Chapter 2: Explain common threats against on-premises, hybrid, and cloud environmentsCloud: data breaches, insecure APIs, DoS/DDoS, compromised credentials
Chapter 4: Describe functions of the cryptography components such as hashing, encryption, PKI, SSL, IPsec, NAT-T IPv4 for IPsec, preshared key, and certificate-based authorization
Chapter 5: Compare site-to-site and remote access VPN deployment types and components such as virtual tunnel interfaces, standards-based IPsec, DMVPN, FlexVPN, and Cisco Secure Client including high availability considerations
Chapter 12: Securing the CloudDescribe deployment models of network security solutions and architectures that provide intrusion prevention and firewall capabilities
Chapter 17: Securing the Cloud-Implement management options for network security solutions (single vs. multidevice manager, in-band vs. out-of-band, cloud vs. on-premises)
Chapter 19: Securing the Cloud-Configure secure network management of perimeter security and infrastructure devices such as SNMPv3, NetConf, RestConf, APIs, secure syslog, and NTP with authentication
Chapter 34: Content Security-Compare the components, capabilities, and benefits of on-premises, hybrid, and cloudbased email and web solutions (Cisco Secure Email Gateway, Cisco Secure Email Cloud Gateway, and Cisco Secure Web Appliance)
Chapter 36: Content Security-Configure and verify email security features such as SPAM filtering, antimalware filtering, DLP, blocklisting, and email encryption
Chapter 37: Content Security-Configure and verify Cisco Umbrella Secure Internet Gateway and web security features such as blocklisting, URL filtering, malware scanning, URL categorization, web application filtering, and TLS decryption
Chapter 39: Content Security-Configure and verify web security controls on Cisco Umbrella (identities, URL content settings, destination lists, and reporting)
Chapter 48: Secure Network Access, Visibility, and Enforcement-Describe identity management and secure network access concepts such as guest services, profiling, posture assessment and BYOD
Chapter 54: Secure Network Access, Visibility, and Enforcement-Describe the components, capabilities, and benefits of these security products and solutions-Cisco Secure Network Analytics
Chapter 55: Secure Network Access, Visibility, and Enforcement-Describe the components, capabilities, and benefits of these security products and solutions-Cisco Secure Cloud Analytics
Chapter 56: Secure Network Access, Visibility, and Enforcement-Describe the components, capabilities, and benefits of these security products and solutions-Cisco pxGrid
Chapter 57: Secure Network Access, Visibility, and Enforcement-Describe the components, capabilities, and benefits of these security products and solutions-Cisco Umbrella Investigate
Chapter 58: Secure Network Access, Visibility, and Enforcement-Describe the components, capabilities, and benefits of these security products and solutions-Cisco Cognitive Intelligence
Chapter 59: Secure Network Access, Visibility, and Enforcement-Describe the components, capabilities, and benefits of these security products and solutions-Cisco Encrypted Traffic Analytics
Chapter 60: Secure Network Access, Visibility, and Enforcement-Describe the components, capabilities, and benefits of these security products and solutions-Cisco Secure Client Network Visibility Module (NVM)