Overview
Syllabus
- Introduction to Network Security
- Common Security Threats
- Risk Assessment and Security documents
- Network Topologies
- Email-based threats
- Web-based threats
- Security and Cisco Routers: An introduction
- Password Management
- Password Management for remote connections
- Understanding Privilege Levels
- Introduction to Cisco Configuration Professional CCP
- CCP: In-depth
- Introduction to AAA
- Configuring AAA
- Configuring AAA Part 2
- Cisco Secure ACS
- Zoom-in: RADIUS and TACACS+ protocols
- AAA: Authorization and Accounting
- Role-Based Access Control RBAC using Privilege Levels
- Role-Based Access Control RBAC using Parser Views
- Integration of Active Directory with AAA
- Authentication and Authorization using Cisco ISE
- 802.1X
- BYOD
- Introduction to ACLs
- Wildcards and Network Summarization
- Implementing ACLs
- Implementing ACLs through CCP
- Using Object groups with ACLs
- Implementing Password Policies
- Network Management Protocols Part 1
- Network Management Protocols Part 2
- Restricting VTY Access and SNMP Overview
- Logging, NTP and Cisco IOS Resilient Configuration
- Common Layer 2 Attacks
- Configuring switch ports and VLANs
- General Layer 2 best security practices
- Port Security Part 1
- Port Security Part 2
- STP Security
- DHCP Snooping and DAI
- Introduction to Firewalls
- Introduction to NAT
- Introduction to Cisco IOS Zone-based Firewall ZFW
- Configuring Cisco IOS Zone-based Firewall via CLI Part 1
- Configuring Cisco IOS Zone-based Firewall via CLI Part 2
- Configuring Cisco IOS Zone-based Firewall via CCP
- Configuring Cisco IOS NAT Part 1
- Configuring Cisco IOS NAT Part 2
- Intro to Cisco ASA: modes, HA, contexts, FW services
- Configuring the Cisco ASA via CLI Part 1
- Configuring the Cisco ASA via CLI Part 2
- Configuring the Cisco ASA via ASDM
- NAT on the ASA
- Network Object NAT
- Twice NAT
- Introduction to Cryptography Part 1
- Cisco IPS Solutions
- Introduction to Cryptography Part 1
- Introduction to Cryptography Part 2
- Introduction to Virtual Private Networks VPN
- IPSec VPN Part 1
- IPSec VPN Part 2
- Configuring IOS IPSec Site-to-Site VPN
- Verifying IOS IPSec Site-to-Site VPN
- IPSec site-to-site VPN with PSK on ASA
- Verifying IPSec L2L VPN on the ASA
- SSL VPN
- Configuring Clientless SSL VPN on ASA
- Configuring AnyConnect SSL VPN on ASA
- Identify Endpoint Posture Assessment
- Hairpinning, Split Tunneling, Always-on, NAT Traversal
Taught by
Paul Browning