CCIE Security Written Exam Guide: Exam 350-018 (Cisco pocket Guides Book 5)
Not Available / Digital Item
CCIE Security Written Exam Guide: Exam 350-018 (Cisco pocket Guides Book 5)
This book is designed to give the reader all of the information required to pass the Cisco CCIE Security Exam 350-018 version 4.0.
This book is presented in a format to make it readable and understandable.
Topics covered:
1.0 Infrastructure, Connectivity, Communications, and Network Security
1.1 Network addressing basics
1.2 OSI layers
1.3 TCP/UDP/IP protocols
1.4 LAN switching (for example, VTP, VLANs, spanning tree, and trunking)
1.5 Routing protocols (for example, RIP, EIGRP, OSPF, and BGP)
1.5.a Basic functions and characteristics
1.5.b Security features
1.6 Tunneling protocols
1.6.a GRE
1.6.b NHRP
1.6.c IPv6 tunnel types
1.7 IP multicast
1.7.a PIM
1.7.b MSDP
1.7.c IGMP and CGMP
1.8 Wireless
1.8.a SSID
1.8.b Authentication and authorization
1.8.c Rogue APs
1.8.d Session establishment
1.9 Authentication and authorization technologies
1.9.a Single sign-on
1.9.b OTPs
1.9.c LDAP and AD
1.9.d RBAC
1.10 VPNs
1.10.a L2 vs L3
1.10.b MPLS, VRFs, and tag switching
1.11 Mobile IP networks
2.0 Security Protocols
2.1 RSA
2.2 RC4
2.3 MD5
2.4 SHA
2.5 DES
2.6 3DES
2.7 AES
2.8 IPsec
2.9 ISAKMP
2.10 IKE and IKEv2
2.11 GDOI
2.12 AH
2.13 ESP
2.14 CEP
2.15 TLS and DTLS
2.16 SSL
2.17 SSH
2.18 RADIUS
2.19 TACACS+
2.20 LDAP
2.21 EAP methods (for example, EAP-MD5, EAP-TLS, EAP-TTLS, EAP-FAST, PEAP, and LEAP)
2.22 PKI, PKIX, and PKCS
2.23 IEEE 802.1X
2.24 WEP, WPA, and WPA2
2.25 WCCP
2.26 SXP
2.27 MACsec
2.28 DNSSEC
3.0 Application and Infrastructure Security
3.1 HTTP
3.2 HTTPS
3.3 SMTP
3.4 DHCP
3.5 DNS
3.6 FTP and SFTP
3.7 TFTP
3.8 NTP
3.9 SNMP
3.10 syslog
3.11 Netlogon, NetBIOS, and SMB
3.12 RPCs
3.13 RDP and VNC
3.14 PCoIP
3.15 OWASP
3.16 Manage unnecessary services
4.0 Threats, Vulnerability Analysis, and Mitigation
4.1 Recognize and mitigate common attacks
4.1.a ICMP attacks and PING floods
4.1.b MITM
4.1.c Replay
4.1.d Spoofing
4.1.e Backdoor
4.1.f Botnets
4.1.g Wireless attacks
4.1.h DoS and DDoS attacks
4.1.i Virus and worm outbreaks
4.1.j Header attacks
4.1.k Tunneling attacks
4.2 Software and OS exploits
4.3 Security and attack tools
4.4 Generic network intrusion prevention concepts
4.5 Packet filtering
4.6 Content filtering and packet inspection
4.7 Endpoint and posture assessment
4.8 QoS marking attacks
5.0 Cisco Security Products, Features, and Management
Author:
Grant Wilson is the author of the “Cisco Pocket Guide†series of books. He is CCIE security #26667 and currently works as contractor for some is the biggest names in the business. He spent 15 years of his IT career as a Cisco trainer (CCSI) teaching many Cisco certified classes. He lives near Oxford in England with his wife and three children.
Grant runs a website which is in his kitchen and is protected by an IOS firewall, ASA firewall, IOS IPS and an IPS sensor.
He holds the following certifications:
• CCIE - Security (Cisco) - #26667
• CCSI (Cisco) - #23077
• CCSP (Cisco)
• CCNP (Cisco)
• JNCIS Security (Juniper)
• JNCIA (Juniper)
• CCSA (Checkpoint)
• CCNA (Cisco)
• CCDA (Cisco)
• MCSE (Microsoft)
• MCT (Microsoft)
• Cisco Firewall Specialist
• Cisco Content Networking Specialist
• Cisco Network Management Specialist
• Ironport certified trainer
• Cisco Borderless Networks R and S Support Specialist
• BSc Electrical and electronic engineering
• MA Digital Music Technology