Book Content
chapters • 17h16m total length
1. Exploring Security threats
2. Delving into security toolkits
3. Understanding Security Policies
4. Deep diving into Cryptography
5. Implementing AAA Framework
6. Securing the Control and Management Plane
7. Protecting Layer 2 Protocols
8. Protecting the Switch Infrastructure
9. Exploring Firewall technologies
10. Cisco ASA
11. Advanced ASA Configuration
12. Configuring Zone Based Firewall
13. IPsec-The protocol that drives VPN
14. Configuring Site to Site VPN
15. Configuring Remote Access VPN
16. Working with IPS
17. Application & Endpoint Security














