logo资料库

CCNA Cyber Ops SECFND #210-250 Official Cert Guide.pdf

第1页 / 共946页
第2页 / 共946页
第3页 / 共946页
第4页 / 共946页
第5页 / 共946页
第6页 / 共946页
第7页 / 共946页
第8页 / 共946页
资料共946页,剩余部分请下载后查看
About This E-Book
Title Page
Copyright Page
About the Authors
About the Technical Reviewers
Dedications
Acknowledgments
Contents at a Glance
Contents
Command Syntax Conventions
Introduction
About the 210-250 CCNA Cyber Ops SECFND Exam
210-250 CCNA Cyber Ops SECFNC Exam Topics
About the CCNA Cyber Ops SECFND 210-250 Official Cert Guide
Objectives and Methods
Book Features
How This Book Is Organized
Companion Website
Pearson Test Prep Practice Test Software
Accessing the Pearson Test Prep Software Online
Accessing the Pearson Test Prep Software Offline
Customizing Your Exams
Updating Your Exams
Part I: Network Concepts
Chapter 1. Fundamentals of Networking Protocols and Networking Devices
“Do I Know This Already?” Quiz
Foundation Topics
TCP/IP and OSI Model
Layer 2 Fundamentals and Technologies
Internet Protocol and Layer 3 Technologies
Internet Control Message Protocol (ICMP)
Domain Name System (DNS)
IPv6 Fundamentals
Transport Layer Technologies and Protocols
Exam Preparation Tasks
Review All Key Topics
Complete Tables and Lists from Memory
Define Key Terms
Q&A
References and Further Reading
Chapter 2. Network Security Devices and Cloud Services
“Do I Know This Already?” Quiz
Foundation Topics
Network Security Systems
Security Cloud-based Solutions
Cisco NetFlow
Data Loss Prevention
Exam Preparation Tasks
Review All Key Topics
Complete Tables and Lists from Memory
Define Key Terms
Q&A
Part II: Security Concepts
Chapter 3. Security Principles
“Do I Know This Already?” Quiz
Foundation Topics
The Principles of the Defense-in-Depth Strategy
What Are Threats, Vulnerabilities, and Exploits?
Confidentiality, Integrity, and Availability: The CIA Triad
Risk and Risk Analysis
Personally Identifiable Information and Protected Health Information
Principle of Least Privilege and Separation of Duties
Security Operation Centers
Forensics
Exam Preparation Tasks
Review All Key Topics
Define Key Terms
Q&A
Chapter 4. Introduction to Access Controls
“Do I Know This Already?” Quiz
Foundation Topics
Information Security Principles
Subject and Object Definition
Access Control Fundamentals
Access Control Process
Information Security Roles and Responsibilities
Access Control Types
Access Control Models
Access Control Mechanisms
Identity and Access Control Implementation
Exam Preparation Tasks
Review All Key Topics
Complete Tables and Lists from Memory
Define Key Terms
Q&A
References and Additional Reading
Chapter 5. Introduction to Security Operations Management
“Do I Know This Already?” Quiz
Foundation Topics
Introduction to Identity and Access Management
Security Events and Logs Management
Assets Management
Introduction to Enterprise Mobility Management
Configuration and Change Management
Vulnerability Management
Patch Management
References and Additional Readings
Exam Preparation Tasks
Review All Key Topics
Complete Tables and Lists from Memory
Define Key Terms
Q&A
Part III: Cryptography
Chapter 6. Fundamentals of Cryptography and Public Key Infrastructure (PKI)
“Do I Know This Already?” Quiz
Foundation Topics
Cryptography
Fundamentals of PKI
Exam Preparation Tasks
Review All Key Topics
Complete Tables and Lists from Memory
Define Key Terms
Q&A
Chapter 7. Introduction to Virtual Private Networks (VPNs)
“Do I Know This Already?” Quiz
Foundation Topics
What Are VPNs?
Site-to-site vs. Remote-Access VPNs
An Overview of IPsec
SSL VPNs
Exam Preparation Tasks
Review All Key Topics
Complete Tables and Lists from Memory
Define Key Terms
Q&A
Part IV: Host-Based Analysis
Chapter 8. Windows-Based Analysis
“Do I Know This Already?” Quiz
Foundation Topics
Process and Threads
Memory Allocation
Windows Registration
Windows Management Instrumentation
Handles
Services
Windows Event Logs
Exam Preparation Tasks
Review All Key Topics
Define Key Terms
Q&A
References and Further Reading
Chapter 9. Linux- and Mac OS X–Based Analysis
“Do I Know This Already?” Quiz
Foundation Topics
Processes
Forks
Permissions
Symlinks
Daemons
UNIX-Based Syslog
Apache Access Logs
Exam Preparation Tasks
Review All Key Topics
Complete Tables and Lists from Memory
Define Key Terms
Q&A
References and Further Reading
Chapter 10. Endpoint Security Technologies
“Do I Know This Already?” Quiz
Foundation Topics
Antimalware and Antivirus Software
Host-Based Firewalls and Host-Based Intrusion Prevention
Application-Level Whitelisting and Blacklisting
System-Based Sandboxing
Exam Preparation Tasks
Review All Key Topics
Complete Tables and Lists from Memory
Define Key Terms
Q&A
Part V: Security Monitoring and Attack Methods
Chapter 11. Network and Host Telemetry
“Do I Know This Already?” Quiz
Foundation Topics
Network Telemetry
Host Telemetry
Exam Preparation Tasks
Review All Key Topics
Complete Tables and Lists from Memory
Define Key Terms
Q&A
Chapter 12. Security Monitoring Operational Challenges
“Do I Know This Already?” Quiz
Foundation Topics
Security Monitoring and Encryption
Security Monitoring and Network Address Translation
Security Monitoring and Event Correlation Time Synchronization
DNS Tunneling and Other Exfiltration Methods
Security Monitoring and Tor
Security Monitoring and Peer-to-Peer Communication
Exam Preparation Tasks
Review All Key Topics
Define Key Terms
Q&A
Chapter 13. Types of Attacks and Vulnerabilities
“Do I Know This Already?” Quiz
Foundation Topics
Types of Attacks
Types of Vulnerabilities
Exam Preparation Tasks
Review All Key Topics
Define Key Terms
Q&A
Chapter 14. Security Evasion Techniques
“Do I Know This Already?” Quiz
Foundation Topics
Encryption and Tunneling
Resource Exhaustion
Traffic Fragmentation
Protocol-Level Misinterpretation
Traffic Timing, Substitution, and Insertion
Pivoting
Exam Preparation Tasks
Review All Key Topics
Complete Tables and Lists from Memory
Define Key Terms
Q&A
References and Further Reading
Part VI: Final Preparation
Chapter 15. Final Preparation
Tools for Final Preparation
Suggested Plan for Final Review/Study
Summary
Part VII: Appendixes
Appendix A. Answers to the “Do I Know This Already?” Quizzes and Q&A Questions
Answers to the “Do I Know This Already?” Quizzes
Chapter 1
Chapter 2
Chapter 3
Chapter 4
Chapter 5
Chapter 6
Chapter 7
Chapter 8
Chapter 9
Chapter 10
Chapter 11
Chapter 12
Chapter 13
Chapter 14
Answers to the Q&A Questions
Chapter 1
Chapter 2
Chapter 3
Chapter 4
Chapter 5
Chapter 6
Chapter 7
Chapter 8
Chapter 9
Chapter 10
Chapter 11
Chapter 12
Chapter 13
Chapter 14
Glossary
Index
Elements Available on the Book Website
Appendix B. Memory Tables
Chapter 1
Chapter 2
Chapter 4
Chapter 5
Chapter 7
Chapter 9
Chapter 11
Appendix C. Memory Tables Answer Key
Chapter 1
Chapter 2
Chapter 4
Chapter 5
Chapter 7
Chapter 9
Chapter 11
Appendix D. Study Planner
Inside Back Cover
Inside Front Cover
Access Card
Where are the companion content files?
Code Snippets
www.hellodigi.ir
About This E-Book EPUB is an open, industry-standard format for e-books. However, support for EPUB and its many features varies across reading devices and applications. Use your device or app settings to customize the presentation to your liking. Settings that you can customize often include font, font size, single or double column, landscape or portrait mode, and figures that you can click or tap to enlarge. For additional information about the settings and features on your reading device or app, visit the device manufacturer’s Web site. Many titles include programming code or configuration examples. To optimize the presentation of these elements, view the e-book in single-column, landscape mode and adjust the font size to the smallest setting. In addition to presenting code and configurations in the reflowable text format, we have included images of the code that mimic the presentation found in the print book; therefore, where the reflowable format may compromise the presentation of the code listing, you will see a “Click here to view code image” link. Click the link to view the print-fidelity code image. To return to the previous page viewed, click the Back button on your device or app.
CCNA Cyber Ops SECFND 210-250 Official Cert Guide OMAR SANTOS, CISSP No. 463598 JOSEPH MUNIZ, CISSP No. 344594 STEFANO DE CRESCENZO CCIE No. 26025, CISSP 406579 800 East 96th Street Indianapolis, IN 46240 www.hellodigi.ir
Cert Guide reproduced be may including without review. in a written or transmitted in recording, photocopying, permission from the form any by any or publisher, Inc, Ops Pearson 210-250 Official East Education, SECFND Cyber CCNA Santos Omar Muniz Joseph Stefano De Crescenzo Copyright 2017 © by: Published Press Cisco 800 Street 96th IN Indianapolis, All reserved. rights or means, by any storage information except the for Printed in the United States of America 1 17 Library of Congress Control Number: 2017931952 ISBN-10: 1-58714-702-5 ISBN-13: 978-1-58714-702-9 USA this of part electronic mechanical, or system, quotations retrieval and inclusion brief of 46240 No book Warning and Disclaimer This book is designed to provide information about the CCNA Cyber Ops SECFND #210-250 exam. Every effort has been made to make this book as complete and accurate as possible, but no warranty or fitness is implied. The information is provided on an “as is” basis. The authors, Cisco Press, and Cisco Systems, Inc., shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this book or from the use of the discs or programs that may accompany it. The opinions expressed in this book belong to the authors and are not necessarily those of Cisco Systems, Inc. Editor-in-Chief: Mark Taub Product Line Manager: Brett Bartow Managing Editor: Sandra Schroeder Development Editor: Christopher Cleveland Project Editor: Mandie Frank www.hellodigi.ir
Composition: Tricia Bronkella Indexer: Ken Johnson Alliances Manager, Cisco Press: Ron Fligge Executive Editor: Mary Beth Ray Technical Editors: Pavan Reddy, Ron Taylor Copy Editor: Bart Reed Designer: Chuti Prasertsith Editorial Assistant: Vanessa Evans Proofreader: The Wordsmithery LLC Trademark Acknowledgments All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capitalized. Cisco Press or Cisco Systems, Inc., cannot attest to the accuracy of this information. Use of a term in this book should not be regarded as affecting the validity of any trademark or service mark. Special Sales For information about buying this title in bulk quantities, or for special sales opportunities (which may include electronic versions; custom cover designs; and content particular to your business, training goals, marketing focus, or branding interests), please contact our corporate sales department at corpsales@pearsoned.com or (800) 382-3419. For government sales inquiries, please contact governmentsales@pearsoned.com. For questions about sales outside the United States, please contact intlcs@pearson.com. Feedback Information At Cisco Press, our goal is to create in-depth technical books of the highest quality and value. Each book is crafted with care and precision, undergoing rigorous development that involves the unique expertise of members from the professional technical community. Readers’ feedback is a natural continuation of this process. If you have any comments regarding how we could improve the quality of this book, or otherwise alter it to better suit your needs, you can contact us through email at feedback@ciscopress.com. Please make sure to include the book title and ISBN in your message. We greatly appreciate your assistance. www.hellodigi.ir
Americas Headquarters Cisco Systems. Inc. San Jose, CA Asia Pacific Headquarters Cisco Systems (USA) Pte. Ltd. Singapore Europe Headquarters Cisco Systems International BV Amsterdam, The Netherlands Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco Website at www.cisco.com/go/offices. CCDE, CCENT, Cisco Eos, Cisco HealthPresence, the Cisco logo, Cisco Lumin, Cisco Nexus, Cisco StadiumVision, Cisco Telepresence, Cisco WebEx, DCE, and Welcome to the Human Network are trademarks; Changing the Way We Work, Live, Play, and Learn and Cisco Store are service marks; and Access Registrar, Aironet, AsyncOS, Bringing the Meeting To You, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, CCVP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Collaboration Without Limitation, EtherFast, EtherSwitch, Event Center, Fast Step, Follow Me Browsing, FormShare, GigaDrive, HomeLink, Internet Quotient, IOS, iPhone, iQuick Study, IronPort, the IronPort logo, LightStream, Linksys, MediaTone, MeetingPlace, MeetingPlace Chime Sound, MGX, Networkers, Networking Academy, Network Registrar, PCNow, PIX, PowerPanels, ProConnect, ScriptShare, SenderBase, SMARTnet, Spectrum Expert, StackWise, The Fastest Way to Increase Your Internet Quotient, TransPath, WebEx, and the WebEx logo are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries. All other trademarks mentioned in this document or website are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (0812R) www.hellodigi.ir
About the Authors Omar Santos is an active member of the cyber security community, where he leads several industry-wide initiatives and standards bodies. His active role helps businesses, academic institutions, state and local law enforcement agencies, and other participants dedicated to increasing the security of their critical infrastructures. Omar is the author of over a dozen books and video courses, as well as numerous white papers, articles, and security configuration guidelines and best practices. Omar is a principal engineer of the Cisco Product Security Incident Response Team (PSIRT), where he mentors and leads engineers and incident managers during the investigation and resolution of cyber security vulnerabilities. Additional information about Omar’s current projects can be found at omarsantos.io, and you can follow Omar on Twitter @santosomar. Joseph Muniz is an architect at Cisco Systems and security researcher. He has extensive experience in designing security solutions and architectures for the top Fortune 500 corporations and the U.S. government. Joseph’s current role gives him visibility into the latest trends in cyber security, from both leading vendors and customers. Examples of Joseph’s research include his RSA talk titled “Social Media Deception,” which has been quoted by many sources (search for “Emily Williams Social Engineering”), as well as his articles in PenTest Magazine regarding various security topics. Joseph runs The Security Blogger website, a popular resource for security, hacking, and product implementation. He is the author and contributor of several publications covering various penetration testing and security topics. You can follow Joseph at www.thesecurityblogger.com and @SecureBlogger. Stefano De Crescenzo is a senior incident manager with the Cisco Product Security Incident Response Team (PSIRT), where he focuses on product vulnerability management and Cisco products forensics. He is the author of several blog posts and white papers about security best practices and forensics. He is an active member of the security community and has been a speaker at several security conferences. Stefano specializes in malware detection and integrity assurance in critical infrastructure devices, and he is the author of integrity assurance guidelines for Cisco IOS, IOS-XE, and ASA. Stefano holds a B.Sc. and M.Sc. in telecommunication engineering from Politecnico di Milano, Italy, and an M.Sc. in telecommunication from Danish Technical University, Denmark. He is currently pursuing an Executive MBA at Vlerick Business School in Belgium. He also holds a CCIE in Security #26025 and is CISSP and CISM certified. www.hellodigi.ir
www.hellodigi.ir
分享到:
收藏