Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
CCIE Security Exam Certification Guide (CCIE Self-Study)

Buy

Official self-study test preparation guide for the CCIE Security written exam

Review all CCIE Security written exam topics, including:

  • Switching concepts, routing protocols, and WAN protocols, including PPP, ISDN, and Frame Relay
  • DNS, TFTP, Secure Shell, Secure Socket Layer Protocol, NTP, and SNMP
  • Cisco IOS(r) Software specifics, including password security, password recovery, and standard and extended access lists
  • Encryption technologies and security protocols, including TACACS+, RADIUS, and KerberosWindows and UNIX operating system security issues
  • Cisco security applications, including Cisco PIX(r) Firewall, VPN, IDS, and Cisco Policy Manager
  • Basic security methods and the evolution of new secure networks including packet filtering, proxies, and NAT/PAT
  • Network security policies, vulnerabilities, and protection techniques

With increased reliance on networking resources to provide productivity gains and corporate revenue contributions, the need for network security has never been higher. Rising concerns over corporate espionage, cyber-terrorism, financial fraud, and theft of proprietary information have radically increased the demand for highly skilled networking security professionals. One of the most sought-after and highly valued networking certifications, the Cisco Systems CCIE Security certification is answering the need for technical expertise in this critical market by distinguishing the top echelon of internetworking experts.

CCIE Security Exam Certification Guide is a comprehensive study tool for the Security written exam. Written and reviewed by members of the CCIE Security team at Cisco, this book helps you understand and master the material you will need to know to pass the written exam. Designed to optimize your study time, this book helps you assess your knowledge of the material at the beginning of each chapter with customized quizzes for each topic. Increase retention of key concepts by reviewing summaries of crucial concepts. Test your comprehension with chapter-ending review questions. Determine your assimilation of knowledge and get a taste for the CCIE Security lab exam with two complete practice lab scenarios focused on security and routing and switching topics. Take timed practice exams that mimic the real testing environment with the CD-ROM test engine or customize the test bank to focus on the topics for which you need the most help. Along with an electronic version of the text, a complete copy of Henry Benjamin's previously published CCIE Routing and Switching Exam Cram is also presented on the CD-ROM as an additional bonus.

CCIE Security Exam Certification Guide is part of a recommended study program from Cisco Systems that can include simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, please visit www.cisco.com/go/authorizedtraining.

"This book will be a valuable asset for potential CCIE Security candidates. I am positive individuals will inevitably gain extensive security network knowledge during their preparation by using this book."
-Gert De Laet, Product Manager, CCIE Security, Cisco Systems, Inc.

Companion CD-ROM
CD contains a test engine with over 300 questions, lab equipment suggestions, sample configurations, and a bonus electronic copy of the complete CCIE Routing and Switching Exam Cram text.

(HTML tags aren't allowed.)

Access 2002 Programming by Example
Access 2002 Programming by Example
This book addresses an unmet need in this topic area. It is a complete beginner's tutorial resource to tips, troubleshooting, techniques, and program development for Access 2002. The book covers fundamentals such as database normalization, query design, object manipulation, and optimization and custom programming for forms and reports. It makes the...
Unleashing Your Leadership Potential: Seven Strategies for Success
Unleashing Your Leadership Potential: Seven Strategies for Success

Unleashing Your Leadership Potential provides the means to unleash the unique capital of leadership inherent in each of us, making it possible for teams, organizations, and society to improve the lives of others while we improve our own. Luc's leadership model is based on case studies and interviews with leaders, providing insights...

Ultrasonic Nondestructive Evaluation: Engineering and Biological Material Characterization
Ultrasonic Nondestructive Evaluation: Engineering and Biological Material Characterization
Most books on ultrasonic nondestructive evaluation (NDE) focus either on its theoretical background or on advanced applications. Furthermore, information on the most current applications, such as guided wave techniques and acoustic microscopy, is scattered throughout various conference proceedings and journals. No one book has integrated these...

MCSE Self-Paced Training Kit (Exam 70-217): Microsoft  Windows  2000 Active Directory  Services, Second Edition
MCSE Self-Paced Training Kit (Exam 70-217): Microsoft Windows 2000 Active Directory Services, Second Edition

Welcome to the MCSE Training Kit—Microsoft Windows 2000 Active Directory Services. This kit prepares you to install, configure, administer, monitor, and troubleshoot Microsoft Windows 2000 Active Directory.

This kit introduces you to Windows 2000 Active Directory and prepares you to plan, configure, and administer your...

Drying of Porous Materials
Drying of Porous Materials
This book provides recent advances in research on drying of particulate and porous materials. It is based on a selection of papers presented at the XI the Polish Drying Symposium 2005. The selected contributions cover theoretical, as well as experimental and modeling research on heat and mass transfer processes during drying of porous material, and...
Computer Security -- ESORICS 2013: 18th European Symposium on Research in Computer Security
Computer Security -- ESORICS 2013: 18th European Symposium on Research in Computer Security

This book constitutes the refereed proceedings of the 18th European Symposium on Computer Security, ESORICS 2013, held in Egham, UK, in September 2013.

The 43 papers included in the book were carefully reviewed and selected from 242 papers. The aim of ESORICS is to further the progress of research in computer security by...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy