SNRS. Securing Networks with Cisco Routers and Switches. Length 5 days. Format Lecture/lab



Similar documents
Securing Networks with Cisco Routers and Switches 1.0 (SECURE)

Implementing Cisco IOS Network Security

IINS Implementing Cisco Network Security 3.0 (IINS)

Implementing Cisco IOS Network Security v2.0 (IINS)

TABLE OF CONTENTS NETWORK SECURITY 2...1

CISCO IOS NETWORK SECURITY (IINS)

(d-5273) CCIE Security v3.0 Written Exam Topics

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD SEGURIDAD EN REDES. NIVEL I. VERSION 2.0

CCNP Security SECURE

CCNA Security v1.0 Scope and Sequence

Securing Cisco Network Devices (SND)

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0

CCNA Security. IINS v2.0 Implementing Cisco IOS Network Security ( )

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline

Cisco Certified Security Professional (CCSP) 50 Cragwood Rd, Suite 350 South Plainfield, NJ 07080

Cisco Certified Security Professional (CCSP)

Tim Bovles WILEY. Wiley Publishing, Inc.

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0

SSECMGT: CManaging Enterprise Security with Cisco Security Manager v4.x

The IINS acronym to this exam will remain but the title will change slightly, removing IOS from the title, making the new title

VPN_2: Deploying Cisco ASA VPN Solutions

CCNP: Implementing Secure Converged Wide-area Networks

CCNA Security v1.0 Scope and Sequence

TABLE OF CONTENTS NETWORK SECURITY 1...1

Managing Enterprise Security with Cisco Security Manager

CCNA Security 2.0 Scope and Sequence

Managing Enterprise Security with Cisco Security Manager

Cisco Certified Network Expert (CCNE)

BUY ONLINE AT:

Chapter 1 The Principles of Auditing 1

CCIE Security Written Exam ( ) version 4.0

Latest IT Exam Questions & Answers

Security Threats VPNs and IPSec AAA and Security Servers PIX and IOS Router Firewalls. Intrusion Detection Systems

Implementing Cisco Secure Mobility

Implementing Cisco Secure AccessSolutions Exam

Cisco EXAM Implementing Cisco Secure Mobility Solutions (SIMOS) Buy Full Product.

How To Pass A Credit Course At Florida State College At Jacksonville

Evaluating the Cisco ASA Adaptive Security Appliance VPN Subsystem Architecture

IPv6 Fundamentals, Design, and Deployment

Cisco Security Certifications

Securing Networks with Cisco Routers and Switches ( )

Cisco CCNP Implementing Secure Converged Wide Area Networks (ISCW)

Implementing Cisco IOS Network Security

PKI Uncovered. Cisco Press. Andre Karamanian Srinivas Tenneti Francois Dessart. 800 East 96th Street. Indianapolis, IN 46240

Deploying Cisco ASA VPN Solutions

To participate in the hands-on labs in this class, you need to bring a laptop computer with the following:

IMPLEMENTING CISCO SWITCHED NETWORKS V2.0 (SWITCH)

Interconnecting Cisco Networking Devices, Part 2 Course ICND2 v2.0; 5 Days, Instructor-led

Network Access Security. Lesson 10

CCNA Security 1.1 Instructional Resource

Case Study for Layer 3 Authentication and Encryption

Implementing Core Cisco ASA Security (SASAC)

"Charting the Course...

PCI Compliance for Branch Offices: Using Router-Based Security to Protect Cardholder Data

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Cisco Virtual Office Overview. Contents. Scope of Document. Introduction

INTERCONNECTING CISCO NETWORKING DEVICES PART 2 V2.0 (ICND 2)

Interconnecting Cisco Networking Devices: Accelerated (CCNAX) 2.0(80 Hs) 1-Interconnecting Cisco Networking Devices Part 1 (40 Hs)

CCNA Cisco Associate- Level Certifications

Cisco Router and Security Device Manager (SDM)

Interconnecting Cisco Networking Devices, Part 2 **Part of CCNA Route/Switch**

NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus

Deploying Cisco Basic Wireless LANs WDBWL v1.1; 3 days, Instructor-led

Cisco Cisco 3845 X X X X X X X X X X X X X X X X X X

Cisco Secure ACS. By Igor Koudashev, Systems Engineer, Cisco Systems Australia 2006 Cisco Systems, Inc. All rights reserved.

How To Learn Cisco Cisco Ios And Cisco Vlan

Securing Networks with PIX and ASA

ethernet services for multi-site connectivity security, performance, ip transparency

Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) :

Integrated Services Router with the "AIM-VPN/SSL" Module

Network Virtualization Network Admission Control Deployment Guide

For Sales Kathy Hall

Foreword Introduction Product Overview Introduction to Network Security Firewall Technologies Network Firewalls Packet-Filtering Techniques

Cisco Actualtests Exam Questions & Answers

: Interconnecting Cisco Networking Devices Part 2 v2.0 (ICND2)

Developing Network Security Strategies

IPv6 Security. Scott Hogg, CCIE No Eric Vyncke. Cisco Press. Cisco Press 800 East 96th Street Indianapolis, IN USA

Integrated Services Router with the "AIM-VPN/SSL" Module

Lab 4.4.8a Configure a Cisco GRE over IPSec Tunnel using SDM

NETWORK SECURITY (W/LAB) Course Syllabus

PCISS-1. Job Description: Key Responsibilities: I. Perform troubleshooting& support:

Recommended IP Telephony Architecture

Cisco Certified Network Associate - Design

Implementing and Administering Security in a Microsoft Windows Server 2003 Network

Table of Contents. Introduction

FIREWALLS & CBAC. philip.heimer@hh.se

The following chart provides the breakdown of exam as to the weight of each section of the exam.

1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network

MOC 6435A Designing a Windows Server 2008 Network Infrastructure

Scenario: Remote-Access VPN Configuration

Designing Cisco Network Service Architectures ARCH v2.1; 5 Days, Instructor-led

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

IINS Implementing Cisco IOS Network Security Exam.

Cisco Easy VPN on Cisco IOS Software-Based Routers

Cisco ASA. Administrators

Security. AAA Identity Management. Premdeep Banga, CCIE # Cisco Press. Vivek Santuka, CCIE # Brandon J. Carroll, CCIE #23837

Associate in Science Degree in Computer Network Systems Engineering

Transcription:

Length 5 days Format Lecture/lab Version 3.0 SNRS Course Description SNRS 1.0 is a 5-day, lab-intensive course that provides the knowledge and skills needed to secure Cisco IOS router and switch networks. You will learn how to secure the network using Cisco IOS and CatOS security features, configure the Cisco IOS, implement secure tunnels, and complete a security audit. Who Should Attend This course is designed for network professionals tasked with designing and deploying Cisco security features in a Cisco IOS-based internetwork. It is also recommended for anyone pursuing Cisco Certified Security Professional (CCSP), Cisco Security Specialist certifications, or the Information Systems Security (INFOSEC) Professional certification. Recommended Prerequisites CCNA certification or equivalent knowledge Basic knowledge of the Windows operating system Familiarity with networking and security terms and concepts and security system components Related Courses Introduction to Cisco Networking Technologies (INTRO) Interconnecting Cisco Network Devices (ICND) Securing Cisco Network Devices (SND) Learning Objectives After completing this course, you will be able to: Configure, operate, and troubleshoot Cisco Secure ACS for Windows Server Install, maintain and troubleshoot Cisco IOS including Authentication Proxy, Context Based Access Control (CBAC) and Intrusion Prevention System (IPS) Implement IPSec VPNs using IOS Routers in site to site and remote access configurations, including using digital certificates Use the Cisco Security Device Manager (SDM) to complete a wide range of configuration tasks on an IOS router

Module 1: Layer 2 Security Lesson 1: Examining Company ABC Unsecured Company ABC Unsecured Attacks and Vulnerabilities Attacks on Company ABC Lesson 2: Examining Layer 2 Attacks Types of Layer 2 Attacks CAM Table Overflow Attack Port Security Verifying Port Security VLAN Hopping Attacks STP Vulnerabilities MAC Spoofing: Man-in-the-Middle Attacks PVLAN Vulnerabilities Lesson 3: Configuring DHCP Snooping DHCP Starvation and Spoofing Attacks Understanding DHCP Snooping Mitigating DHCP Attacks DHCP Snooping Configuration Guidelines Enabling and Configuring DHCP Snooping Verifying DHCP Snooping Module 2: Trust and Identity Lesson 1: Implementing Identity Management Cisco Secure ACS for Windows Overview Authentication, Authorization, and Accounting Authentication Authorization Accounting TACACS+ RADIUS Configuring AAA to Work with External AAA Servers Cisco Secure ACS as a AAA Server Cisco Secure ACS for Microsoft Windows Architecture Administering Cisco Secure ACS Installing Cisco Secure ACS Creating an Installation Adding an Administrator Working in Cisco Secure ACS Network Access Profiles Configuring Cisco Secure ACS NAPs Creating a NAP Configuring Profile-Based Policies Troubleshooting Cisco Secure ACS Lesson 2: Implementing Cisco IBNS Cisco IBNS Overview Port-Based Access Control IEEE 802.1x Selecting the Correct EAP 802.1x and Port Security 802.1x and VLAN Assignment 802.1x and Guest VLANs 802.1x and Restricted VLANs Configuring 802.1x Module 3: Cisco Network Foundation Protection Lesson 1: Introducing Cisco NFP Cisco NFP Overview Cisco IOS Tools for a Secure Infrastructure Lesson 2: Securing the Control Plane Router Control Plane Tools for Securing the Control Plane Overview of CPPr CPPr Architecture Configuring CPPr Configuring a Port-Filter Policy Configuring a Queue-Threshold Policy Verifying CPPr Lesson 3: Securing the Management Plane The Management Plane Tools for Securing the Management Plane Cisco MPP Feature Securing the Management Plane Verifying MPP Lesson 4: Securing the Data Plane Data Plane Attacks Data Plane Protection Flexible Packet Matching Configuring FPM Verifying FPM Troubleshooting FPM

Module 4: Secured Connectivity Lesson 1: Introducing IPsec IPsec Overview Authentication Header Encapsulating Security Payload Internet Key Exchange Internet Security Association and Key Management Protocol Other Protocols and Terminology IPsec Configuration Task List Lesson 2: Examining Cisco IOS VPNs IPsec VPN Deployment Options Fully Meshed IPsec VPNs Hub-and-Spoke IPsec VPNs Characteristics Benefits Restrictions Dynamic Multipoint VPNs Cisco Easy VPN WebVPN Lesson 3: Implementing IPsec VPNs Using Pre-Shared Keys Configuring IPsec Preparing for IPsec Planning the IKE Policy Planning the IPsec Policy Configuring ISAKMP Configure Pre-Shared Keys Configuring IPsec Policies Applying Crypto Maps to Interfaces Testing and Verifying IPsec Troubleshooting Lesson 4: Implementing IPsec VPNs Using PKI Examining Cisco IOS PKI Digital Signatures Examining SCEP Configuring IPsec VPN Using Digital Certificates Testing and Verifying IPsec Lesson 5: Configuring GRE Tunnels Examining GRE Tunnels Deploying GRE Configuring a GRE Tunnel Verifying GRE Tunnels Configuring GRE Tunnels and Encryption Lesson 6: Configuring a DMVPN Dynamic Multipoint VPN DMVPN Configuration Tasks Configuring ISAKMP and IPsec IPsec Profiles Routing Protocols Configuring the Hub in a Spoke-to-Spoke DMVPN Configuring a Spoke for the Spoke-to-Spoke DMVPN Verifying DMVPN Lesson 2: Generating Reports Types of Reports How to Generate an Events by Severity Report How to Generate an Events by Group Report How to Generate a Group Detail Report How to Generate a Host Detail Report How to Generate a Policy Detail Report How to View the Audit Trail Lesson 7: Configuring Cisco IOS SSL VPN (WebVPN) Overview of Cisco IOS SSL VPN (WebVPN) Clientless Access Thin-Client Access Tunnel Mode Access WebVPN Configuration Tasks AAA Configuration for WebVPN DNS Configuration for WebVPN Certificates and Trustpoints for WebVPN WebVPN Configuration Verifying WebVPN Functionality Troubleshooting WebVPN Lesson 8: Configuring Easy VPN Remote Access Introduction to Cisco Easy VPN Configuring Cisco Easy VPN Server Configuring Cisco VPN Client v4.x Create New Client Connection Entries

Module 5: Adaptive Threat Defense Lesson 1: Configuring Cisco IOS s Cisco IOS as a Cisco IOS Feature Set Cisco IOS Classic Cisco IOS Authentication Proxy Cisco IOS IPS Lesson 2: Configuring Cisco IOS Classic Cisco IOS Classic Cisco IOS Classic Process Cisco IOS Classic Configuration Tasks Configuring IP ACLs for Cisco IOS Classic Defining Inspection Rules Example Configurations Granular Protocol Inspection Applying the Inspection Rule to an Interface Audit Trails and Logging Verifying Cisco IOS Classic Removing Cisco IOS Classic Lesson 5: Configuring Cisco IOS IPS Cisco IOS IPS Signature Micro-Engines Signatures and SDFs Deploying IOS IPS Cisco IOS IPS Configuration Configure Logging via Syslog or SDEE Upgrading to the Latest SDF Verifying IPS Configuration Lesson 6: Examining Company ABC Secured Company ABC Secured Lesson 3: Configuring Cisco IOS Zoned- Based Policy Legacy Stateful Inspection Cisco IOS Zone-Based Policy Overview Zones Security Zone Policies Configuring a Cisco IOS Zoned-Based Policy Verifying Cisco IOS Zone-Based Policy Lesson 4: Configuring Cisco IOS Authentication Proxy Cisco IOS Authentication Proxy AAA Server Configuration Cisco IOS Authentication Proxy Configuration

Course Labs Lab 1-1: Configure Layer 2 Security Lab 1-2: Configure DHCP Snooping Lab 2-1: Configure Cisco Secure ACS as a AAA Server Lab 2-2: Configure 802.1x Port-Based Authentication Lab 3-1: Configure Cisco NFP Lab 4-1: Configure a Site-to-Site VPN Using Pre-Shared Keys Lab 4-2: Configure a Site-to-Site VPN Using PKI Lab 4-6: Configure Cisco Easy VPN Remote Access Lab 5-1: Configure Cisco IOS Classic Lab 5-2: Configure Cisco IOS Application Policy Lab 5-3: Configure a Cisco IOS Zone-Based Policy Lab 5-4: Configure Cisco IOS Authentication Proxy on a Cisco Router Lab 5-5: Configure a Cisco Router with Cisco IOS IPS Lab 4-3: Configure a GRE Tunnel to a Remote Site Lab 4-4: Configure a DMVPN Lab 4-5: Configure a Cisco IOS SSL VPN (WebVPN)