■ Policies—Security Policy Best Practices
■ Standards Bodies—IETF
■ Vulnerability Discussions
■ Attacks and Common Exploits—recon, priv escalation, penetration, cleanup, backdoor
You can find in this book's introduction a list of all of the exam topics. For the latest updates on exam topics, visit Cisco.com.
Was this article helpful?