Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Network Security Technologies and Solutions (CCIE Professional Development Series)

Buy
Yusuf Bhaiji, CCIE No. 9305 (R&S and Security), has been with Cisco for seven years and is currently the program manager for Cisco CCIE Security certification. He is also the CCIE Proctor in the Cisco Dubai Lab. Prior to this, he was technical lead for the Sydney TAC Security and VPN team at Cisco.
  • Filter traffic with access lists and implement security features on switches
  • Configure Cisco IOS router firewall features and deploy ASA and PIX Firewall appliances
  • Understand attack vectors and apply Layer 2 and Layer 3 mitigation techniques
  • Secure management access with AAA
  • Secure access control using multifactor authentication technology
  • Implement identity-based network access control
  • Apply the latest wireless LAN security solutions
  • Enforce security policy compliance with Cisco NAC
  • Learn the basics of cryptography and implement IPsec VPNs, DMVPN, GET VPN, SSL VPN, and MPLS VPN technologies
  • Monitor network activity and security incident response with network and host intrusion prevention, anomaly detection, and security monitoring and correlation
  • Deploy security management solutions such as Cisco Security Manager, SDM, ADSM, PDM, and IDM
  • Learn about regulatory compliance issues such as GLBA, HIPPA, and SOX

This book is part of the Cisco CCIE Professional Development Series from Cisco Press, which offers expert-level instruction on network design, deployment, and support methodologies to help networking professionals manage complex networks and prepare for CCIE exams.

 

Category: Network Security

Covers: CCIE Security Exam


About the Author


Yusuf Bhaiji, CCIE No. 9305 (Routing and Switching and Security), has been with Cisco for seven years and is currently the program manager for the Cisco CCIE Security Certification and CCIE proctor in Cisco Dubai Lab. Prior to this, he was technical lead for the Sydney TAC Security and VPN team. Yusuf’s passion for security technologies and solutions has played a dominant role in his 17 years of industry experience, from as far back as his initial master’s degree in computer science, and has since been reflected in his numerous certifications. Yusuf prides himself in his knowledge-sharing abilities, which are evident in the fact that he has mentored many successful candidates, as well as having designed and delivered a number of Network Security solutions around the globe. Yusuf is an advisory board member of several nonprofit organizations for the dissemination of technologies and promotion of indigenous excellence in the field of internetworking through academic and professional activities. Yusuf chairs the Networkers Society of Pakistan (NSP) and IPv6 Forum Pakistan chapter. Yusuf has also authored a Cisco Press publication titled CCIE Security Practice Labs (ISBN 1587051346), released in early 2004. He has been a technical reviewer for several Cisco Press publications and written articles, white papers, and presentations on various security technologies. He is a frequent lecturer and well-known speaker presenting in several conferences and seminars worldwide.

(HTML tags aren't allowed.)

Designer's Guide to Mac OS X Tiger
Designer's Guide to Mac OS X Tiger
You held off on moving to Mac OS X until your bread-and-butter applications made the jump, and now you're thinking of moving up to Tiger. This book is especially geared toward designers who've become comfortable working under Mac OS X and are ready now to make the Tiger transition. Designer and prepress pro Jeff Gamet focuses on the Mac OS X...
Graph Algorithms and Applications 2 (No. 2)
Graph Algorithms and Applications 2 (No. 2)

This book contains Volumes 4 and 5 of the Journal of Graph Algorithms and Applications (JGAA). The first book of this series, Graph Algorithms and Applications 1, published in March 2002, contains Volumes 1-3 of JGAA.JGAA is a peer-reviewed scientific journal devoted to the publication of high-quality research papers on the analysis, design,...

The Disciplinary Frame: Photographic Truths and the Capture of Meaning
The Disciplinary Frame: Photographic Truths and the Capture of Meaning
Photography can seem to capture reality and the eye like no other medium, commanding belief and wielding the power of proof. In some cases, a photograph itself is attributed the force of the real. How can a piece of chemically discolored paper have such potency? How does the meaning of a photograph become fixed? In The Disciplinary Frame,...

Functional and Object Oriented Analysis and Design: An Integrated Methodology
Functional and Object Oriented Analysis and Design: An Integrated Methodology
Functional and Object Oriented Analysis and Design: An Integrated Methodology teaches students of information systems, software engineering, computer science and related areas how to analyze and design information systems using the FOOM methodology. FOOM combines the object-oriented approach and the functional (process-oriented) approach. It...
Nanoscale Materials
Nanoscale Materials
The unique electronic and chemical properties of nanoparticles have drawn the attention of chemists, physicists, biologists and engineers who wish to use them for the development of next generation nanodevices. Organized nanoassemblies of inorganic nanoparticles and organic molecules are building blocks of nanodevices, whether they...
Truffle Quick Start Guide: Learn the fundamentals of Ethereum development
Truffle Quick Start Guide: Learn the fundamentals of Ethereum development

Develop, test, and deploy decentralized applications for Ethereum platform

Key Features

  • Build your first Ethereum Dapp with Truffle: the most popular Ethereum development framework
  • Build, compile, and deploy smart contracts in your development environment
  • ...
©2020 LearnIT (support@pdfchm.net) - Privacy Policy