Save up to 50% on all Microsoft Courses : Use code : Micro50
Get 20% off on EC-Council, ISACA and Axelos Courses : Use code: Learning20
Buy 1st training of USD 2500 and above and get Excel/PowerPoint/word training Free : Use code: BOGO2020*Promo Terms
    • 18756 Stone Oak Park Way, Suite200, San Antonio TX 78258 USA
  • 100 Queen St W, Brampton, ON L6X 1A4, Canada
  • +1-800-961-0337
START DATE END DATE CLASS TIMINGS MODE Price LOCATION ACTION
12/16/2019 12/20/2019
USD 3495 Live Online
03/30/2020 04/03/2020
USD 3495 Live Online
07/06/2020 07/10/2020
USD 3495 Live Online
09/14/2020 09/18/2020
USD 3495 Live Online
12/14/2020 12/18/2020
USD 3495 Live Online

Implementing Cisco IOS Network Security (IINS v3.0)

After finishing this course, the student will have the capacity to meet these general destinations:

  • Portray regular system security ideas

  • Secure directing and exchanging framework

  • Send essential verification, approval and bookkeeping administrations

  • Send essential firewalling administrations

  • Send essential site-to-site and remote access VPN administrations

  • Depict the utilization of further developed security administrations, for example, interruption insurance, content security, and character administration

Who Should Attend

The intended interest groups of this course are students who plan to arrange relates in the space of system security and who have information that is contained in the Interconnecting Cisco Networking Devices Part 1 (ICND1) course.

Module 1: Security Concepts

  • Lesson 1: Threatscape

  • Threatscape Overview

  • DoS and DDoS

  • Mocking

  • Reflection and Amplification Attacks

  • Social Engineering

  • Development of Phishing

  • Secret key Attacks

  • Surveillance Attacks

  • Support Overflow Attacks

  • Man-in-the-Middle Attacks

  • Malware

  • Vectors of Data Loss and Exfiltration

  • Hacking Tools

  • Different Considerations

  • Rundown

  • Lesson 2: Threat Defense Technologies

  • Firewalls

  • Interruption Prevention Systems

  • Content Security

  • VPNs

  • Endpoint Security

  • Logging

  • Rundown

  • Lesson 3: Security Policy and Basic Security Architectures

  • Data Security Overview

  • Grouping Assets, Vulnerabilities, and Countermeasures

  • Overseeing Risk

  • Administrative Compliance

  • Standards of Secure Network Design

  • Security Policy

  • Security Zones

  • The Functional Planes of the Network

  • Rundown

  • Lesson 4: Cryptographic Technologies

  • Cryptography Overview

  • Hash Algorithms

  • Encryption Overview

  • Cryptanalysis

  • Symmetric Encryption Algorithms

  • Awry Encryption Algorithms

  • Utilize Case: SSH

  • Computerized Signatures

  • PKI Overview

  • PKI Operations

  • Utilize Case: SSL/TLS

  • Key Management

  • Disclosure 1: Exploring Cryptographic Technologies

  • Outline

  • Lesson 5: Module Summary

  • References

  • Lesson 6: Module Self-Check

Module 2: Secure Network Devices

  • Lesson 1: Implementing AAA

  • Prologue to AAA

  • AAA Databases

  • AAA Protocols

  • AAA Servers

  • SSH Configuration and Operation on IOS

  • IOS Authorization with Privilege Levels

  • Actualizing Local AAA Authentication and Authorization

  • Approval with Role-Based CLI

  • TACACS+ on IOS

  • Revelation 2: Configure and Verify AAA

  • Outline

  • Lesson 2: Management Protocols and Systems

  • IOS File System

  • Duplicating Files to and from Network Devices

  • Approving IOS Images Using MD5

  • Carefully Signed Images

  • IOS Resilient Configuration

  • NTP

  • Syslog

  • Memory and CPU Threshold Notifications

  • Netflow

  • Arrangement Management Protocol Options

  • HTTPS Configuration and Operation

  • SNMPv3 Configuration and Operation

  • Securing Management Access with ACLs

  • Other Password Considerations

  • Revelation 3: Configuration Management Protocols

  • Outline

  • Lesson 3: Securing the Control Plane

  • The Control Plane

  • Control Plane Policing

  • Control Plane Protection

  • Verifying Routing Protocols

  • OSPF Route Authentication

  • EIGRP Route Authentication

  • Revelation 4: Securing Routing Protocols

  • Lesson 4: Module Summary

  • References

  • Lesson 5: Module Self-Check

Module 3: Layer 2 Security

  • Lesson 1: Securing Layer 2 Infrastructure

  • Prologue to Layer 2 Security

  • Ethernet Switching Overview

  • VLAN Overview

  • VLAN Configuration

  • 802.1Q Trunking

  • Trunk Attacks

  • Trunk Configuration and Attack Mitigation

  • CDP

  • ACL Primer

  • ACLs on Switches

  • Macintosh Address Abuse

  • Port Security

  • Private VLANs

  • Private VLAN Edge

  • Private VLAN Proxy Attack and Mitigation

  • Revelation 5: VLAN Security and ACLs on Switches

  • Revelation 6: Port Security and Private VLAN Edge

  • Outline

  • Lesson 2: Securing Layer 2 Protocols

  • STP Overview

  • STP Attacks

  • STP Attack Mitigation

  • DHCP Overview

  • DHCP Attacks

  • DHCP Snooping

  • ARP Overview

  • ARP Cache Poisoning Attack

  • Dynamic ARP Inspection

  • Disclosure 7: Securing DHCP, ARP, and STP

  • Rundown

  • Lesson 3: Module Summary

  • References

  • Lesson 4: Module Self-Check

Module 4: Firewall

  • Lesson 1: Firewall Technologies

  • Firewall Overview

  • Parcel Filters

  • Stateful Firewalls

  • Intermediary Servers

  • Cutting edge Firewalls

  • Logging

  • Disclosure 8: Explore Firewall Technologies

  • Rundown

  • Lesson 2: Introducing the Cisco ASA v9.2

  • Presenting the Cisco ASA Family of Security Appliances

  • Cisco ASA Firewall Features

  • Methods of Deployment

  • Security Contexts

  • High-Availability and Failover

  • Designing Management Access on the Cisco ASA

  • Designing Cisco ASA Interfaces

  • NAT Fundamentals

  • Design NAT on Cisco ASA

  • Design Static NAT on Cisco ASA

  • Design Dynamic NAT on Cisco ASA

  • Design PAT on Cisco ASA

  • Design Policy NAT on Cisco ASA

  • Check NAT Operations

  • Disclosure 9: Cisco ASA Interfaces and NAT

  • Rundown

  • Lesson 3: Cisco ASA Access Control and Service Policies

  • Diagram of Interface Access Rules

  • Design Interface Access Rules

  • Design Object Groups

  • Presenting Cisco ASA Modular Policy Framework

  • Designing Cisco MPF Service Policy Rules

  • Disclosure 10: Access Control Using the Cisco ASA

  • Rundown

  • Lesson 4: Cisco IOS Zone Based Firewall

  • Zone-Based Policy Firewall Overview

  • Zones and Zone Pairs

  • Prologue to Cisco Common Classification Policy Language

  • Default Policies, Traffic Flows, and Zone Interaction

  • Cisco Common Classification Policy Language (C3PL) Configuration Overview

  • Designing Zone-Based Policy Firewall Class-Maps

  • Designing Zone-Based Policy Firewall Policy-Maps

  • Disclosure 11: Exploring Cisco IOS Zone-Based Firewall

  • Rundown

  • Lesson 5: Module Summary

  • References

  • Lesson 6: Module Self-Check

Module 5: VPN

  • Lesson 1: IPsec Technologies

  • IPsec VPNs

  • IPsec Security Services

  • IPsec Framework

  • Web Key Exchange

  • IKE Phase 1

  • ISAKMP Configuration

  • IPsec Protocols

  • IKE Phase 2

  • IPsec Configuration

  • Suite B Cryptographic Standard

  • IKE Version 2

  • IPsec with IPv6

  • Disclosure 12: Explore IPsec Technologies

  • Outline

  • Lesson 2: Site-to-Site VPN

  • Site-to-Site Tunnel Negotiation Process

  • Arranging Site-to-Site IPsec VPN

  • Stage 1: Ensure That ACLs Are Compatible with IPsec

  • Stage 2: Create ISAKMP IKE Phase 1 Policies

  • Stage 3: Configure Transform Sets

  • Stage 4: Create Crypto ACLs Using Extended ACLs

  • Stage 5: Configure IPsec Crypto Maps

  • Confirming the IPsec Configuration

  • Arranging Site-to-Site VPN on Cisco ASA

  • Checking Site-to-Site VPN Configuration in ASDM

  • Revelation 13: IOS-Based Site-to-Site VPN

  • Revelation 14: ASA-Based Site-to-Site VPN

  • Outline

  • Lesson 3: Client Based Remote Access VPN

  • Secure Sockets Layer and Transport Layer Security

  • Essential Cisco AnyConnect SSL VPN

  • Cisco AnyConnect SSL VPN Solution Components

  • SSL VPN Server Authentication

  • SSL VPN Client Authentication

  • SSL VPN Client IP Address Assignment

  • Essential AnyConnect SSL VPN Configuration Tasks

  • Revelation 15: Remote Access VPN: ASA and AnyConnect

  • Outline

  • Lesson 4: Clientless Remote Access VPN

  • Cisco Clientless SSL VPN

  • Cisco Clientless SSL VPN Use Cases

  • Cisco Clientless SSL VPN Resource Access Methods

  • Essential Clientless SSL VPN Solution

  • Server Authentication in Basic Clientless SSL VPN

  • Customer Side Authentication in Basic Clientless SSL VPN

  • Clientless SSL VPN URL Entry and Bookmarks

  • Fundamental Access Control for Clientless SSL VPN

  • Fundamental Clientless SSL VPN Configuration Tasks

  • Disclosure 16: Clientless Remote Access VPN

  • Synopsis

  • Lesson 5: Module Summary

  • References

  • Lesson 6: Module Self-Check

Module 6: Advanced Topics

  • Lesson 1: Intrusion Detection and Protection

  • Prologue to IPS

  • IPS Terminology

  • Avoidance Techniques and Countermeasures

  • Ensuring the Network with FireSIGHT

  • FireSIGHT Protection Before an Attack

  • FireSIGHT Protection During an Attack

  • FireSIGHT Protection After an Attack

  • FireSIGHT Deployment Options

  • Inline and Passive Mode Deployment Options

  • Synopsis

  • Lesson 2: Endpoint Protection

  • Endpoint Security Overview

  • Individual Firewalls

  • Antivirus and Antispyware

  • Brought together Endpoint Policy Enforcement

  • Cisco AMP for Endpoints

  • Synopsis

  • Lesson 3: Content Security

  • Cisco ESA Deployment

  • Cisco ESA Overview

  • Cisco ESA Features and Benefits

  • Cisco ESA GUI Management

  • Cisco ESA Mail Processing

  • Cisco WSA Deployment

  • Cisco WSA Overview

  • Cisco WSA Features and Benefits

  • Cisco WSA GUI Management

  • Cisco CWS Deployment

  • Cisco CWS Overview

  • Cisco CWS Features and Benefits

  • Synopsis

  • Lesson 4: Advanced Network Security Architectures

  • Particular Network Architectures

  • Security Issues in Modern Networks

  • Character Management

  • BYOD Challenge

  • Cisco TrustSec

  • Synopsis

  • Lesson 5: Module Summary

  • References

  • Lesson 6: Module Self-Check

Lab Outline

  • Test 1: Configure AAA and Secure Remote Administration

  • Arrange AAA and Secure Remote Administration

  • Test 2: Configure Secure Network Management Protocols

  • Arrange Secure Network Management Protocols

  • Test 3: Configure Secure EIGRP Routing

  • Arrange EIGRP course confirmation

  • Test 4: Configure Secure Layer 2 Infrastructure

  • Arrange Secure Layer 2 Infrastructure

  • Test 5: Configure DHCP Snooping and STP Protection

  • Arrange DHCP Snooping and STP Protection

  • Test 6: Configure Interfaces and NAT on the Cisco ASA

  • Arrange Interfaces and NAT on Cisco ASA

  • Test 7: Configure Network Access Control with the Cisco ASA

  • Design Network Access Control with the Cisco ASA

  • Test 8: Configure Site-to-Site VPN on IOS

  • Design Site-to-Site VPN on IOS

  • Test 9: Configure AnyConnect Remote Access VPN on ASA

  • Design AnyConnect Remote Access VPN on ASA

  • Test 10: Configure Clientless SSL VPN on the ASA

  • Arrange Clientless SSL VPN on the ASA

The information and aptitude that a student must have before going to this course are as per the following:

  • Aptitudes and information equal to those educated in Interconnecting Cisco Networking Devices Part 1 (ICND1)

  • Working learning of the Windows working framework

  • Working learning of Cisco IOS systems administration and ideas


Are you being sponsored by your employer to take this class?
 
Email
 
Contact No.
 
Message
 
 
  • *I authorize Microtek Learning to contact me via Phone/Email