Implementing Cisco Network Security (IINS) 3.0

Similar documents
The IINS acronym to this exam will remain but the title will change slightly, removing IOS from the title, making the new title.

CCNA Security. 2.0 Secure Access. 1.0 Security Concepts

CISCO QUAD Cisco CCENT/CCNA/CCDA/CCNA Security (QUAD)

Implementing Cisco Edge Network Security Solutions ( )

ASACAMP - ASA Lab Camp (5316)

Implementing Core Cisco ASA Security (SASAC)

CCNA CCNA Security Official Cert Guide. Course Outline. CCNA Security Official Cert Guide.

Cisco - ASA Lab Camp v9.0

Understanding Cisco Cybersecurity Fundamentals

UniNets CCNA Security LAB MANUAL UNiNets CCNA Cisco Certified Network Associate Security LAB MANUAL UniNets CCNA LAB MANUAL

Informal Write-up on CCNA Security. October, 2009 (V1.0)

CISCO EXAM QUESTIONS & ANSWERS

CISCO EXAM QUESTIONS & ANSWERS

Implementing Cisco Cybersecurity Operations

Fundamentals of Network Security v1.1 Scope and Sequence

Exam Actual. Higher Quality. Better Service! QUESTION & ANSWER

"Charting the Course... Interconnecting Cisco Networking Devices Accelerated 3.0 (CCNAX) Course Summary

Security+ SY0-501 Study Guide Table of Contents

Cisco Exam Implementing Cisco Network Security Version: 12.0 [ Total Questions: 186 ]

Cisco CCNP ROUTE: Implementing Cisco IP Routing (ROUTE) 2.0. Upcoming Dates. Course Description. Course Outline

Interconnecting Cisco Networking Devices: Accelerated

Deploying Cisco ASA Firewall Solutions (FIREWALL v1.0)

Chapter 3 Network Foundation Protection (NFP) Overview 39. Configuring and Implementing Switched Data Plane Security Solutions 57

ActualTorrent. Professional company engaging Providing Valid Actual Torrent file for qualification exams.

Deploying Cisco ASA VPN Solutions v2.0 (VPN)

Vendor: Cisco. Exam Code: Exam Name: Implementing Cisco Threat Control Solutions. Version: Demo

ASA/PIX Security Appliance

PREREQUISITES TARGET AUDIENCE. Length Days: 5

CCNA Boot Camp. Course Description

SYLLABUS. DIVISION: Business and Engineering Technology REVISED: FALL 2015 CREDIT HOURS: 4 HOURS/WK LEC: 4 HOURS/WK LAB: 0 LEC/LAB COMB: 4

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

Cisco 5921 Embedded Services Router

Cisco 5921 Embedded Services Router

The primary audience for this course includes Network Administrators, Network Engineers,

About This Guide. Document Objectives. Audience

Hands-On TCP/IP Networking

S.No. CCIE Security Written Exam Topics v4.0 Part I Infrastructure, Connectivity, Communications, Network Security

Cisco Number: Cisco Passing Score: 800 Time Limit: 120 min File Version: 1.0. Sections 1. Sims 2. Multi Select 3.

Implementing Cisco IP Routing (ROUTE)

Interconnecting Cisco Networking Devices Part 1 ICND1

SASSL v1.0 Managing Advanced Cisco SSL VPN. 3 days lecture course and hands-on lab $2,495 USD 25 Digital Version

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)

"Charting the Course... Implementing Cisco Data Center Infrastructure (DCII) Course Summary

TestOut Routing and Switching Pro - English 6.0.x COURSE OUTLINE. Modified

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD SEGURIDAD EN REDES. NIVEL II. VERSION 2.0

Exam : Title : Security Solutions for Systems Engineers. Version : Demo

IT Exam Training online / Bootcamp

New Features for ASA Version 9.0(2)

Interconnecting Cisco Networking Devices Part 1 (ICND1) Course Overview

CCNA Security Official Cert Guide First Edition. Copyright 2015 Cisco Systems, Inc. ISBN-10: ISBN-13:

ICND1 v2.0 Interconnecting Cisco Networking Devices Part 1 CCENT & Part of CCNA Rout/Switch

Cisco Security Solutions for Systems Engineers (SSSE) Practice Test. Version

Cisco Passguide Exam Questions & Answers

Chapter 5. Security Components and Considerations.

Implementing Cisco IP Switched Networks (SWITCH)

Modular Policy Framework. Class Maps SECTION 4. Advanced Configuration

This course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N

Cisco CISCO Securing Networks with ASA Advanced. Practice Test. Version

Cisco CCNA (ICND1, ICND2) Bootcamp

TestOut Network Pro - English 5.0.x COURSE OUTLINE. Modified

CCNA Security. Implementing Cisco Network Security Version: 5.0

TestOut Network Pro - English 4.1.x COURSE OUTLINE. Modified

PrepAwayExam. High-efficient Exam Materials are the best high pass-rate Exam Dumps

Cisco Exam. Volume: 223 Questions. Question No: 1 Which three commands can be used to harden a switch? (Choose three.)

Cisco ASA 5500 Series Adaptive Security Appliance 8.2 Software Release

Cisco Exam Questions & Answers

CCNA Exploration Network Fundamentals

CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline

CCNP Security VPN

cisco. Number: Passing Score: 800 Time Limit: 120 min

CISCO EXAM QUESTIONS & ANSWERS

The following chart provides the breakdown of exam as to the weight of each section of the exam.

CCIE Security. Course Outline. CCIE Security. 07 Oct

Number: Passing Score: 800 Time Limit: 120 min File Version: 1.0. Cisco

CCNA SECURITY. Technology Workbook. Implementing Cisco Network Security Exam ( )

CompTIA Security+ Certification

NETLOGIC TRAINING CENTER

CCNA Security 1.0 Student Packet Tracer Manual

Implementing Cisco Data Center Infrastructure v6.0 (DCII)

Technology Scenarios. INE s CCIE Security Bootcamp - 1 -

Interconnecting Cisco Network Devices Part 1 v2.0 (ICND 1)

Palo Alto Networks PCNSE7 Exam

Question: 1 An engineer is using the policy trace tool to troubleshoot a WSA. Which behavior is used?

McAfee Network Security Platform Administration Course

Clientless SSL VPN Overview

LAN-to-LAN IPsec VPNs

Course: CCNA Bootcamp (Intensive CCNA)

Cisco ASA Software Release 8.2

PND at a glance: The World s Premier Online Practical Network Defense course. Self-paced, online, flexible access

CompTIA Network+ Study Guide Table of Contents

TSHOOT v2.0 Troubleshooting and Maintaining Cisco IP Networks 5 days, Instructor-led

Certified SonicWALL Security Administrator (CSSA) Instructor-led Training

Certified Ethical Hacker (CEH)

SWITCH Implementing Cisco IP Switched Networks

This document describes the configuration of Secure Sockets Layer (SSL) decryption on the FirePOWER Module using ASDM (On-Box Management).

Internetwork Expert s CCNA Security Bootcamp. Common Security Threats

AVANTUS TRAINING PTE LTD

Implementing Cisco IP Switched Networks (SWITCH) v2.0

CHCSS. Certified Hands-on Cyber Security Specialist (510)

Chapter 10: Security. 2. What are the two types of general threats to computer security? Give examples of each.

Transcription:

Implementing Cisco Network Security (IINS) 3.0 COURSE OVERVIEW: Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles and technologies, using Cisco security products to provide hands-on examples. Using instructor-led discussions, extensive hands-on lab exercises, and supplemental materials, this course allows learners to understand common security concepts, and deploy basic security techniques utilizing a variety of popular security appliances within a real-life network infrastructure. Overall, this is very valuable experience for Cisco students. WHO SHOULD ATTEND: The target audiences of this course are learners who aim to be network associates in the domain of network security and who have knowledge that is contained in the Interconnecting Cisco Networking Devices Part 1 (ICND1) course. PREREQUISITES: The knowledge and skills that a learner must have before attending this course are as follows: Skills and knowledge equivalent to those learned in Interconnecting Cisco Networking Devices Part 1 (ICND1) Working knowledge of the Windows operating system Working knowledge of Cisco IOS networking and concepts COURSE OBJECTIVES: Upon completing this course, the learner will be able to meet these overall objectives: Describe common network security concepts Secure routing and switching infrastructure Deploy basic authentication, authorization and accounting services Deploy basic firewalling services Deploy basic site-to-site and remote access VPN services Describe the use of more advanced security services such as intrusion protection, content security and identity management 1 of 10 A company built for engineers by engineers

COURSE OUTLINE: Module 1: Security Concepts Lesson 1: Threatscape Threatscape Overview DoS and DDoS Spoofing Reflection and Amplification Attacks Social Engineering Evolution of Phishing Password Attacks Reconnaissance Attacks Buffer Overflow Attacks Man-in-the-Middle Attacks Malware Vectors of Data Loss and Exfiltration Hacking Tools Other Considerations Lesson 2: Threat Defense Technologies Firewalls Intrusion Prevention Systems Content Security VPNs Endpoint Security Logging Lesson 3: Security Policy and Basic Security Architectures Information Security Overview Classifying Assets, Vulnerabilities, and Countermeasures Managing Risk Regulatory Compliance Principles of Secure Network Design Security Policy Security Zones 2 of 10 A company built for engineers by engineers

The Functional Planes of the Network Lesson 4: Cryptographic Technologies Cryptography Overview Hash Algorithms Encryption Overview Cryptanalysis Symmetric Encryption Algorithms Asymmetric Encryption Algorithms Use Case: SSH Digital Signatures PKI Overview PKI Operations Use Case: SSL/TLS Key Management Discovery 1: Exploring Cryptographic Technologies Lesson 5: Module Summary Lesson 6: Module Self-Check Module 2: Secure Network Devices Lesson 1: Implementing AAA Introduction to AAA AAA Databases AAA Protocols AAA Servers SSH Configuration and Operation on IOS IOS Authorization with Privilege Levels Implementing Local AAA Authentication and Authorization Authorization with Role-Based CLI TACACS+ on IOS Discovery 2: Configure and Verify AAA 3 of 10 A company built for engineers by engineers

Lesson 2: Management Protocols and Systems IOS File System Copying Files to and from Network Devices Validating IOS Images Using MD5 Digitally Signed Images IOS Resilient Configuration NTP Syslog Memory and CPU Threshold Notifications Netflow Configuration Management Protocol Options HTTPS Configuration and Operation SNMPv3 Configuration and Operation Locking Down Management Access with ACLs Other Password Considerations Discovery 3: Configuration Management Protocols Lesson 3: Securing the Control Plane The Control Plane Control Plane Policing Control Plane Protection Authenticating Routing Protocols OSPF Route Authentication EIGRP Route Authentication Discovery 4: Securing Routing Protocols Lesson 4: Module Summary Lesson 5: Module Self-Check Module 3: Layer 2 Security Lesson 1: Securing Layer 2 Infrastructure Introduction to Layer 2 Security Ethernet Switching Overview VLAN Overview 4 of 10 A company built for engineers by engineers

VLAN Configuration 802.1Q Trunking Trunk Attacks Trunk Configuration and Attack Mitigation CDP ACL Primer ACLs on Switches MAC Address Abuse Port Security Private VLANs Private VLAN Edge Private VLAN Proxy Attack and Mitigation Discovery 5: VLAN Security and ACLs on Switches Discovery 6: Port Security and Private VLAN Edge Lesson 2: Securing Layer 2 Protocols STP Overview STP Attacks STP Attack Mitigation DHCP Overview DHCP Attacks DHCP Snooping ARP Overview ARP Cache Poisoning Attack Dynamic ARP Inspection Discovery 7: Securing DHCP, ARP, and STP Lesson 3: Module Summary Lesson 4: Module Self-Check Module 4: Firewall Lesson 1: Firewall Technologies Firewall Overview Packet Filters 5 of 10 A company built for engineers by engineers

Stateful Firewalls Proxy Servers Next Generation Firewalls Logging Discovery 8: Explore Firewall Technologies Lesson 2: Introducing the Cisco ASA v9.2 Introducing the Cisco ASA Family of Security Appliances Cisco ASA Firewall Features Modes of Deployment Security Contexts High-Availability and Failover Configuring Management Access on the Cisco ASA Configuring Cisco ASA Interfaces NAT Fundamentals Configure NAT on Cisco ASA Configure Static NAT on Cisco ASA Configure Dynamic NAT on Cisco ASA Configure PAT on Cisco ASA Configure Policy NAT on Cisco ASA Verify NAT Operations Discovery 9: Cisco ASA Interfaces and NAT Lesson 3: Cisco ASA Access Control and Service Policies Overview of Interface Access Rules Configure Interface Access Rules Configure Object Groups Introducing Cisco ASA Modular Policy Framework Configuring Cisco MPF Service Policy Rules Discovery 10: Access Control Using the Cisco ASA Lesson 4: Cisco IOS Zone Based Firewall Zone-Based Policy Firewall Overview Zones and Zone Pairs Introduction to Cisco Common Classification Policy Language Default Policies, Traffic Flows, and Zone Interaction 6 of 10 A company built for engineers by engineers

Cisco Common Classification Policy Language (C3PL) Configuration Overview Configuring Zone-Based Policy Firewall Class-Maps Configuring Zone-Based Policy Firewall Policy-Maps Discovery 11: Exploring Cisco IOS Zone-Based Firewall Lesson 5: Module Summary Lesson 6: Module Self-Check Module 5: VPN Lesson 1: IPsec Technologies IPsec VPNs IPsec Security Services IPsec Framework Internet Key Exchange IKE Phase 1 ISAKMP Configuration IPsec Protocols IKE Phase 2 IPsec Configuration Suite B Cryptographic Standard IKE Version 2 IPsec with IPv6 Discovery 12: Explore IPsec Technologies Lesson 2: Site-to-Site VPN Site-to-Site Tunnel Negotiation Process Configuring Site-to-Site IPsec VPN Step 1: Ensure That ACLs Are Compatible with IPsec Step 2: Create ISAKMP IKE Phase 1 Policies Step 3: Configure Transform Sets Step 4: Create Crypto ACLs Using Extended ACLs Step 5: Configure IPsec Crypto Maps Verifying the IPsec Configuration Configuring Site-to-Site VPN on Cisco ASA 7 of 10 A company built for engineers by engineers

Monitoring Site-to-Site VPN Configuration in ASDM Discovery 13: IOS-Based Site-to-Site VPN Discovery 14: ASA-Based Site-to-Site VPN Lesson 3: Client Based Remote Access VPN Secure Sockets Layer and Transport Layer Security Basic Cisco AnyConnect SSL VPN Cisco AnyConnect SSL VPN Solution Components SSL VPN Server Authentication SSL VPN Client Authentication SSL VPN Client IP Address Assignment Basic AnyConnect SSL VPN Configuration Tasks Discovery 15: Remote Access VPN: ASA and AnyConnect Lesson 4: Clientless Remote Access VPN Cisco Clientless SSL VPN Cisco Clientless SSL VPN Use Cases Cisco Clientless SSL VPN Resource Access Methods Basic Clientless SSL VPN Solution Server Authentication in Basic Clientless SSL VPN Client-Side Authentication in Basic Clientless SSL VPN Clientless SSL VPN URL Entry and Bookmarks Basic Access Control for Clientless SSL VPN Basic Clientless SSL VPN Configuration Tasks Discovery 16: Clientless Remote Access VPN Lesson 5: Module Summary Lesson 6: Module Self-Check Module 6: Advanced Topics Lesson 1: Intrusion Detection and Protection Introduction to IPS IPS Terminology Evasion Techniques and Countermeasures 8 of 10 A company built for engineers by engineers

Protecting the Network with FireSIGHT FireSIGHT Protection Before an Attack FireSIGHT Protection During an Attack FireSIGHT Protection After an Attack FireSIGHT Deployment Options Inline and Passive Mode Deployment Options Lesson 2: Endpoint Protection Endpoint Security Overview Personal Firewalls Antivirus and Antispyware Centralized Endpoint Policy Enforcement Cisco AMP for Endpoints Lesson 3: Content Security Cisco ESA Deployment Cisco ESA Overview Cisco ESA Features and Benefits Cisco ESA GUI Management Cisco ESA Mail Processing Cisco WSA Deployment Cisco WSA Overview Cisco WSA Features and Benefits Cisco WSA GUI Management Cisco CWS Deployment Cisco CWS Overview Cisco CWS Features and Benefits Lesson 4: Advanced Network Security Architectures Modular Network Architectures Security Issues in Modern Networks Identity Management BYOD Challenge Cisco TrustSec Lesson 5: Module Summary 9 of 10 A company built for engineers by engineers

Lesson 6: Module Self-Check LAB OUTLINE: Challenge 1: Configure AAA and Secure Remote Administration Challenge 2: Configure Secure Network Management Protocols Challenge 3: Configure Secure EIGRP Routing Challenge 4: Configure Secure Layer 2 Infrastructure Challenge 5: Configure DHCP Snooping and STP Protection Challenge 6: Configure Interfaces and NAT on the Cisco ASA Challenge 7: Configure Network Access Control with the Cisco ASA Challenge 8: Configure Site-to-Site VPN on IOS Challenge 9: Configure AnyConnect Remote Access VPN on ASA Challenge 10: Configure Clientless SSL VPN on the ASA 10 of 10 A company built for engineers by engineers