| 1. | - 2011 Collegiate Cyber Defense Challenge: Shaping the Cyber Warriors of Tomorrow
- By
Brad Bowers
- May 2, 2011
- Brad Bowers provides an intriguing look into the 2011 Mid-Atlantic CCDC attack-and-defense competition for information technology students.
|
| 2. | - A Student-Hacker Showdown at the Collegiate Cyber Defense Competition
- By
Seth Fogie
- Mar 31, 2006
- Students-turned-IT managers faced off against experienced hackers at the Mid-Atlantic Regional Collegiate Cyber Defense Competition. Seth Fogie witnessed this real-world competition and reports on its unexpected twists, turns, and even drama.
|
| 3. | - Analyzing MPLS VPN Security
- By
Michael H. Behringer, Monique Morrow
- Oct 6, 2005
- VPN users have certain expectations and requirements for their VPN service. In a nutshell, they want their service to be both private and secure. In other words, they want their VPN to be as secure as with dedicated circuits while gaining the scalability benefits of a shared infrastructure. Both concepts, of privacy and security, are not black and white, and need to be defined for a real world implementation. This chapter introduces you to VPN MPLS security requirements.
|
| 4. | - Attacking and Defending the Internet with Border Gateway Protocol (BGP)
- By
Carolyn Meinel
- Aug 25, 2008
- Carolyn Meinel explains how sysadmins can take advantage of resources offered by several organizations to detect and defeat BGP problems.
|
| 5. | - Attacking the Spanning Tree Protocol
- By
Eric Vyncke, Christopher Paggen
- Jun 4, 2008
- Conducting STP attacks is now within the reach of a wide population, thanks to the availability of point-and-shoot attacks tools. Fortunately, simple features widely available on a range of switches, such as BPDU-guard, provide effective measures against spanning-tree–based exploits.
|
| 6. | - Basic Cisco IOS Software and Catalyst 3550 Series Security
- By
Dmitry Bokotey, Andrew Mason, Raymond Morrow
- Jul 25, 2003
- Become comfortable with basic Cisco IOS Software and Catalyst 3550 security features with an introduction to password management, disabling unnecessary services, setting up secure HTTP and NTP services, and SSH.
|
| 7. | - Broadband Routers and Firewalls
- By
Ido Dubrawsky, Wes Noonan
- Nov 17, 2006
|
| 8. | - Building a Human Firewall: Raising Awareness to Protect Against Social Engineering
- By
Thierry Wohnlich
- Oct 27, 2006
- Thierry Wohnlich proposes an alternate view of information security awareness, a view that takes into consideration the reasons behind the need for awareness, and discusses the role of the individuals in relation to information technology.
|
| 9. | - Building Cisco IDS 3.0(3) Custom Signatures
- By
Earl Carter
- Feb 15, 2002
- Tuning your IDS to meet your specific network requirements is crucial for optimum protection of your network, as discussed in this article by Earl Carter.
|
| 10. | - Capturing Network Traffic for the Catalyst 6000 IDS Module
- By
Earl Carter
- Feb 15, 2002
- With the addition of the Catalyst 6000 IDS Module, you can integrate your Cisco IDS directly into your network’s infrastructure, as discussed by expert Earl Carter.
|
| 11. | - CCDC and the Tale of the Insider Threat
- By
Brad Bowers
- May 24, 2010
- Brad Bowers discusses the value of including the threat of insider attacks in Collegiate Cyber Defense Competition (CCDC) events.
|
| 12. | - CCSP Cisco Secure PIX Firewall Advanced Exam: CiscoWorks Management Center for Firewalls
- By
Greg Bastien, Earl Carter, Christian Degu
- Jan 7, 2005
- To help you prepare for the CCSP Cisco Secure PIX Firewall Advanced Exam, this chapter provides information on using CiscoWorks with Firewall MC.
|
| 13. | - CCSP Cisco Secure VPN Exam: Remote Access Configuration
- By
John Roland, Mark Newcomb
- May 23, 2003
|
| 14. | - CCSP CSI Exam Certification: SAFE IP Telephony Design
- By
Ido Dubrawsky, Paul Grey
- Dec 30, 2004
- This chapter will help you prepare for the CCSP CSI Exam, with a focus on SAFE IP Telephony Design. Sample questions are included to help you study.
|
| 15. | - CCSP Self-Study: Advanced AAA Security for Cisco Router Networks
- By
John Roland
- May 21, 2004
- For CCSP candidates, John Roland discusses Cisco Secure ACS 3.0 for Windows 2000/NT Servers, Cisco Secure ACS for UNIX, and the security services of TACACS+, RADIUS, and Kerberos.
|
| 16. | - Cisco AAA Identity Management Security: Getting Familiar with ACS 5.1
- By
Brandon J. Carroll, Premdeep Banga, Vivek Santuka
- Feb 2, 2011
- ACS 5.1 has a completely different user interface from ACS 4.2. Throughout the course of this chapter you will become familiar with the GUI and know where different functions are located.
|
| 17. | - Cisco ASA Authentication, Authorization, and Accounting Network Security Services
- By
Jazib Frahim, Omar Santos
- Jan 28, 2010
- This chapter provides an explanation of the configuration and troubleshooting of Cisco ASA-supported authentication, authorization, and accounting network security services.
|
| 18. | - Cisco ASA Security Contexts
- By
Omar Santos, Jazib Frahim
- Dec 16, 2005
- The virtual firewall methodology enables a physical firewall to be partitioned into multiple standalone firewalls. Each standalone firewall acts and behaves as an independent entity with its own configuration, interfaces, security policies, routing table, and administrators. In Cisco ASA, these virtual firewalls are known as security contexts. This chapter covers security contexts in detail.
|
| 19. | - Cisco Asks, Can Security Skills Be Certified?
- By
Yusuf Bhaiji
- Jul 23, 2004
- Yusuf Hussain Bhaiji explores the value of certification in IT Security given its rapidly changing nature and offers suggestions on choosing the right certification program.
|
| 20. | - Cisco IDS Sensor Deployment Considerations
- By
Earl Carter
- Feb 15, 2002
- Correctly deploying your Cisco IDS Sensor is crucial to protecting your network. Earl Carter helps you understand your network topology, as well as the critical components on your network.
|