Home > Computing and Information Technology > Computer networking and communications > Network security > CCIE Security Exam Certification Guide (CCIE Self-Study)
CCIE Security Exam Certification Guide (CCIE Self-Study)

CCIE Security Exam Certification Guide (CCIE Self-Study)

          
5
4
3
2
1

Out of Stock


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Notify me when this book is in stock
Add to Wishlist

About the Book

Official self-study test preparation guide for the CCIE Security written exam 350-018   Updated content covers all the latest CCIE Security written exam 2.0 objectives, including: AES, EAP, IOS SSH, RDEP, and intrusion prevention DNS, TFTP, Secure Shell, Secure Socket Layer Protocol, NTP, and SNMP Password security, password recovery, and standard and extended access lists Encryption technologies and security protocols, including IPSec, AES, 3DES, TACACS+, and RADIUS Cisco security applications, including Cisco Secure PIX® Firewall, VPN, IDS, IPS, and Cisco Policy Manager Basic security methods and the evolution of new secure networks including packet filtering, proxies, and NAT/PAT Cisco security applications such as the VPN 3000, client-side VPNs, and service modules  With increased reliance on networking resources to provide productivity gains and corporate revenue contributions, the need for network security has never been higher. Rising concerns over corporate espionage, cyber-terrorism, financial fraud, and theft of proprietary information have radically increased the demand for highly skilled networking security professionals. As one of the most sought-after and highly valued networking certifications, the Cisco Systems® CCIE Security certification is answering the need for technical expertise in this critical market by distinguishing the top echelon of internetworking experts.   CCIE Security Exam Certification Guide, Second Edition, is a comprehensive study tool for the CCIE Security written exam version 2.0. Fully updated and reviewed by present and former members of the CCIE Security team at Cisco®, this book helps you understand and master the material you need to know to pass the written exam. Covering all the topics in this challenging exam, this book is your ultimate exam preparation resource. Designed to optimize your study time, CCIE Security Exam Certification Guide helps you assess your knowledge of the material at the start of each chapter with customized quizzes for each topic. Increase retention of key concepts by reviewing succinct summaries of crucial concepts. Test your comprehension with chapter-ending review questions. Determine your assimilation of knowledge and get a taste of the CCIE Security lab exam with sample lab scenarios in the last chapter. Take timed practice exams that mimic the real testing environment with the CD-ROM test engine or customize the test bank to focus on the topics for which you need the most help.   CCIE Security Exam Certification Guide, Second Edition, is part of a recommended study program from Cisco Systems that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, please visit www.cisco.com/go/authorizedtraining.   “This book will be a valuable asset for potential CCIE Security candidates. I am positive individuals will inevitably gain extensive security network knowledge during their preparation for the CCIE Security written exam using this book.” -Yusuf Hussain Bhaiji, CCIE Security Program Manager, Cisco Systems   Companion CD-ROM CD-ROM contains a test engine with over 500 questions covering the full range of CCIE Security written exam topics, flash card format practice questions, and an electronic version of the text. CD-ROM test engine powered by www.boson.com. Boson Software is a Cisco Learning Partner.   This volume is part of the Exam Certification Guide Series from Cisco Press®. Books in this series provide officially developed exam preparation materials that offer assessment, review, and practice to help Cisco Career Certification candidates identify weaknesses, concentrate their study efforts, and enhance their confidence as exam day nears.  

Table of Contents:
Foreword Introduction Chapter 1 General Networking Topics “Do I Know This Already?” Quiz Foundation Topics Networking Basics–The OSI Reference Model Layer 1: The Physical Layer Layer 2: The Data Link Layer Layer 3: The Network Layer Layer 4: The Transport Layer Layer 5: The Session Layer Layer 6: The Presentation Layer Layer 7: The Application Layer TCP/IP and OSI Model Comparison Example of Peer-to-Peer Communication Ethernet Overview Switching and Bridging Bridge Port States Fast EtherChannel Internet Protocol Variable-Length Subnet Masks Classless Interdomain Routing Transmission Control Protocol TCP Mechanisms TCP/IP Services Address Resolution Protocol Reverse ARP Dynamic Host Configuration Protocol Hot Standby Router Protocol Internet Control Message Protocol Telnet File Transfer Protocol and Trivial File Transfer Protocol Routing Protocols Routing Information Protocol Enhanced Interior Gateway Routing Protocol Open Shortest Path First Border Gateway Protocol Integrated Services Digital Network Basic Rate and Primary Rate Interfaces ISDN Framing and Frame Format ISDN Layer 2 Protocols Cisco IOS ISDN Commands IP Multicast Asynchronous Communications and Access Devices Telephony Best Practices Wireless Best Practices Foundation Summary Wireless Best Practices Q & A Scenario: Routing IP on Cisco Routers Scenario Answers Chapter 2 Application Protocols “Do I Know This Already?” Quiz Foundation Topics Domain Name System Trivial File Transfer Protocol File Transfer Protocol Active FTP Passive FTP Hypertext Transfer Protocol Secure Sockets Layer Simple Network Management Protocol SNMP Notifications SNMP Examples Simple Mail Transfer Protocol Network Time Protocol Secure Shell and Cisco IOS SSH Cisco IOS SSH Remote Data Exchange Protocol Foundation Summary Q & A Scenario: Configuring DNS, TFTP, NTP, and SNMP Scenario Answers Chapter 3 Cisco IOS Specifics and Security “Do I Know This Already?” Quiz Foundation Topics Cisco Hardware Random-Access Memory  Nonvolatile RAM System Flash Central Processing Unit Read-Only Memory Configuration Registers Cisco Interfaces Saving and Loading Files show and debug Commands Router CLI show Commands Debugging Cisco Routers Password Recovery Basic Security on Cisco Routers IP Access Lists Access Lists on Cisco Routers Extended Access Lists Layer 2 Switching Security CAM Table Overflow VLAN Hopping Spanning Tree Protocol Manipulation MAC Spoofing Attack DHCP Starvation Attacks Security Policy Best Practices–A Cisco View Foundation Summary Q & A Scenario: Configuring Cisco Routers for Passwords and Access Lists Scenario Answers Chapter 4 Security Protocols “Do I Know This Already?” Quiz Foundation Topics Authentication, Authorization, and Accounting Authentication Authorization Accounting Remote Authentication Dial-In User Service RADIUS Configuration Task List Terminal Access Controller Access Control System Plus TACACS+ Configuration Task List TACACS+ Versus RADIUS Encryption Technology Overview DES and 3DES Advanced Encryption Standard Message Digest 5 and Secure Hash Algorithm Diffie-Hellman IP Security Certificate Enrollment Protocol Extensible Authentication Protocol, Protected EAP, and Temporal Key Integrity Protocol Virtual Private Dial-Up Networks (VPDN) VPDN Configuration Task List Foundation Summary Q & A Scenario: Configuring Cisco Routers for IPSec Scenario Answers Chapter 5 Cisco Security Applications “Do I Know This Already?” Quiz Foundation Topics Cisco Secure for Windows (NT) and Cisco Secure ACS Cisco Secure ACS IDS Fundamentals Notification Alarms Signature-Based IDS Anomaly-Based IDS Network-Based IDS Versus Host-Based IDS IDS Placement IDS Tuning Cisco Secure Intrusion Detection System and Catalyst Services Modules Cisco Secure IDS Cisco Inline IDS (Intrusion Prevention System) Catalyst Services Module CiscoWorks VMS Cisco VPN 3000 Concentrator Cisco Secure VPN Client Cisco Router and Security Device Manager Security Information Monitoring System Foundation Summary Q & A Scenario: Cisco Secure IDS Database Event Scenario Answers Chapter 6 Security Technologies “Do I Know This Already?” Quiz Foundation Topics Advanced Security Concepts Network Address Translation and Port Address Translation NAT Operation on Cisco Routers Cisco PIX Firewall Configuring a PIX Firewall Troubleshooting PIX Firewall Log Files Cisco PIX Firewall Software Features Cisco IOS Firewall Feature Set CBAC Configuration Task List Public Key Infrastructure Virtual Private Networks Network-Based Intrusion Detection Systems Cisco Security Agent and Host-Based IDS Cisco Threat Response Cisco Threat Response IDS Requirements Authorization Technologies (IOS Authentication 802.1X) Foundation Summary Q & A Scenario: Configuring a Cisco PIX Firewall for NAT Scenario Answer Chapter 7 Network Security Policies, Vulnerabilities, and Protection “Do I Know This Already?” Quiz Foundation Topics Network Security Policies Standards Bodies and Incident Response Teams Incident Response Teams Internet Newsgroups Vulnerabilities, Attacks, and Common Exploits Intrusion Detection System Protecting Cisco IOS from Intrusion Foundation Summary Q & A Scenario: Defining Cisco IOS Commands to View DoS Attacks in Real Time Scenario Answers Chapter 8 CCIE Security Self-Study Lab How to Use This Chapter Preparing for this Lab Goal of This Lab CCIE Security Self-Study Lab Part I Goals CCIE Security Self-Study Lab Part II Goals General Lab Guidelines and Setup Communications Server (0 Points) CCIE Security Self-Study Lab Part I: Basic Network Connectivity (4 Hours) Basic Frame Relay Setup (5 Points) Physical Connectivity (0 Points) Catalyst Ethernet Switch Setup I (5 Points) Catalyst Ethernet Switch Setup II (6 Points) IP Host Lookup and Disable DNS (1 Point) PIX Configuration (6 Points) IGP Routing (18 Points) Basic ISDN Configuration (6 Points) DHCP Configuration (3 Points) BGP Routing Configuration (6 Points) CCIE Security Self-Study Lab Part II: Advanced Security Design (4 Hours) IP Access List (4 Points) Prevent Denial-of-Service Attacks (4 Points) Time-Based Access List (4 Points) Dynamic Access List/Lock and Key Feature (5 Points) Cisco IOS Firewall Configuration on R5 (6 Points) IPSec Configuration (6 Points) Advanced PIX Configuration (5 Points) ACS Configuration (5 Points) Cisco Intrusion Detection System (5 Points) Final Configurations Additional Advanced Lab Topics (No Solutions Provided) Advanced Security Lab Topics (4 Points) Content Filtering (2 Points) FTP Issues (3 Points) Routing Table Authenticity (4 Points) Access Control on R2 Ethernet Interface (4 Points) Conclusion Appendix A  Answers to Quiz Questions Appendix B  Study Tips for CCIE Security Examinations Appendix C    Sample CCIE Routing and Switching Lab I Appendix D    Sample CCIE Routing and Switching Lab II  


Best Sellers


Product Details
  • ISBN-13: 9781587201356
  • Publisher: Pearson Education (US)
  • Publisher Imprint: Cisco Press
  • Height: 232 mm
  • No of Pages: 720
  • Weight: 1362 gr
  • ISBN-10: 1587201356
  • Publisher Date: 02 Jun 2005
  • Binding: SA
  • Language: English
  • Spine Width: 49 mm
  • Width: 237 mm


Similar Products

How would you rate your experience shopping for books on Bookswagon?

Add Photo
Add Photo

Customer Reviews

REVIEWS           
Click Here To Be The First to Review this Product
CCIE Security Exam Certification Guide (CCIE Self-Study)
Pearson Education (US) -
CCIE Security Exam Certification Guide (CCIE Self-Study)
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

CCIE Security Exam Certification Guide (CCIE Self-Study)

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book
    Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!
    ASK VIDYA