Implementing Cisco Network Security Exam (210-260)

Beschreibung

CCIE - Cisco.Press.Network.Security_base Mindmap am Implementing Cisco Network Security Exam (210-260), erstellt von alessandro moreira am 28/09/2016.
alessandro moreira
Mindmap von alessandro moreira, aktualisiert more than 1 year ago
alessandro moreira
Erstellt von alessandro moreira vor fast 8 Jahre
18
1

Zusammenfassung der Ressource

Implementing Cisco Network Security Exam (210-260)
  1. 1 - Security Concepts (12%)
    1. Common security principles
      1. Common security threats
        1. Cryptography concepts
          1. Describe network topologies
          2. 2 - Secure Access (14%)
            1. Secure management
              1. AAA concepts
                1. 802.1X authentication
                  1. BYOD
                  2. 3 - VPN (17%)
                    1. VPN concepts
                      1. Remote access VPN
                        1. Site-to-site VPN
                        2. 4 - Secure Routing and Switching (18%)
                          1. Security on Cisco routers (OSPF)
                            1. Securing routing protocols
                              1. Common Layer 2 attacks
                                1. Mitigation procedures
                                  1. VLAN security
                                  2. 5 - Cisco Firewall Technologies (18%)
                                    1. Describe operational strengths and weaknesses of the different firewall technologies
                                      1. Compare stateful vs. stateless firewalls
                                        1. Implement NAT on Cisco ASA 9.x
                                          1. Implement zone-based firewall
                                            1. Firewall features on the Cisco Adaptive Security Appliance (ASA) 9.x
                                            2. 6 - IPS (9%)
                                              1. Describe IPS deployment considerations
                                                1. Describe IPS technologies
                                                2. 7 - Content and Endpoint Security (12%)
                                                  1. Describe mitigation technology for email-based threats
                                                    1. Describe mitigation technology for web-based threats
                                                      1. Describe mitigation technology for endpoint threats
                                                      Zusammenfassung anzeigen Zusammenfassung ausblenden

                                                      ähnlicher Inhalt

                                                      Spielst du Fußball?
                                                      Nadja Blust
                                                      Die Verwandlung von Franz Kafka
                                                      AntonS
                                                      Aufbau Quellenanalyse
                                                      barbara91
                                                      Zivilrecht - Gesellschaftsrecht Streitigkeiten
                                                      myJurazone
                                                      Innere Medizin
                                                      marieschwertl
                                                      Mathe Themen Abitur 2016
                                                      henrythegeek
                                                      Chirurgie 2014 Vetie
                                                      Kim Langner
                                                      Vetie Tierseuchen 2018
                                                      Johanna Müller
                                                      Vetie Geflügelkrankheiten Fragebogen Röntgen 2, Haltung und Arten
                                                      Tropsi B