CCNP and CCIE Security Core SCOR 300-701 Official Cert Guide: Implementing and Operating Cisco Security Core Technologies / Edition 1 available in Hardcover
This item is not eligible for coupon offers.
- Pub. Date:
- Cisco Press
The CCNP Security Core SCOR 300-701 Official Cert Guide serves as comprehensive guide for individuals who are pursuing the Cisco CCNP Security certification. This book helps any network professionals that want to learn the skills required to develop a security infrastructure, recognize threats and vulnerabilities to networks, and mitigate security threats. Complete and easy to understand, it explains key concepts and techniques through real-life examples. This book will be valuable to any individual that wants to learn about modern cybersecurity concepts and frameworks.
About the Author
Omar Santos is an active member of the security community, where he leads several industry-wide initiatives and standard bodies. His active role helps businesses, academic institutions, state and local law enforcement agencies, and other participants that are dedicated to increasing the security of the critical infrastructure.
Omar is the author of over 20 books and video courses; numerous white papers, articles, and security configuration guidelines and best practices. Omar is a Principal Engineer of Cisco’s Product Security Incident Response Team (PSIRT) where he mentors and lead engineers and incident managers during the investigation and resolution of security vulnerabilities. Omar has been quoted by numerous media outlets, such as TheRegister, Wired, ZDNet, ThreatPost, CyberScoop, TechCrunch, Fortune Magazine, ArsTechnica, and more. You can follow Omar on Twitter: @santosomar or visit his website at: http://omarsantos.io
Table of Contents
Chapter 1: Cybersecurity Fundamentals
Chapter 2: Cryptography
Chapter 3: Software Defined Networking Security and Network Programmability
Chapter 4: Network Security
Chapter 5: Virtual Private Networks (VPNs)
Chapter 6: Securing the Cloud
Chapter 7: Content Security
Chapter 8: Endpoint Protection & Detection
Chapter 9: Secure Network Access, Visibility & Enforcement