======1.0 Security Concepts====== =====1.1 Common Security Principles===== [[cisco:certification_topics:ccna_security:1.0#section_11_csp_notes|Section 1 Notes]]\\ [[cisco:certification_topics:ccna_security:1.0#a_describe_confidentiality_integrity_availability_cia|1.1a Describe confidentiality, integrity, availability (CIA)]]\\ [[cisco:certification_topics:ccna_security:1.0#b_describe_siem_technology|1.1b Describe SIEM technology]]\\ [[cisco:certification_topics:ccna_security:1.0#c_identify_common_security_terms|1.1c Identify common security terms]]\\ [[cisco:certification_topics:ccna_security:1.0#d_identify_common_network_security_zones|1.1d Identify common network security zones]] =====1.2 Common Security Threats===== [[cisco:certification_topics:ccna_security:1.0#a_identify_common_network_attacks|1.2a Identify common network attacks]]\\ [[cisco:certification_topics:ccna_security:1.0#b_describe_social_engineering|1.2b Describe social engineering]]\\ [[cisco:certification_topics:ccna_security:1.0#c_identify_malware|1.2c Identify malware]]\\ [[cisco:certification_topics:ccna_security:1.0#d_classify_the_vectors_of_data_loss_exfiltration|1.2d Classify the vectors of data loss/exfiltration]] =====1.3 Cryptography concepts===== [[cisco:certification_topics:ccna_security:1.0#a_describe_key_exchange|1.3a Describe key exchange]]\\ [[cisco:certification_topics:ccna_security:1.0#b_describe_hash_algorithm|1.3b Describe hash algorithm]]\\ [[cisco:certification_topics:ccna_security:1.0#c_compare_and_contrast_symmetric_and_asymmetric_encryption|1.3c Compare and contrast symmetric and asymmetric encryption]]\\ [[cisco:certification_topics:ccna_security:1.0#d_describe_digital_signatures_certificates_and_pki|1.3d Describe digital signatures, certificates, and PKI]]