Summary
During the course of this chapter, you have learned about the need to use a multi-layered approach known as Defense-in-Depth to improve the security posture of your network and organization. Furthermore, you have learned how threat actors can use various Layer 2 threats and attacks to compromise our enterprise network. Next, we covered how to implement Layer 2 security controls on your Cisco IOS switches to prevent and mitigate Layer 2 attacks and wireless security to secure your network.
I hope this chapter has been informative for you and will prove helpful in your journey toward learning how to implement and administer Cisco solutions and prepare for the CCNA 200-301 certification. In the next chapter, Network Automation and Programmability Techniques, you will learn how automation and programmability can improve efficiency in network deployment and management.