Text
Network security auditing
Contents:
Ch. 1 The Principles of Auditing
Security Fundamentals: The Five Pillars
Building a Security Program
Security Controls
Managing Risk
How, What, and Why You Audit
ch. 2 Information Security and the Law
IT Security Laws
Hacking, Cracking, and Fraud Laws
Intellectual Property Laws
Can-Spam Act of 2003
State and Local Laws
Reporting a Crime
Regulatory Compliance Laws
ch. 3 Information Security Governance, Frameworks, and Standards
Understanding Information Security Governance
Process: Security Governance Frameworks
Technology: Standards Procedures and Guidelines
ch. 4 Auditing Tools and Techniques
Evaluating Security Controls
Auditing Security Practices
Testing Security Technology
Security Testing Frameworks
Security Auditing Tools
ch. 5 Auditing Cisco Security Solutions
Auditors and Technology
Security as a System
Cisco Security Auditing Domains
Defining the Audit Scope of a Domain
Identifying Security Controls to Assess
Mapping Security Controls to Cisco Solutions
The Audit Checklist
ch. 6 Policy, Compliance, and Management
Do You Know Where Your Policy Is?
Auditing Security Policies
Standard Policies
Policies for Regulatory and Industry Compliance
Cisco Policy Management and Monitoring Tools
ch. 7 Infrastructure Security
Infrastructure Threats
Policy Review
Infrastructure Operational Review
Technical Testing
ch. 8 Perimeter Intrusion Prevention
Perimeter Threats and Risk
Policy review
Perimeter Operations Review
Perimeter Architecture Review
Auditing Firewall
Auditing IPS
ch. 9 Access Control
Fundamentals of Access Control
Access Control Threats and Risks
Access Control Policy
Access Control Operational Review
Access Control Architecture Review
Technical testing
ch. 10 Secure Remote Access
Defining the Network Edge
VPN Fundamentals
Remote Access Threats and Risks
Remote Access Policies
Remote Access Operational Review
Remote Access Architecture Revie
Technical testing
ch. 11 Endpoint Protection
Endpoint Risks
Endpoint Threats
Policy review
Endpoint Protection Operational Control Review
Endpoint Architecture Review
ch. 12 Unified Communications
Unified Communications Risks
VoIP Threats
UC Policy and Standards Review
UC Operational Control Review
UC Architecture Review
No other version available