Chapter 1 Modern Network Security Threats 1.0 Introduction 1.1 Fundamental Principles of a Secure Network 1.2 Viruses, Worms, and Trojan horses 1.3 Attack Methodologies 1.4 Cisco Network Foundation Protection Framework 1.5 Chapter Summary Chapter 2 Securing Network Devices 2.0 Chapter Introduction 2.
1 Securing Device Access 2.2 Assigning Administrative Roles 2.3 Monitoring and Managing Devices 2.4 Using Automated Security Features 2.5 Summary Chapter 3 Authentication, Authorization, and Accounting 3.0 Introduction 3.1 Purpose of AAA 3.2 Local AAA Authentication 3.
3 Server-Based AAA 3.4 Server-Based AAA Authentication 3.5 Server-Based AAA Authorization and Accounting 3.6 Summary Chapter 4 Implementing Firewall Technologies 4.0 Introduction 4.1 Access Control Lists 4.2 Firewall Technologies 4.3 Zone-Based Policy Firewalls 4.
4 Summary Chapter 5 Implementing Intrusion Prevention 5.0 Introduction 5.1 IPS Technologies 5.2 IPS Signatures 5.3 Implement IPS 5.4 Verify and Monitor IPS 5.5 Summary Chapter 6 Securing the Local-Area Network 6.0 Introduction 6.
1 Endpoint Security 6.2 Layer 2 Security Considerations 6.3 Configuring Layer 2 Security 6.4 Wireless, VoIP, and SAN Security 6.5 Summary Chapter 7 Cryptographic Systems 7.0 Introduction 7.1 Cryptographic Services 7.2 Basic Integrity and Authenticity 7.
3 Confidentiality 7.4 Public Key Cryptography.