SETC Training844-434-7382
 Find a Course: 
 
Programming TrainingMicrosoft TrainingMS Office TrainingServer TrainingManagement TrainingNetwork TrainingAbout UsContact Us

Cisco Training


The Teacher was very talented. As English is my second language, the teacher was able to understand what I was trying to say and answer easily all my questions.
Comment from DND

1. Title

  • Mastering Security in a Cisco Network (CSCADV, 4 days)
    View PDF

2. Course Pre-requisites

  • Previous experience in a Cisco based environment.c

3. Target Audience

  • Networking professionals that want to learn how to better protect their network infrastructure

4. Dates and Pricing


2 People for Guaranteed Live or Virtual Delivery $2,775.00 per person

5. Outline

Module 1: Security fundamentals

Topic 1: Introduction to Network Security

Topic 2: The Need for Network Security

Topic 3: Network Security Options

Topic 4: Why Do Hackers Hack?

Topic 5: General Network Security Goals

Topic 6: Social Engineering and Privilege Escalation Attacks

Topic 7: Understanding Ping Sweeps and Basic Network Auditing

Module 2: Introduction to SDM (Security Device Manager)

Topic 1: Cisco’s Security Device Manager (SDM)

Topic 2: Pre-Installation Configuration

Topic 3: Installing, Launching and Loading SDM

Topic 4: SDM Settings and Configuration

Topic 5: SDM Monitoring

Module 3: Authentication, Authorization, and Accounting (AAA)

Topic 1: Overview of “What is AAA?”

Topic 2: TACAS+ vs. Radius

Topic 3: TACAS+ and Radius Configuration

Topic 4: Overview of Authentication Principals

Topic 5: Accounting

Topic 6: Authorization

Topic 7: Configuring AAA with SDM

Module 4: Layer 2 Security

Topic 1: Basic L2 Security Features

Topic 2: Port Security Overview

Topic 3: Configuring or Misconfiguring Port Security

Topic 4: Aging Time for Secure Access and Sticky Addresses

Topic 5: Cisco Lightweight Extensible Authentication Protocol (LEAP)

Topic 6: Local and Remote SPAN Configuration

Topic 7: Filtering Intra-VLAN Traffic

Topic 8: VLAN Access List (VACL)

Topic 9: Private VLAN

Topic 10: DHCP Snooping and Dynamic ARP Inspection

Topic 11: IP Source Guard

Topic 12: MAC Address Flooding Attacks and VLAN Hopping

Topic 13: Root and BPDU Guard

Module 5: Layer 3 Security

Topic 1: Configuring and Encrypting Passwords in Cisco IOS

Topic 2: Privileged Levels

Topic 3: Creating and Testing Minimum Length Password Policy

Topic 4: Strong vs. Weak Passwords

Topic 5: “Salting” your MD5

Topic 6: Network Time Protocol (NTP)

Topic 7: Synchronizing and Configuring NTP

Topic 8: Telnet and SSH Remote Access

Topic 9: Different Types of Network Attacks

Topic 10: Denial of Services (DoS) and SYN Flooding Attack

Topic 11: ICMP (Ping) Sweep, Port Scan, and Port Sweep

Topic 12: Ping Attacks and Floods

Topic 13: IP Spoofing and Source Routing

Topic 14: Packet Sniffers and Queries

Topic 15: Introduction to Security Auditing

Topic 16: Viruses and Worms

Topic 17: Differences Between SDM and AutoSecure

Module 6: The Intrusion Prevention System (IPS)

Topic 1: Intrusion Detection (IDS) vs. Intrusion Prevention (IPS)

Topic 2: Signatures and Signature Types

Topic 3: NIPS and HIPS

Topic 4: Honeypots

Topic 5: Configuring IPS in SDM

Topic 6: Viewing and Editing Signatures

Topic 7: Verifying a IPS Configuration

Module 7: Firewalls

Topic 1: The Basic of Firewalls

Topic 2: Stateless vs. Stateful Firewalls

Topic 3: Application Layer Gateway (ALG)

Topic 4: The Cisco IOS Firewall Feature Set Components

Topic 5: Authentication Proxy

Topic 6: ACL Review and Extended Access Control Lists

Topic 7: Introduction to Turbo ACLs

Topic 8: TCP and UDP Generic Inspection

Topic 9: Deep Pocket Inspection (DPI)

Topic 10: Zone-Based Firewall Configuration

Topic 11: Class Maps and Policy-Maps

Topic 12: Basic Zone Configuration and Commands

Topic 13: Firewall with SDM

Module 8: Cryptography and Virtual Private Networks (VPNs)

Topic 1: Introduction to Cryptography Techniques

Topic 2: Asymmetric and Symmetric Algorithms

Topic 3: Overview of Common Cryptographic Algorithms

Topic 4: What is a VPN?

Topic 5: VPN Terminology and Theory

Topic 6: Introduction to PKI and the Certificate of Authority

Topic 7: Public Key Cryptography Standards and Internet Key Exchange

Topic 8: Policy Match Criteria and Crypto ACLs

Topic 9: Using SDM to Configure Site-to-Site VPN

Topic 10: Generic Routing Encapsulation (GRE) Over IPSec

Topic 11: Using SDM to Configure GRE over IPSec

Module 9: Introduction to Cisco Network Solutions

Topic 1: System Development Life Cycle

Topic 2: Cisco SDLC Phases

Topic 3: Disaster Recovery Techniques

Topic 4: Risk Analysis – Quantitative and Qualitative

Topic 5: Cisco Self-Defending Network

Topic 6: Cisco Security Management Suite

Topic 7: Cisco Security Agent and Interceptors

SETC Training on LinkedIn follow @CTESTraining Follow us on Facebook
  Programming Training
  Microsoft Training
  Network Training
  Management Training
  Server Training
  Microsoft Office Training
Site developed and authored by Jean-Marc Choquette