Summary
In this chapter, you have learned about the importance of information security and the need to protect all assets within an organization. We have covered the various types of threats, vulnerabilities, and attacks. Furthermore, we've discussed the importance of implementing AAA within an organization to help manage user access on a corporate network.
I hope this chapter has been informative for you and is helpful in your journey toward learning how to implement and administrate Cisco solutions and prepare for the CCNA 200-301 certification. In the next chapter, Configuring Device Access Controls and VPNs, you will learn how to secure your network devices and learn about Virtual Private Networks (VPNs).