Securing the Borderless Network

Securing the Borderless Network
Title Securing the Borderless Network PDF eBook
Author Tom Gillis
Publisher Pearson Education
Pages 290
Release 2010-04-09
Genre Computers
ISBN 1587141302

Download Securing the Borderless Network Book in PDF, Epub and Kindle

Securing the Borderless Network reveals New techniques for securing advanced Web 2.0, virtualization, mobility, and collaborative applications Today’s new Web 2.0, virtualization, mobility, telepresence, and collaborative applications offer immense potential for enhancing productivity and competitive advantage. However, they also introduce daunting new security issues, many of which are already being exploited by cybercriminals. Securing the Borderless Network is the first book entirely focused on helping senior IT decision-makers understand, manage, and mitigate the security risks of these new collaborative technologies. Cisco® security technology expert Tom Gillis brings together systematic, timely decision-making and technical guidance for companies of all sizes: information and techniques for protecting collaborative systems without compromising their business benefits. You’ll walk through multiple scenarios and case studies, from Cisco Webex® conferencing to social networking to cloud computing. For each scenario, the author identifies key security risks and presents proven best-practice responses, both technical and nontechnical. Securing the Borderless Network reviews the latest Cisco technology solutions for managing identity and securing networks, content, endpoints, and applications. The book concludes by discussing the evolution toward "Web 3.0" applications and the Cisco security vision for the borderless enterprise, providing you with a complete security overview for this quickly evolving network paradigm.

Connecting Networks Companion Guide

Connecting Networks Companion Guide
Title Connecting Networks Companion Guide PDF eBook
Author Cisco Networking Academy
Publisher Pearson Education
Pages 569
Release 2014
Genre Computers
ISBN 1587133326

Download Connecting Networks Companion Guide Book in PDF, Epub and Kindle

"This course discusses the WAN technologies and network services required by converged applications in a complex network. The course allows you to understand the selection criteria of network devices and WAN technologies to meet network requirements. You will learn how to configure and troubleshoot network devices and resolve common issues with data link protocols. You will also develop the knowledge and skills needed to implement IPSec and virtual private network (VPN) operations in a complex network."--Back cover.

Cisco ISE for BYOD and Secure Unified Access

Cisco ISE for BYOD and Secure Unified Access
Title Cisco ISE for BYOD and Secure Unified Access PDF eBook
Author Jamey Heary
Publisher Cisco Press
Pages 752
Release 2013-06-07
Genre Computers
ISBN 0133103633

Download Cisco ISE for BYOD and Secure Unified Access Book in PDF, Epub and Kindle

Plan and deploy identity-based secure access for BYOD and borderless networks Using Cisco Secure Unified Access Architecture and Cisco Identity Services Engine, you can secure and regain control of borderless networks in a Bring Your Own Device (BYOD) world. This book covers the complete lifecycle of protecting a modern borderless network using these advanced solutions, from planning an architecture through deployment, management, and troubleshooting. Cisco ISE for BYOD and Secure Unified Access begins by reviewing the business case for an identity solution. Next, you’ll walk through identifying users, devices, and security posture; gain a deep understanding of Cisco’s Secure Unified Access solution; and master powerful techniques for securing borderless networks, from device isolation to protocol-independent network segmentation. You’ll find in-depth coverage of all relevant technologies and techniques, including 802.1X, profiling, device onboarding, guest lifecycle management, network admission control, RADIUS, and Security Group Access. Drawing on their cutting-edge experience supporting Cisco enterprise customers, the authors present detailed sample configurations to help you plan your own integrated identity solution. Whether you’re a technical professional or an IT manager, this guide will help you provide reliable secure access for BYOD, CYOD (Choose Your Own Device), or any IT model you choose. Review the new security challenges associated with borderless networks, ubiquitous mobility, and consumerized IT Understand the building blocks of an Identity Services Engine (ISE) solution Design an ISE-Enabled network, plan/distribute ISE functions, and prepare for rollout Build context-aware security policies Configure device profiling, endpoint posture assessments, and guest services Implement secure guest lifecycle management, from WebAuth to sponsored guest access Configure ISE, network access devices, and supplicants, step-by-step Walk through a phased deployment that ensures zero downtime Apply best practices to avoid the pitfalls of BYOD secure access Simplify administration with self-service onboarding and registration Deploy Security Group Access, Cisco’s tagging enforcement solution Add Layer 2 encryption to secure traffic flows Use Network Edge Access Topology to extend secure access beyond the wiring closet Monitor, maintain, and troubleshoot ISE and your entire Secure Unified Access system

CCNA Security 640-554 Official Cert Guide

CCNA Security 640-554 Official Cert Guide
Title CCNA Security 640-554 Official Cert Guide PDF eBook
Author Keith Barker
Publisher Pearson Education
Pages 744
Release 2013
Genre Computers
ISBN 1587204460

Download CCNA Security 640-554 Official Cert Guide Book in PDF, Epub and Kindle

Trust the best selling Official Cert Guide series from Cisco Press to help you learn, prepare, and practice for exam success. They are built with the objective of providing assessment, review, and practice to help ensure you are fully prepared for your certification exam. CCNA Security 640-554 Official Cert Guide presents you with an organized test preparation routine through the use of proven series elements and techniques. "Do I Know This Already?" quizzes open each chapter and enable you to decide how much time you need to spend on each section. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly. · Master Cisco CCNA Security 640-554 exam topics · Assess your knowledge with chapter-opening quizzes · Review key concepts with exam preparation tasks · Practice with realistic exam questions on the CD-ROM CCNA Security 640-554 Official Cert Guide, focuses specifically on the objectives for the Cisco CCNA Security IINS exam. Expert networking professionals Keith Barker and Scott Morris share preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics. Well-regarded for its level of detail, assessment features, comprehensive design scenarios, and challenging review questions and exercises, this official study guide helps you master the concepts and techniques that will enable you to succeed on the exam the first time. The official study guide helps you master all the topics on the CCNA Security IINS exam, including: Network security concepts Security policies and strategies Network foundation protection (NFP) Cisco Configuration Professional (CCP) Management plane security AAA security Layer 2 security threats IPv6 security Threat mitigation and containment Access Control Lists (ACLs) Network Address Translation (NAT) Cisco IOS zone-based firewalls and ASA firewalls Intrusion prevention and detection systems Public Key Infrastructure (PKI) and cryptography Site-to-site IPsec VPNs and SSL VPNs CCNA Security 640-554 Official Cert Guide is part of a recommended learning path from Cisco that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor ...

Securing Cisco IP Telephony Networks

Securing Cisco IP Telephony Networks
Title Securing Cisco IP Telephony Networks PDF eBook
Author Akhil Behl
Publisher Cisco Press
Pages 1155
Release 2012-08-31
Genre Computers
ISBN 0132731061

Download Securing Cisco IP Telephony Networks Book in PDF, Epub and Kindle

The real-world guide to securing Cisco-based IP telephony applications, devices, and networks Cisco IP telephony leverages converged networks to dramatically reduce TCO and improve ROI. However, its critical importance to business communications and deep integration with enterprise IP networks make it susceptible to attacks that legacy telecom systems did not face. Now, there’s a comprehensive guide to securing the IP telephony components that ride atop data network infrastructures–and thereby providing IP telephony services that are safer, more resilient, more stable, and more scalable. Securing Cisco IP Telephony Networks provides comprehensive, up-to-date details for securing Cisco IP telephony equipment, underlying infrastructure, and telephony applications. Drawing on ten years of experience, senior network consultant Akhil Behl offers a complete security framework for use in any Cisco IP telephony environment. You’ll find best practices and detailed configuration examples for securing Cisco Unified Communications Manager (CUCM), Cisco Unity/Unity Connection, Cisco Unified Presence, Cisco Voice Gateways, Cisco IP Telephony Endpoints, and many other Cisco IP Telephony applications. The book showcases easy-to-follow Cisco IP Telephony applications and network security-centric examples in every chapter. This guide is invaluable to every technical professional and IT decision-maker concerned with securing Cisco IP telephony networks, including network engineers, administrators, architects, managers, security analysts, IT directors, and consultants. Recognize vulnerabilities caused by IP network integration, as well as VoIP’s unique security requirements Discover how hackers target IP telephony networks and proactively protect against each facet of their attacks Implement a flexible, proven methodology for end-to-end Cisco IP Telephony security Use a layered (defense-in-depth) approach that builds on underlying network security design Secure CUCM, Cisco Unity/Unity Connection, CUPS, CUCM Express, and Cisco Unity Express platforms against internal and external threats Establish physical security, Layer 2 and Layer 3 security, and Cisco ASA-based perimeter security Complete coverage of Cisco IP Telephony encryption and authentication fundamentals Configure Cisco IOS Voice Gateways to help prevent toll fraud and deter attacks Secure Cisco Voice Gatekeepers and Cisco Unified Border Element (CUBE) against rogue endpoints and other attack vectors Secure Cisco IP telephony endpoints–Cisco Unified IP Phones (wired, wireless, and soft phone) from malicious insiders and external threats This IP communications book is part of the Cisco Press® Networking Technology Series. IP communications titles from Cisco Press help networking professionals understand voice and IP telephony technologies, plan and design converged networks, and implement network solutions for increased productivity.

Implementing Cisco IOS Network Security (IINS 640-554) Foundation Learning Guide

Implementing Cisco IOS Network Security (IINS 640-554) Foundation Learning Guide
Title Implementing Cisco IOS Network Security (IINS 640-554) Foundation Learning Guide PDF eBook
Author Catherine Paquet
Publisher Cisco Press
Pages 921
Release 2012-11-29
Genre Computers
ISBN 0132983311

Download Implementing Cisco IOS Network Security (IINS 640-554) Foundation Learning Guide Book in PDF, Epub and Kindle

Implementing Cisco IOS Network Security (IINS) Foundation Learning Guide Second Edition Foundation learning for the CCNA Security IINS 640-554 exam Implementing Cisco IOS Network Security (IINS) Foundation Learning Guide, Second Edition, is a Cisco-authorized, self-paced learning tool for CCNA® Security 640-554 foundation learning. This book provides you with the knowledge needed to secure Cisco® networks. By reading this book, you will gain a thorough understanding of how to develop a security infrastructure, recognize threats and vulnerabilities to networks, and mitigate security threats. This book focuses on using Cisco IOS routers to protect the network by capitalizing on their advanced features as a perimeter router, firewall, intrusion prevention system, and site-to-site VPN device. The book also covers the use of Cisco Catalyst switches for basic network security, the Cisco Secure Access Control System (ACS), and the Cisco Adaptive Security Appliance (ASA). You learn how to perform basic tasks to secure a small branch office network using Cisco IOS security features available through web-based GUIs (Cisco Configuration Professional) and the CLI on Cisco routers, switches, and ASAs. Whether you are preparing for CCNA Security certification or simply want to gain a better understanding of Cisco IOS security fundamentals, you will benefit from the information provided in this book. Implementing Cisco IOS Network Security (IINS) Foundation Learning Guide, Second Edition, is part of a recommended learning path from Cisco that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led training, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, please visit www.cisco.com/go/authorizedtraining. -- Develop a comprehensive network security policy to counter threats against information security -- Secure borderless networks -- Learn how to use Cisco IOS Network Foundation Protection (NFP) and Cisco Configuration Professional (CCP) -- Securely implement the management and reporting features of Cisco IOS devices -- Deploy Cisco Catalyst Switch security features -- Understand IPv6 security features -- Plan threat control strategies -- Filter traffic with access control lists -- Configure ASA and Cisco IOS zone-based firewalls -- Implement intrusion prevention systems (IPS) and network address translation (NAT) -- Secure connectivity with site-to-site IPsec VPNs and remote access VPNs This volume is in the Foundation Learning Guide Series offered by Cisco Press®. These guides are developed together with Cisco as the only authorized, self-paced learning tools that help networking professionals build their understanding of networking concepts and prepare for Cisco certification exams. Category: Cisco Certification Covers: CCNA Security IINS exam 640-554

CCNA Security (210-260) Portable Command Guide

CCNA Security (210-260) Portable Command Guide
Title CCNA Security (210-260) Portable Command Guide PDF eBook
Author Bob Vachon
Publisher Cisco Press
Pages 446
Release 2016-03-25
Genre Computers
ISBN 0134307453

Download CCNA Security (210-260) Portable Command Guide Book in PDF, Epub and Kindle

Preparing for the latest CCNA Security exam? Here are all the CCNA Security (210-260) commands you need in one condensed, portable resource. Filled with valuable, easy-to-access information, the CCNA Security Portable Command Guide, is portable enough for you to use whether you’re in the server room or the equipment closet. Completely updated to reflect the new CCNA Security 210-260 exam, this quick reference summarizes relevant Cisco IOS® Software commands, keywords, command arguments, and associated prompts, and offers tips and examples for applying these commands to real-world security challenges. Configuration examples, throughout, provide an even deeper understanding of how to use IOS to protect networks. Topics covered include Networking security fundamentals: concepts, policies, strategy Protecting network infrastructure: network foundations, security management planes/access; data planes (Catalyst switches and IPv6) Threat control/containment: protecting endpoints and content; configuring ACLs, zone-based firewalls, and Cisco IOS IPS Secure connectivity: VPNs, cryptology, asymmetric encryption, PKI, IPsec VPNs, and site-to-site VPN configuration ASA network security: ASA/ASDM concepts; configuring ASA basic settings, advanced settings, and VPNs Access all CCNA Security commands: use as a quick, offline resource for research and solutions Logical how-to topic groupings provide one-stop research Great for review before CCNA Security certification exams Compact size makes it easy to carry with you, wherever you go “Create Your Own Journal” section with blank, lined pages allows you to personalize the book for your needs “What Do You Want to Do?” chart inside the front cover helps you to quickly reference specific tasks