SETC Training844-434-7382
 Find a Course: 
Programming TrainingMicrosoft TrainingMS Office TrainingServer TrainingManagement TrainingNetwork TrainingAbout UsContact Us

Cisco Training

The ambience, food and camaraderie excellent. The arrangements made to compensate for my disability has been much appreciated. THANKS The place felt like home.
Comment from Shared Services

1. Title

  • Mastering Security in a Cisco Network (CSCADV, 4 days)
    View PDF

2. Course Pre-requisites

  • Previous experience in a Cisco based environment.c

3. Target Audience

  • Networking professionals that want to learn how to better protect their network infrastructure

4. Dates and Pricing

2 People for Guaranteed Live or Virtual Delivery $2,775.00 per person

5. Outline

Module 1: Security fundamentals

Topic 1: Introduction to Network Security

Topic 2: The Need for Network Security

Topic 3: Network Security Options

Topic 4: Why Do Hackers Hack?

Topic 5: General Network Security Goals

Topic 6: Social Engineering and Privilege Escalation Attacks

Topic 7: Understanding Ping Sweeps and Basic Network Auditing

Module 2: Introduction to SDM (Security Device Manager)

Topic 1: Cisco’s Security Device Manager (SDM)

Topic 2: Pre-Installation Configuration

Topic 3: Installing, Launching and Loading SDM

Topic 4: SDM Settings and Configuration

Topic 5: SDM Monitoring

Module 3: Authentication, Authorization, and Accounting (AAA)

Topic 1: Overview of “What is AAA?”

Topic 2: TACAS+ vs. Radius

Topic 3: TACAS+ and Radius Configuration

Topic 4: Overview of Authentication Principals

Topic 5: Accounting

Topic 6: Authorization

Topic 7: Configuring AAA with SDM

Module 4: Layer 2 Security

Topic 1: Basic L2 Security Features

Topic 2: Port Security Overview

Topic 3: Configuring or Misconfiguring Port Security

Topic 4: Aging Time for Secure Access and Sticky Addresses

Topic 5: Cisco Lightweight Extensible Authentication Protocol (LEAP)

Topic 6: Local and Remote SPAN Configuration

Topic 7: Filtering Intra-VLAN Traffic

Topic 8: VLAN Access List (VACL)

Topic 9: Private VLAN

Topic 10: DHCP Snooping and Dynamic ARP Inspection

Topic 11: IP Source Guard

Topic 12: MAC Address Flooding Attacks and VLAN Hopping

Topic 13: Root and BPDU Guard

Module 5: Layer 3 Security

Topic 1: Configuring and Encrypting Passwords in Cisco IOS

Topic 2: Privileged Levels

Topic 3: Creating and Testing Minimum Length Password Policy

Topic 4: Strong vs. Weak Passwords

Topic 5: “Salting” your MD5

Topic 6: Network Time Protocol (NTP)

Topic 7: Synchronizing and Configuring NTP

Topic 8: Telnet and SSH Remote Access

Topic 9: Different Types of Network Attacks

Topic 10: Denial of Services (DoS) and SYN Flooding Attack

Topic 11: ICMP (Ping) Sweep, Port Scan, and Port Sweep

Topic 12: Ping Attacks and Floods

Topic 13: IP Spoofing and Source Routing

Topic 14: Packet Sniffers and Queries

Topic 15: Introduction to Security Auditing

Topic 16: Viruses and Worms

Topic 17: Differences Between SDM and AutoSecure

Module 6: The Intrusion Prevention System (IPS)

Topic 1: Intrusion Detection (IDS) vs. Intrusion Prevention (IPS)

Topic 2: Signatures and Signature Types

Topic 3: NIPS and HIPS

Topic 4: Honeypots

Topic 5: Configuring IPS in SDM

Topic 6: Viewing and Editing Signatures

Topic 7: Verifying a IPS Configuration

Module 7: Firewalls

Topic 1: The Basic of Firewalls

Topic 2: Stateless vs. Stateful Firewalls

Topic 3: Application Layer Gateway (ALG)

Topic 4: The Cisco IOS Firewall Feature Set Components

Topic 5: Authentication Proxy

Topic 6: ACL Review and Extended Access Control Lists

Topic 7: Introduction to Turbo ACLs

Topic 8: TCP and UDP Generic Inspection

Topic 9: Deep Pocket Inspection (DPI)

Topic 10: Zone-Based Firewall Configuration

Topic 11: Class Maps and Policy-Maps

Topic 12: Basic Zone Configuration and Commands

Topic 13: Firewall with SDM

Module 8: Cryptography and Virtual Private Networks (VPNs)

Topic 1: Introduction to Cryptography Techniques

Topic 2: Asymmetric and Symmetric Algorithms

Topic 3: Overview of Common Cryptographic Algorithms

Topic 4: What is a VPN?

Topic 5: VPN Terminology and Theory

Topic 6: Introduction to PKI and the Certificate of Authority

Topic 7: Public Key Cryptography Standards and Internet Key Exchange

Topic 8: Policy Match Criteria and Crypto ACLs

Topic 9: Using SDM to Configure Site-to-Site VPN

Topic 10: Generic Routing Encapsulation (GRE) Over IPSec

Topic 11: Using SDM to Configure GRE over IPSec

Module 9: Introduction to Cisco Network Solutions

Topic 1: System Development Life Cycle

Topic 2: Cisco SDLC Phases

Topic 3: Disaster Recovery Techniques

Topic 4: Risk Analysis – Quantitative and Qualitative

Topic 5: Cisco Self-Defending Network

Topic 6: Cisco Security Management Suite

Topic 7: Cisco Security Agent and Interceptors

SETC Training on LinkedIn follow @CTESTraining Follow us on Facebook
  Programming Training
  Microsoft Training
  Network Training
  Management Training
  Server Training
  Microsoft Office Training
Site developed and authored by Jean-Marc Choquette