Table of Contents
- Exploring Security threats
- Delving into security toolkits
- Understanding Security Policies
- Deep diving into Cryptography
- Implementing AAA Framework
- Securing the Control and Management Plane
- Protecting Layer 2 Protocols
- Protecting the Switch Infrastructure
- Exploring Firewall technologies
- Cisco ASA
- Advanced ASA Configuration
- Configuring Zone Based Firewall
- IPsec-The protocol that drives VPN
- Configuring Site to Site VPN
- Configuring Remote Access VPN
- Working with IPS
- Application & Endpoint Security

