/
CCNA Security v2.0 CCNA Security v2.0

CCNA Security v2.0 - PowerPoint Presentation

tatyana-admore
tatyana-admore . @tatyana-admore
Follow
460 views
Uploaded On 2017-11-05

CCNA Security v2.0 - PPT Presentation

Chapter 11 Managing a Secure Network Chapter Outline 110 Introduction 111 Network Security Testing 112 Developing a Comprehensive Security Policy 113 Summary Section 111 Network Security Testing ID: 602720

policy security testing network security policy network testing topic documents explain comprehensive section chief officer awareness information organization describe

Share:

Link:

Embed:

Download Presentation from below link

Download Presentation The PPT/PDF document "CCNA Security v2.0" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

Slide1

CCNA Security v2.0

Chapter 11:Managing a Secure NetworkSlide2

Chapter Outline

11.0 Introduction11.1 Network Security Testing

11.2 Developing a Comprehensive Security Policy11.3 SummarySlide3

Section 11.1:

Network Security Testing

Upon completion of this section, you should be able to:

Describe the techniques used in network security

testing.

Describe the tools used in network security

testing.Slide4

Topic 11.1.1:

Network Security Testing TechniquesSlide5

Operations SecuritySlide6

Testing and Evaluating Network SecuritySlide7

Types of Network Tests

Operational Status of the Network:

Penetration testing

Network scanning

Vulnerability scanning

Password cracking

Log review

Integrity checks

Virus detectionSlide8

Applying Network Test ResultsSlide9

Topic 11.1.2:

Network Security Testing ToolsSlide10

Network Testing Tools

Nmap

/

Zenmap

SuperScan

SIEM

GFI

LANguard

Tripwire

Nessus

L0phtCrack

MetasploitSlide11

Nmap

and Zenmap

Sample

Nmap

Screenshot

Sample

Zenmap

ScreenshotSlide12

SuperScanSlide13

SIEM

Essential functions:

Forensic Analysis

Correlation

Aggregation

RetentionSlide14

Section 11.2:

Developing a Comprehensive Security Policy

Upon completion of this section, you should be able to:

Explain the purpose of a comprehensive security policy.

Describe the structure of a comprehensive security

policy.

Describe the standards, guidelines, and procedures of a security

policy.

Explain the roles and responsibilities entailed by a security policy

.

Explain security awareness and how to achieve through education and training

.

Explain how to respond to a security breach.Slide15

Topic 11.2.1:

Security Policy OverviewSlide16

Secure Network Life Cycle

Determine what the assets of an organization are by asking:

What does the organization have that others want?

What processes, data, or information systems are critical to the organization?

What would stop the organization from doing business or fulfilling its mission?Slide17

Security PolicySlide18

Security Policy Audience

Audience Determines Security Policy ContentSlide19

Topic 11.2.2:

Structure of a Security PolicySlide20

Security Policy HierarchySlide21

Governing Policy

A governing policy includes:

Statement of the issue that the policy addresses

How the policy applies in the environment

Roles and responsibilities of those affected by the policy

Actions, activities, and processes that are allowed (and not allowed)

Consequences of noncomplianceSlide22

Technical Policies

Technical components:

General policies

Telephony policy

Email and communication policy

Remote access policy

Network policy

Application policySlide23

End User Polices

Customize End-User Policies for GroupsSlide24

Topic 11.2.3:

Standards, Guidelines, and ProceduresSlide25

Security Policy DocumentsSlide26

Standards DocumentsSlide27

Guideline Documents

NIST Information Technology PortalSlide28

Guideline

Documents (Cont.)

NSA WebsiteSlide29

Guideline

Documents (Cont.)

Common Criteria WebsiteSlide30

Procedure DocumentsSlide31

Topic 11.2.4:

Roles and ResponsibilitiesSlide32

Organizational Reporting StructureSlide33

Common Executive Titles

Chief Executive Officer (CEO)

Chief Technology Officer (CTO)

Chief Information Officer (CIO)

Chief Security Officer (CSO)

Chief Information Security Officer (CISO)Slide34

Topic 11.2.5:

Security Awareness and TrainingSlide35

Security Awareness Program

Primary components:

Awareness campaigns

Training and educationSlide36

Topic 11.2.6:

Responding to a Security BreachSlide37

Motive, Opportunity, and MeansSlide38

Collecting DataSlide39

Section 11.3:

Summary

Chapter Objectives:

Explain the various techniques and tools used for network security testing

.

Explain how to develop a comprehensive security policy

.Slide40
Slide41

Instructor Resources

Remember, there are helpful tutorials and user guides available via your

NetSpace

home

page. (

https://

www.netacad.com)

These resources cover a variety of topics including navigation, assessments, and assignments.

A screenshot has been provided here highlighting the tutorials related to activating exams, managing assessments, and creating quizzes.

1

2