Integrated Security Technologies and Solutions - Volume I
Cisco Security Solutions for Advanced Threat Protection with Next Generation Firewall, Intrusion Prevention, Amp, and Content Security
Integrated Security Technologies and Solutions - Volume I
Cisco Security Solutions for Advanced Threat Protection with Next Generation Firewall, Intrusion Prevention, Amp, and Content Security
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Prepare for your CCIE Security written and lab exam: gain expert-level knowledge of Cisco security products and solutions from leading Cisco engineers and architects * The must-have ready-reference for all Cisco security professionals * First of two volumes: Volume 1 focuses on network security, next-generation firewalling and intrusion prevention, and advanced threat and content security * Discover how Cisco firewalls, IPS systems, access control, and other security products and solutions integrate in the real world
- Arvind ChandakaDeveloping Microservices Architecture on Microsoft Azure with Open Source Technologies48,99 €
- Yuri DiogenesMicrosoft Azure Security Infrastructure38,99 €
- William StallingsCryptography and Network Security245,99 €
- Aaron WolandCisco Ise for Byod and Secure Unified Access77,99 €
- Graham BartlettIkev2 Ipsec Virtual Private Networks70,99 €
- William StallingsEffective Cybersecurity64,99 €
- Pramod NairSecuring 5g and Evolving Architectures75,99 €
-
-
-
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
- Produktdetails
- Verlag: Pearson Education
- Seitenzahl: 592
- Erscheinungstermin: 14. Mai 2018
- Englisch
- Abmessung: 229mm x 183mm x 36mm
- Gewicht: 980g
- ISBN-13: 9781587147067
- ISBN-10: 1587147068
- Artikelnr.: 48433758
- Verlag: Pearson Education
- Seitenzahl: 592
- Erscheinungstermin: 14. Mai 2018
- Englisch
- Abmessung: 229mm x 183mm x 36mm
- Gewicht: 980g
- ISBN-13: 9781587147067
- ISBN-10: 1587147068
- Artikelnr.: 48433758
Part I Hi There! This Is Network Security 1
Chapter 1 Let’s Talk About Network Security 3
Know Thy Enemy 4
Know Thy Self 6
Security Standards and Frameworks 9
Regulatory Compliance 15
Payment Card Industry Data Security Standard (PCI DSS) 16
Security Models 18
Integrating Security Solutions 23
Summary 25
References 25
Chapter 2 Infrastructure Security and Segmentation 27
The Three Planes 27
Securing the Management Plane 28
Securing the Control Plane 38
Securing the Data Plane 49
Visibility with NetFlow 76
Summary 77
References 78
Chapter 3 Wireless Security 79
What Is Wireless? 79
Wireless Security Overview 90
Securing the WLAN 94
Configuring Wireless Protection Policies 98
Management and Control Plane Protection 114
Integrating a WLC with Other Security Solutions 120
Summary 122
References 122
Part II Deny IP any any 123
Chapter 4 Firewalling with the ASA 125
ASA Fundamentals 125
Traffic with the ASA 151
ASA Advanced Features 167
Advanced Firewall Tuning 172
Troubleshooting the ASA 176
Summary 180
References 181
Chapter 5 Next-Gen Firewalls 183
Firepower Deployment Options 184
Configuring Firepower Threat Defense 186
Access Control Policies 206
Analysis and Reporting 229
Summary 237
References 238
Chapter 6 Next-Gen Intrusion Detection and Prevention 239
NGIPS Overview 239
Cisco NGIPS Appliances 248
Snort 256
Configuring a NGIPS 267
Operationalizing a NGIPS 283
Summary 296
References 297
Chapter 7 IOS Firewall and Security Features 299
Network Address Translation (NAT) 299
Zone-Based Firewall (ZBF) 309
IOS Advanced Security Features 319
Summary 331
References 331
Part III EHLO. You have threat in content
333
Chapter 8 Content Security and Advanced Threat Protection 335
Content Security Overview 335
Web Security Appliance 336
Email Security Appliance 370
Security Management Appliance 390
Summary 391
References 391
Chapter 9 Umbrella and the Secure Internet Gateway 393
Umbrella Fundamentals 393
Umbrella Overview Dashboard 399
Deploying Umbrella 401
Cisco Investigate 423
Summary 425
References 425
Chapter 10 Protecting Against Advanced Malware 427
Introduction to Advanced Malware Protection (AMP) 427
Role of the AMP Cloud 429
Doing Security Differently 430
The Cloud 437
Cloud Proxy Mode 438
Air Gap Mode 440
Threat Grid 442
The Clean Interface 446
The Administrative Interface 446
The Dirty Interface 446
Comparing Public and Private Deployments 446
AMP for Networks 447
AMP for Endpoints 457
Custom Detections 462
AMP for Windows 474
Mac Policies 490
Linux Policies 495
AMP for Android 497
Groups, Groups, and More Groups 498
The Download Connector Screen 499
Distributing via Cisco AnyConnect 500
Installing AMP for Windows 501
Installing AMP for Mac 503
Installing AMP for Linux 504
Proxy Complications 511
AMP for Content Security 513
Content Security Connectors 513
Configuring AMP for Content Security Appliances 514
Configuring the Web Security Appliance (WSA) Devices 515
Configuring the Email Security Appliance (ESA) Devices 519
AMP Reports 522
Summary 524
9781587147067, TOC, 4/16/2018
Part I Hi There! This Is Network Security 1
Chapter 1 Let’s Talk About Network Security 3
Know Thy Enemy 4
Know Thy Self 6
Security Standards and Frameworks 9
Regulatory Compliance 15
Payment Card Industry Data Security Standard (PCI DSS) 16
Security Models 18
Integrating Security Solutions 23
Summary 25
References 25
Chapter 2 Infrastructure Security and Segmentation 27
The Three Planes 27
Securing the Management Plane 28
Securing the Control Plane 38
Securing the Data Plane 49
Visibility with NetFlow 76
Summary 77
References 78
Chapter 3 Wireless Security 79
What Is Wireless? 79
Wireless Security Overview 90
Securing the WLAN 94
Configuring Wireless Protection Policies 98
Management and Control Plane Protection 114
Integrating a WLC with Other Security Solutions 120
Summary 122
References 122
Part II Deny IP any any 123
Chapter 4 Firewalling with the ASA 125
ASA Fundamentals 125
Traffic with the ASA 151
ASA Advanced Features 167
Advanced Firewall Tuning 172
Troubleshooting the ASA 176
Summary 180
References 181
Chapter 5 Next-Gen Firewalls 183
Firepower Deployment Options 184
Configuring Firepower Threat Defense 186
Access Control Policies 206
Analysis and Reporting 229
Summary 237
References 238
Chapter 6 Next-Gen Intrusion Detection and Prevention 239
NGIPS Overview 239
Cisco NGIPS Appliances 248
Snort 256
Configuring a NGIPS 267
Operationalizing a NGIPS 283
Summary 296
References 297
Chapter 7 IOS Firewall and Security Features 299
Network Address Translation (NAT) 299
Zone-Based Firewall (ZBF) 309
IOS Advanced Security Features 319
Summary 331
References 331
Part III EHLO. You have threat in content
333
Chapter 8 Content Security and Advanced Threat Protection 335
Content Security Overview 335
Web Security Appliance 336
Email Security Appliance 370
Security Management Appliance 390
Summary 391
References 391
Chapter 9 Umbrella and the Secure Internet Gateway 393
Umbrella Fundamentals 393
Umbrella Overview Dashboard 399
Deploying Umbrella 401
Cisco Investigate 423
Summary 425
References 425
Chapter 10 Protecting Against Advanced Malware 427
Introduction to Advanced Malware Protection (AMP) 427
Role of the AMP Cloud 429
Doing Security Differently 430
The Cloud 437
Cloud Proxy Mode 438
Air Gap Mode 440
Threat Grid 442
The Clean Interface 446
The Administrative Interface 446
The Dirty Interface 446
Comparing Public and Private Deployments 446
AMP for Networks 447
AMP for Endpoints 457
Custom Detections 462
AMP for Windows 474
Mac Policies 490
Linux Policies 495
AMP for Android 497
Groups, Groups, and More Groups 498
The Download Connector Screen 499
Distributing via Cisco AnyConnect 500
Installing AMP for Windows 501
Installing AMP for Mac 503
Installing AMP for Linux 504
Proxy Complications 511
AMP for Content Security 513
Content Security Connectors 513
Configuring AMP for Content Security Appliances 514
Configuring the Web Security Appliance (WSA) Devices 515
Configuring the Email Security Appliance (ESA) Devices 519
AMP Reports 522
Summary 524
9781587147067, TOC, 4/16/2018