Description: CCNP and CCIE Security Core SCOR 350-701 Exam Cram by Eddie Mendonca, Joseph Mlodzianowski, Nick Kelly CCNP and CCIE Security Core SCOR 350-701 Exam Cram is the perfect study guide to help you pass the CCNP and CCIE Security Core SCOR 350-701 exam, providing coverage and practice questions for every exam topic. The book contains an extensive set of preparation tools, including topic overviews, exam alerts, CramSavers, CramQuizzes, chapter-ending review questions, author notes, tips, and an extensive glossary. The book also contains the extremely useful Cram Sheet: a collection of essential facts in an easy to review format. Complementing all these great study tools is the powerful Pearson Test Prep practice test software, complete with hundreds of exam-realistic practice questions. This assessment software offers you a wealth of customization options and reporting features, allowing you to test your knowledge in study mode, practice mode, or flashcard mode. Covers the critical information youll need to know to score higher on your CCNP and CCIE Security Core SCOR 350-701 exam Compare common security vulnerabilities such as software bugs, weak or hardcoded passwords, OWASP top ten, missing encryption ciphers, buffer overflow, path traversal, cross-site scripting/forgeryConfigure AAA for device and network access such as TACACS+ and RADIUSImplement segmentation, access control policies, AVC, URL filtering, malware protection, and intrusion policiesIdentify security capabilities, deployment models, and policy management to secure the cloudConfigure cloud logging and monitoring methodologiesImplement traffic redirection and capture methods for web proxyDescribe the components, capabilities, and benefits of the Cisco UmbrellaConfigure endpoint antimalware protection using Cisco Secure EndpointDescribe the uses and importance of a multifactor authentication (MFA) strategy FORMAT Paperback LANGUAGE English CONDITION Brand New Author Biography Joseph Mlodzianowski is a CCIE, CISSP, information security aficionado, and adventurer; he started multiple events and villages at RSA Conference, DEF CON, and Black Hat, among others, including founding the Red Team Village. He has been in the information technology security field for more than 25 years working in cybersecurity, infrastructure, networking, systems, design, offense, and defense. Joseph is currently a cybersecurity architect for Cisco Managed and Intelligence Services. He spent more than 12 years at the Department of Defense as an operator, principal cyber engineer, and SME designing and deploying complex technologies in support of missions around the world. He has consulted, investigated, and provided support for multiple federal agencies during the past 15 years. Joseph continues to contribute to content, reviews, and editing in the certification testing and curriculum process. Joseph spent almost 15 years in the energy sector, supporting refineries, pipelines, and chemical plants, specializing in ICS/SCADA industrial control networks, and building data centers. Joseph holds a broad range of certifications, including the Cisco CCIE, CNE, CSNA, CNSS-4012, CISSP, ITILv4, MCSE, NSA IAM and IEM, OIAC1180, FEMA IS-00317, Aruba ACMA, First Responder, Hazmat Certified, Member of Bexar County Sheriffs Office CERT, and Certified Hacking Investigator. He also is a founding contributor to the CyManII (Cybersecurity Manufacturing Innovation Institute) Supply Chain. He is a member of Messaging Malware Mobile Anti-Abuse Working Group (M3aawg) and founder of the Texas Cyber Summit, a nonprofit. He believes in giving back to the community and supporting nonprofits. More information on Joseph and his training classes can be found at CyberLearningPath.org. Eduardo (Eddie) Mendonca is a 23-year Cisco veteran whose current role is cybersecurity technical solutions architect in the Cisco security channel team. Before joining the security channel team, Eddie served as a technical leader on the Cisco Identity Services Engine (ISE) infrastructure development team. Eddie authored several infrastructure features in ISE, including the installation framework, upgrade and patching framework, OS layer IPv6 support, NIC Bonding, Secure Boot, and RootPatch kit. Eddie holds various technical certifications, including CISSP and Cisco DevNet. He also holds U.S. Patent US8250630: Detecting Unauthorized Computer Access. Eddie holds a bachelors degree in computer science from Fresno State University and is based out of Clovis, California. Nicholas Kelly has worked for more than 25 years in the cybersecurity industry. He has worked in the private sector, in diplomatic security for the U.S. Department of State, and in volunteer capacity. He currently leads a team of Security Architects at Cisco, whose mission is to provide technical enablement to partners and customers. He is the author of the Leon "Catwalk" Caliber cyberpunk noir series of novels and comics and hosts several podcasts. Nick works alongside the Innocent Lives Foundation, a non-profit, non-vigilante organization that identifies child predators and helps to bring them to justice. He resides in Virginia with his wife, son, and rotating roster of rescued fur babies. Table of Contents Introduction. . . . . . . . . . . . xviii CHAPTER 1: Security Concepts.. . . . . . . . . . . 1 Explain Common Threats Against On-Premises and Cloud Environments.. . . . . . . . . 3 Compare Common Security Vulnerabilities.. . . . . 19 Describe Functions of the Cryptography Components. . . . 25 Compare Site-to-Site VPN and Remote Access VPN Deployment Types.. . . . . . . . . 31 Describe Security Intelligence Authoring, Sharing, and Consumption.. 38 Explain the Role of the Endpoint in Protecting Humans from Phishing and Social Engineering Attacks.. . . . . . 41 Explain Northbound and Southbound APIs in the SDN Architecture.. 44 Explain DNAC APIs for Network Provisioning, Optimization, Monitoring, and Troubleshooting.. . . . . . . 48 Interpret Basic Python Scripts Used to Call Cisco Security Appliance APIs.. . . . . . . . . . 51 What Next?.. . . . . . . . . . . 56 CHAPTER 2: Network Security.. . . . . . . . . . . 57 Compare Network Security Solutions and Provide Intrusion Prevention and Firewall Capabilities.. . . . . . 60 Describe Deployment Models of Network Security Solutions and Architectures That Provide Intrusion Prevention and Firewall Capabilities.. . . . . . . . . 65 Describe the Components, Capabilities, and Benefits of NetFlow and Flexible NetFlow Records.. . . . . . . . 70 Traditional NetFlow vs. Flexible NetFlow.. . . . . 74 Configure and Verify Network Infrastructure Security Methods (Router, Switch, and Wireless).. . . . . . . 77 Implement Segmentation, Access Control Policies, AVC, URL Filtering, and Malware Protection. . . . . . . 89 Implement Management Options for Network Security Solutions.. . 93 Configure AAA for Device and Network Access.. . . . . 97 Configure Secure Network Management of Perimeter Security an Infrastructure Devices.. . . . . . . . . 101 Configure and Verify Site-to-Site VPN and Remote Access VPN.. . 106 What Next?.. . . . . . . . . . . 119 CHAPTER 3: Securing the Cloud.. . . . . . . . . . 121 Identify Security Solutions for Cloud Environments.. . . . 122 Compare Security Responsibilities for the Different Cloud Service Models.. . . . . . . . . . 129 Describe the Concepts of DevSecOps (CI/CD Pipeline), Container Orchestration, and Secure Software Development.. . . . 132 Implementing Application Security.. . . . . . . 136 Identify Security Capabilities, Deployment Models, and Policy Management to Secure the Cloud.. . . . . . . 142 Configure Cloud Logging and Monitoring. . . . . . 144 Application Security Concepts.. . . . . . . . 146 What Next?.. . . . . . . . . . . 150 CHAPTER 4: Content Security.. . . . . . . . . . . 151 Web Proxy Fundamentals. . . . . . . . . 158 Web Proxy Identity and Authentication.. . . . . . 167 Cisco Secure Web Appliance Identification and Authentication. 167 Content Security Overview.. . . . . . . . 171 Deploying Cisco Secure Web Appliance and Secure Email Gateway.. 184 Secure Email Gateway Configuration.. . . . . . 190 Cisco Secure Web Appliance Configuration.. . . . . 202 Cisco Umbrella Overview.. . . . . . . . 209 Cisco Umbrella Configuration.. . . . . . . . 216 What Next?.. . . . . . . . . . . 222 CHAPTER 5: Endpoint Protection and Detection.. . . . . . . . 223 Endpoint Protection and Endpoint Detection and Response. . . 225 Cisco Secure Endpoint.. . . . . . . . . 227 Outbreak Control and Quarantines.. . . . . . . 230 Justifications for Endpoint Security.. . . . . . . 239 Endpoint Management and Asset Inventory Tools.. . . . 241 Uses and Importance of a Multifactor Authentication Strategy.. . 246 Endpoint Posture Assessments to Ensure Endpoint Security. . . 252 Endpoint Patching Strategy.. . . . . . . . 254 What Next?.. . . . . . . . . . . 256 CHAPTER 6: Secure Network Access, Visibility, and Enforcement.. . . . 257 Identity Management Concepts.. . . . . . . 262 AAA Configuration.. . . . . . . . . . 275 RADIUS Change of Authorization.. . . . . . . 292 RADIUS CoA Use Cases. . . . . . . . 292 Application Visibility and Control.. . . . . . . 297 Data Exfiltration. . . . . . . . . . 300 Network Telemetry.. . . . . . . . . . 305 Cisco Security Solutions.. . . . . . . . . 308 What Next?.. . . . . . . . . . . 319 Cram Sheet. . . . . . . . . . . . 321 Online Element: Glossary 9780137282517, TOC, 2/19/24 Feature Smart, fast, effective preparation for the new Cisco CCNP and CCIE Security Core 350-701 (SCOR) exam! Covers every exam objective, including network, cloud, and content security; endpoint protection and detection; secure network access; and visibility and enforcement Contains extensive proven Exam Cram prep tools for self-assessment, focused study, and efficient review Includes the powerful, customizable Pearson IT Certification Practice Test software, with hundreds of exam-realistic practice questions, and three flexible modes of preparation Details ISBN0137282516 Language English ISBN-10 0137282516 ISBN-13 9780137282517 Format Paperback Publisher Pearson Education (US) Series Exam Cram Imprint Pearson IT Certification Place of Publication Upper Saddle River Country of Publication United States Birth 1957 Affiliation Wellington College, UK Position Head of Classics & Humanities Qualifications Stackpole Military History Series Editor AU Release Date 2023-12-28 NZ Release Date 2023-12-28 UK Release Date 2023-12-28 Audience Professional & Vocational Year 2024 Author Nick Kelly Pages 384 Publication Date 2024-04-15 US Release Date 2024-04-15 We've got this At The Nile, if you're looking for it, we've got it. With fast shipping, low prices, friendly service and well over a million items - you're bound to find what you want, at a price you'll love! TheNile_Item_ID:159977252;
Price: 110.64 AUD
Location: Melbourne
End Time: 2025-01-02T02:40:44.000Z
Shipping Cost: 0 AUD
Product Images
Item Specifics
Restocking fee: No
Return shipping will be paid by: Buyer
Returns Accepted: Returns Accepted
Item must be returned within: 30 Days
Format: Paperback
Language: English
ISBN-13: 9780137282517
Author: Eddie Mendonca, Joseph Mlodzianowski, Nick Kelly
Type: NA
Book Title: CCNP and CCIE Security Core SCOR 350-701 Exam Cram
Publication Name: NA