Torrent details for "Chaney R. Securing Enterprise Networks with Cisco Meraki 2025 [andryold1]"    Log in to bookmark

wide
Torrent details
Cover
Download
Torrent rating (0 rated)
Controls:
Category:
Language:
English English
Total Size:
115.00 MB
Info Hash:
2d712105bdda287e474203587dea8b3876df5c1a
Added By:
Added:  
10-10-2024 18:23
Views:
89
Health:
Seeds:
0
Leechers:
0
Completed:
1
wide




Description
wide
Externally indexed torrent
If you are the original uploader, contact staff to have it moved to your account
Textbook in PDF format

Discover the Power of Cisco Meraki.
Unlock the full potential of Cisco Meraki with this in-depth guide, designed to help you build and secure modern, cloud-managed networks. Cisco Meraki offers a unique, cloud-managed IT platform that integrates seamlessly with Cisco’s traditional products and other third-party tools. Whether you’re a new Meraki customer, an experienced network engineer, or an IT manager looking to streamline operations, this book provides you with the knowledge and practical steps needed to secure enterprise networks effectively.
In a world where cybercrime is an ever-present threat, Meraki’s cloud-managed solutions offer a robust alternative to traditional wired and wireless networks. This book not only introduces you to the fundamentals of Meraki but also dives deep into advanced security configurations, industry best practices, and real-world use cases. By the end of this book, you’ll be equipped to implement Meraki solutions that meet stringent IT security standards and frameworks, ensuring your network is not just operational but resilient and secure.
With this book as your guide, you will gain the skills to deploy secure, cloud-managed networks using Cisco Meraki. You will learn:
Meraki’s History: Understand the evolution of Meraki from a research project at MIT to a key player in Cisco’s portfolio.
Security Frameworks and Industry Best Practices: Learn about the essential IT security standards and frameworks and how Meraki can help you meet these requirements.
Meraki Dashboard and Trust: Get familiar with the Meraki management portal and understand the considerations for adopting cloud-managed infrastructure.
Role-Based Access Control (RBAC): Discover how to implement RBAC to enforce the principle of least privilege within your network.
Securing Administrator Access to Meraki Dashboard: Master the configuration of strong authentication methods, including multifactor authentication (MFA) and SAML single sign-on (SSO).
Security Operations: Explore the native Meraki tools and external solutions for compliance reporting, centralized logging, and incident response.
User Authentication: Delve into the setup of authentication infrastructures supporting wired, wireless, and VPN access, including Meraki Cloud Authentication, SAML, and RADIUS.
Wired and Wireless LAN Security: Learn how to secure your LAN with features like 802.1X authentication, firewalling, and adaptive policies
Introduction
Meraki’s History
Security Frameworks and Industry Best Practices
Meraki Dashboard and Trust
Role-Based Access Control (RBAC)
Securing Administrator Access to Meraki Dashboard
Security Operations
User Authentication
Wired and Wireless LAN Security
Meraki MX and WAN Security
Securing User Traffic
Securing End-User Devices
Physical Security
Appendix A Comparison of Common Security Standards and Framework Requirements

  User comments    Sort newest first

No comments have been posted yet.



Post anonymous comment
  • Comments need intelligible text (not only emojis or meaningless drivel).
  • No upload requests, visit the forum or message the uploader for this.
  • Use common sense and try to stay on topic.

  • :) :( :D :P :-) B) 8o :? 8) ;) :-* :-( :| O:-D Party Pirates Yuk Facepalm :-@ :o) Pacman Shit Alien eyes Ass Warn Help Bad Love Joystick Boom Eggplant Floppy TV Ghost Note Msg


    CAPTCHA Image 

    Anonymous comments have a moderation delay and show up after 15 minutes