><strong>257</strong></p> <p>Identity Management Concepts.. . . . . . . 262</p> <p>AAA Configuration.. . . . . . . . . . 275</p> <p>RADIUS Change of Authorization.. . . . . . . 292</p> <p>RADIUS CoA Use Cases. . . . . . . . 292</p> <p>Application Visibility and Control.. . . . . . . 297</p> <p>Data Exfiltration. . . . . . . . . . 300</p> <p>Network Telemetry.. . . . . . . . . . 305</p> <p>Cisco Security Solutions.. . . . . . . . . 308</p> <p>What Next?.. . . . . . . . . . . 319</p> <p>Cram Sheet. . . . . . . . . . . . 321</p> <p>&nbsp;</p> <p>Online Element:</p> <p>Glossary</p> <p>&nbsp;</p> <p>9780137282517, TOC, 2/19/24</p>
€ 50,14
Levertijd ongeveer 8 werkdagen

Rubrieken

    Personen

      Trefwoorden

        CCNP and CCIE Security Core SCOR 350-701 Exam Cram