Implementing Cisco Network Security Exam (210-260)

Descripción

CCIE - Cisco.Press.Network.Security_base Mapa Mental sobre Implementing Cisco Network Security Exam (210-260), creado por alessandro moreira el 28/09/2016.
alessandro moreira
Mapa Mental por alessandro moreira, actualizado hace más de 1 año
alessandro moreira
Creado por alessandro moreira hace casi 8 años
18
1

Resumen del Recurso

Implementing Cisco Network Security Exam (210-260)
  1. 1 - Security Concepts (12%)
    1. Common security principles
      1. Common security threats
        1. Cryptography concepts
          1. Describe network topologies
          2. 2 - Secure Access (14%)
            1. Secure management
              1. AAA concepts
                1. 802.1X authentication
                  1. BYOD
                  2. 3 - VPN (17%)
                    1. VPN concepts
                      1. Remote access VPN
                        1. Site-to-site VPN
                        2. 4 - Secure Routing and Switching (18%)
                          1. Security on Cisco routers (OSPF)
                            1. Securing routing protocols
                              1. Common Layer 2 attacks
                                1. Mitigation procedures
                                  1. VLAN security
                                  2. 5 - Cisco Firewall Technologies (18%)
                                    1. Describe operational strengths and weaknesses of the different firewall technologies
                                      1. Compare stateful vs. stateless firewalls
                                        1. Implement NAT on Cisco ASA 9.x
                                          1. Implement zone-based firewall
                                            1. Firewall features on the Cisco Adaptive Security Appliance (ASA) 9.x
                                            2. 6 - IPS (9%)
                                              1. Describe IPS deployment considerations
                                                1. Describe IPS technologies
                                                2. 7 - Content and Endpoint Security (12%)
                                                  1. Describe mitigation technology for email-based threats
                                                    1. Describe mitigation technology for web-based threats
                                                      1. Describe mitigation technology for endpoint threats
                                                      Mostrar resumen completo Ocultar resumen completo

                                                      Similar

                                                      FARMACOLOGÍA DE LA MUSCULATURA ESQUELETICA
                                                      cass_baltazar
                                                      Vocabulario Inglés - Tema 2
                                                      maya velasquez
                                                      Vocabulario Japonés
                                                      feerivera
                                                      Past Simple of Irregular Verbs
                                                      Ana María Lara díez
                                                      CONCEPTOS BÁSICOS DE EXCEL
                                                      paussh_best11
                                                      Admisión del Personal
                                                      1991mayra
                                                      Elaboración de mapas mentales
                                                      Reyna Elisa Delg
                                                      Miembro Superior - Anatomía
                                                      Ivan Salas
                                                      Las Figuras y Silencios
                                                      mariajesus camino
                                                      FRANQUISMO (1939-1975)
                                                      Juan Cano Molina
                                                      Las TIC
                                                      Laura -