Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword or section
Like this
12Activity

Table Of Contents

Loose Mode Unicast RPF
Cisco IOS Firewall Overview
Context-Based Access Control (CBAC)
Zone-Based Policy Firewall
IP Control Plane Security
Best Practice -Features to Disable
Routing Protocol Neighbour Authentication
IP Management Plane Security
Password Security
Management Plane Protection*
AutoSecure
Useful Links
Other Related IOS Security Sessions
Firewalls
Cisco Firewalls
Cisco Firewall Features
Routed vs Transparent Firewall?
Routed vs Transparent Comparisons
Virtual Firewall
Virtual Firewall Overview
Firewall Redundancy
ASA Modules –IPS/CSC
Other Related Firewall Sessions
Intrusion Prevention/Detection Systems
The Role of IDS/IPS
Intrusion Detection/Prevention
Sensor Placement
IPS Deployment Scenarios
IDS Sensor
IPS Sensor
Inline VLAN Pairing (On-a-Stick)
EtherChannel Load Balancing
Signature Engines
Identifying Attacks with IPS
Response Actions
Interaction with CS-MARS
Other Related IPS/IDS Sessions
Layer 2 Security
Why Worry About Layer 2 Security?
Basic VLAN Hopping Attack
Double 802.1q Encapsulation VLAN Hopping Attack
CAM Overflow / MAC Flood Attack
CAM Table Full
DHCP Starvation Attack: Countermeasure = Port Security
Rogue DHCP Server Attack
Rogue DHCP Server Attack: Countermeasure = DHCP Snooping
Countermeasures to ARP Attacks: Dynamic ARP Inspection
Building the Layers
Layer 2 Security Best Practices
Other Related Layer-2 Sessions
Cisco Security Agent
Why Endpoint Security ? Compare Traditional Security Solutions
Architecture of CSA
CSA Configuration Hierarchy
Application Class
CSA Hierarchy: Rules
Rule Actions
CSA Hierarchy: Rule Modules
CSA Hierarchy: Policies
CSA Hierarchy: Groups
Notification and Justification
Data Loss Prevention (example)
Points to Remember
Other Related Endpoint Sessions
Cisco Security Monitoring, Analysis and Response System
Cisco Security—MARS
Key Concepts—Events
Key Concepts—Sessions
Key Concepts—Incidents
Data/Event Reduction
Events, Sessions and Incidents
An Incident…
An Incident…..(cont.)
Points to Remember…
Other Related CS-MARS Sessions
Session Objectives
Recommended Security Demos
Meet the Expert
Complete Your Online Session Evaluation
0 of .
Results for:
No results containing your search query
P. 1
SEC-2008 Implementing Security Throughout Your Network

SEC-2008 Implementing Security Throughout Your Network

Ratings: (0)|Views: 1,202 |Likes:
Published by HighFreak1c

More info:

Published by: HighFreak1c on Jun 18, 2010
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

10/27/2011

pdf

text

original

You're Reading a Free Preview
Pages 6 to 53 are not shown in this preview.

Activity (12)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads
Lotus Perfaction liked this
enisb liked this
garcia_rice12927 liked this
ms13395792 liked this
ms13395792 liked this

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->