Network Security 1 and 2 Companion Guide
暫譯: 網路安全 1 與 2 伴隨指南
Antoon Rufi
- 出版商: Cisco Press
- 出版日期: 2006-10-15
- 定價: $2,600
- 售價: 1.5 折 $399
- 語言: 英文
- 頁數: 840
- 裝訂: Hardcover
- ISBN: 1587131625
- ISBN-13: 9781587131622
-
相關分類:
資訊安全
立即出貨 (庫存 < 3)
買這商品的人也買了...
-
$680$646 -
$920$902 -
$780$741 -
$780$663 -
$420$332 -
$620$409 -
$650$553 -
$650$429 -
$650$514 -
$720$569 -
$990$891 -
$290$226 -
$550$435 -
$490$387 -
$580$406 -
$630$498 -
$780$515 -
$590$460 -
$680$537 -
$800$632 -
$690$587 -
$330$218 -
$480$408 -
$780$616 -
$580$458
相關主題
商品描述
Description
The completely revised, updated and only authorized textbook for the Cisco Networking Academy Program Network Security 1 and 2 course
- A portable reference that supports the topics in the Cisco Networking Academy Network Security course aligning 1:1 with course modules
- Features improved readability, enhanced topic explanations, real-world examples, and all-new graphical presentations
- Written by leading Academy instructor, Antoon Rufi, who bring a fresh voice to the course material
Network Security 1 and 2 Companion Guide is the official supplemental textbook for version 2 of the Network Security 1 and 2 course of the Cisco Networking Academy Program. Completely revised and updated with new examples and explanations, this textbook includes original material developed by the author, yet it fully aligns with the Network Security curriculum. Written by an experienced author who presents material in a comprehensive manner--using his own voice and own examples--this new edition augments student understanding of course material. The new edition incorporates improved features to aid instructors and enhance student comprehension. For example, chapters align with course modules in both name and number, and chapter objectives are stated as questions to encourage students to think about and find answers as they read chapters. End-of-chapter questions and summaries align with chapter objectives to emphasize key topics, while key terms are listed in each chapter opener in the order of occurrence to alert students to upcoming vocabulary words. In addition, new features include "How To" quick references for step-by-step tasks; real-world examples and all-new illustrations; concise explanations with a focus on word usage and sentence structure for improved readability; and correlations to the CCNA exam in Chapter Objectives, Check Your Understanding questions, and new Challenge Activities.
Table of Contents
Course 1
Chapter 1 Vulnerabilities, Threats, and Attacks
Key Terms
Introduction to Network Security
The Need for Network Security
Identifying Potential Risks to Network Security
Open Versus Closed Security Models
Trends Driving Network Security
Information Security Organizations
Introduction to Vulnerabilities, Threats, and Attacks
Vulnerabilities
Threats
Attacks
Attack Examples
Reconnaissance Attacks
Access Attacks
Denial-of-Service (DoS) Attacks
Masquerade/IP Spoofing Attacks
Distributed Denial-of-Service Attacks
Malicious Code
Vulnerability Analysis
Policy Identification
Network Analysis
Host Analysis
Analysis Tools
Summary
Check Your Understanding
Chapter 2 Security Planning and Policy
Key Terms
Discussing Network Security and Cisco
The Security Wheel
Network Security Policy
Endpoint Protection and Management
Host- and Server-Based Security Components and Technologies
PC Management
Network Protection and Management
Network-Based Security Components and Technologies
Network Security Management
Security Architecture
Security Architecture (SAFE)
The Cisco Self-Defending Network
Secure Connectivity
Threat Defense
Cisco Integrated Security
Plan, Design, Implement, Operate, Optimize (PDIOO)
Basic Router Security
Control Access to Network Devices
Remote Configuration Using SSH
Router Passwords
Router Privileges and Accounts
Cisco IOS Network Services
Routing, Proxy ARP, and ICMP
Routing Protocol Authentication and Update Filtering
NTP, SNMP, Router Name, DNS
Summary
Check Your Understanding
Chapter 3 Security Devices
Device Options
Cisco IOS Firewall Feature Set
Creating a Customized Firewall
PIX Security Appliance
Adaptive Security Appliance
Finesse Operating System
The Adaptive Security Algorithm
Firewall Services Module
Using Security Device Manager
Using the SDM Startup Wizard
SDM User Interface
SDM Wizards
Using SDM to Configure a WAN
Using the Factory Reset Wizard
Monitor Mode
Introduction to the Cisco Security Appliance Family
PIX 501 Security Appliance
PIX 506E Security Appliance
PIX 515E Security Appliance
PIX 525 Security Appliance
PIX 535 Security Appliance
Adaptive Security Appliance Models
PIX Security Appliance Licensing
PIX VPN Encryption License
Security Contexts
PIX Security Appliance Context Licensing
ASA Security Appliance Licensing
Expanding the Features of the PIX 515E
Expanding the Features of the PIX 525
Expanding the Features of the PIX 535
Expanding the Features of the Adaptive Security Appliance Family
Getting Started with the PIX Security Appliance
Configuring the PIX Security Appliance
The help Command
Security Levels
Basic PIX Security Appliance Configuration Commands
Additional PIX Security Appliance Configuration Commands
Examining the PIX Security Appliance Status
Time Setting and NTP Support
Syslog Configuration
Security Appliance Translations and Connections
Transport Protocols
NAT
Dynamic Inside NAT
Two Interfaces with NAT
Three Interfaces with NAT
PAT
Augmenting a Global Pool with PAT
The static Command
The nat 0 Command
Connections and Translations
Manage a PIX Security Appliance with Adaptive Security Device Manager
ASDM Operating Requirements
Prepare for ASDM
Using ASDM to Configure the PIX Security Appliance
PIX Security Appliance Routing Capabilities
Virtual LANs
Static and RIP Routing
OSPF
Multicast Routing
Firewall Services Module Operation
FWSM Requirements
Getting Started with the FWSM
Verify FWSM Installation
Configure the FWSM Access Lists
Using PDM with the FWSM
Resetting and Rebooting the FWSM
Summary
Check Your Understanding
Chapter 4 Trust and Identity Technology
Key Terms
AAA
TACACS
RADIUS
Comparing TACACS+ and RADIUS
Authentication Technologies
Static Passwords
One-Time Passwords
Token Cards
Token Card and Server Methods
Digital Certificates
Biometrics
Identity Based Networking Services (IBNS)
802.1x
Wired and Wireless Implementations
Network Admission Control (NAC)
NAC Components
NAC Phases
NAC Operation
NAC Vendor Participation
Summary
Check Your Understanding
Chapter 5 Cisco Secure Access Control Server
Key Terms
Cisco Secure Access Control Server Product Overview
Authentication and User Databases
The Cisco Secure ACS User Database
Keeping Databases Current
Cisco Secure ACS for Windows Architecture
How Cisco Secure ACS Authenticates Users
User-Changeable Passwords
Configuring RADIUS and TACACS+ with Cisco Secure ACS
Installation Steps
Administering Cisco Secure ACS for Windows
Troubleshooting
Enabling TACACS+
Verifying TACACS+
Failure
Pass
Configuring RADIUS
Summary
Check Your Understanding
Chapter 6 Configure Trust and Identity at Layer 3
Key Terms
Cisco IOS Firewall Authentication Proxy
Authentication Proxy Operation
Supported AAA Servers
AAA Server Configuration
AAA Configuration
Allow AAA Traffic to the Router
Authentication Proxy Configuration
Test and Verify Authentication Proxy
Introduction to PIX Security Appliance AAA Features
PIX Security Appliance Authentication
PIX Security Appliance Authorization
PIX Security Appliance Accounting
AAA Server Support
Configure AAA on the PIX Security Appliance
PIX Security Appliance Access Authentication
Interactive User Authentication
The Local User Database
Authentication Prompts and Timeout
Cut-Through Proxy Authentication
Authentication of Non-Telnet, -FTP, or -HTTP Traffic
Tunnel User Authentication
Authorization Configuration
Downloadable ACLs
Accounting Configuration
Console Session Accounting
Command Accounting
Troubleshooting the AAA Configuration
Summary
Check Your Understanding
Chapter 7 Configure Trust and Identity at Layer 2
Key Terms
Identity Based Networking Services (IBNS)
Features and Benefits
IEEE 802.1x
Selecting the Correct EAP
Cisco LEAP
IBNS and Cisco Secure ACS
ACS Deployment Considerations
Cisco Secure ACS RADIUS Profile Configuration
Configuring 802.1x Port-Based Authentication
Enabling 802.1x Authentication
Configuring the Switch-to-RADIUS Server Communication
Enabling Periodic Reauthentication
Manually Reauthenticating a Client Connected to a Port
Enabling Multiple Hosts
Resetting the 802.1x Configuration to the Default Values
Displaying 802.1x Statistics and Status
Summary
Check Your Understanding 3
Chapter 8 Configure Filtering on a Router
Key Terms
Filtering and Access Lists
Packet Filtering
Stateful Filtering
URL Filtering
Cisco IOS Firewall Context-Based Access Control
CBAC Packets
Cisco IOS ACLs
How CBAC Works
CBAC-Supported Protocols
Configuring Cisco IOS Firewall Context-Based Access Control
CBAC Configuration Tasks
Prepare for CBAC
Setting Audit Trails and Alerts
Setting Global Timeouts
Setting Global Thresholds
Half-Open Connection Limits by Host
System-Defined Port-to-Application Mapping
User-Defined PAM
Defining Inspection Rules for Applications
Defining Inspection Rules for IP Fragmentation
Defining Inspection Rules for ICMP
Applying Inspection Rules and ACLs to Interfaces
Testing and Verifying CBAC
Configuring a Cisco IOS Firewall Using SDM
Summary
Check Your Understanding
Chapter 9 Configure Filtering on a PIX Security Appliance
Key Terms
Configuring ACLs and Content Filters
PIX Security Appliance ACLs
Configuring ACLs
ACL Line Numbers
The icmp Command
nat 0 ACLs
Turbo ACLs
Using ACLs
Malicious Code Filtering
URL Filtering
Object Grouping
Getting Started with Object Groups
&n
商品描述(中文翻譯)
**描述**
這是完全修訂、更新且唯一授權的教科書,適用於思科網路學院計畫的網路安全 1 和 2 課程。
- 一本便攜式參考書,支持思科網路學院網路安全課程的主題,與課程模組一對一對應。
- 具備改善的可讀性、增強的主題解釋、實際案例以及全新的圖形呈現。
- 由領先的學院講師 Antoon Rufi 撰寫,為課程材料帶來新鮮的聲音。
《網路安全 1 和 2 伴隨指南》是思科網路學院計畫網路安全 1 和 2 課程第 2 版的官方補充教科書。這本教科書經過完全修訂和更新,包含新的範例和解釋,並包括作者開發的原創材料,完全符合網路安全課程大綱。由一位經驗豐富的作者撰寫,以全面的方式呈現材料——使用他自己的聲音和範例——這一新版增強了學生對課程材料的理解。新版本包含改進的功能,以幫助講師並增強學生的理解。例如,章節名稱和編號與課程模組對應,章節目標以問題形式陳述,以鼓勵學生在閱讀章節時思考並尋找答案。章末問題和摘要與章節目標對應,以強調關鍵主題,同時每章開頭列出關鍵術語,按出現順序提醒學生即將出現的詞彙。此外,新功能包括「如何做」的快速參考,提供逐步任務;實際案例和全新的插圖;簡明的解釋,重點在於詞彙使用和句子結構,以提高可讀性;以及與 CCNA 考試的關聯,包括章節目標、理解檢查問題和新的挑戰活動。
**目錄**
課程 1
第 1 章 漏洞、威脅與攻擊
- 關鍵術語
- 網路安全簡介
- 網路安全的必要性
- 識別潛在的網路安全風險
- 開放與封閉的安全模型
- 驅動網路安全的趨勢
- 資訊安全組織
- 漏洞、威脅與攻擊簡介
- 漏洞
- 威脅
- 攻擊
- 攻擊範例
- 偵查攻擊
- 存取攻擊
- 拒絕服務 (DoS) 攻擊
- 偽裝/IP 偽造攻擊
- 分散式拒絕服務攻擊
- 惡意程式碼
- 漏洞分析
- 政策識別
- 網路分析
- 主機分析
- 分析工具
- 總結
- 檢查你的理解
第 2 章 安全規劃與政策
- 關鍵術語
- 討論網路安全與思科
- 安全輪
- 網路安全政策
- 端點保護與管理
- 主機和伺服器安全組件與技術
- PC 管理
- 網路保護與管理
- 基於網路的安全組件與技術
- 網路安全管理
- 安全架構
- 安全架構 (SAFE)