SKIP THE SHIPPING
Use code NOSHIP during checkout to save 40% on eligible eBooks, now through January 5. Shop now.
Register your product to gain access to bonus material or receive a coupon.
Breaks topics down into smaller, easy to understand and absorb blocks of information.
Emulates new testing environment and test hands-on networking skills.
Provides students with feedback on areas requiring further study.
Develops student's ability to apply concepts in real-worl setting, improving concept comprehension.
Prepares students for exam.
Students gain knowledge from the source of the exams, courses and technology of the CCNA exam.
Official self-study test preparation guide for the CCIE Security written exam
Review all CCIE Security written exam topics, including:
With increased reliance on networking resources to provide productivity gains and corporate revenue contributions, the need for network security has never been higher. Rising concerns over corporate espionage, cyber-terrorism, financial fraud, and theft of proprietary information have radically increased the demand for highly skilled networking security professionals. One of the most sought-after and highly valued networking certifications, the Cisco Systems CCIE Security certification is answering the need for technical expertise in this critical market by distinguishing the top echelon of internetworking experts.
CCIE Security Exam Certification Guide is a comprehensive study tool for the Security written exam. Written and reviewed by members of the CCIE Security team at Cisco, this book helps you understand and master the material you will need to know to pass the written exam. Designed to optimize your study time, this book helps you assess your knowledge of the material at the beginning of each chapter with customized quizzes for each topic. Increase retention of key concepts by reviewing summaries of crucial concepts. Test your comprehension with chapter-ending review questions. Determine your assimilation of knowledge and get a taste for the CCIE Security lab exam with two complete practice lab scenarios focused on security and routing and switching topics. Take timed practice exams that mimic the real testing environment with the CD-ROM test engine or customize the test bank to focus on the topics for which you need the most help. Along with an electronic version of the text, a complete copy of Henry Benjamin's previously published CCIE Routing and Switching Exam Cram is also presented on the CD-ROM as an additional bonus.
CCIE Security Exam Certification Guide is part of a recommended study program from Cisco Systems that can include simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, please visit www.cisco.com/go/authorizedtraining.
"This book will be a valuable asset for potential CCIE Security candidates. I am positive individuals will inevitably gain extensive security network knowledge during their preparation by using this book."
-Gert De Laet, Product Manager, CCIE Security, Cisco Systems, Inc.
Companion CD-ROM
CD contains a test engine with over 300 questions, lab equipment suggestions, sample configurations, and a bonus electronic copy of the complete CCIE Routing and Switching Exam Cram text.
Patch for the CD-ROM software. Please install the original product from the CD-ROM first.
This program installs CCIE Security Exam Certification Guide on your computer and provides full access to the Security exam question database.
Download - 5.81 MB -- Setup.exe
Download - 790 KB -- Chapter 6: Operating Systems and Cisco Security Applications
1. Using This Book to Prepare for the CCIE Security Written Exam.
CCIE Security Certification. CCIE Security Written Exam Blueprint. How to Prepare for the CCIE Security Written Exam Using This Book.
“Do I Know This Already?” Quiz. Foundation Topics. Networking Basics—The OSI Reference Model. Layer 1: The Physical Layer. Layer 2: The Data Link Layer. Layer 3: The Network Layer. Layer 4: The Transport Layer. Layer 5: The Session Layer. Layer 6: The Presentation Layer. Layer 7: The Application Layer. TCP/IP and OSI Model Comparison. Example of Peer-to-Peer Communication. Ethernet Overview. Switching and Bridging. Bridge Port States. FastEther Channel. Internet Protocol. Variable-Length Subnet Masks. Classless Interdomain Routing. Transmission Control Protocol. TCP Mechanisms. TCP Services. Address Resolution Protocol (ARP). Reverse ARP. Dynamic Host Configuration Protocol. Hot Standby Router Protocol. Internet Control Message Protocol. Telnet. File Transfer Protocol and Trivial File Transfer Protocol. Routing Protocols. Routing Information Protocol. EIGRP. OSPF. Border Gateway Protocol. ISDN. Basic Rate and Primary Rate Interfaces. ISDN Framing and Frame Format. ISDN Layer 2 Protocols. Cisco IOS ISDN Commands. IP Multicast. Asynchronous Communications and Access Devices. Foundation Summary. Requirements for FastEther Channel. Q & A. Scenario. Scenario 2-1: Routing IP on Cisco Routers. Scenario Answers. Scenario 2-1 Answers: Routing IP on Cisco Routers.
“Do I Know This Already?” Quiz. Foundation Topics. Domain Name System. Trivial File Transfer Protocol. File Transfer Protocol. Active FTP. Passive FTP. Hypertext Transfer Protocol. Secure Socket Layer. Simple Network Management Protocol. SNMP Notifications. SNMP Examples. Simple Mail Transfer Protocol. Network Time Protocol. Secure Shell. Foundation Summary. Q & A. Scenario. Scenario 3-1: Configuring DNS, TFTP, NTP, and SNMP. Scenario Answers. Scenario 3-1 Solutions.
“Do I Know This Already?” Quiz. Foundation Topics. Cisco Hardware. Random-Access Memory (RAM). Nonvolatile RAM (NVRAM). System Flash. Central Processing Unit. Read-Only Memory. Configuration Registers. Cisco Interfaces. Saving and Loading Files. show and debug Commands. Router CLI. show Commands. Debugging Cisco Routers. Password Recovery. Basic Security on Cisco Routers. IP Access Lists. Access Lists on Cisco Routers. Extended Access Lists. Foundation Summary. Q & A. Scenario. Scenario 4-1: Configuring Cisco Routers for Passwords and Access Lists. Scenario Answers.
“Do I Know This Already?” Quiz. Foundation Topics. Authentication, Authorization, and Accounting (AAA). Authentication. Authorization. Accounting. Remote Authentication Dial-In User Service (RADIUS). RADIUS Configuration Task List. Terminal Access Controller Access Control System Plus (TACACS+). TACACS+ Configuration Task List. TACACS+ Versus RADIUS. Kerberos. Kerberos Configuration Task List. Virtual Private Dial-Up Networks (VPDN). VPDN Configuration Task List. Encryption Technology Overview. Data Encryption Standard (DES) and Triple Data Encryption Standard (3DES). Digital Signature Standard (DSS). Message Digest 5 (MD5) and Secure Hash Algorithm (SHA). Diffie-Hellman. IP Security IPSec. Internet Key Exchange (IKE). IKE Phase I Messages Types 1-6. IKE Phase II Message Types 1-3. Cisco IOS IPSec Configuration. Certificate Enrollment Protocol (CEP). Foundation Summary. Q & A. Scenario. Scenario 5-1: Configuring Cisco Routers for IPSec. Scenario Answers. Scenario 5-1 Solutions.
“Do I Know This Already?” Quiz. Foundation Topics. UNIX. UNIX Command Structure. UNIX Permissions. UNIX File Systems. Microsoft NT Systems. Browsing and Windows Names Resolution. Scaling Issues in Windows NT. Login and Permissions. Windows NT Users and Groups. Windows NT Domain Trust. Common Windows DOS Commands. Cisco Secure for Windows and UNIX. Cisco Secure Policy Manager. Cisco Secure Intrusion Detection System and Cisco Secure Scanner. NetRanger (Cisco Secure Intrusion Detection System). NetSonar (Cisco Secure Scanner). Cisco Security Wheel. Foundation Summary. Q & A. Scenarios. Scenario 6-1: NT File Permissions. Scenario 6-2: UNIX File Permissions. Scenario Answers. Scenario 6-1 Solution. Scenario 6-2 Solution.
“Do I Know This Already?” Quiz. Foundation Topics. Advanced Security Concepts. Network Address Translation and Port Address Translation. NAT Operation on Cisco Routers. Cisco Private Internet Exchange (PIX). Configuring a PIX. Cisco PIX Firewall Software Features. Cisco IOS Firewall Security Feature Set. CBAC Configuration Task List. Public Key Infrastructure. Virtual Private Networks. Foundation Summary. Q & A. Scenario. Scenario 7-1: Configuring a Cisco PIX for NAT. Scenario Answer. Scenario 7-1 Solution.
“Do I Know This Already?” Quiz. Foundation Topics. Network Security Policies. Standards Bodies and Incident Response Teams. Incident Response Teams. Internet Newsgroups. Vulnerabilities, Attacks, and Common Exploits. Intrusion Detection System. Protecting Cisco IOS from Intrusion. Foundation Summary. Q & A. Scenario. Scenario 8-1: Defining IOS Commands to View DoS Attacks in Real Time. Scenario Answer. Scenario 8-1 Solution.
How to Use This Chapter. Goal of This Lab. CCIE Security Self-Study Lab Part I Goals. CCIE Security Self-Study Lab Part II Goals. General Lab Guidelines and Setup. Communications Server. CCIE Security Self-Study Lab Part I: Basic Network Connectivity (4 Hours). Basic Frame Relay Setup. Physical Connectivity. Catalyst Ethernet Switch Setup I. Catalyst Ethernet Switch Setup II. IP Host Lookup and Disable DNS. PIX Configuration. IGP Routing. Basic ISDN Configuration. DHCP Configuration. BGP Routing Configuration. CCIE Security Self-Study Lab Part II: Advanced Security Design (4 Hours). IP Access List. Prevent Denial-of-Service Attacks. Time-Based Access List. Dynamic Access List/Lock and Key Feature. IOS Firewall Configuration on R5. IPSec Configuration. Advanced PIX Configuration. ACS Configuration. Final Configurations. Conclusion.
Download - 44.4 KB -- Book Foreword (pdf)
Download - 560 KB -- Index