Mon, 22 May | SNRS. Editorial, Production, and Web Services: Americas Headquarters. Cisco Systems, Inc. West Tasman Drive San Jose. Veja grátis o arquivo enviado para a disciplina de Redes de Computadores Categoria: Trabalhos – 4. SNRS Securing Networks with Cisco Routers and Switches Volume 1 Version Student Guide Editorial, Production, and Web Services:
|Published (Last):||12 June 2013|
|PDF File Size:||4.43 Mb|
|ePub File Size:||5.34 Mb|
|Price:||Free* [*Free Regsitration Required]|
Redes de Computadores 8. Enviado smrs mauro flag Denunciar. Cisco Press self-study titles are a prime source of content for some individuals, and can also serve as an excellent supplement to other forms of learning.
Training classes, whether delivered in a classroom or on the Internet, are a great way to quickly acquire new understanding. Hands-on practice is essential for anyone seeking to build, or hone, new skills. Authorized Cisco training classes, labs, and simulations are available exclusively from Cisco Learning Solutions Partners worldwide.
I hope and expect that you’ll find this guide to be an essential part of your exam preparation and a valuable addition to your personal library.
This exam focuses on the application of security principles with regard to Cisco IOS routers, switches, and virtual private network VPN devices. These technologies include mitigating Layer cisdo attacks, intrusion prevention systems, Security Device Manager, and It is important that you have extensive experience in and an in-depth understanding of computer snra before you can begin to apply security principles.
Cisco Certified Security Professional – SNRS – Cisco Certified Expert
The Cisco SNRS program was developed to introduce the security products associated with or integrated into Cisco IOS Software, explain how each product is applied, and explain how it can increase the security of your network.
The SNRS program is for network administrators, network security administrators, network architects, and experienced networking professionals who are interested in applying security principles to their networks. How to Use This Book The book consists of 24 chapters. Each chapter tends to build upon the chapter that precedes it.
The chapters that cover specific commands and configurations include case studies or practice configurations. The chapters of the book cover the following topics: Chapter 1, “Network Security Essentials” Chapter 1 snrss an overview of network security in general terms. This chapter defines the scope of network security and discusses the delicate “balancing act” required to ensure that you fulfill the business need xnrs compromising the security of the organization.
Network security is a continuous process that should be driven by a predefined organizational security policy. Chapter 2, “Defining and Detailing Attack Threats” Chapter 2 discusses the potential network vulnerabilities ciscl attacks that pose a threat to the network. This chapter provides you with a better understanding of the need for an effective network security policy.
Chapter 3, “Defense in Depth” Until recently, a network was considered secure if it had a strong perimeter defense.
Network attacks are becoming much more dynamic and require a security posture that provides defense at many levels. Chapter 3 discusses the concepts that integrate all the security components into a single, effective security strategy.
This chapter focuses on the basic tasks that are snts to manage an individual Cisco IOS router. It is important to secure this access to prevent unauthorized changes to the router.
Chapter 6, “Authentication” This chapter discusses the many different types of authentication and the advantages and icsco of each type. AAA is used to verify which users are connecting to a specific resource, cusco that they are authorized to perform requested functions, cissco track which actions were performed, by whom, and at what time. Chapter 11, “Securing Networks with Cisco Routers” It is important to restrict access to your Cisco IOS router to ensure that only authorized administrators are performing configuration changes.
There are many different ways to access the Cisco IOS router. Chapter 11 describes how to ensure that all nonessential services have been disabled to reduce any chances of accessing the router by exploiting open ports or running services. These features are discussed in Enrs Cisco IPS products go beyond the IDS signature matching by incorporating features such as stateful pattern recognition, protocol analysis, visco anomaly detection, and protocol anomaly detection.
Chapter 14, “Mitigating Layer 2 Attacks” As the popularity of Ethernet switching and wireless local-area networks WLANs grow, the emphasis on Layer 2 security has become more important. This chapter discusses Layer 2 attacks, mitigations, and best practices and functionality.
This is incorporated as part of the Cisco IOS Security feature set and is used to greatly increase the security of the network perimeter. Chapter 16, “Authentication Proxy and the Cisco IOS Firewall” Authentication proxy is a function that enables users to authenticate when accessing specific resources.
This functionality enables administrators to create a granular and dynamic per-user security policy. IBNS combines several Cisco products that offer authentication, user policies, and access control to provide a comprehensive solution for increasing network access security.