Integrated Security Technologies and Solutions - Volume II

Cisco Security Solutions for Network Access Control, Segmentation, Context Sharing, Secure Connectivity and Virtualization

Nonfiction, Computers, General Computing, Skills, Networking & Communications
Cover of the book Integrated Security Technologies and Solutions - Volume II by Aaron Woland, Vivek Santuka, Jamie Sanbower, Chad Mitchell, Pearson Education
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Aaron Woland, Vivek Santuka, Jamie Sanbower, Chad Mitchell ISBN: 9780134807676
Publisher: Pearson Education Publication: March 28, 2019
Imprint: Cisco Press Language: English
Author: Aaron Woland, Vivek Santuka, Jamie Sanbower, Chad Mitchell
ISBN: 9780134807676
Publisher: Pearson Education
Publication: March 28, 2019
Imprint: Cisco Press
Language: English

The essential reference for security pros and CCIE Security candidates: identity, context sharing, encryption, secure connectivity and virtualization

Integrated Security Technologies and Solutions – Volume II brings together more expert-level instruction in security design, deployment, integration, and support. It will help experienced security and network professionals manage complex solutions, succeed in their day-to-day jobs, and prepare for their CCIE Security written and lab exams.

Volume II focuses on the Cisco Identity Services Engine, Context Sharing, TrustSec, Application Programming Interfaces (APIs), Secure Connectivity with VPNs, and the virtualization and automation sections of the CCIE v5 blueprint. Like Volume I, its strong focus on interproduct integration will help you combine formerly disparate systems into seamless, coherent, next-generation security solutions.

Part of the Cisco CCIE Professional Development Series from Cisco Press, it is authored by a team of CCIEs who are world-class experts in their Cisco security disciplines, including co-creators of the CCIE Security v5 blueprint. Each chapter starts with relevant theory, presents configuration examples and applications, and concludes with practical troubleshooting.

  • Review the essentials of Authentication, Authorization, and Accounting (AAA)
  • Explore the RADIUS and TACACS+ AAA protocols, and administer devices with them
  • Enforce basic network access control with the Cisco Identity Services Engine (ISE)
  • Implement sophisticated ISE profiling, EzConnect, and Passive Identity features
  • Extend network access with BYOD support, MDM integration, Posture Validation, and Guest Services
  • Safely share context with ISE, and implement pxGrid and Rapid Threat Containment
  • Integrate ISE with Cisco FMC, WSA, and other devices
  • Leverage Cisco Security APIs to increase control and flexibility
  • Review Virtual Private Network (VPN) concepts and types
  • Understand and deploy Infrastructure VPNs and Remote Access VPNs
  • Virtualize leading Cisco Security products
  • Make the most of Virtual Security Gateway (VSG), Network Function Virtualization (NFV), and microsegmentation
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

The essential reference for security pros and CCIE Security candidates: identity, context sharing, encryption, secure connectivity and virtualization

Integrated Security Technologies and Solutions – Volume II brings together more expert-level instruction in security design, deployment, integration, and support. It will help experienced security and network professionals manage complex solutions, succeed in their day-to-day jobs, and prepare for their CCIE Security written and lab exams.

Volume II focuses on the Cisco Identity Services Engine, Context Sharing, TrustSec, Application Programming Interfaces (APIs), Secure Connectivity with VPNs, and the virtualization and automation sections of the CCIE v5 blueprint. Like Volume I, its strong focus on interproduct integration will help you combine formerly disparate systems into seamless, coherent, next-generation security solutions.

Part of the Cisco CCIE Professional Development Series from Cisco Press, it is authored by a team of CCIEs who are world-class experts in their Cisco security disciplines, including co-creators of the CCIE Security v5 blueprint. Each chapter starts with relevant theory, presents configuration examples and applications, and concludes with practical troubleshooting.

More books from Pearson Education

Cover of the book Microsoft Voice and Unified Communications by Aaron Woland, Vivek Santuka, Jamie Sanbower, Chad Mitchell
Cover of the book Next Generation Business Strategies for the Base of the Pyramid by Aaron Woland, Vivek Santuka, Jamie Sanbower, Chad Mitchell
Cover of the book Using Microsoft Windows 7 by Aaron Woland, Vivek Santuka, Jamie Sanbower, Chad Mitchell
Cover of the book Adobe AIR (Adobe Integrated Runtime) with Ajax by Aaron Woland, Vivek Santuka, Jamie Sanbower, Chad Mitchell
Cover of the book Selling Online 2.0 by Aaron Woland, Vivek Santuka, Jamie Sanbower, Chad Mitchell
Cover of the book CCNP Routing and Switching ROUTE 300-101 Official Cert Guide by Aaron Woland, Vivek Santuka, Jamie Sanbower, Chad Mitchell
Cover of the book A Developer's Guide to Data Modeling for SQL Server by Aaron Woland, Vivek Santuka, Jamie Sanbower, Chad Mitchell
Cover of the book Buying a Car by Aaron Woland, Vivek Santuka, Jamie Sanbower, Chad Mitchell
Cover of the book The Truth About Protecting Your IRAs and 401(k)s by Aaron Woland, Vivek Santuka, Jamie Sanbower, Chad Mitchell
Cover of the book Excel 2016 Pivot Table Data Crunching (includes Content Update Program) by Aaron Woland, Vivek Santuka, Jamie Sanbower, Chad Mitchell
Cover of the book Computer Basics Absolute Beginner's Guide, Windows 8.1 Edition by Aaron Woland, Vivek Santuka, Jamie Sanbower, Chad Mitchell
Cover of the book A Beginner's Guide to Using Your iPad as a Business Productivity Tool by Aaron Woland, Vivek Santuka, Jamie Sanbower, Chad Mitchell
Cover of the book Introducing Microsoft Power BI by Aaron Woland, Vivek Santuka, Jamie Sanbower, Chad Mitchell
Cover of the book Adobe Muse on Demand by Aaron Woland, Vivek Santuka, Jamie Sanbower, Chad Mitchell
Cover of the book Enterprise Web 2.0 Fundamentals by Aaron Woland, Vivek Santuka, Jamie Sanbower, Chad Mitchell
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy