Header Fragment
Logo

A career growth machine

Home All Students Certifications Training Interview Plans Contact Us
  
× Home All Students
AI Resume Builder & Interview
Certifications Training
Books
Interview Plans Contact Us
FAQ
Login

Chapter 1: Explain common threats against on-premises, hybrid, and cloud environments-On-premises: viruses, trojans, DoS/DDoS attacks, phishing, rootkits, man-in-themiddle attacks, SQL injection, cross-site scripting, malware
Chapter 2: Explain common threats against on-premises, hybrid, and cloud environmentsCloud: data breaches, insecure APIs, DoS/DDoS, compromised credentials
Chapter 3: Compare common security vulnerabilities such as software bugs, weak and/or hardcoded passwords, OWASP top ten, missing encryption ciphers, buffer overflow, path traversal, cross-site scripting/forgery
Chapter 4: Describe functions of the cryptography components such as hashing, encryption, PKI, SSL, IPsec, NAT-T IPv4 for IPsec, preshared key, and certificate-based authorization
Chapter 5: Compare site-to-site and remote access VPN deployment types and components such as virtual tunnel interfaces, standards-based IPsec, DMVPN, FlexVPN, and Cisco Secure Client including high availability considerations
Chapter 13: Describe the components, capabilities, and benefits of NetFlow and Flexible NetFlow records
Chapter 14: Layer 2 methods (network segmentation using VLANs; Layer 2 and port security; DHCP snooping; Dynamic ARP inspection; storm control; PVLANs to segregate network traffic; and defenses against MAC, ARP, VLAN hopping, STP, and DHCP rogue attacks)
Chapter 17: Securing the Cloud-Implement management options for network security solutions (single vs. multidevice manager, in-band vs. out-of-band, cloud vs. on-premises)
Chapter 18: Securing the Cloud-Configure AAA for device and network access such as TACACS+ and RADIUS
Chapter 19: Securing the Cloud-Configure secure network management of perimeter security and infrastructure devices such as SNMPv3, NetConf, RestConf, APIs, secure syslog, and NTP with authentication
Chapter 27: Securing the Cloud-Describe the concept of DevSecOps (CI/CD pipeline, container orchestration, and secure software development)
Chapter 34: Content Security-Compare the components, capabilities, and benefits of on-premises, hybrid, and cloudbased email and web solutions (Cisco Secure Email Gateway, Cisco Secure Email Cloud Gateway, and Cisco Secure Web Appliance)
Chapter 35: Content Security-Configure and verify web and email security deployment methods to protect onpremises, hybrid, and remote users
Chapter 36: Content Security-Configure and verify email security features such as SPAM filtering, antimalware filtering, DLP, blocklisting, and email encryption
Chapter 37: Content Security-Configure and verify Cisco Umbrella Secure Internet Gateway and web security features such as blocklisting, URL filtering, malware scanning, URL categorization, web application filtering, and TLS decryption
Chapter 39: Content Security-Configure and verify web security controls on Cisco Umbrella (identities, URL content settings, destination lists, and reporting)
Chapter 41: Endpoint Protection and Detection-Configure endpoint antimalware protection using Cisco Secure Endpoint
Chapter 42: Endpoint Protection and Detection-Configure and verify outbreak control and quarantines to limit infection
Chapter 43: Endpoint Protection and Detection-Describe justifications for endpoint-based security
Chapter 44: Endpoint Protection and Detection-Describe the value of endpoint device management and asset inventory systems such as MDM
Chapter 45: Endpoint Protection and Detection-Describe the uses and importance of a multifactor authentication (MFA) strategy
Chapter 48: Secure Network Access, Visibility, and Enforcement-Describe identity management and secure network access concepts such as guest services, profiling, posture assessment and BYOD
Chapter 49: Secure Network Access, Visibility, and Enforcement-Configure and verify network access control mechanisms such as 802.1X, MAB, WebAuth
Chapter 51: Secure Network Access, Visibility, and Enforcement-Describe the benefits of device compliance and application control
Chapter 54: Secure Network Access, Visibility, and Enforcement-Describe the components, capabilities, and benefits of these security products and solutions-Cisco Secure Network Analytics
Chapter 55: Secure Network Access, Visibility, and Enforcement-Describe the components, capabilities, and benefits of these security products and solutions-Cisco Secure Cloud Analytics
Chapter 56: Secure Network Access, Visibility, and Enforcement-Describe the components, capabilities, and benefits of these security products and solutions-Cisco pxGrid
Chapter 57: Secure Network Access, Visibility, and Enforcement-Describe the components, capabilities, and benefits of these security products and solutions-Cisco Umbrella Investigate
Chapter 58: Secure Network Access, Visibility, and Enforcement-Describe the components, capabilities, and benefits of these security products and solutions-Cisco Cognitive Intelligence
Chapter 59: Secure Network Access, Visibility, and Enforcement-Describe the components, capabilities, and benefits of these security products and solutions-Cisco Encrypted Traffic Analytics
Chapter 60: Secure Network Access, Visibility, and Enforcement-Describe the components, capabilities, and benefits of these security products and solutions-Cisco Secure Client Network Visibility Module (NVM)

Combo Packages at a Discount: Get one that best fits your learning needs.