Network Defense Bk. 2Security Policy and Threats |
|
Author:
| EC-Council Staff, |
Series title: | EC-Council Press Ser. |
ISBN: | 978-1-4354-8356-9 |
Publication Date: | Apr 2010 |
Publisher: | Course Technology
|
Book Format: | Paperback |
List Price: | USD $179.95 |
Book Description:
|
The Network Defense Series from EC-Council | Press is comprised of 5 books designed to educate learners from a vendor-neutral standpoint how to defend the networks they manage. This series covers the fundamental skills in evaluating internal and external threats to network security and design, how to enforce network level security policies, and how to ultimately protect an organization's information. The books in the series cover a broad range of topics from secure network...
More DescriptionThe Network Defense Series from EC-Council | Press is comprised of 5 books designed to educate learners from a vendor-neutral standpoint how to defend the networks they manage. This series covers the fundamental skills in evaluating internal and external threats to network security and design, how to enforce network level security policies, and how to ultimately protect an organization's information. The books in the series cover a broad range of topics from secure network fundamentals, protocols & analysis, standards and policy, hardening infrastructure, to configuring IPS, IDS, firewalls, bastion host and honeypots. Learners completing this series will have a full understanding of defensive measures taken to secure their organization's information, and along with the proper experience these books will prepare readers for the EC-Council Network Security Administrator (E|NSA) certification.Understanding the threats to an organization's infrastructure as well as internal policies and mechanisms used to defend the infrastructure is an integral part to a Network Security Administrator's role. This book, the second in the series, is designed to cover a broad range of topics from a vendor-neutral perspective preparing the Administrator to implement and enforce policies that leverage not only the knowledge of how these threats can materialize, but also the mechanisms used prevent them.