This page was exported from Free Cisco Training & Resources - Certification Exam Preparation [ https://www.ciscobibles.com ]
Export date: Fri Mar 29 2:25:43 2024 / +0000 GMT

Train Signal - Cisco CCNA Security 640-553:IINS raining



You cannot be a Cisco Network Administrator without knowing Cisco Security. Today, security knowledge is no longer a luxury, it is a necessity in nearly any IT position. Any job applicant, from the most experienced network admin to the entry level junior admin will be required to demonstrate a substantial amount of knowledge concerning security elements.

Passing the CCNA Security exam and proving your security knowledge is difficult. That's why I have created this comprehensive course that shows you how to tackle the diverse security issues that you will face on the exam and in the real world.

As with all Train Signal courses, this CCNA Security course presents the same combination of clearly explained theory and an abundance of "real world" lab examples using the new Security Device Manager (SDM) and the Command Line. This exciting course contains over 13 hours of video instruction where I break down network security theory as you work hands on with real Cisco routers & switches... and secure your own network!

Video 1

Hackers - Their Motives and Methods

Learn about Hacker Roles and why they hack. Discover what your Network Security Goals should be, and how to implement Network Security Best Practices to achieve those goals to keep from suffering the consequences of ineffective network security.

Video 2

Introduction to SDM (Security Device Manager)

Improve productivity, simplify router deployments, and troubleshoot complex connectivity issues using the Security Device Manager. Plus, launch, login, and tour SDM and discover some Real World SDM issues as you learn to manage your router away from the Command Line.

Video 3

Authentication, Authorization, and Accounting (AAA)

Learn how Authentication works in AAA, what happens when you specify different devices used for Authentication, and discover commands used in Authentication, Authorization, and Accounting that will be useful in the real world and on the exam. Plus, configure TACAS+ and RADIUS security protocols.

Video 4

Layer 2 Security

Learn how to prevent security threats like CAM Overflow attacks by configuring and implementing Port Security, Sticky Addresses, Lightweight Extensible Authentication Protocol (LEAP), and SPAN. Plus, discover the relationship between DHCP Snooping, Dynamic ARP Inspection, and IP Source Guard and learn to configure and operate Root Guard and BPDU Guard.

Video 5

Layer 3 Security

This is one of the most important Videos in the course because of the volume of detailed information that you will use on the exam and in the real world. Learn about "Salting" your MD5 to make an encrypted password even stronger and discover how Network Time Protocol (NTP) will be important in your security deployment. Plus, learn to configure and use Superviews, Autosecure, Security Audits, and One-Step Lockdown via SDM to thwart ICMP based attacks, IP Spoofing, and Recon Attacks.

Video 6

The Intrusion Prevention System (IPS)

Learn the differences between Intrusion Detection (IDS) and Intrusion Prevention (IPS) and how they operate. Plus, discover the different approaches to identifying malicious traffic and learn to use NIPS, HIPS and Honeypots to stop it. We'll also configure your Intrusion Prevention System using the Security Device Manager (SDM) and we'll use the Command Line to verify this IPS configuration.

Video 7

Firewalls

Learn to enable a Cisco router to act as a firewall using the Cisco IOS Firewall Set. Plus, discover concepts relatively new to Cisco like Zone-based Firewalls that are meant to phase out CBAC and the "ip inspect" command. We'll also configure and edit a firewall using the Security Device Manager's (SDM) Basic Firewall Wizard and we'll draw distinctions between the Basic Firewall Wizard and SDM's Advanced Firewall Wizard.

Video 8

Cryptography and Virtual Private Networks (VPNs)

Learn how Asymetric and Symetric Algorithms can be used to implement Cryptography Techniques that help encrypt clear text passwords. Plus, configure your own IKE policy using the Command Line and get your hands dirty by using the Security Device Manager (SDM) to configure Site-to-Site VPN and Generic Routing Encapsulation (GRE) over IPsec.

Video 9

Introduction to Voice and SAN Security

You do not need to be an expert in Voice Networking or Storage Area Networking (SAN) to learn how to keep these types of networks secure. Learn the differences between FCAP and FCPAP, discover the details of LUN and LUN Masking, and delve deeper into VoIP (Voice Over IP). Whatever your experience level may be, this detailed overview of Voice and SAN Networking will provide you the insight you need to get into one of the fastest growing areas in the IT field.

Video 10

Introduction to Cisco Network Solutions

This Video will introduce you to Cisco Network Solutions including: ASA 5500, Cisco Self-Defending Network, Cisco Security Management Suite, and Cisco Security Agent. Plus, learn about the five phases of the Cisco SDLC (System Development Life Cycle) and discover the differences between Quantitative Risk Analysis and Qualitative Risk Analysis.

Download

[This hidden password content is only available for our VIP member]. Become VIP Member NOW

 

 


Post date: 2010-08-11 13:27:23
Post date GMT: 2010-08-11 05:27:23
Post modified date: 2010-08-11 13:27:23
Post modified date GMT: 2010-08-11 05:27:23

Powered by [ Universal Post Manager ] plugin. MS Word saving format developed by gVectors Team www.gVectors.com