CCNA Security Study Notes
Part I: Network Security Architecture
CHAPTER 1: Network Insecurity
- Exploring Network Security Basics and the Need for Network Security
- Exploring the Taxonomy of Network Attacks
CHAPTER 2: Building a Secure Network Using Security Controls
- Defining Operations Security Needs
- Establishing a Comprehensive Network Security Policy
- Examining Cisco’s Model of the Self-Defending Network
Part II: Perimeter Security
CHAPTER 3: Security at the Network Perimeter
- Cisco lOS Security Features
- Securing Administrative Access to Cisco Routers
- Introducing Cisco SDM
- Configuring Local Database AAA on a Cisco Router
- Configuring External AAA on a Cisco Router Using Cisco Secure ACS
CHAPTER 4: Implementing Secure Management and Hardening the Router
Part III: Augmenting Depth of Defense
CHAPTER 5: Using Cisco lOS Firewalls to Implement a Network Security Policy
- Examining and Defining Firewall Technologies
- Creating Static Packet Filters with ACLs
- Cisco Zone-Based Policy Firewall Fundamentals
CHAPTER 6: Introducing Cryptographic Services
- Cryptology Overview
- Exploring Symmetric Key Encryption
- Exploring Cryptographic Hashing Algorithms and Digital Signatures
- Exploring Asymmetric Key Encryption and Public Key Infrastructure
CHAPTER 7: Virtual Private Networks with IPsec
- Overview of VPN Technology
- Conceptualizing a Site-toSite IPsec VPN
- ImplementinQ IPsec on a Site-toSite VPN Usina the CLI
- Implementing IPsec on a Site-to-Site VPN Using Cisco SDM
CHAPTER 8: Network Security Using Cisco lOS IPS
Part IV: Security Inside the Perimeter
CHAPTER 9: Introduction to Endpoint, SAN, and Voice Security
CHAPTER 10: Protecting Switch Infrastructure
- VLAN Hopping Attacks
- STP Manipulation Attack
- CAM Table Overflow Attacky
- Miscellaneous Switch Security Features