Home > Articles > Cisco > CCNP Security
CCNP Security
58 Items
Sort by Date | Title
- Flexible Packet Matching Concepts and Configuration
- Oct 28, 2011
- This article takes a look at the FPM feature, what it can be used for and the basic steps that would be used to configure it.
|
- Getting Started with the Cisco PIX Firewall
- Apr 11, 2003
|
- Identifying Cisco Network Threats
- Dec 5, 2003
- To become a Cisco Certified Security Professional you need to understand all kinds of threats to your network. Learn to identify threats by their origin and by their type.
|
- Introducing Intrusion Prevention
- Sep 12, 2011
- This article introduces you to the network security practice of intrusion prevention, covering detection vs. prevention, detection technologies, evasion techniques, reliable IPS, and Host IPS.
|
- Introducing VPN Technologies
- Dec 6, 2011
- In this article, Anthony Sequeira examines the basics of IPSec for the creation of these VPNs.
|
- IOS Zone-based Firewall Configuration Overview
- Feb 28, 2011
- Sean Wilkins examines the basic concepts and proper configurations for zone-based firewalls.
|
- Private VLAN Concepts and Configuration
- Dec 13, 2011
- A private VLAN offers another level of security that enables an organization to further secure VLAN ports. This article takes a look at this feature, its functionality and how it can be configured on Cisco equipment.
|
- Protecting Critical Resources with Target Value Ratings (TVRs)
- Aug 8, 2011
- This article dives into customizing Target Value Ratings (TVRs) to provide a better fortress of security for your critical resources in just minutes.
|
- Q&A with the Author of Computer Incident Response and Product Security
- Mar 7, 2011
- The author of Computer Incident Response and Product Security discusses the book and its features.
|
- Quality of Service (QoS) on the Cisco ASA
- Jul 13, 2011
- This article provides a valuable review of QoS in general and then details the exact QoS mechanisms that are currently supported on the Cisco ASA. These capabilities include classification, congestion management, traffic shaping, and traffic policing.
|
- Routing Protocol Authentication Concepts and Configuration
- Jul 13, 2011
- This article takes a look at the available routing protocol authentication options for the most often used routing protocols: EIGRP, OSPF, RIP and BGP.
|
- Securing Cisco Routers
- Dec 12, 2003
- Learn the different ways you can provide additional security to your Cisco network by setting up encrypted passwords, turning off all unwanted services, configuring different access levels, and using different access lists to filter all unwanted traffic out of your network and mitigate spoofing and DoS threats.
|
- Securing the Management Plane of a Cisco Network Device
- Jul 11, 2011
- This article takes a look at a couple of the different features that can be used to secure the management plane of a Cisco network device (or devices) and reviews the basic configuration of these features.
|
- SNMP Concepts and Configuration
- Jul 20, 2011
- This article takes a look at some of the basic SNMP concepts, examining how it works and how it can be configured to perform basic functions.
|
- Switchport Security Concepts and Configuration
- Jul 1, 2011
- There are a couple of different ways to configure the use of switchport security and this article will review the available options and requirements.
|
- The Cisco Certified Security Professional
- Oct 31, 2003
|
- The Ideal Security Professional
- Nov 8, 2010
- In this article you’ll take a look at relevant certifications, technical skills and knowledge, higher education, and subject matter expertise of greatest interest to employers of security professionals.
|
- Unicast Reverse Path Forwarding Concepts and Configuration
- Jul 8, 2011
- This article goes over the Unicast Reverse Path Forwarding (Unicast RPF) feature and how it can be configured to deal with an IP source address spoofing attack.
|