Computer Network Security

Book description

Developed in collaboration with a training and certification team from Cisco, Computer Network Security is an exploration of the state-of-the-art and good practices in setting up a secure computer system. Concrete examples are offered in each chapter, to help the reader to master the concept and apply the security configuration.

This book is intended for students preparing for the CCNA Security Exam (210-260 IINS) ? whether at professional training centers, technical faculties, or training centers associated with the “Cisco Academy” program. It is also relevant to anyone interested in computer security, be they professionals in this field or users who want to identify the threats and vulnerabilities of a network to ensure better security.

Table of contents

  1. Cover
  2. Preface
  3. Introduction
  4. 1 Fundamentals of Network Security
    1. 1.1. Introduction
    2. 1.2. Types of network security
    3. 1.3. The main risks related to the logical security of the network
    4. 1.4. Exercises to test learning
  5. 2 Securing Network Devices
    1. 2.1. Types of network traffic
    2. 2.2. Securing the management plan
    3. 2.3. Securing passwords
    4. 2.4. Implementing connection restrictions
    5. 2.5. Securing access through console lines, VTY and auxiliaries
    6. 2.6. Allocation of administrative roles
    7. 2.7. Securing the control plane
    8. 2.8. Exercises for application
  6. 3 Supervising a Computer Network
    1. 3.1. Introduction
    2. 3.2. Implementing an NTP server
    3. 3.3. Implementing a Syslog server
    4. 3.4. Implementing the Simple Network Management Protocol (SNMP)
    5. 3.5. Exercises for application
  7. 4 Securing Access Using AAA
    1. 4.1. Introduction
    2. 4.2. AAA authentication
    3. 4.3. AAA authorizations
    4. 4.4. AAA traceability
    5. 4.5. Exercises for application
  8. 5 Using Firewalls
    1. 5.1. Introducing firewalls
    2. 5.2. Types of firewalls
    3. 5.3. Setting up a firewall
    4. 5.4. Different firewall strategies
    5. 5.5. ACL-based firewalls
    6. 5.6. Zone-based firewalls
    7. 5.7. Creating zones
    8. 5.8. Creating Class-Maps
    9. 5.9. Creating the Policy-Map to apply the Class-Maps
    10. 5.10. Defining the zone pairs
    11. 5.11. Applying the policy maps to the zone pairs
    12. 5.12. Assigning interfaces to zones
    13. 5.13. Exercises for application
  9. 6 Putting in Place an Intrusion Prevention System (IPS)
    1. 6.1. Introduction to a detector
    2. 6.2. The differences between an IDS and an IPS
    3. 6.3. Types of IPS
    4. 6.4. Cisco IP solutions
    5. 6.5. Modes of deploying IPS
    6. 6.6. Types of alarms
    7. 6.7. Detecting malicious traffic
    8. 6.8. Signature micro-engines
    9. 6.9. Severity levels of the signatures
    10. 6.10. Monitoring and managing alarms and alerts
    11. 6.11. List of actions to be taken during an attack
    12. 6.12. Configuration of an IOS IPS
    13. 6.13. Recommended practices
    14. 6.14. Exercises for application
  10. 7 Securing a Local Network
    1. 7.1. Introduction
    2. 7.2. Types of attacks on Layer 2
    3. 7.3. The best security practices for protecting Layer 2
    4. 7.4. Exercises for application
  11. 8 Cryptography
    1. 8.1. Basic concepts in cryptography
    2. 8.2. The different classifications of cryptology
    3. 8.3. Key management
    4. 8.4. Hash functions
    5. 8.5. HMAC codes
    6. 8.6. Asymmetric cryptography
    7. 8.7. Exercises for application
  12. 9 IPsec VPNs
    1. 9.1. The IPsec protocol
    2. 9.2. IKE protocol
    3. 9.3. The site-to-site VPN configuration
    4. 9.4. Exercises for application
  13. 10 Studying Advanced Firewalls
    1. 10.1. Cisco ASA firewalls
    2. 10.2. Exercises for application
    3. 10.3. Configuring Cisco elements with graphical tools
    4. 10.4. The TMG 2010 firewall
  14. References
  15. Index
  16. End User License Agreement

Product information

  • Title: Computer Network Security
  • Author(s): Ali Sadiqui
  • Release date: June 2020
  • Publisher(s): Wiley-ISTE
  • ISBN: 9781786305275