CCSP SelfStudy CCSP CSI: Exam Certification Guide, Second Edition [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

CCSP SelfStudy CCSP CSI: Exam Certification Guide, Second Edition [Electronic resources] - نسخه متنی

Tebyan

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید





  • CSI Exam Blueprint


    The CSI exam focuses on the SAFE blueprints published by Cisco Systems, Inc. These blueprints cover designing and securing a wide range of networks, from small and medium networks to Enterprise networks. In addition, the blueprints cover certain technologies, such as IP telephony and wireless LANs (WLANs), in depth.

    The CSI course provides the knowledge and skills needed to implement and use the principles and axioms presented in the whitepaper. The primary focus of the course is the labs, which allow students to build complete end-to-end security solutions using the SAFE whitepapers as the blueprints. The following devices are covered in the course, along with their configuration and functionality regarding the SAFE whitepapers:

    • Cisco IOS routers

    • PIX firewalls

    • VPN concentrators

    • Cisco network IDS sensors

    • Cisco host-based IPS

    • Cisco VPN client (software and hardware)

    • Cisco IP telephony devices

    • Cisco WLAN access points (APs)


    The CSI exam covers a variety of topics related to the course and the SAFE whitepapers. These topics are provided in Table I-3, along with the applicable chapter in which information can be found in this guide. Note that Cisco Systems reserves the right to change exam objectives without notice. Prior to taking the exams, view the current exam objectives by visiting Cisco.com, clicking Learning & Events, and navigating to the CCSP certification page.

    Table I-3. CSI Exam Objectives

    Topic Number

    Objective

    Chapter Covering the Objective

    Security Fundamentals

    1

    Need for network security

    5

    2

    Network attack taxonomy

    7,8

    3

    Network security policy

    5

    4

    Management protocols and functions

    11

    Architectural Overview

    5

    Design fundamentals

    2

    6

    SAFE axioms

    3

    7

    Security wheel

    5

    Cisco Security Portfolio

    8

    Secure connectivityVPNs

    13

    9

    Secure connectivity3000 concentrator

    13

    10

    Secure connectivityCisco IOS VPN routers

    13

    11

    Perimeter security firewalls

    13

    12

    Intrusion protection

    12

    13

    Host intrusion prevention systemCisco Security Agent

    12

    14

    Identity

    13

    15

    Security Management

    13

    16

    AVVID

    13

    SAFE Small Network Design

    17

    Small network Corporate Internet module

    14

    18

    Small network Campus module

    14

    19

    Implementation ISP router

    15

    20

    ImplementationCisco IOS firewall features and configuration

    15

    21

    ImplementationPIX firewall

    15

    SAFE Medium Network Design

    22

    Medium-size network Corporate Internet module

    16

    23

    Medium-size network Corporate Internet module design guidelines

    16

    24

    Medium-size network Campus module

    16

    25

    Medium-size network Campus module design guidelines

    16

    26

    Medium-size network WAN module

    16

    27

    ImplementationISP router

    17

    28

    Implementationedge router

    17

    29

    ImplementationCisco IOS firewall

    17

    30

    ImplementationPIX firewall

    17

    31

    ImplementationNIDS

    17

    32

    ImplementationHIDS

    17

    33

    ImplementationVPN concentrator

    17

    34

    ImplementationLayer 3 switch

    17

    SAFE Enterprise Network Design

    35

    Enterprise network Edge module

    18

    36

    Enterprise network Edge module design guidelines

    18

    37

    Enterprise network Campus module

    18

    38

    Enterprise network Campus Module design guidelines

    18

    39

    Review Questions

    18

    SAFE Remote User Network Implementation

    40

    Key devices

    18

    41

    Threat mitigation

    18

    42

    Software access option

    18

    43

    Remote site firewall option

    18

    44

    Hardware VPN option

    18

    45

    Remote site router option

    18

    SAFE IP Telephony Design

    46

    Basic IP telephony concepts

    19

    47

    Cisco IP telephony product line

    19

    48

    IP telephony design approach

    19

    49

    Small network IP telephony

    19

    50

    Medium-size network IP telephony

    19

    51

    Enterprise network IP telephony

    19

    SAFE Wireless LAN Design

    52

    Basic wireless LAN concepts

    20

    53

    Cisco wireless LAN product line

    20

    54

    Wireless LAN design approach

    20

    55

    Small wireless LAN design

    20

    56

    Medium-size wireless LAN design

    20

    57

    Enterprise wireless LAN design

    20

    58

    Remote wireless LAN design

    20

    NOTE

    The mitigation of host attacks traditionally used a technique referred to as a host intrusion detection system (HIDS). Nowadays, however, this mechanism more commonly is referred to as a host intrusion prevention system (host-based IPS). This book uses both naming conventions but refers to the mitigation technique used on host devices.

  • / 290