Ficha técnica de curso Código: IFCAD111

Similar documents
ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0

CISCO IOS NETWORK SECURITY (IINS)

Cisco Certified Security Professional (CCSP)

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD SEGURIDAD EN REDES. NIVEL I. VERSION 2.0

Securing Cisco Network Devices (SND)

Chapter 4: Security of the architecture, and lower layer security (network security) 1

Securing Networks with PIX and ASA

Security Threats VPNs and IPSec AAA and Security Servers PIX and IOS Router Firewalls. Intrusion Detection Systems

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0

Case Study for Layer 3 Authentication and Encryption

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus

A Model Design of Network Security for Private and Public Data Transmission

Implementing Cisco IOS Network Security

CCNA Security. IINS v2.0 Implementing Cisco IOS Network Security ( )

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline

VPN. Date: 4/15/2004 By: Heena Patel

Network Access Security. Lesson 10

Network Security and Firewall 1

INTRODUCTION TO FIREWALL SECURITY

TABLE OF CONTENTS NETWORK SECURITY 2...1

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

Cisco CCNP Implementing Secure Converged Wide Area Networks (ISCW)

Virtual Private Networks

SonicWALL PCI 1.1 Implementation Guide

Security Technology: Firewalls and VPNs

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Firewalls. Chapter 3

Scenario: IPsec Remote-Access VPN Configuration

Cisco Certified Security Professional (CCSP) 50 Cragwood Rd, Suite 350 South Plainfield, NJ 07080

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

CCNP: Implementing Secure Converged Wide-area Networks

NETWORK SECURITY (W/LAB) Course Syllabus

Implementing Cisco IOS Network Security v2.0 (IINS)

Firewalls, IDS and IPS

Tim Bovles WILEY. Wiley Publishing, Inc.

Linux Network Security

FIREWALLS & CBAC. philip.heimer@hh.se

Network Security Topologies. Chapter 11

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

SSL VPN Technology White Paper

Computer Networks. Secure Systems

Cisco Which VPN Solution is Right for You?

How To Pass A Credit Course At Florida State College At Jacksonville

: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

Description: Objective: Attending students will learn:

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led

How To Understand And Understand The Security Of A Key Infrastructure

Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) :

(d-5273) CCIE Security v3.0 Written Exam Topics

This chapter describes how to set up and manage VPN service in Mac OS X Server.

Cisco ASA. Administrators

Protocol Security Where?

INTRUSION DETECTION SYSTEMS and Network Security

Technical White Paper

Internet Security Firewalls

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

Implementing Core Cisco ASA Security (SASAC)

Firewall and Router Policy

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)

Network Security Fundamentals

Classic IOS Firewall using CBACs Cisco and/or its affiliates. All rights reserved. 1

Executive Summary and Purpose

Table of Contents. Introduction

Firewalls. Ingress Filtering. Ingress Filtering. Network Security. Firewalls. Access lists Ingress filtering. Egress filtering NAT

"Charting the Course...

Information Technology Career Cluster Introduction to Cybersecurity Course Number:

Citrix NetScaler 10.5 Essentials for ACE Migration CNS208; 5 Days, Instructor-led

Internet Security Firewalls

The IINS acronym to this exam will remain but the title will change slightly, removing IOS from the title, making the new title

IINS Implementing Cisco Network Security 3.0 (IINS)

PIX/ASA: Allow Remote Desktop Protocol Connection through the Security Appliance Configuration Example

Comparing Dedicated and Integrated Firewall Performance

Advanced Higher Computing. Computer Networks. Homework Sheets

Deploying the Barracuda Link Balancer with Cisco ASA VPN Tunnels

Introduction of Intrusion Detection Systems

NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9

Cisco SR 520-T1 Secure Router

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

PIX/ASA 7.x and above: Mail (SMTP) Server Access on the DMZ Configuration Example

Scenario: Remote-Access VPN Configuration

How To Learn Cisco Cisco Ios And Cisco Vlan

Chapter 15. Firewalls, IDS and IPS

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network

Managing Enterprise Security with Cisco Security Manager

Electronic Service Agent TM. Network and Transmission Security And Information Privacy

I. What is VPN? II. Types of VPN connection. There are two types of VPN connection:

Firewalls. Outlines: By: Arash Habibi Lashkari July Network Security 06

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

Joseph Migga Kizza. A Guide to Computer Network Security. 4) Springer

IP Security. IPSec, PPTP, OpenVPN. Pawel Cieplinski, AkademiaWIFI.pl. MUM Wroclaw

Foreword Introduction Product Overview Introduction to Network Security Firewall Technologies Network Firewalls Packet-Filtering Techniques

Firewalls, Tunnels, and Network Intrusion Detection

SonicOS 5.9 / / 6.2 Log Events Reference Guide with Enhanced Logging

Transcription:

Curso de: Objetivos: Managing Cisco Network Security: Building Rock-Solid Networks Dar a conocer la filosofía CISCO desde el punto de vista de la seguridad y como construir una red solidad. Como hacer filtrado del trafico tanto de entrada como de salida, y todo lo referente a cortafuegos y redes privadas virtuales. Destinado a: Todos los que tienen conocimiento sobre Redes y los que desea conocer bien como tener una red segura para evitar problemas de seguridad. Modalidad: presencial Plazas: 15 Documentación: En formato pdf. Requisitos: Tutorías: Acreditación: A aportar: 2 horas semanales Certificación acreditativa Revisión 1. 2014 Página 1 de 8

Contenido del Curso: Chapter 1 to IP Network Security Protecting Your Site Typical Site Scenario Host Security Network Security Availability Integrity Confidentiality Access Control Authentication Authorization Accounting Network Communication in TCP/IP Application Layer Transport Layer TCP TCP Connection UDP internet Layer IP ICMP ARP Network Layer Security in TCP/IP Cryptography Symmetric Cryptography Asymmetric Cryptography Hash Function Public Key Certificates Contents Application Layer Security Pretty Good Privacy (PGP) Secure HyperText Transport Protocol (S-HTTP) Transport Layer Security Secure Sockets Layer (SSL) and Transport Layer Security (TLS) Secure Shell (SSH) Filtering Network Layer Security IP Security Protocols (IPSec) Filtering (Access Control Lists) Data Link Layer Security Authentication Terminal Access Controller Access Control System Plus (TACACS+) Remote Access Dial-In User Service (RADIUS) Kerberos Cisco IP Security Hardware and Software Cisco Secure PIX Firewall Cisco Secure Integrated Software Cisco Secure Integrated VPN Software Cisco Secure VPN Client Cisco Secure Access Control Server Cisco Secure Scanner Cisco Secure Intrusion Detection System Cisco Secure Policy Manager Cisco Secure Consulting Services Revisión 1. 2014 Página 2 de 8

Chapter 2 Traffic Filtering on the Cisco IOS Access Lists Access List Operation Types of Access Lists Standard IP Access Lists Source Address and Wildcard Mask Keywords any and host Keyword log Applying an Access List Extended IP Access Lists Keywords permit or deny Protocol Source Address and Wildcard-Mask Contents Destination Address and Wildcard Mask Source and Destination Port Number Established Named Access Lists Editing Access Lists Problems with Access Lists Lock-and-Key Access Lists Reflexive Access Lists Building Reflexive Access Lists Applying Reflexive Access Lists Reflexive Access List Example Context-based Access Control The Control-based Access Control Process Configuring Control-based Access Control Inspection Rules Applying the Inspection Rule Configuring Port to Application Mapping Configuring PAM Protecting a Private Network Protecting a Network Connected to the Internet Protecting Server Access Using Lock-and-Key Protecting Public Servers Connected to the Internet Chapter 3 Network Address Translation (NAT) NAT Overview Overview of NAT Devices Address Realm NAT Transparent Address Assignment Transparent Routing Public, Global, and External Networks Private and Local Networks Application Level Gateway NAT Architectures Traditional or Outbound NAT Network Address Port Translation (NAPT) Static NAT Twice NAT Guidelines for Deploying NAT and NAPT Configuring NAT on Cisco IOS Configuration Commands Verification Commands Configuring NAT between a Private Network and Internet Configuring NAT in a Network with DMZ Considerations on NAT and NAPT IP Address Information in Data Bundled Session Applications Revisión 1. 2014 Página 3 de 8

Peer-to-Peer Applications IP Fragmentation with NAPT En Route Applications Requiring Retention of Address Mapping IPSec and IKE Chapter 4 Cisco PIX Firewall Overview of the Security Features Differences Between IOS 4.x and 5.x Initial Configuration Installing the PIX Software Basic Configuration Installing the IOS over TFTP Command Line Interface IP Configuration IP Address Configuring NAT and NAPT Security Policy Configuration Security Strategies Deny Everything That Is Not Explicitly Permitted Allow Everything That Is Not Explicitly Denied Identify the Resources to Protect Demilitarized Zone (DMZ) Identify the Security Services to Implement Authentication and Authorization Access Control Confidentiality URL, ActiveX, and Java Filtering Implementing the Network Security Policy Authentication Configuration in PIX Access Control Configuration in PIX Securing Resources URL, ActiveX, and Java Filtering PIX Configuration Examples Protecting a Private Network Protecting a Network Connected to the Internet Protecting Server Access Using Authentication Protecting Public Servers Connected to the Internet Securing and Maintaining the PIX System Journaling Securing the PIX Chapter 5 Virtual Private Networks What Is a VPN? Overview of the Different VPN Technologies The Peer Model The Overlay Model Link Layer VPNs Network Layer VPNs Transport and Application Layer VPNs Layer 2 Transport Protocol (L2TP) Configuring Cisco L2TP LAC Configuration Example LNS Configuration Example IPSec IPSec Architecture Security Association Anti-Replay Feature Security Policy Database Revisión 1. 2014 Página 4 de 8

Authentication Header Encapsulating Security Payload Manual IPSec Internet Key Exchange Authentication Methods IKE and Certificate Authorities IPSec Limitations Network Performance Network Troubleshooting Interoperability with Firewalls and Network Address Translation Devices IPSec and Cisco Encryption Technology (CET) Configuring Cisco IPSec IPSec Manual Keying Configuration IPSec over GRE Tunnel Configuration Connecting IPSec Clients to Cisco IPSec Cisco Secure VPN Client Windows 2000 Linux FreeS/WAN BSD Kame Project Chapter 6 Cisco Authentication, Authorization, and Accounting Mechanisms AAA Overview AAA Benefits Cisco AAA Mechanisms Supported AAA Security Protocols RADIUS TACACS+ Kerberos RADIUS, TACACS+, or Kerberos Authentication Login Authentication Using AAA PPP Authentication Using AAA Enable Password Protection for Privileged EXEC Mode Authorization Configure Authorization TACACS+ Configuration Example Accounting Configuring Accounting Suppress Generation of Accounting Records for Null Username Sessions RADIUS Configuration Example Typical RAS Configuration Using AAA Typical Firewall Configuration Using AAA Authentication Proxy How the Authentication Proxy Works Comparison with the Lock-and Key Feature Benefits of Authentication Proxy Restrictions of Authentication Proxy Configuring Authentication Proxy Configuring the HTTP Server Configure Authentication Proxy Authentication Proxy Configuration Example Revisión 1. 2014 Página 5 de 8

Chapter 7 Intrusion Detection What Is Intrusion Detection? Network Attacks and Intrusions Poor Network Perimeter/Device Security Network Sniffers Scanner Programs Network Topology Unattended Modems Poor Physical Security Application and Operating Software Weaknesses Software Bugs Web Server/Browser-based Attacks Getting Passwords Easy Ways in Cracking Programs Trojan Horse Attacks Virus or Worm Attacks Human Failure Poorly Configured Systems Information Leaks Malicious Users Weaknesses in the IP Suite of Protocols Layer 7 Attacks Layer 5 Attacks Layer 3 and 4 Attacks Network and Host-based Intrusion Detection Network IDS Host IDS What Can t IDSs Do? Deploying in a Network Sensor Placement Network Vulnerability Analysis Tools Cisco s Approach to Security Cisco Secure Scanner (NetSonar) Minimum System Specifications for Secure Scanner V2.0 Searching the Network for Vulnerabilities Viewing the Results Keeping the System Up-to-Date Cisco Secure Intrusion Detection System (NetRanger) What Is NetRanger? Before You Install Director and Sensor Setup General Operation nrconfigure Data Management Package (DMP) Cisco IOS Intrusion Detection System Configuring IOS IDS Features Associated Commands Cisco Secure Integrated Software (Firewall Feature Set) Chapter 8 Network Security Management PIX Firewall Manager PIX Firewall Manager Overview PIX Firewall Manager Benefits Supported PIX Firewall IOS Version Versus PIX Firewall Manager Version Installation Requirements for PIX Firewall Manager PIX Firewall Manager Features Using PIX Firewall Manager Configuration Installation Errors in PIX Firewall Manager A Configuration Example Revisión 1. 2014 Página 6 de 8

CiscoWorks 2000 ACL Manager ACL Manager Overview ACL Manager Device and Software Support Installation Requirements for ACL Manager ACL Manager Features Using a Structure Access Control Lists Security Policy Increase Deployment Time for Access Control Lists Ensure Consistency of Access Control Lists Keep Track of Changes Made on the Network Troubleshooting and Error Recovery Basic Operation of ACL Manager Using ACL Manager Configuration An ACL Manager Configuration Example Cisco Secure Policy Manager Cisco Secure Policy Manager Overview The Benefits of Using Cisco Secure Policy Manager Installation Requirements for Cisco Secure Policy Manager Cisco Secure Policy Manager Features Cisco Firewall Management VPN and IPSec Security Management Security Policy Management Network Security Deployment Options Cisco Secure Policy Manager Device and Software Support Using Cisco Secure Policy Manager Configuration CSPM Configuration Example Cisco Secure ACS Cisco Secure ACS Overview Cisco Secure ACS Benefits Installation Requirements for Cisco Secure ACS Cisco Secure ACS Features Placing Cisco Secure ACS in Your Network Cisco Secure ACS Device and Software Support Using Cisco Secure ACS Configuration Cisco Secure ACS Configuration Example Chapter 9 Security Processes and Managing Cisco Security Fast Track What Is a Managing Cisco Security Fast Track? to Cisco Network Security Network Security Network Communications in TCP/IP Security in TCP/IP Traffic Filtering on the Cisco IOS Access Lists Standard and Extended Access Lists Reflexive Access Lists Context-based Access Control Network Address Translation (NAT) Private Addresses Network Address Translation Static NAT Traditional or Outbound NAT Network Address Port Translation (NAPT or PAT) Considerations Cisco PIX Firewall Security Policy Configuration Revisión 1. 2014 Página 7 de 8

Securing and Maintaining the PIX Virtual Private Networks (VPNs) L2TP IPSec Network Troubleshooting Interoperability with Firewalls and Network Address Translation Devices Cisco Authentication, Authorization and Accounting Mechanisms Authentication Authorization Accounting Intrusion Detection What Is Intrusion Detection? Cisco Secure Scanner (NetSonar) Cisco Secure NetRanger Cisco Secure Intrusion Detection Software Network Security Management Cisco PIX Firewall Manager CiscoWorks 2000 ACL Manager Cisco Secure Policy Manager Cisco Secure Access Control Manager General Security Configuration Recommendations on Cisco Remote Login and Passwords Disable Unused Network Services Logging and Backups Traffic Filtering Physical Access Keeping Up-to-Date Revisión 1. 2014 Página 8 de 8