Mastering Security in a Cisco Network
(CSCADV, Live Instructor-Led Training, 4 days)


This SETC certified course provides the network professional with the opporutnity to delve into the details of network security in a Cisco environment. Every aspect of the security policy implementation is covered, starting with basic protocol considerations to the use of firewalls, intrusion detection systems and IPv6. Included in the course is full coverage of ACLs, tunnelling and routing protocols amongst others. If you need to secure a Cisco network, this SETC-SECT certified course is for you. Note: This course uses commercial grade Cisco hardware and software. No emulators are used in the practical exercises.

Dates and Pricing

Jan 23 to Jan 26, 2018$2,500/person Feb 20 to Feb 23, 2018$2,500/person Mar 20 to Mar 23, 2018$2,500/person


Security fundamentals
Introduction to Network Security
The Need for Network Security
Network Security Options
Why Do Hackers Hack?
General Network Security Goals
Social Engineering and Privilege Escalation Attacks
Understanding Ping Sweeps and Basic Network Auditing
Introduction to SDM (Security Device Manager)
Cisco’s Security Device Manager (SDM)
Pre-Installation Configuration
Installing, Launching and Loading SDM
SDM Settings and Configuration
SDM Monitoring
Authentication, Authorization, and Accounting (AAA)
Overview of “What is AAA?”
TACAS+ vs. Radius
TACAS+ and Radius Configuration
Overview of Authentication Principals
Configuring AAA with SDM
Layer 2 Security
Basic L2 Security Features
Port Security Overview
Configuring or Misconfiguring Port Security
Aging Time for Secure Access and Sticky Addresses
Cisco Lightweight Extensible Authentication Protocol (LEAP)
Local and Remote SPAN Configuration
Filtering Intra-VLAN Traffic
VLAN Access List (VACL)
Private VLAN
DHCP Snooping and Dynamic ARP Inspection
IP Source Guard
MAC Address Flooding Attacks and VLAN Hopping
Root and BPDU Guard
Layer 3 Security
Configuring and Encrypting Passwords in Cisco IOS
Privileged Levels
Creating and Testing Minimum Length Password Policy
Strong vs. Weak Passwords
“Salting” your MD5
Network Time Protocol (NTP)
Synchronizing and Configuring NTP
Telnet and SSH Remote Access
Different Types of Network Attacks
Denial of Services (DoS) and SYN Flooding Attack
ICMP (Ping) Sweep, Port Scan, and Port Sweep
Ping Attacks and Floods
IP Spoofing and Source Routing
Packet Sniffers and Queries
Introduction to Security Auditing
Viruses and Worms
Differences Between SDM and AutoSecure
The Intrusion Prevention System (IPS)
Intrusion Detection (IDS) vs. Intrusion Prevention (IPS)
Signatures and Signature Types
Configuring IPS in SDM
Viewing and Editing Signatures
Verifying a IPS Configuration
The Basic of Firewalls
Stateless vs. Stateful Firewalls
Application Layer Gateway (ALG)
The Cisco IOS Firewall Feature Set Components
Authentication Proxy
ACL Review and Extended Access Control Lists
Introduction to Turbo ACLs
TCP and UDP Generic Inspection
Deep Pocket Inspection (DPI)
Zone-Based Firewall Configuration
Class Maps and Policy-Maps
Basic Zone Configuration and Commands
Firewall with SDM
Cryptography and Virtual Private Networks (VPNs)
Introduction to Cryptography Techniques
Asymmetric and Symmetric Algorithms
Overview of Common Cryptographic Algorithms
What is a VPN?
VPN Terminology and Theory
Introduction to PKI and the Certificate of Authority
Public Key Cryptography Standards and Internet Key Exchange
Policy Match Criteria and Crypto ACLs
Using SDM to Configure Site-to-Site VPN
Generic Routing Encapsulation (GRE) Over IPSec
Using SDM to Configure GRE over IPSec
Introduction to Cisco Network Solutions
System Development Life Cycle
Cisco SDLC Phases
Disaster Recovery Techniques
Risk Analysis – Quantitative and Qualitative
Cisco Self-Defending Network
Cisco Security Management Suite
Cisco Security Agent and Interceptors