More than 3000 engineers find our updates useful. You can get them at your mail box!
  
Search your paper presentation and project titles:

Department/Area of interest: ( To list the projects / paper presentations)

Mechanical               Scada technology              Communication             Computer science           Alternative energy
Electrical                  Robotics                        Biometrics                     Artificial intelligence             Electronics

CCNA Security Official Exam Certification Guide




CCNA Security Official Exam Certification Guide 


By Michael Watkins, Kevin Wallace.
Published by Cisco Press.
Series: Exam Certification Guide.


ISBN-10: 1-58720-220-4;
Published: Jun 24, 2008;
Copyright 2008;
Dimensions 7-3/8x9-1/8;
Pages: 672;
Edition: 1st.

CCNA Security Certification
CCNA Security Certification meets the needs of IT professionals who are responsible for network security. It confirms an individual's skills for job roles such as Network Security Spe******ts, Security Administrators, and Network Security Support Engineers. This certification validates skills including installation, troubleshooting and monitoring of network devices to maintain integrity, confidentiality and availability of data and devices and develops competency in the technologies that Cisco uses in its security structure.

Students completing the recommended Cisco training will gain an introduction to core security technologies as well as how to develop security policies and mitigate risks. IT organizations that employ CCNA Security-holders will have IT staff that can develop a security infrastructure, recognize threats and vulnerabilities to networks, and mitigate security threats.

The official study guide helps you master all the topics on the IINS exam, including
-Network security threats
-Security policies
-Network perimeter defense
-AAA configuration
-Router security
-Switch security
-Endpoint security
-SAN security
-VoIP security
-IOS firewalls
-Cisco IOS® IPS
-Cryptography
-Digital signatures
-PKI and asymmetric encryption
-IPsec VPNs

Intense Debate Comments