Скачать книгу

rel="nofollow" href="#u4e0f7ab7-fb94-5f54-8e09-9f33372e67f2">10 3.9.6 Utilities and Heating, Ventilation, and Air Conditioning (HVAC) 10 3.9.7 Environmental issues 10 3.9.8 Fire prevention, detection, and suppression 10 3.9.9 Power (e.g., redundant, backup) 10 Domain 4 Communication and Network Security 4.1 Assess and implement secure design principles in network architectures 11, 12 4.1.1 Open System Interconnection (OSI) and Transmission Control Protocol/Internet Protocol (TCP/IP) models 11 4.1.2 Internet Protocol (IP) networking (e.g., Internet Protocol Security (IPSec), Internet Protocol (IP) v4/6) 11, 12 4.1.3 Secure protocols 11 4.1.4 Implications of multilayer protocols 11 4.1.5 Converged protocols (e.g., Fiber Channel Over Ethernet (FCoE), Internet Small Computer Systems Interface (iSCSI), Voice over Internet Protocol (VoIP)) 11 4.1.6 Micro-segmentation (e.g., Software Defined Networks (SDN), Virtual eXtensible Local Area Network (VXLAN), Encapsulation, Software-Defined Wide Area Network (SD-WAN)) 11 4.1.7 Wireless networks (e.g., LiFi, Wi-Fi, Zigbee, satellite) 11 4.1.8 Cellular networks (e.g., 4G, 5G) 11 4.1.9 Content Distribution Networks (CDN) 11 4.2 Secure network components 11 4.2.1 Operation of hardware (e.g., redundant power, warranty, support) 11 4.2.2 Transmission media 11 4.2.3 Network Access Control (NAC) devices 11 4.2.4 Endpoint security 11 4.3 Implement secure communication channels according to design 12 4.3.1 Voice 12 4.3.2 Multimedia collaboration 12 4.3.3 Remote access 12 4.3.4 Data communications 12 4.3.5 Virtualized networks 12 4.3.6 Third-party connectivity 12 Domain 5 Identity and Access Management (IAM) 5.1 Control physical and logical access to assets 13 5.1.1 Information 13 5.1.2

Скачать книгу