CCNA Security (210-260) Portable Command Guide

by
Edition: 2nd
Format: Paperback
Pub. Date: 2016-04-04
Publisher(s): Cisco Press
List Price: $37.30

Rent Textbook

Select for Price
There was a problem. Please try again later.

New Textbook

We're Sorry
Sold Out

Used Textbook

We're Sorry
Sold Out

eTextbook

We're Sorry
Not Available

How Marketplace Works:

  • This item is offered by an independent seller and not shipped from our warehouse
  • Item details like edition and cover design may differ from our description; see seller's comments before ordering.
  • Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
  • Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
  • Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.

Summary

Preparing for the latest CCNA Security exam? Here are all  the CCNA Security (210-260) commands you need in one condensed, portable resource. Filled with valuable, easy-to-access information, the CCNA Security Portable Command Guide, is portable enough for you to use whether you’re in the server room or the equipment closet.


Completely updated to reflect the new CCNA Security 210-260 exam, this quick reference summarizes relevant Cisco IOS® Software commands, keywords, command arguments, and associated prompts, and offers tips and examples for applying these commands to real-world security challenges. Configuration examples, throughout, provide an even deeper understanding of how to use IOS to protect networks.


Topics covered include


  • Networking security fundamentals: concepts, policies, strategy
  •  Protecting network infrastructure: network foundations, security management planes/access; data planes (Catalyst switches and IPv6)
  •  Threat control/containment: protecting endpoints and content; configuring ACLs, zone-based firewalls, and Cisco IOS IPS
  •  Secure connectivity: VPNs, cryptology, asymmetric encryption, PKI, IPsec VPNs, and site-to-site VPN configuration
  •  ASA network security: ASA/ASDM concepts; configuring ASA basic settings, advanced settings, and VPNs

 Access all CCNA Security commands: use as a quick, offline resource for research and solutions


  • Logical how-to topic groupings provide one-stop research
  • Great for review before CCNA Security certification exams
  • Compact size makes it easy to carry with you, wherever you go
  •  “Create Your Own Journal” section with blank, lined pages allows you to personalize the book for your needs
  •  “What Do You Want to Do?” chart inside the front cover helps you to quickly reference specific tasks


Author Biography

Bob Vachon is a professor in the Computer Systems Technology program at Cambrian College in Sudbury, Ontario, Canada, where he teaches networking infrastructure courses. He has worked and taught in the computer networking and information technology field since 1984. He has collaborated on various CCNA, CCNA Security, and CCNP projects for the Cisco Networking Academy as team lead, lead author, and subject matter expert. He enjoys playing the guitar and being outdoors.

Table of Contents

Table of Contents from First Edition

 

Part I: Networking Security Fundamentals

CHAPTER 1 Networking Security Concepts

CHAPTER 2 Implementing Security Policies Using a Lifecycle Approach

CHAPTER 3 Building a Security Strategy for Borderless Networks

 

Part II: Protecting the Network Infrastructure

CHAPTER 4 Network Foundation Protection

CHAPTER 5 Protecting the Network Infrastructure Using CCP

CHAPTER 6 Securing the Management Plane

CHAPTER 7 Securing Management Access with AAA

CHAPTER 8 Securing the Data Plane on Catalyst Switches

CHAPTER 9 Securing the Data Plane in IPv6 Environments

  

Part III: Threat Control and Containment

CHAPTER 10 Planning a Threat Control Strategy

CHAPTER 11 Configuring ACLs for Threat Mitigation

CHAPTER 12 Configuring Zone-Based Firewalls

CHAPTER 13 Configuring Cisco IOS IPS

 

Part IV: Secure Connectivity

CHAPTER 14 VPNs and Cryptology

CHAPTER 15 Asymmetric Encryption and PKI

CHAPTER 16 IPsec VPNs

CHAPTER 17 Configuring Site-to-Site VPNs

 

Part V: Securing the Network Using the ASA

CHAPTER 18 Introduction to the ASA

CHAPTER 19 Introduction to ASDM

CHAPTER 20 Configuring Cisco ASA Basic Settings

CHAPTER 21 Configuring Cisco ASA Advanced Settings

CHAPTER 22 Configuring Cisco ASA SSL VPNs

APPENDIX Create Your Own Journal Here

TOC, 9781587204487, 5/1/2012

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.