Atjaunināt sīkdatņu piekrišanu

E-grāmata: CCNP Security Cisco Secure Firewall and Intrusion Prevention System Official Cert Guide

  • Formāts: 656 pages
  • Sērija : Official Cert Guide
  • Izdošanas datums: 07-Jul-2022
  • Izdevniecība: Cisco Press
  • Valoda: eng
  • ISBN-13: 9780136589815
Citas grāmatas par šo tēmu:
  • Formāts - PDF+DRM
  • Cena: 45,72 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: 656 pages
  • Sērija : Official Cert Guide
  • Izdošanas datums: 07-Jul-2022
  • Izdevniecība: Cisco Press
  • Valoda: eng
  • ISBN-13: 9780136589815
Citas grāmatas par šo tēmu:

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

Trust the best-selling Official Cert Guide series from Cisco Press to help you learn, prepare, and practice for exam success. They are built with the objective of providing assessment, review, and practice to help ensure you are fully prepared for your certification exam and excel in your day-to-day security work.



CCNP Security Cisco Secure Firewall and Intrusion Prevention System Official Cert Guide presents you with an organized test preparation routine using proven series elements and techniques. "Do I Know This Already?" quizzes open each chapter and enable you to decide how much time you need to spend on each section. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly.

* Master the topics on the CCNP Security concentration exam that focuses on the Cisco Secure Firewall and IPS (formerly known as Cisco Firepower) * Assess your knowledge with chapter-opening quizzes * Review key concepts with exam preparation tasks * Practice with realistic exam questions in the practice test software



CCNP Security Cisco Secure Firewall and Intrusion Prevention System Official Cert Guide from Cisco Press enables you to succeed on the exam the first time and is the only self-study resource approved by Cisco. Long-time Cisco security insider Nazmul Rajib shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills.

This complete study package includes

* A test-preparation routine proven to help you pass the exams * Do I Know This Already? quizzes, which enable you to decide how much time you need to spend on each section * Chapter-ending and part-ending exercises, which help you drill on key concepts you must know thoroughly * The powerful Pearson Test Prep Practice Test software, with two full exams comprised of well-reviewed, exam-realistic questions, customization options, and detailed performance reports * A final preparation chapter, which guides you through tools and resources to help you craft your review and test-taking strategies * Study plan suggestions and templates to help you organize and optimize your study time



Well regarded for its level of detail, study plans, assessment features, and challenging review questions and exercises, this official study guide helps you master the concepts and techniques that ensure your exam success.



This official study guide helps you master the topics on the CCNP Security concentration exam that focuses on the Cisco Secure Firewall and IPS (formerly known as Cisco Firepower). Use it to deepen your knowledge of

* Configurations * Integrations * Deployments * Management * Troubleshooting, and more

Companion Website: The companion website contains two full practice exams, an interactive Flash Cards application, Study Planner, Glossary, memory table and config checklist review exercises, and more.

Includes Exclusive Offers for Up to 80% Off Video Training, Practice Tests, and more

Pearson Test Prep online system requirements: Browsers: Chrome version 73 and above, Safari version 12 and above, Microsoft Edge 44 and above. Devices: Desktop and laptop computers, tablets running Android v8.0 and above or iPad OS v13 and above, smartphones running Android v8.0 and above or iOS v13 and above with a minimum screen size of 4.7.

Pearson Test Prep offline system requirements: Windows 10, Windows 8.1; Microsoft .NET Framework 4.5 Client; Pentium-class 1 GHz processor (or equivalent); 512 MB RAM; 650 MB disk space plus 50 MB for each downloaded practice exam; access to the Internet to register and download exam databases.



Also available from Cisco Press for CCNP Security study is the CCNP Security Cisco Secure Firewall and Intrusion Prevention System Official Cert Guide Premium Edition eBook and Practice Test. This digital-only certification preparation product combines an eBook with enhanced Pearson Test Prep Practice Test.



This integrated learning package

* Enables you to focus on individual topic areas or take complete, timed exams * Includes direct links from each question to detailed tutorials to help you understand the concepts behind the questions * Provides unique sets of exam-realistic practice questions * Tracks your performance and provides feedback on a module-by-module basis, laying out a complete assessment of your knowledge to help you focus your study where it is needed most
Introduction xxv
Part I General Deployment
Chapter 1 Introduction to Cisco Secure Firewall and IPS
2(22)
"Do I Know This Already?" Quiz
3(1)
Foundation Topics
4(1)
Evolution of Next-Generation Firewall
4(4)
Cisco Secure Firewall Solutions
8(3)
Product Evolution and Lifecycle
11(3)
Software and Hardware Architecture
14(4)
Scalability and Resiliency
18(1)
Clustering
18(1)
Multi-Instance
19(1)
High Availability
20(1)
Resiliency in Connectivity
21(1)
Summary
22(1)
Exam Preparation Tasks
22(1)
Review All Key Topics
22(1)
Complete Tables and Lists from Memory
23(1)
Define Key Terms
23(1)
Chapter 2 Deployment of Secure Firewall Virtual
24(24)
"Do I Know This Already?" Quiz
24(2)
Foundation Topics
26(1)
Cisco Secure Firewall on a Virtual Platform
26(1)
Hosting Environment Settings
27(1)
Virtual Resource Allocation
28(1)
Software Package Selection
28(2)
Best Practices
30(1)
Configuration
31(1)
Virtual Network for Management Traffic
32(1)
Virtual Network for Data Traffic
33(2)
Virtual Machine Creation for Secure Firewall
35(6)
System Initialization and Validation
41(4)
Summary
45(1)
Exam Preparation Tasks
46(1)
Review All Key Topics
46(1)
Complete Tables and Lists from Memory
46(1)
Define Key Terms
46(2)
Chapter 3 Licensing and Registration
48(22)
Do I Know This Already?
48(2)
Foundation Topics
50(1)
Cisco Licensing Architecture
50(2)
Direct Cloud Access
52(1)
On-Premises Server
52(1)
Offline Access
53(1)
Cisco Secure Firewall Licenses
54(1)
Feature License
54(1)
Export-Controlled License
55(1)
Evaluation License
56(3)
Validation of Licensing
59(2)
Device Registration
61(1)
Best Practices for Registration
61(1)
Configurations on Threat Defense
62(1)
Configurations on Management Center
63(2)
Management Communication over the Internet
65(2)
Validation of Registration
67(1)
Summary
68(1)
Exam Preparation Tasks
69(1)
Review All Key Topics
69(1)
Complete Tables and Lists from Memory
69(1)
Define Key Terms
69(1)
Chapter 4 Firewall Deployment in Routed Mode
70(20)
"Do I Know This Already?" Quiz
70(2)
Foundation Topics
72(1)
Routed Mode Essentials
72(1)
Best Practices for Routed Mode Configuration
73(1)
Fulfilling Prerequisites
73(2)
Enabling the Routed Firewall Mode
75(1)
Configuration of the Routed Interface
75(1)
Configuring Interfaces with Static IP Addresses
76(4)
Configuring Interfaces with Automatic IP Addresses
80(2)
Validation of Interface Configuration
82(6)
Summary
88(1)
Exam Preparation Tasks
89(1)
Review All Key Topics
89(1)
Complete Tables and Lists from Memory
89(1)
Define Key Terms
89(1)
Chapter 5 Firewall Deployment in Transparent Mode
90(30)
"Do I Know This Already?" Quiz
90(2)
Foundation Topics
92(1)
Transparent Mode Essentials
92(1)
Best Practices for Transparent Mode Configuration
93(1)
Fulfilling Prerequisites
94(1)
Enabling the Transparent Firewall Mode
95(1)
Configuring Transparent Mode in a Layer 2 Network
96(1)
Configuring the Physical and Virtual Interfaces
96(7)
Verifying the Interface Status
103(1)
Verifying Basic Connectivity and Operations
104(4)
Deploying a Threat Defense Between Layer 3 Networks
108(1)
Selecting a Default Action
108(3)
Adding an Access Control Rule for a Routing Protocol
111(2)
Creating an Access Control Rule for the SSH Protocol
113(2)
Verifying Access Control Lists
115(3)
Integrated Routing and Bridging (IRB)
118(1)
Summary
118(1)
Exam Preparation Tasks
118(1)
Re view All Key Topics
118(1)
Memory Tables and Lists
119(1)
Define Key Terms
119(1)
Chapter 6 IPS-Only Deployment in Inline Mode
120(18)
"Do I Know This Already?" Quiz
120(2)
Foundation Topics
122(1)
Inline Mode Essentials
122(1)
Inline Mode Versus Passive Mode
123(2)
Inline Mode Versus Transparent Mode
125(1)
Best Practices for Inline Mode
125(1)
Inline Mode Configuration
126(1)
Fulfilling Prerequisites
126(1)
Interface Setup
127(2)
Inline Set Configuration
129(3)
Verification
132(3)
Event Analysis in IPS-Only Mode
135(1)
Summary
136(1)
Exam Preparation Tasks
136(1)
Review All Key Topics
136(1)
Memory Tables and Lists
137(1)
Define Key Terms
137(1)
Chapter 7 Deployment in Detection-Only Mode
138(18)
"Do I Know This Already?" Quiz
139(2)
Foundation Topics
141(1)
Detection-Only Mode Essentials
141(1)
Passive Monitoring Technology
141(1)
Interface Modes: Inline, Inline Tap, and Passive
142(1)
Best Practices for Detection-Only Deployment
143(2)
Inline Tap Mode
145(1)
Configuration of Inline Tap Mode
145(2)
Verification of Inline Tap Configuration
147(2)
Passive Interface Mode
149(1)
Configuration of Passive Interface Mode
149(1)
Configuring Passive Interface Mode on a Threat Defense
150(1)
Configuring a SPAN Port on a Switch
151(1)
Verification of Passive Interface Configuration
152(1)
Event Analysis in Detection-Only Mode
153(1)
Summary
154(1)
Exam Preparation Tasks
154(1)
Review All Key Topics
155(1)
Complete Tables and Lists from Memory
155(1)
Define Key Terms
155(1)
Part II Basic Security Operations
Chapter 8 Capturing Traffic for Advanced Analysis
156(16)
"Do I Know This Already?" Quiz
157(1)
Foundation Topics
158(1)
Packet Capture Essentials
158(2)
Best Practices for Capturing Traffic
160(2)
Capturing of Packets Using Secure Firewall
162(1)
Configuration
162(3)
Verification
165(4)
Packet Capture versus Packet Tracer
169(1)
Summary
170(1)
Exam Preparation Tasks
170(1)
Review All Key Topics
170(1)
Memory Tables and Lists
171(1)
Define Key Terms
171(1)
Chapter 9 Network Discovery Policy
172(22)
"Do I Know This Already?" Quiz
172(2)
Foundation Topics
174(1)
Network Discovery Essentials
174(1)
Application Detectors
175(1)
Network Discovery Operations
176(2)
Best Practices for Network Discovery
178(1)
Fulfilling Prerequisites
179(1)
Configurations
180(1)
Reusable Objects
181(2)
Network Discovery Policy
183(3)
Verification
186(1)
Analyzing Application Discovery
186(1)
Analyzing Host Discovery
186(2)
Undiscovered New Hosts
188(3)
Summary
191(1)
Exam Preparation Tasks
191(1)
Review All Key Topics
191(1)
Complete Tables and Lists from Memory
192(1)
Define Key Terms
192(2)
Chapter 10 Access Control Policy
194(30)
"Do I Know This Already?" Quiz
194(2)
Foundation Topics
196(1)
Access Control Policy Essentials
196(1)
Policy Editor
196(2)
Rule Editor
198(1)
Best Practices for Access Control Policy
199(1)
Access Control Policy Configuration
200(1)
Fulfilling Prerequisites
201(1)
Creating Rules
202(6)
Verification
208(14)
Summary
222(1)
Exam Preparation Tasks
222(1)
Review All Key Topics
222(1)
Complete Tables and Lists from Memory
222(1)
Define Key Terms
222(2)
Chapter 11 Prefilter Policy
224(24)
"Do I Know This Already?" Quiz
224(2)
Foundation Topics
226(1)
Prefilter Policy Essentials
226(1)
Prefilter Policy: Rules and Actions
226(1)
Bypassing Deep Packet Inspection
227(3)
Best Practices for a Prefilter Policy
230(1)
Enabling Bypass Through a Prefilter Policy
230(1)
Fulfilling Prerequisites
230(1)
Configuring a Rule in a Prefilter Policy
230(5)
Invoking a Prefilter Policy into an Access Control Policy
235(2)
Establishing Trust Through an Access Control Policy
237(3)
Verification
240(2)
Managing Encapsulated Traffic Inspection
242(3)
Summary
245(1)
Exam Preparation Tasks
245(1)
Review All Key Topics
245(1)
Complete Tables and Lists from Memory
246(1)
Define Key Terms
246(2)
Chapter 12 Security Intelligence
248(34)
"Do I Know This Already?" Quiz
249(2)
Foundation Topics
251(1)
Security Intelligence Essentials
251(5)
Best Practices for Security Intelligence
256(1)
Fulfilling Prerequisites
257(2)
Automatic Blocking Using Cisco Intelligence Feed
259(3)
Verifying the Action of Cisco Intelligence Feed
262(3)
Overriding the Cisco Intelligence Feed Outcome
265(2)
Instant Blocking Using Context Menu
267(1)
Adding an Address to the Block List
267(1)
Deleting an Address from the Block List
268(1)
Manual Blocking Using Custom List
269(3)
Enabling Security Intelligence in Monitor-Only Mode
272(2)
Threat Intelligence Director
274(2)
Enabling Threat Intelligence Director
276(1)
Adding Sources and Importing Indicators
277(3)
Summary
280(1)
Exam Preparation Tasks
281(1)
Review All Key Topics
281(1)
Complete Tables and Lists from Memory
281(1)
Define Key Terms
281(1)
Chapter 13 Domain Name System (DNS) Policy
282(28)
"Do I Know This Already?" Quiz
282(2)
Foundation Topics
284(1)
DNS Policy Essentials
284(1)
Domain Name System (DNS)
284(1)
Blocking of a DNS Query Using a Secure Firewall
285(2)
DNS Rule Actions
287(1)
Actions That Can Interrupt DNS Queries
288(4)
Actions That Allow DNS Queries
292(1)
Sources of Intelligence
293(2)
Best Practices for Blocking DNS Queries
295(1)
Fulfilling Prerequisites
296(1)
Configuring DNS Policy
297(1)
Add a New Rule to a DNS Policy
298(3)
Invoke the DNS Policy
301(1)
Verification
302(5)
Summary
307(1)
Exam Preparation Tasks
307(1)
Review All Key Topics
308(1)
Complete Tables and Lists from Memory
308(1)
Define Key Terms
308(2)
Chapter 14 URL Filtering
310(32)
"Do I Know This Already?" Quiz
310(2)
Foundation Topics
312(1)
URL Filtering Essentials
312(1)
Category and Reputation
312(2)
URL Database
314(1)
Fulfilling Prerequisites
315(2)
Best Practices for URL Filtering Configuration
317(5)
Enabling URL Filtering
322(1)
Blocking URLs of a Certain Category
323(2)
Verifying the Operation of a URL Filtering Rule
325(4)
Allowing a Specific URL
329(2)
Analyzing the Default Category Override
331(4)
Handling Uncategorized URLs
335(3)
Investigating the Uncategorized URLs
338(2)
Summary
340(1)
Exam Preparation Tasks
341(1)
Review All Key Topics
341(1)
Complete Tables and Lists from Memory
341(1)
Define Key Terms
341(1)
Part III Advanced Configurations
Chapter 15 Network Analysis and Intrusion Policies
342(38)
"Do I Know This Already?" Quiz
343(2)
Foundation Topics
345(1)
Intrusion Prevention System Essentials
345(1)
Network Analysis Policy
346(1)
Intrusion Policy
346(6)
System-Provided Variable Sets
352(1)
System-Provided Base Policies
353(3)
Best Practices for Intrusion Policy Deployment
356(3)
Configuring a Network Analysis Policy
359(5)
Configuring an Intrusion Policy
364(1)
Creating a Policy with a Default Ruleset
364(1)
Incorporating Intrusion Rule Recommendations
365(3)
Enabling or Disabling an Intrusion Rule
368(1)
Setting Up a Variable Set
369(2)
Policy Deployment
371(2)
Verification
373(6)
Summary
379(1)
Exam Preparation Tasks
379(1)
Review All Key Topics
379(1)
Complete Tables and Lists from Memory
379(1)
Define Key Terms
379(1)
Chapter 16 Malware and File Policy
380(36)
"Do I Know This Already?" Quiz
380(2)
Foundation Topics
382(1)
File Policy Essentials
382(1)
File Type Detection
382(1)
Malware Analysis
382(4)
Best Practices for File Policy Configuration
386(1)
Fulfilling Prerequisites
387(3)
Configuring a File Policy
390(1)
Creating a File Policy
390(6)
Deploying a File Policy
396(2)
Verification
398(1)
Analyzing File Events
399(5)
Analyzing Malware Events
404(1)
The Management Center Is Unable to Communicate with the Cloud
404(4)
The Management Center Performs a Cloud Lookup
408(1)
The Threat Defense Blocks Malware
409(3)
Overriding a Malware Disposition
412(1)
Network Trajectory
413(1)
Summary
414(1)
Exam Preparation Tasks
414(1)
Review All Key Topics
414(1)
Complete Tables and Lists from Memory
415(1)
Define Key Terms
415(1)
Chapter 17 Network Address Translation (NAT)
416(44)
"Do I Know This Already?" Quiz
417(1)
Foundation Topics
418(1)
NAT Essentials
418(2)
NAT Techniques
420(2)
NAT Rule Types
422(1)
Best Practices for NAT Deployment
423(2)
Fulfilling Prerequisites
425(2)
Configuring NAT
427(1)
Masquerading a Source Address (Source NAT for Outbound Connection)
427(1)
Configuring a Dynamic NAT Rule
427(6)
Verifying the Configuration
433(1)
Verifying the Operation: Inside to Outside
434(7)
Verifying the Operation: Outside to Inside
441(5)
Connecting to a Masqueraded Destination (Destination NAT for Inbound Connection)
446(1)
Configuring a Static NAT Rule
446(3)
Verifying the Operation: Outside to DMZ
449(8)
Summary
457(1)
Exam Preparation Tasks
457(1)
Review All Key Topics
457(1)
Complete Tables and Lists from Memory
458(1)
Define Key Terms
458(2)
Chapter 18 Traffic Decryption Policy
460(22)
"Do I Know This Already?" Quiz
460(2)
Foundation Topics
462(1)
Traffic Decryption Essentials
462(1)
Overview of SSL and TLS Protocols
462(4)
Decryption Techniques on Secure Firewall
466(1)
Best Practices for Traffic Decryption
467(1)
Configuring a Decryption Policy
468(1)
PKI Objects
468(1)
Internal CAs Object
469(1)
Internal Certs Object
469(1)
SSL Policy
470(4)
File Policy
474(1)
Access Control Policy
474(2)
Verification
476(4)
Summary
480(1)
Exam Preparation Tasks
480(1)
Review All Key Topics
481(1)
Complete Tables and Lists from Memory
481(1)
Define Key Terms
481(1)
Chapter 19 Virtual Private Network (VPN)
482(54)
"Do I Know This Already?" Quiz
483(1)
Foundation Topics
484(1)
VPN Essentials
484(1)
Site-to-Site VPN
485(3)
Remote Access VPN
488(1)
IPsec Essentials
489(1)
Mode of Operation
490(2)
Security Association and Key Exchange
492(1)
IKEvl
492(2)
IKEv2
494(1)
Authentication
495(1)
Site-to-Site VPN Deployment
496(1)
Prerequisites
496(3)
Configurations
499(4)
Access Control Policy
503(1)
NAT Policy
504(3)
Verification
507(6)
Remote Access VPN Deployment
513(1)
Prerequisites
513(3)
Configuration
516(1)
Any Connect File
517(1)
RADIUS Server Group
518(1)
Certificate Enrollment
518(3)
Network and IP Address Pool
521(1)
Remote Access VPN Policy
522(5)
Verification
527(7)
Summary
534(1)
Exam Preparation Tasks
535(1)
Review All Key Topics
535(1)
Complete Tables and Lists from Memory
535(1)
Define Key Terms
535(1)
Chapter 20 Quality of Service (QoS)
536(20)
"Do I Know This Already?" Quiz
536(2)
Foundation Topics
538(1)
Quality of Service Essentials
538(3)
Best Practices for Enabling QoS
541(1)
Fulfilling Prerequisites
541(1)
Configuring QoS Policy
542(4)
Verification
546(4)
Analyzing QoS Events and Statistics
550(4)
Summary
554(1)
Exam Preparation Tasks
554(1)
Review All Key Topics
554(1)
Complete Tables and Lists from Memory
555(1)
Define Key Terms
555(1)
Chapter 21 System Logging (Syslog)
556(26)
"Do I Know This Already?" Quiz
557(1)
Foundation Topics
558(1)
Secure Firewall Logging Essentials
558(2)
Best Practices for Logging
560(1)
Prerequisites
560(4)
Sending Syslog from Threat Defense
564(1)
Add a Syslog Server on Platform Settings
564(4)
Enable Logging on Access Control Policy
568(1)
Verification
568(1)
Sending Syslog from Management Center
569(1)
Create Syslog Alerts
569(3)
Verification
572(2)
Correlate Events to Send Syslog Alerts
574(4)
Troubleshooting Logs
578(3)
Summary
581(1)
Exam Preparation Tasks
581(1)
Review All Key Topics
581(1)
Complete Tables and Lists from Memory
581(1)
Define Key Terms
581(1)
Part IV Conclusion
Chapter 22 Final Preparation
582(6)
Getting Ready for the Exam
582(1)
Tools for Final Review
582(1)
Exam Day
583(1)
Practice Tests
583(1)
Pearson Cert Practice Test Engine and Questions on the Website
583(1)
Accessing the Pearson Test Prep Software Online
584(1)
Accessing the Pearson Test Prep Software Offline
584(1)
Customizing Your Exams
585(1)
Updating Your Exams
585(1)
Premium Edition
586(1)
Chapter-Ending Review Tools
586(1)
Summary
586(2)
Part V Appendixes
Appendix A Answers to the "Do I Know This Already?" Questions
588(10)
Appendix B CCNP Security Cisco Secure Firewall and Intrusion Prevention System Official Cert Guide Updates
598(3)
Glossary 601(7)
Index 608
Nazmul Rajib is a senior product marketing manager of Cisco Systems, Inc. He leads Cisco's global initiatives on cybersecurity enablement, focusing on the firewall and intrusion prevention technologies. As a senior member of the Security Business Group (SBG), Nazmul regularly advises Cisco on security product roadmaps, content strategies, and technical communications. He develops training programs for the Global Security Sales Organization (GSSO) and worldwide channel partners. Nazmul also worked as a technical marketing engineer in the product management organization, where he was responsible for validating security designs, researching best practices, publishing white papers, and presenting new security capabilities.





Prior to joining Cisco's core business group, Nazmul served as a senior information security consultant in the Cisco advanced services organization. With more than a decade of experience, Nazmul assisted many Fortune 500 companies, government agencies, and international organizations. He frequently met Cisco customers to address their critical security concerns and to run workshops.





Previously, Nazmul was a technical lead in the Cisco Customer Experiences (CX) organization, where he consistently assisted the security engineers, and spearheaded the engineering efforts to solve business-critical escalations. He developed several training programs and taught many Cisco engineers worldwide. Nazmul published numerous articles on the Cisco website. In addition to this book, he has authored the best-selling security book Cisco Firepower Threat Defense (ISBN: 9781587144806).





Nazmul is a veteran of Sourcefire, Inc., which developed the world's greatest open-source intrusion prevention system. At Sourcefire, Nazmul created and managed the customer knowledge base, new hire onboarding process, and partner certification program. He routinely trained Sourcefire's security engineers and managed security service providers (MSSP) in the United States.





Nazmul has a master of science degree in Internetworking. He also holds many certifications in the areas of cybersecurity, information technology, technical communication, and product marketing. He is a Sourcefire Certified Expert and Sourcefire Certified Security Engineer.