CCNP Security SISAS 300-208 Official Cert Guide from Cisco Press enables you to succeed on the exam the first time and is the only self-study resource approved by Cisco. Cisco security experts Aaron Woland and Kevin Redmon share preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. This complete study package includes A test-preparation routine proven to help you pass the exam “Do I Know This Already?” quizzes, which enable you to decide how much time you need to spend on each section The powerful Pearson IT Certification Practice Testsoftware, complete with hundreds of well-reviewed, exam-realistic questions, customization options, and detailed performance reports A final preparation chapter, which guides you through tools and resources to help you craft your review and test-taking strategies Study plan suggestions and templates to help you organize and optimize your study time Well regarded for its level of detail, study plans, assessment features, challenging review questions and exercises, video instruction, and hands-on labs, this official study guide helps you master the concepts and techniques that ensure your exam success. The official study guide helps you master topics on the CCNP Security SISAS 300-208 exam, including the following: Identity management/secure access Threat defense Troubleshooting, monitoring and reporting tools Threat defense architectures Identity management architectures
Fully updated: The complete guide to Cisco Identity Services Engine solutions Using Cisco Secure Access Architecture and Cisco Identity Services Engine, you can secure and gain control of access to your networks in a Bring Your Own Device (BYOD) world. This second edition of Cisco ISE for BYOD and Secure Unified Accesscontains more than eight brand-new chapters as well as extensively updated coverage of all the previous topics in the first edition book to reflect the latest technologies, features, and best practices of the ISE solution. It begins by reviewing today''s business case for identity solutions. Next, you walk through ISE foundational topics and ISE design. Then you explore how to build an access security policy using the building blocks of ISE. Next are the in-depth and advanced ISE configuration sections, followed by the troubleshooting and monitoring chapters. Finally, we go in depth on the new TACACS+ device administration solution that is new to ISE and to this second edition. With this book, you will gain an understanding of ISE configuration, such as identifying users, devices, and security posture; learn about Cisco Secure Access solutions; and master advanced techniques for securing access to networks, from dynamic segmentation to guest access and everything in between. Drawing on their cutting-edge experience supporting Cisco enterprise customers, the authors offer in-depth coverage of the complete lifecycle for all relevant ISE solutions, making this book a cornerstone resource whether you''re an architect, engineer, operator, or IT manager. � Review evolving security challenges associated with borderless networks, ubiquitous mobility, and consumerized IT � Understand Cisco Secure Access, the Identity Services Engine (ISE), and the building blocks of complete solutions � Design an ISE-enabled network, plan/distribute ISE functions, and prepare for rollout � Build context-aware security policies for network access, devices, accounting, and audit � Configure device profiles, visibility, endpoint posture assessments, and guest services � Implement secure guest lifecycle management, from WebAuth to sponsored guest access � Configure ISE, network access devices, and supplicants, step by step � Apply best practices to avoid the pitfalls of BYOD secure access � Set up efficient distributed ISE deployments � Provide remote access VPNs with ASA and Cisco ISE � Simplify administration with self-service onboarding and registration � Deploy security group access with Cisco TrustSec � Prepare for high availability and disaster scenarios � Implement passive identities via ISE-PIC and EZ Connect � Implement TACACS+ using ISE � Monitor, maintain, and troubleshoot ISE and your entire Secure Access system � Administer device AAA with Cisco IOS, WLC, and Nexus
Integrated Security Technologies and Solutions - Volume II is part of the Cisco CCIE Professional Development Series from Cisco Press, which offers expert-level instruction in security design, deployment, integration and support methodologies to help security professionals manage complex solutions and prepare for their CCIE exams. A one-stop expert level guide for all aspects of Cisco Security, this guide will help security pros succeed in their day-to-day jobs as they get ready for their CCIE Security written and lab exams. This guide has been written by a team of CCIEs who are world-class experts in their respective Cisco Security disciplines, including experts who were involved in creating the new CCIE Security 5.0 blueprint and possess unsurpassed understanding of its requirements. Each chapter starts with relevant theory, progresses through configuration examples and applications, and concludes with practical troubleshooting sections. Volume 1 focuses on Identity, Context Sharing, Encryption, Secure Connectivity and Virtualization Security. With a strong focus on inter-product integration, it also shows how to combine formerly disparate systems into a seamless, coherent next-generation security solution.
The essential reference for security pros and CCIE Security candidates: policies, standards, infrastructure/perimeter and content security, and threat protection Integrated Security Technologies and Solutions - Volume I offers one-stop expert-level instruction in security design, deployment, integration, and support methodologies to help security professionals manage complex solutions and prepare for their CCIE exams. It will help security pros succeed in their day-to-day jobs and also get ready for their CCIE Security written and lab exams. Part of the Cisco CCIE Professional Development Series from Cisco Press, it is authored by a team of CCIEs who are world-class experts in their Cisco security disciplines, including co-creators of the CCIE Security v5 blueprint. Each chapter starts with relevant theory, presents configuration examples and applications, and concludes with practical troubleshooting. Volume 1 focuses on security policies and standards; infrastructure security; perimeter security (Next-Generation Firewall, Next-Generation Intrusion Prevention Systems, and Adaptive Security Appliance [ASA]), and the advanced threat protection and content security sections of the CCIE Security v5 blueprint. With a strong focus on interproduct integration, it also shows how to combine formerly disparate systems into a seamless, coherent next-generation security solution. Review security standards, create security policies, and organize security with Cisco SAFE architecture Understand and mitigate threats to network infrastructure, and protect the three planes of a network device Safeguard wireless networks, and mitigate risk on Cisco WLC and access points Secure the network perimeter with Cisco Adaptive Security Appliance (ASA) Configure Cisco Next-Generation Firewall Firepower Threat Defense (FTD) and operate security via Firepower Management Center (FMC) Detect and prevent intrusions with Cisco Next-Gen IPS, FTD, and FMC Configure and verify Cisco IOS firewall features such as ZBFW and address translation Deploy and configure the Cisco web and email security appliances to protect content and defend against advanced threats Implement Cisco Umbrella Secure Internet Gateway in the cloud as your first line of defense against internet threats Protect against new malware with Cisco Advanced Malware Protection and Cisco ThreatGrid
Author: Ip Specialist
Publisher: Independently Published
Release Date: 2017-12-07
CCNP - CISCO CERTIFIED NETWORK PROFESSIONAL - SECURITY (SISAS) TECHNOLOGY WORKBOOKExam: 300-208Course DescriptionThis exam is conducted to make sure that the security engineers have the knowledge of the security components and architecture with the help of 802.1X and Cisco TrustSec. This exam certifies the candidate's familiarity and knowledge of ISE Architecture (Identity Services Engine Architecture), implementation, and all other components like network security threat alleviation and endpoint control solutions. The course includes the fundamental concepts of BYOD (Bring Your Own Device) with the help of ISE's posture and profiling services. SISAS (Cisco Secure Access Solutions) course can be taken by the candidate for preparing this exam.Cisco Certified Network Professional Security (CCNP Security) certification program is aligned specifically to the job role of the Cisco Network Security Engineer responsible for Security in Routers, Switches, Networking devices and appliances, as well as choosing, deploying, supporting and troubleshooting Firewalls, VPNs, and IDS/IPS solutions for their networking environments.IP Specialist Technology Workbooks are ideally crafted courses that will guide you through the process of developing concrete skills required to pass the exam and build a successful career in the service provider field. These Workbooks have been created in order to cover the previous exam patterns and official exam blueprint. Our technology workbooks practically explain all the concepts with the help of real-life case-study based labs. The content covered in our technology workbooks consist of individually focused technology topics presented in easy-to-follow, clear, précis, and step-by-step manner considering the individual needs. In our technology workbooks, technology breakdown and methodical verifications help you understand the scenario and related concepts with ease. We extensively used mind maps in our workbooks to visually explain the technology. Our workbooks have become a widely used tool to learn and remember the information effectively.