Onemind Services Partner with Training World 360 for our training delivery and Lab delivery is Backed up our Partner Cloudmylab.

Implementing Cisco IOS Network Security**CCNA Security** (IINS v3.0)

Overview/Objective


Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles and technologies, using Cisco security products to provide hands-on examples. Using instructor-led discussions, extensive hands-on lab exercises, and supplemental materials, this course allows learners to understand common security concepts, and deploy basic security techniques utilizing a variety of popular security appliances within a “real-life” network infrastructure.

Upon completing this course, the learner will be able to meet these overall objectives:

  • Describe common network security concepts
  • Secure routing and switching infrastructure
  • Deploy basic authentication, authorization and accounting services
  • Deploy basic firewalling services
  • Deploy basic site-to-site and remote access VPN services
  • Describe the use of more advanced security services such as intrusion protection, content security and identity management




Course outline


Module 1: Security Concepts


    • Lesson 1: Threatscape

      • Threatscape Overview

      • DoS and DDoS

      • Spoofing

      • Reflection and Amplification Attacks

      • Social Engineering

      • Evolution of Phishing

      • Password Attacks

      • Reconnaissance Attacks

      • Buffer Overflow Attacks

      • Man-in-the-Middle Attacks

      • Malware

      • Vectors of Data Loss and Exfiltration

      • Hacking Tools

      • Other Considerations

      • Summary







    • Lesson 2: Threat Defense Technologies

      • Firewalls

      • Intrusion Prevention Systems

      • Content Security

      • VPNs

      • Endpoint Security

      • Logging

      • Summary







    • Lesson 3: Security Policy and Basic Security Architectures

      • Information Security Overview

      • Classifying Assets, Vulnerabilities, and Countermeasures

      • Managing Risk

      • Regulatory Compliance

      • Principles of Secure Network Design

      • Security Policy

      • Security Zones

      • The Functional Planes of the Network

      • Summary







    • Lesson 4: Cryptographic Technologies

      • Cryptography Overview

      • Hash Algorithms

      • Encryption Overview

      • Cryptanalysis

      • Symmetric Encryption Algorithms

      • Asymmetric Encryption Algorithms

      • Use Case: SSH

      • Digital Signatures

      • PKI Overview

      • PKI Operations

      • Use Case: SSL/TLS

      • Key Management

      • Discovery 1: Exploring Cryptographic Technologies

      • Summary







    • Lesson 5: Module Summary

      • References







    • Lesson 6: Module Self-Check




Module 2: Secure Network Devices


    • Lesson 1: Implementing AAA

      • Introduction to AAA

      • AAA Databases

      • AAA Protocols

      • AAA Servers

      • SSH Configuration and Operation on IOS

      • IOS Authorization with Privilege Levels

      • Implementing Local AAA Authentication and Authorization

      • Authorization with Role-Based CLI

      • TACACS+ on IOS

      • Discovery 2: Configure and Verify AAA

      • Summary







    • Lesson 2: Management Protocols and Systems

      • IOS File System

      • Copying Files to and from Network Devices

      • Validating IOS Images Using MD5

      • Digitally Signed Images

      • IOS Resilient Configuration

      • NTP

      • Syslog

      • Memory and CPU Threshold Notifications

      • Netflow

      • Configuration Management Protocol Options

      • HTTPS Configuration and Operation

      • SNMPv3 Configuration and Operation

      • Locking Down Management Access with ACLs

      • Other Password Considerations

      • Discovery 3: Configuration Management Protocols

      • Summary







    • Lesson 3: Securing the Control Plane

      • The Control Plane

      • Control Plane Policing

      • Control Plane Protection

      • Authenticating Routing Protocols

      • OSPF Route Authentication

      • EIGRP Route Authentication

      • Discovery 4: Securing Routing Protocols







    • Lesson 4: Module Summary

      • References







    • Lesson 5: Module Self-Check




Module 3: Layer 2 Security


    • Lesson 1: Securing Layer 2 Infrastructure

      • Introduction to Layer 2 Security

      • Ethernet Switching Overview

      • VLAN Overview

      • VLAN Configuration

      • 802.1Q Trunking

      • Trunk Attacks

      • Trunk Configuration and Attack Mitigation

      • CDP

      • ACL Primer

      • ACLs on Switches

      • MAC Address Abuse

      • Port Security

      • Private VLANs

      • Private VLAN Edge

      • Private VLAN Proxy Attack and Mitigation

      • Discovery 5: VLAN Security and ACLs on Switches

      • Discovery 6: Port Security and Private VLAN Edge

      • Summary







    • Lesson 2: Securing Layer 2 Protocols

      • STP Overview

      • STP Attacks

      • STP Attack Mitigation

      • DHCP Overview

      • DHCP Attacks

      • DHCP Snooping

      • ARP Overview

      • ARP Cache Poisoning Attack

      • Dynamic ARP Inspection

      • Discovery 7: Securing DHCP, ARP, and STP

      • Summary







    • Lesson 3: Module Summary

      • References







    • Lesson 4: Module Self-Check




Module 4: Firewall


    • Lesson 1: Firewall Technologies

      • Firewall Overview

      • Packet Filters

      • Stateful Firewalls

      • Proxy Servers

      • Next Generation Firewalls

      • Logging

      • Discovery 8: Explore Firewall Technologies

      • Summary







    • Lesson 2: Introducing the Cisco ASA v9.2

      • Introducing the Cisco ASA Family of Security Appliances

      • Cisco ASA Firewall Features

      • Modes of Deployment

      • Security Contexts

      • High-Availability and Failover

      • Configuring Management Access on the Cisco ASA

      • Configuring Cisco ASA Interfaces

      • NAT Fundamentals

      • Configure NAT on Cisco ASA

      • Configure Static NAT on Cisco ASA

      • Configure Dynamic NAT on Cisco ASA

      • Configure PAT on Cisco ASA

      • Configure Policy NAT on Cisco ASA

      • Verify NAT Operations

      • Discovery 9: Cisco ASA Interfaces and NAT

      • Summary







    • Lesson 3: Cisco ASA Access Control and Service Policies

      • Overview of Interface Access Rules

      • Configure Interface Access Rules

      • Configure Object Groups

      • Introducing Cisco ASA Modular Policy Framework

      • Configuring Cisco MPF Service Policy Rules

      • Discovery 10: Access Control Using the Cisco ASA

      • Summary







    • Lesson 4: Cisco IOS Zone Based Firewall

      • Zone-Based Policy Firewall Overview

      • Zones and Zone Pairs

      • Introduction to Cisco Common Classification Policy Language

      • Default Policies, Traffic Flows, and Zone Interaction

      • Cisco Common Classification Policy Language (C3PL) Configuration Overview

      • Configuring Zone-Based Policy Firewall Class-Maps

      • Configuring Zone-Based Policy Firewall Policy-Maps

      • Discovery 11: Exploring Cisco IOS Zone-Based Firewall

      • Summary







    • Lesson 5: Module Summary

      • References







    • Lesson 6: Module Self-Check




Module 5: VPN


    • Lesson 1: IPsec Technologies

      • IPsec VPNs

      • IPsec Security Services

      • IPsec Framework

      • Internet Key Exchange

      • IKE Phase 1

      • ISAKMP Configuration

      • IPsec Protocols

      • IKE Phase 2

      • IPsec Configuration

      • Suite B Cryptographic Standard

      • IKE Version 2

      • IPsec with IPv6

      • Discovery 12: Explore IPsec Technologies

      • Summary







    • Lesson 2: Site-to-Site VPN

      • Site-to-Site Tunnel Negotiation Process

      • Configuring Site-to-Site IPsec VPN

      • Step 1: Ensure That ACLs Are Compatible with IPsec

      • Step 2: Create ISAKMP IKE Phase 1 Policies

      • Step 3: Configure Transform Sets

      • Step 4: Create Crypto ACLs Using Extended ACLs

      • Step 5: Configure IPsec Crypto Maps

      • Verifying the IPsec Configuration

      • Configuring Site-to-Site VPN on Cisco ASA

      • Monitoring Site-to-Site VPN Configuration in ASDM

      • Discovery 13: IOS-Based Site-to-Site VPN

      • Discovery 14: ASA-Based Site-to-Site VPN

      • Summary







    • Lesson 3: Client Based Remote Access VPN

      • Secure Sockets Layer and Transport Layer Security

      • Basic Cisco AnyConnect SSL VPN

      • Cisco AnyConnect SSL VPN Solution Components

      • SSL VPN Server Authentication

      • SSL VPN Client Authentication

      • SSL VPN Client IP Address Assignment

      • Basic AnyConnect SSL VPN Configuration Tasks

      • Discovery 15: Remote Access VPN: ASA and AnyConnect

      • Summary







    • Lesson 4: Clientless Remote Access VPN

      • Cisco Clientless SSL VPN

      • Cisco Clientless SSL VPN Use Cases

      • Cisco Clientless SSL VPN Resource Access Methods

      • Basic Clientless SSL VPN Solution

      • Server Authentication in Basic Clientless SSL VPN

      • Client-Side Authentication in Basic Clientless SSL VPN

      • Clientless SSL VPN URL Entry and Bookmarks

      • Basic Access Control for Clientless SSL VPN

      • Basic Clientless SSL VPN Configuration Tasks

      • Discovery 16: Clientless Remote Access VPN

      • Summary







    • Lesson 5: Module Summary

      • References







    • Lesson 6: Module Self-Check




Module 6: Advanced Topics


    • Lesson 1: Intrusion Detection and Protection

      • Introduction to IPS

      • IPS Terminology

      • Evasion Techniques and Countermeasures

      • Protecting the Network with FireSIGHT

      • FireSIGHT Protection Before an Attack

      • FireSIGHT Protection During an Attack

      • FireSIGHT Protection After an Attack

      • FireSIGHT Deployment Options

      • Inline and Passive Mode Deployment Options

      • Summary







    • Lesson 2: Endpoint Protection

      • Endpoint Security Overview

      • Personal Firewalls

      • Antivirus and Antispyware

      • Centralized Endpoint Policy Enforcement

      • Cisco AMP for Endpoints

      • Summary







    • Lesson 3: Content Security

      • Cisco ESA Deployment

      • Cisco ESA Overview

      • Cisco ESA Features and Benefits

      • Cisco ESA GUI Management

      • Cisco ESA Mail Processing

      • Cisco WSA Deployment

      • Cisco WSA Overview

      • Cisco WSA Features and Benefits

      • Cisco WSA GUI Management

      • Cisco CWS Deployment

      • Cisco CWS Overview

      • Cisco CWS Features and Benefits

      • Summary







    • Lesson 4: Advanced Network Security Architectures

      • Modular Network Architectures

      • Security Issues in Modern Networks

      • Identity Management

      • BYOD Challenge

      • Cisco TrustSec

      • Summary







    • Lesson 5: Module Summary

      • References







    • Lesson 6: Module Self-Check







Audience and Prerequisites


Audience



  • Channel Partners

  • Customers

  • Employees


Prerequisites


The knowledge and skills that a learner must have before attending this course are as follows:



  • Skills and knowledge equivalent to those learned in Interconnecting Cisco Networking Devices Part 1 (ICND1)

  • Working knowledge of the Windows operating system

  • Working knowledge of Cisco IOS networking and concepts




Delivery Method


Web-Based ILT


Duration 5 Days





Implementing Cisco Edge Network Security Solutions**Part of the CCNP Security certification track** (SENSS v1.0)

Overview/Objective


Upon completing this course, you will be able to:



  • Understand current security threat landscape

  • Understanding and implementing Cisco modular Network Security Architectures such as SecureX and TrustSec

  • Deploy Cisco Infrastructure management and control plane security controls

  • Configuring Cisco layer 2 and layer 3 data plane security controls

  • Implement and maintain Cisco ASA Network Address Translations (NAT)

  • Implement and maintain Cisco IOS Software Network Address Translations (NAT)

  • Designing and deploying Cisco Threat Defense solutions on a Cisco ASA utilizing access policy and application and identity-based inspection

  • Implementing Botnet Traffic Filters

  • Deploying Cisco IOS Zone-Based Policy Firewalls (ZBFW)

  • Configure and verify Cisco IOS ZBFW Application Inspection Policy




Course outline


Module 1: Cisco Secure Design Principles




    • Lesson 1: Network Security Zoning

    • Lesson 2: Cisco Module Network Architecture

    • Lesson 3: Cisco SecureX Architecture

    • Lesson 4: Cisco TrustSec Solutions



Module 2: Implement Network Infrastructure Protection




    • Lesson 1: Introducing Cisco Network Infrastructure Architecture

    • Lesson 2: Deploying Cisco IOS Control Plane Security Controls

    • Lesson 3: Deploying Cisco IOS Management Plane Security Controls

    • Lesson 4: Deploying Cisco ASA Management Plane Security Controls

    • Lesson 5: Deploying Cisco Traffic Telemetry Methods

    • Lesson 6: Deploying Cisco IOS Layer 2 Data Plane Security Controls

    • Lesson 7: Deploying Cisco IOS Layer 3 Data Plane Security Controls



Module 3: Deploying NAT on Cisco IOS and Cisco Adaptive Security Appliance (ASA)




    • Lesson 1: Introducing Network Address Translation

    • Lesson 2: Deploying Cisco ASA Network Address Translation

    • Lesson 3: Deploying Cisco IOS Software Network Address Translation



Module 4: Deploying Threat Controls on Cisco ASA




    • Lesson 1: Introducing Cisco Threat Controls

    • Lesson 2: Deploying Cisco ASA Basic Access Controls

    • Lesson 3: Deploying Cisco ASA Application Inspection Policies

    • Lesson 4: Deploying Cisco ASA Botnet Traffic Filtering

    • Lesson 5: Deploying Cisco ASA Identity Based Firewall



Module 5: Deploying Threat Controls on Cisco IOS Software




    • Lesson 1: Deploying Cisco IOS Software with Basic Zone-Based Firewall Policies

    • Lesson 2: Deploying Cisco IOS Software Zone-Based Firewall with Application Inspection Policies





Audience and Prerequisites


Audience





  • Channel Partners

  • Customers

  • Employees


Prerequisites


The knowledge and skills that a learner must have before attending this course are as follows:



  • Cisco Certified Network Associate (CCNA) certification

  • Cisco Certified Network Associate (CCNA) Security certification

  • Knowledge of Microsoft Windows operating system




Delivery Method


Web-Based ILT


Duration 5 Days





Implementing Cisco Secure Mobility Solutions**Part of the CCNP Security certification track** (SIMOS v1.0)

Overview/Objective


Upon completing this course, you will be able to:

2
    3
  • Understand Cisco Identity Services Engine architecture and access control capabilities
  • 4
  • Understand 802.1X architecture, implementation and operation
  • 5
  • Understand commonly implemented Extensible Authentication Protocols (EAP)
  • 6
  • Implement Public-Key Infrastructure with ISE
  • 7
  • Understand the implement Internal and External authentication databases
  • 8
  • Implement MAC Authentication Bypass
  • 9
  • Implement identity based authorization policies
  • 10
  • Understand Cisco TrustSec features
  • 11
  • Implement Web Authentication and Guest Access
  • 12
  • Implement ISE Posture service
  • 13
  • Implement ISE Profiling
  • 14
  • Understand Bring Your Own Device (BYOD) with ISE
  • 15
  • Troubleshoot ISE
  • 16 Become even more productive with the Pro HTML Editor No ads and limitations Save your settings More features: Custom CSS Auxiliary editor Tag manager Tag and tag attribute filters Purchase The Pro HTML Editor License! Online HTML Editor The best real-time online HTML editor software kit with dynamic instant live visual preview and inline WYSIWYG editor using CKEditor and markup clean-up feature. Includes a HTML viewer, editor, compressor, beautifier and easy formatter. It's impossible to create invalid code with this tool. How To Use The HTML Editor? The operation of this HTML editor with built-in HTML Cleaner is very intuitive and it's working in your browser without installing any additional program. Compose your text using the WYSIWYG editor on the left and adjust formatting of the source code on the right. To convert Microsoft Word, PDF or any other rich-text documents to HTML, simply paste it in the visual editor. Perform bulk operations on the HTML code by clicking the Clean button after adjusting the settings. Before you start composing the content for a live website I advise you to experiment with the features populating the work area with a demo text clicking the Quick Tourmenu item. The visual editor works like a regular text composer program, just use the commands above the text area to adjust the content and in the meantime you'll notice the source editor changing with it. If you're familiar with HTML code composing then you can adjust the code on the right. What Can You Do With This Online WYSIWYG Editor The control panel above the HTML source editor lists the most important commands: – Revert the text back to the state before the cleaning or execution of any other major event. The visual editor has its own Undo button. – The fresh page command starts a new document. The same feature is listed below File / New document. – Deleting the new lines from the HTML code you can compress the source code. – Define replacement rules and execute them. Use the plus button to define new rules and the recycle bin to remove one. – Fill the page with meaningless writing to fill gaps or experiment with the layout. – Pick a color from the palette and use them with the easy Click and Copy feature. Save the active colors for later use or use the advanced color mixer by RGBColorCode.com – Activate automatic scroll. The two editors will scroll together when this option is enabled. – Adjust the font size according to your preferences. – Set up the cleaning options here. Your settings will not be lost when you leave the website. Click the header to select/disable all options. Clean – Execute all options that are checked in the settings (see gear icon above). Other important editing features You can try these HTML editor features to practice and to maximize your coding efficiency. Document converter – To convert any visual document like Excel, PDF, Word to HTML just paste the doc in the visual editor and the markup will show up instantly on the right. Online text editor – Compose documents, just like in a rich text editor. Use the control panel to include images, tables, headings, lists and other items to your paper. Copy - paste – The editor won't allow you to save the documents. For this you have to copy your generated code into a blank text file, change its extension to .html and open it in a web browser. Work with tables – Using the WYSIWYG editor panel you can create a table of any dimmension in only 2 clicks. There's a cleaning option to convert them to styled DIV tags. Undo – Both editors have this function which allows to revert back the document to a previous state, ie. before the cleaning has been performed. Interactive demo – Take a 4-step tour going through the features clicking the Quick Tour menu item. Learn how to use the redactor and experiment with the demo text. Never forget: Have a backup before using this tool to make sure you can always revert back to your original document. Always check your code before publishing on a live website. This editor never saves or sends out your document, all operations are performed on your local computer. Like most websites, this one uses cookies. Div Table Styling Make sure you apply the CSS code below when you publish tables converted to div elements. Try the interactive online table stylerwhich can generate grids from both div and table elements. These are both supported by this editor. Please note that the class names used by us are slightly different than the ones used by DivTable.com. .rTable { display: table; width: 100%;} .rTableRow { display: table-row; } .rTableHeading { background-color: #ddd; display: table-header-group; } .rTableCell, .rTableHead { display: table-cell; padding: 3px 10px; border: 1px solid #999999; } .rTableHeading { display: table-header-group; background-color: #ddd; font-weight: bold; } .rTableFoot { display: table-footer-group; font-weight: bold; background-color: #ddd; } .rTableBody { display: table-row-group; }




    Course outline


    Module 1: Threat Mitigation Through Identity Services



    • Lesson 1: Identity Services

    • Lesson 2: 802.1X and EAP

    • Lesson 3: Identity System Quick Start

    • Lesson 4: Module Summary


    Module 2: Cisco Identity Services Engine (ISE) Fundamentals



    • Lesson 1: Cisco ISE Overview

    • Lesson 2: Cisco ISE with PKI

    • Lesson 3: Cisco ISE Authentication

    • Lesson 4: Configuring Cisco ISE for External Authentication

    • Lesson 5: Module Summary


    Module 3: Advanced Access Control



    • Lesson 1: Certificate-based User Authentication

    • Lesson 2: Authorization

    • Lesson 3: Security Group Access (SGA) and MACsec Implementation

    • Lesson 4: Module Summary


    Module 4: Web Authentication and Guest Access



    • Lesson 1: Describe the Cisco Email Security Solutions

    • Lesson 2: Guest Access Services

    • Lesson 3: Summary


    Module 5: Endpoint Access Control Enhancements



    • Lesson 1: Posture

    • Lesson 2: Profiler

    • Lesson 3: BYOD

    • Lesson 4: Summary


    Module 6: Troubleshooting Network Access Control



    • Lesson 1: Troubleshooting Network Access Control

    • Lesson 2: Summary




    Audience and Prerequisites


    Audience





    • Channel Partners

    • Customers

    • Employees


    Prerequisites


    The knowledge and skills that a learner must have before attending this course are as follows:



    • Cisco Certified Network Associate (CCNA) certification

    • Cisco Certified Network Associate (CCNA) Security certification

    • Knowledge of Microsoft Windows operating system








    Delivery Method


    Web-Based ILT Duration 5 Days





    Implementing Cisco Secure Access Solutions**Part of the CCNP Security certification track** (SISAS v1.0)

    Overview/Objective


    Upon completing this course, you will be able to:

    2
      3
    • Understand Cisco Identity Services Engine architecture and access control capabilities
    • 4
    • Understand 802.1X architecture, implementation and operation
    • 5
    • Understand commonly implemented Extensible Authentication Protocols (EAP)
    • 6
    • Implement Public-Key Infrastructure with ISE
    • 7
    • Understand the implement Internal and External authentication databases
    • 8
    • Implement MAC Authentication Bypass
    • 9
    • Implement identity based authorization policies
    • 10
    • Understand Cisco TrustSec features
    • 11
    • Implement Web Authentication and Guest Access
    • 12
    • Implement ISE Posture service
    • 13
    • Implement ISE Profiling
    • 14
    • Understand Bring Your Own Device (BYOD) with ISE
    • 15
    • Troubleshoot ISE
    • 16 Become even more productive with the Pro HTML Editor No ads and limitations Save your settings More features: Custom CSS Auxiliary editor Tag manager Tag and tag attribute filters Purchase The Pro HTML Editor License! Online HTML Editor The best real-time online HTML editor software kit with dynamic instant live visual preview and inline WYSIWYG editor using CKEditor and markup clean-up feature. Includes a HTML viewer, editor, compressor, beautifier and easy formatter. It's impossible to create invalid code with this tool. How To Use The HTML Editor? The operation of this HTML editor with built-in HTML Cleaner is very intuitive and it's working in your browser without installing any additional program. Compose your text using the WYSIWYG editor on the left and adjust formatting of the source code on the right. To convert Microsoft Word, PDF or any other rich-text documents to HTML, simply paste it in the visual editor. Perform bulk operations on the HTML code by clicking the Clean button after adjusting the settings. Before you start composing the content for a live website I advise you to experiment with the features populating the work area with a demo text clicking the Quick Tourmenu item. The visual editor works like a regular text composer program, just use the commands above the text area to adjust the content and in the meantime you'll notice the source editor changing with it. If you're familiar with HTML code composing then you can adjust the code on the right. What Can You Do With This Online WYSIWYG Editor The control panel above the HTML source editor lists the most important commands: – Revert the text back to the state before the cleaning or execution of any other major event. The visual editor has its own Undo button. – The fresh page command starts a new document. The same feature is listed below File / New document. – Deleting the new lines from the HTML code you can compress the source code. – Define replacement rules and execute them. Use the plus button to define new rules and the recycle bin to remove one. – Fill the page with meaningless writing to fill gaps or experiment with the layout. – Pick a color from the palette and use them with the easy Click and Copy feature. Save the active colors for later use or use the advanced color mixer by RGBColorCode.com – Activate automatic scroll. The two editors will scroll together when this option is enabled. – Adjust the font size according to your preferences. – Set up the cleaning options here. Your settings will not be lost when you leave the website. Click the header to select/disable all options. Clean – Execute all options that are checked in the settings (see gear icon above). Other important editing features You can try these HTML editor features to practice and to maximize your coding efficiency. Document converter – To convert any visual document like Excel, PDF, Word to HTML just paste the doc in the visual editor and the markup will show up instantly on the right. Online text editor – Compose documents, just like in a rich text editor. Use the control panel to include images, tables, headings, lists and other items to your paper. Copy - paste – The editor won't allow you to save the documents. For this you have to copy your generated code into a blank text file, change its extension to .html and open it in a web browser. Work with tables – Using the WYSIWYG editor panel you can create a table of any dimmension in only 2 clicks. There's a cleaning option to convert them to styled DIV tags. Undo – Both editors have this function which allows to revert back the document to a previous state, ie. before the cleaning has been performed. Interactive demo – Take a 4-step tour going through the features clicking the Quick Tour menu item. Learn how to use the redactor and experiment with the demo text. Never forget: Have a backup before using this tool to make sure you can always revert back to your original document. Always check your code before publishing on a live website. This editor never saves or sends out your document, all operations are performed on your local computer. Like most websites, this one uses cookies. Div Table Styling Make sure you apply the CSS code below when you publish tables converted to div elements. Try the interactive online table stylerwhich can generate grids from both div and table elements. These are both supported by this editor. Please note that the class names used by us are slightly different than the ones used by DivTable.com. .rTable { display: table; width: 100%;} .rTableRow { display: table-row; } .rTableHeading { background-color: #ddd; display: table-header-group; } .rTableCell, .rTableHead { display: table-cell; padding: 3px 10px; border: 1px solid #999999; } .rTableHeading { display: table-header-group; background-color: #ddd; font-weight: bold; } .rTableFoot { display: table-footer-group; font-weight: bold; background-color: #ddd; } .rTableBody { display: table-row-group; }




      Course outline


      Module 1: Threat Mitigation Through Identity Services



      • Lesson 1: Identity Services

      • Lesson 2: 802.1X and EAP

      • Lesson 3: Identity System Quick Start

      • Lesson 4: Module Summary


      Module 2: Cisco Identity Services Engine (ISE) Fundamentals



      • Lesson 1: Cisco ISE Overview

      • Lesson 2: Cisco ISE with PKI

      • Lesson 3: Cisco ISE Authentication

      • Lesson 4: Configuring Cisco ISE for External Authentication

      • Lesson 5: Module Summary


      Module 3: Advanced Access Control



      • Lesson 1: Certificate-based User Authentication

      • Lesson 2: Authorization

      • Lesson 3: Security Group Access (SGA) and MACsec Implementation

      • Lesson 4: Module Summary


      Module 4: Web Authentication and Guest Access



      • Lesson 1: Describe the Cisco Email Security Solutions

      • Lesson 2: Guest Access Services

      • Lesson 3: Summary


      Module 5: Endpoint Access Control Enhancements



      • Lesson 1: Posture

      • Lesson 2: Profiler

      • Lesson 3: BYOD

      • Lesson 4: Summary


      Module 6: Troubleshooting Network Access Control



      • Lesson 1: Troubleshooting Network Access Control

      • Lesson 2: Summary




      Audience and Prerequisites


      Audience





      • Channel Partners

      • Customers

      • Employees


      Prerequisites


      The knowledge and skills that a learner must have before attending this course are as follows:



      • Cisco Certified Network Associate (CCNA) certification

      • Cisco Certified Network Associate (CCNA) Security certification

      • Knowledge of Microsoft Windows operating system








      Delivery Method


      Web-Based ILT Duration 5 Days





      Implementing Cisco Threat Control Solutions**Part of the CCNP Security certification track** (SITCS v1.5)

      Overview/Objective


      Upon completing this course, you will be able to:



      • Understand current security threat landscape

      • Understanding and implementing Cisco modular Network Security Architectures such as SecureX and TrustSec

      • Deploy Cisco Infrastructure management and control plane security controls

      • Configuring Cisco layer 2 and layer 3 data plane security controls

      • Implement and maintain Cisco ASA Network Address Translations (NAT)

      • Implement and maintain Cisco IOS Software Network Address Translations (NAT)

      • Designing and deploying Cisco Threat Defense solutions on a Cisco ASA utilizing access policy and application and identity-based inspection

      • Implementing Botnet Traffic Filters

      • Deploying Cisco IOS Zone-Based Policy Firewalls (ZBFW)

      • Configure and verify Cisco IOS ZBFW Application Inspection Policy




      Course outline


      Module 1: Cisco Secure Design Principles




        • Lesson 1: Network Security Zoning

        • Lesson 2: Cisco Module Network Architecture

        • Lesson 3: Cisco SecureX Architecture

        • Lesson 4: Cisco TrustSec Solutions



      Module 2: Implement Network Infrastructure Protection




        • Lesson 1: Introducing Cisco Network Infrastructure Architecture

        • Lesson 2: Deploying Cisco IOS Control Plane Security Controls

        • Lesson 3: Deploying Cisco IOS Management Plane Security Controls

        • Lesson 4: Deploying Cisco ASA Management Plane Security Controls

        • Lesson 5: Deploying Cisco Traffic Telemetry Methods

        • Lesson 6: Deploying Cisco IOS Layer 2 Data Plane Security Controls

        • Lesson 7: Deploying Cisco IOS Layer 3 Data Plane Security Controls



      Module 3: Deploying NAT on Cisco IOS and Cisco Adaptive Security Appliance (ASA)




        • Lesson 1: Introducing Network Address Translation

        • Lesson 2: Deploying Cisco ASA Network Address Translation

        • Lesson 3: Deploying Cisco IOS Software Network Address Translation



      Module 4: Deploying Threat Controls on Cisco ASA




        • Lesson 1: Introducing Cisco Threat Controls

        • Lesson 2: Deploying Cisco ASA Basic Access Controls

        • Lesson 3: Deploying Cisco ASA Application Inspection Policies

        • Lesson 4: Deploying Cisco ASA Botnet Traffic Filtering

        • Lesson 5: Deploying Cisco ASA Identity Based Firewall



      Module 5: Deploying Threat Controls on Cisco IOS Software




        • Lesson 1: Deploying Cisco IOS Software with Basic Zone-Based Firewall Policies

        • Lesson 2: Deploying Cisco IOS Software Zone-Based Firewall with Application Inspection Policies





      Audience and Prerequisites


      Audience





      • Channel Partners

      • Customers

      • Employees


      Prerequisites


      The knowledge and skills that a learner must have before attending this course are as follows:



      • Cisco Certified Network Associate (CCNA) certification

      • Cisco Certified Network Associate (CCNA) Security certification

      • Knowledge of Microsoft Windows operating system




      Delivery Method


      Web-Based ILT


      Duration 5 Days





      GET IN TOUCH WITH US

      © 2016 -2020 One Mind Services.

      CONTACT

      Phone: 1-408-540-6771

      Email: info@onemindservices.com

      HQ

      6200 Stoneridge Mall Rd

      Suiite#300

      Pleasanton CA 94588