Implementing Cisco Network Security Exam (210-260)

Description

CCIE - Cisco.Press.Network.Security_base Mind Map on Implementing Cisco Network Security Exam (210-260), created by alessandro moreira on 28/09/2016.
alessandro moreira
Mind Map by alessandro moreira, updated more than 1 year ago
alessandro moreira
Created by alessandro moreira almost 8 years ago
19
1

Resource summary

Implementing Cisco Network Security Exam (210-260)
  1. 1 - Security Concepts (12%)
    1. Common security principles
      1. Common security threats
        1. Cryptography concepts
          1. Describe network topologies
          2. 2 - Secure Access (14%)
            1. Secure management
              1. AAA concepts
                1. 802.1X authentication
                  1. BYOD
                  2. 3 - VPN (17%)
                    1. VPN concepts
                      1. Remote access VPN
                        1. Site-to-site VPN
                        2. 4 - Secure Routing and Switching (18%)
                          1. Security on Cisco routers (OSPF)
                            1. Securing routing protocols
                              1. Common Layer 2 attacks
                                1. Mitigation procedures
                                  1. VLAN security
                                  2. 5 - Cisco Firewall Technologies (18%)
                                    1. Describe operational strengths and weaknesses of the different firewall technologies
                                      1. Compare stateful vs. stateless firewalls
                                        1. Implement NAT on Cisco ASA 9.x
                                          1. Implement zone-based firewall
                                            1. Firewall features on the Cisco Adaptive Security Appliance (ASA) 9.x
                                            2. 6 - IPS (9%)
                                              1. Describe IPS deployment considerations
                                                1. Describe IPS technologies
                                                2. 7 - Content and Endpoint Security (12%)
                                                  1. Describe mitigation technology for email-based threats
                                                    1. Describe mitigation technology for web-based threats
                                                      1. Describe mitigation technology for endpoint threats
                                                      Show full summary Hide full summary

                                                      Similar

                                                      Art Movements
                                                      Julia Lee
                                                      Cell Structure
                                                      daniel.praecox
                                                      History of Medicine: Ancient Ideas
                                                      James McConnell
                                                      An Inspector Calls - Themes
                                                      Emily Simms
                                                      GCSE Mathematics Topics
                                                      goldsmith.elisa
                                                      How does Shakespeare present villainy in Macbeth?
                                                      maxine.canvin
                                                      GCSE Subjects
                                                      KimberleyC
                                                      Sociology: Crime and Deviance Flash cards
                                                      Beth Morley
                                                      Peace and Conflict Flashcards - Edexcel GCSE Religious Studies Unit 8
                                                      nicolalennon12
                                                      Forms of Business Ownership Quiz
                                                      Noah Swanson
                                                      Repaso Revalida PR 2016
                                                      Rodrigo Lopez