Summary
During the course of this chapter, you have learned about many security features and technologies that have been integrated into Cisco devices. You have learned how to configure various protocols and use an additional layer of security to ensure that each device establishes trust with every other device. Furthermore, you have discovered how to implement various Layer 2 security controls to mitigate various Layer 2 attacks on an internal network. Lastly, you have acquired the skills to implement a Cisco ASA firewall on a network and configure it to perform various roles.
I hope that this chapter has been informative for you and will prove beneficial in your journey toward learning the foundations of cybersecurity operations and gaining your Cisco Certified CyberOps Associate certification. In the next chapter, you will learn how to implement various cybersecurity operation technologies.