Vi ste ovdje
Overview/Description
Cisco AnyConnect VPN is a flexible full tunnel solution for remote access VPNs. AnyConnect can be configured to use SSL or IPSec. This course covers configuration and verification of SSL and IPSec VPNs using AnyConnect. This course is one of a series of courses that prepares the learner for Cisco certification exam 300-209 SIMOS. This exam counts towards CCNP Security certification.
Target Audience
Network security engineers and learners preparing for Cisco CCNP Security certification
Prerequisites
None
Expected Duration (hours)
2.0
Lesson Objectives...
Overview/Description
Application plugins are a way of securely extending the functionality of Cisco clientless SSL VPNs. Plugins give thin application client access to apps that would otherwise be unavailable through Cisco clientless SSL VPNs. This course covers Cisco clientless SSL VPN verification and application plugin configuration. It goes on to cover authentication, authorization, and accounting (AAA) in a Cisco clientless SSL VPN environment. This course is one of a series of courses that prepares the learner for Cisco certification exam 300-209 SIMOS. This exam counts towards CCNP...
Overview/Description
The fundamental security principles of confidentiality, availability, and integrity guide all successful information security best practices. In this course, you'll learn about applying these security principles, as well as best practices for establishing security governance principles. You'll also explore how best to establish and implement comprehensive security guidelines across the organization. This course is one of a series in the SkillSoft learning path that covers the objectives for the Certified Information Systems Security Professional (CISSP) exam.
Target...
Overview/Description
Risk management is an integral part of overall information systems security. In this course, you'll learn about personnel security best practices, risk management concepts, and risk analysis techniques. You'll also be introduced to threat modeling best practices, countermeasure selection, and implementing risk controls. Finally, this course covers risk monitoring and reporting best practices. This course is one of a series in the Skillsoft learning path that covers the objectives for the Certified Information Systems Security Professional (CISSP) exam.
Target Audience...
Overview/Description
The substantial increase in the amount of digitized data over the past few years requires an equal response in attention to the security of that data. In this course, you'll learn about asset security best practices including classification techniques and asset security ownership. This course also covers privacy protection considerations, including data remanence and collection limitations. Finally, you'll explore best practices for media, hardware and personnel retention, and techniques for determining the most appropriate data security controls like scoping, tailoring...
Overview/Description
Integrating comprehensive security controls into information systems planning and design activities is vital for establishing IS architecture that has necessary functionality combined with the ability to fend off both internal and external threats. In this course, you'll learn best practices for implementing and managing secure engineering processes, including applying underlying security principles in IS architecture design. This course also introduces you to systems security evaluation models selecting appropriate controls and countermeasures. Finally, you'll learn...
Overview/Description
Even in an age of digitized data, securing the physical environment is still a critical part of security engineering. In this course, you'll learn about security threats, both natural and man-made, and techniques for preventing loss from these threats. You'll also learn about site and facility design considerations, restricted work area security, and best practices for crime prevention through secure design of the physical environment. This course is one of a series in the SkillSoft learning path that covers the objectives for the Certified Information Systems Security...
Overview/Description
Securing network communications is a key activity in managing the security of any IT system, and the network is a common and potent vector for attack. In this course, you'll learn about the design and components of network systems, how to implement secure systems, and how to mitigate common attacks. This course is one of a series in the Skillsoft learning path that covers the objectives for the Certified Information Systems Security Professional (CISSP) exam.
Target Audience
Individuals interested in information systems security concepts, methodologies and best...
Overview/Description
Identity and access management is at the heart of security management and is key to the CISSP examination. Compromising identity is the main aim of most attacks on data confidentiality. In this course, you'll learn about physical and logical access control, the proper management of identity and identification of the identity lifecycle, and attacks to access control and their mitigation. You'll also learn about the design and components of network systems, how to implement secure systems, and how to mitigate common attacks. This course is one of a series in the Skillsoft...
Overview/Description
The time spent planning and establishing security controls isn't worth much if you don't spend time ensuring that those security designs work. In this course, you'll learn how to design and validate security control assessment and test strategies, and perform vulnerability assessments. This course also covers how to perform log reviews, code reviews and tests, and perform penetration testing to test security controls. Finally, you'll learn about best practices for collecting security test data, and analyzing test outputs so you can identify gaps and implement any further...