Font size:

This instructor-led course focuses on the necessity of a comprehensive security policy and how it affects the posture of the network. Students will be able to perform basic tasks to secure a small branch type office network using Cisco IOS security features available through web-based GUIs (Cisco Router and Security Device Manager [SDM]) and the command-line interface (CLI) on Cisco routers and switches.

Introduction to Network Security Principles

  • Examining Network Security Fundamentals
  • Threats to Security
  • Addressing Internal Threats
  • External Threats
  • Confidentiality
  • Integrity
  • Availability
  • Information Classification
  • Classification Levels
  • Main Vulnerability Categories
  • The Human Vulnerability Factor
  • Adversaries
  • Integrity Violations
  • Trust Exploitation
  • Port Redirection
  • Password Attacks
  • Availability Violations
Perimeter Security
  • Perimeter Security
  • Securing Administrative Access to Cisco Routers
  • Router Security Principles
  • How Routers Enforce Perimeter Security Policy
  • Starting Cisco SDM and Cisco SDM Express
  • Files Required to Run Cisco SDM from a Router
  • Launching Cisco SDM Express
  • Launching Cisco SDM
  • Network Configuration
  • Interface Configuration
  • External Databases
  • Windows Database
  • Locking Down a Router Using Cisco Auto Secure
  • Limitations and Cautions
Network Security Using Cisco IOS Firewalls
  • Expanding on the Definition
  • Firewall Benefits
  • Firewall Limitations
  • Firewalls in a Layered Defense Strategy
  • Wildcard Bits to Match IP Subnets
  • Wildcard Bit Mask Abbreviations
  • Numbered Standard IPv4 ACL Configuration
  • Benefits of Zone-Based Policy Firewall
  • Zone-Based Policy Firewall Actions
  • Zone-Based Policy Firewall Rules for Application Traffic
Site-to-Site VPNs
  • Examining Cryptographic Services
  • Cryptology Overview
  • Cryptography History
  • Substitution Cipher
  • Asymmetric Encryption Overview
  • Asymmetric Encryption Algorithms
  • Public Key Confidentiality Scenario
  • Asymmetric Confidentiality Process
  • show crypto isakmp policy Command
  • show crypto map Command
Network Security Using Cisco IOS IPS
  • Introducing IPS Technologies
  • Defining IDS and IPS
  • IDS and IPS Common Characteristics
  • Cisco IPS AIM
  • IPS Signature Operational Characteristics
  • Signature Micro-Engines
  • Editing Signatures Using Cisco SDM
  • Support for SDEE and Syslog
  • Viewing SDEE Alarm Messages
LAN, SAN, Voice, and Endpoint Security Overview
  • Examining Endpoint Security
  • Cisco Host Security Strategy
  • Software Security Concepts
  • Operating System Vulnerabilities
  • Business Case for VoIP
  • Components of a VoIP Network
  • Major VoIP Protocols
  • Threats to IP Telephony Endpoints
  • Verifying Port Security
  • Notification of Intrusions
  • Switched Port Analyzer
Register Now
Cisco CCNA Security Training Online course
  • Course ID:
  • Duration:
    12 months
  • Price: