CCNA Security. IINS v2.0 Implementing Cisco IOS Network Security (640-554)



Similar documents
The IINS acronym to this exam will remain but the title will change slightly, removing IOS from the title, making the new title

CISCO IOS NETWORK SECURITY (IINS)

Cisco Certified Security Professional (CCSP)

Implementing Cisco IOS Network Security v2.0 (IINS)

IINS Implementing Cisco Network Security 3.0 (IINS)

Implementing Cisco IOS Network Security

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0

Cisco Certified Network Expert (CCNE)

Securing Cisco Network Devices (SND)

Tim Bovles WILEY. Wiley Publishing, Inc.

CCNA Security v1.0 Scope and Sequence

CCNP: Implementing Secure Converged Wide-area Networks

SNRS. Securing Networks with Cisco Routers and Switches. Length 5 days. Format Lecture/lab

(d-5273) CCIE Security v3.0 Written Exam Topics

CCNA Security v1.0 Scope and Sequence

Implementing Cisco IOS Network Security

Latest IT Exam Questions & Answers

Securing Networks with Cisco Routers and Switches 1.0 (SECURE)

Implementing Core Cisco ASA Security (SASAC)

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD SEGURIDAD EN REDES. NIVEL I. VERSION 2.0

Cisco CCNP Implementing Secure Converged Wide Area Networks (ISCW)

CCNA Security 2.0 Scope and Sequence

: Interconnecting Cisco Networking Devices Part 2 v1.1

Interconnecting Cisco Networking Devices Part 2

TABLE OF CONTENTS NETWORK SECURITY 2...1

Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)

CCNA Security 1.1 Instructional Resource

CCT vs. CCENT Skill Set Comparison

"Charting the Course...

Chapter 1 The Principles of Auditing 1

Securing Networks with Cisco Routers and Switches ( )

CCIE Security Written Exam ( ) version 4.0

How To Learn Cisco Cisco Ios And Cisco Vlan

Cisco Discovery 3: Introducing Routing and Switching in the Enterprise hours teaching time

Securing Networks with PIX and ASA

Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0

TABLE OF CONTENTS NETWORK SECURITY 1...1

VPN_2: Deploying Cisco ASA VPN Solutions

IMPLEMENTING CISCO SWITCHED NETWORKS V2.0 (SWITCH)

Security Threats VPNs and IPSec AAA and Security Servers PIX and IOS Router Firewalls. Intrusion Detection Systems

Cisco Networking Professional-6Months Project Based Training

Configuring IPsec VPN with a FortiGate and a Cisco ASA

Cisco ASA, PIX, and FWSM Firewall Handbook

Configuring the Transparent or Routed Firewall

Interconnecting Cisco Network Devices 1 Course, Class Outline

CCNA Security Portable Command Guide

CCNP v2 Eğitimi İçeriği

Cisco CCNA Security Exam

Cisco ASA. Administrators

Interconnecting Cisco Networking Devices: Accelerated (CCNAX) 2.0(80 Hs) 1-Interconnecting Cisco Networking Devices Part 1 (40 Hs)

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Recommended IP Telephony Architecture

ASM Educational Center (ASM) Est. 1992

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

COURSE AGENDA. Lessons - CCNA. CCNA & CCNP - Online Course Agenda. Lesson 1: Internetworking. Lesson 2: Fundamentals of Networking

Scenario: Remote-Access VPN Configuration

Evaluating the Cisco ASA Adaptive Security Appliance VPN Subsystem Architecture

Cisco ASA 5500 Series Adaptive Security Appliance 8.2 Software Release

: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)

Implementing Cisco Secure AccessSolutions Exam

CCNA Cisco Associate- Level Certifications

Course Contents CCNP (CISco certified network professional)

Cisco Certified Network Associate (CCNA) 120 Hours / 12 Months / Self-Paced WIA Fee: $

Introduction about cisco company and its products (network devices) Tell about cisco offered courses and its salary benefits (ccna ccnp ccie )

Cisco Certified Network Professional (CCNP Routing & Switching)

INTERCONNECTING CISCO NETWORK DEVICES PART 1 V2.0 (ICND 1)

C H A P T E R Management Cisco SAFE Reference Guide OL

Cisco Security Manager 4.2: Integrated Security Management for Cisco Firewall, IPS, and VPN Solutions

How To Pass A Credit Course At Florida State College At Jacksonville

Security. Official Cert Guide Learn, prepare, and practice for exam success OMAR SANTOS, CISSP NO JOHN STUPPI, CCIE NO.

Cisco Certified Security Professional (CCSP) 50 Cragwood Rd, Suite 350 South Plainfield, NJ 07080

Configuring an IPsec VPN to provide ios devices with secure, remote access to the network

NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus

CCNP Security SECURE

Network Simulator Lab Study Plan

Scenario: IPsec Remote-Access VPN Configuration

IMPLEMENTING CISCO IP ROUTING V2.0 (ROUTE)

Ficha técnica de curso Código: IFCAD111

Secure Network Foundation 1.1 Design Guide for Single Site Deployments

Welcome to Todd Lammle s CCNA Bootcamp

SonicWALL PCI 1.1 Implementation Guide

CCNA Security 1.1 Instructional Resource

NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9

Managing Enterprise Security with Cisco Security Manager

Description: Objective: Upon completing this course, the learner will be able to meet these overall objectives:

Outline VLAN. Inter-VLAN communication. Layer-3 Switches. Spanning Tree Protocol Recap

SSECMGT: CManaging Enterprise Security with Cisco Security Manager v4.x

Number: Passing Score: 800 Time Limit: 120 min File Version: 1.0. Cisco IINS v2.

To participate in the hands-on labs in this class, you need to bring a laptop computer with the following:

Interconnecting Cisco Networking Devices, Part 2 Course ICND2 v2.0; 5 Days, Instructor-led

ISOM3380 Advanced Network Management. Spring Course Description

Cconducted at the Cisco facility and Miercom lab. Specific areas examined

Cisco AnyConnect Secure Mobility Solution Guide

NETWORK SECURITY (W/LAB) Course Syllabus

Network Access Security. Lesson 10

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

SonicOS 5.9 / / 6.2 Log Events Reference Guide with Enhanced Logging

Transcription:

CCNA Security Öngereksinimler: CCNA http://www.cliguru.com/ccna Kurs Tanımı: CCNA Security network'ün temellerini anlamış olan katılımcılara network güvenliği hakkında temel bilgi sağlamaya yönelik hazırlanmış bir eğitimdir. IINS v2.0 Implementing Cisco IOS Network Security (640-554) Common Security Threats Security and Cisco Routers AAA on Cisco Devices IOS ACLs Secure Network Management and Reporting Common Layer 2 Attacks Cisco Firewall Technologies Cisco IPS VPN Technologies 1

CCNA Security IINS Implementing Cisco IOS Network Security (640-554) 1. Common Security Threats 1.1. Describe common security threats 1.1.1. Common threats to the physical installation 1.1.2. Mitigation methods for common network attacks 1.1.3. Email-based threats 1.1.4. Web-based attacks 1.1.5. Mitigation methods for Worm, Virus, and Trojan Horse attacks 1.1.6. Phases of a secure network lifecycle 1.1.7. Security needs of a typical enterprise with a comprehensive security policy 1.1.8. Mobile/remote security 1.1.9. DLP 2. Security and Cisco Routers 2.1. Implement security on Cisco routers 2.1.1. CCP Security Audit feature 2.1.2. CCP One-Step Lockdown feature 2.1.3. Secure router access using strong encrypted passwords, and using IOS login enhancements, IPV6 security. 2.1.4. Multiple privilege levels 2.1.5. Role-based CLI 2.1.6. Cisco IOS image and configuration files 2.2. Describe securing the control, data and management plane 2.3. Describe CSM 2.4. Describe IPv4 to IPv6 transition 2.4.1. Reasons for IPv6 2.4.2. Understanding IPv6 addressing 2.4.3. Assigning IPv6 addresses 2.4.4. Routing considerations for IPv6 2

3. AAA on Cisco Devices 3.1. Implement authentication, authorization and accounting (AAA) 3.1.1. AAA using CCP on routers 3.1.2. AAA using CLI on routers and switches 3.1.3. AAA on ASA 3.2. Describe TACACS+ 3.3. Describe RADIUS 3.4. Describe AAA 3.4.1. Authentication 3.4.2. Authorization 3.4.3. Accounting 3.5. Verify AAA functionality 4. IOS ACLs 4.1. Describe standard, extended, and named IP IOS ACLs to filter packets 4.1.1. IPv4 4.1.2. IPv6 4.1.3. Object groups 4.1.4. ACL operations 4.1.5. Types of ACLs (dynamic, reflexive, time-based ACLs) 4.1.6. ACL wild card masking 4.1.7. Standard ACLs 4.1.8. Extended ACLs 4.1.9. Named ACLs 4.1.10. VLSM 4.2. Describe considerations when building ACLs 4.2.1. Sequencing of ACEs 4.2.2. Modification of ACEs 4.3. Implement IP ACLs to mitigate threats in a network 4.3.1. Filter IP traffic 4.3.2. SNMP 4.3.3. DDoS attacks 4.3.4. CLI 4.3.5. CCP 4.3.6. IP ACLs to prevent IP spoofing 4.3.7. VACLs 3

5. Secure Network Management and Reporting 5.1. Describe secure network management 5.1.1. In-band 5.1.2. Out of band 5.1.3. Management protocols 5.1.4. Management enclave 5.1.5. Management plane 5.2. Implement secure network management 5.2.1. SSH 5.2.2. syslog 5.2.3. SNMP 5.2.4. NTP 5.2.5. SCP 5.2.6. CLI 5.2.7. CCP 5.2.8. SSL 6. Common Layer 2 Attacks 6.1. Describe Layer 2 security using Cisco switches 6.1.1. STP attacks 6.1.2. ARP spoofing 6.1.3. MAC spoofing 6.1.4. CAM overflows 6.1.5. CDP/LLDP 6.2. Describe VLAN Security 6.2.1. Voice VLAN 6.2.2. PVLAN 6.2.3. VLAN hopping 6.2.4. Native VLAN 6.3. Implement VLANs and trunking 6.3.1. VLAN definition 6.3.2. Grouping functions into VLANs 6.3.3. Considering traffic source to destination paths 6.3.4. Trunking 6.3.5. Native VLAN 6.3.6. VLAN trunking protocols 6.3.7. Inter-VLAN routing 6.4. Implement Spanning Tree 6.4.1. Potential issues with redundant switch topologies 6.4.2. STP operations 6.4.3. Resolving issues with STP 4

7. Cisco Firewall Technologies 7.1. Describe operational strengths and weaknesses of the different firewall technologies 7.1.1. Proxy firewalls 7.1.2. Packet and stateful packet 7.1.3. Application firewall 7.1.4. Personal firewal 7.2. Describe stateful firewalls 7.2.1. Operations 7.2.2. Function of the state table 7.3. Describe the types of NAT used in firewall technologies 7.3.1. Static 7.3.2. Dynamic 7.3.3. PAT 7.4. Implement Zone Based Firewall using CCP 7.4.1. Zone to zone 7.4.2. Self zone 7.5. Implement the Cisco Adaptive Security Appliance (ASA) 7.5.1. NAT 7.5.2. ACL 7.5.3. Default MPF 7.5.4. Cisco ASA sec level 7.6. Implement NAT and PAT 7.6.1. Functions of NAT, PAT, and NAT Overload 7.6.2. Translating inside source addresses 7.6.3. Overloading Inside global addresses 5

8. Cisco IPS 8.1. Describe IPS deployment considerations 8.1.1. SPAN 8.1.2. IPS product portfolio 8.1.3. Placement 8.1.4. Caveats 8.2. Describe IPS technologies 8.2.1. Attack responses 8.2.2. Monitoring options 8.2.3. syslog 8.2.4. SDEE 8.2.5. Signature engines 8.2.6. Signatures 8.2.7. Global correlation and SIO 8.2.8. Network-based 8.2.9. Host-based 8.3. Configure Cisco I Logging OS IPS using CCP 8.3.1. Logging 8.3.2. Signatures 6

9. VPN Technologies 9.1. Describe the different methods used in cryptography 9.1.1. Symmetric 9.1.2. Asymetric 9.1.3. HMAC 9.1.4. Message digest 9.1.5. PKI 9.2. Describe VPN technologies 9.2.1. IPsec 9.2.2. SSL 9.3. Describe the building blocks of IPSec 9.3.1. IKE 9.3.2. ESP 9.3.3. AH 9.3.4. Tunnel mode 9.3.5. Transport mode 9.4. Implement an IOS IPSec site-to-site VPN with pre-shared key authentication 9.4.1. CCP 9.4.2. CLI 9.5. Verify VPN operations 9.6. Implement SSL VPN using ASA device manager 9.6.1. Clientless 9.6.2. AnyConnect 7