BN.com Gift Guide
Customer Reviews for

CCNA Security 640-554 Official Cert Guide

Average Rating 4
( 5 )
Rating Distribution

5 Star

(2)

4 Star

(1)

3 Star

(2)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing all of 2 review with 5 star rating   See All Ratings
Page 1 of 1
  • Posted August 12, 2012

    Highly Recommended FOR THE CCNA SECURITY EXAM!!

    Are you preparing for the 640-554 Implementing Cisco IOS Network Security exam? If you are, then this book is for you! Authors Keith Barker and Scott Morris, have done an outstanding job of writing book that improves your awareness and knowledge of network security. Barker and Morris, begin by covering the need for the building blocks of network and information security, threats to our networks today, and the fundamental principles of secure network design. Then, the authors review risk analysis, management and security policies. The authors also cover the securing of borderless networks, controlling and containing data loss. They continue by covering the securing of the network using the network foundation protection approach, the management plane, the control plane, and the data plane. Next, the authors review the Cisco Configuration Professional features and the GUI, setting up new devices, CCP building blocks, and CCP audit features. Then, they describe management traffic and how to make it more secure and the implementation of security measures to protect the management plane. The authors also describe the role of Cisco Secure ACS and the two primary protocols used with it, RADIUS and TACACS. They continue by reviewing VLANs and trunking fundamentals, spanning-tree fundamentals, and common Layer 2 threats and how to mitigate them. Next, the authors cover the Ipv6. Then, they discuss the design considerations for threat mitigation and containment; and, the hardware, software, and services used to implement a secure network. The authors also cover the benefits and fundamentals for access control lists, implementing Ipv4 ACLs a packet filters, and implementing Ipv6 ACLs as packet filters. They continue by reviewing the firewall concepts and the technologies used by them, the function of Network Address Translations, including its building blocks, and the guidelines and considerations for creating and deploying firewalls. Next, the authors discuss the operational and functional components of the IOS Zone-Based Firewall and how to configure and verify the IOS Zone-Based Firewall. Then, they cover the Adaptive Security Appliance family and features, ASA firewall fundamentals, and configuring the ASA. The authors also compare intrusion prevention systems to intrusion detection systems and cover how to identify malicious traffic on the network, manage signatures, and monitor and manage alarms and alerts. Next, they cover the features included in the IOS-based IPS and the installing of the IPS feature; working with signatures in IOS-based IPS; and, managing and monitoring IPS alarms. The authors continue by covering what VPNs are, why they are used and the basic ingredients of cryptography. Then, they cover the concepts, components, and operations of the public key infrastructure and include an example of putting the pieces of PKI to work. The authors also cover the concepts, components, and operations of IPsec and how to configure and verify IPsec. Next, they cover the planning and preparation that is needed to implement an IPsec site-to-site VPN, implementing and verifying the IPsec site-to-site VPN. The authors continue by covering the functions and use of SSL for VPNs, configuring SSL clientless VPN on the ASA, and configuring the full SSL AnyConnect VPN on the ASA. Finally, they identify the tools that are needed for the final exam preparation to help you develop an effective study plan. The goal of this most excellent book is

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted May 1, 2014

    No text was provided for this review.

Sort by: Showing all of 2 review with 5 star rating   See All Ratings
Page 1 of 1