Those joining this course will get a detailed lesson in the necessity of comprehensive security policy and how it affects the health of the network. You will learn the basics of securing the networks of small office branches using Cisco IOS security features made available using web browser-based graphical interfaces Cisco Router and Security Device Manager, as well as the command-line interface on the Cisco router. You'll be given a broad course on firewall technologies as well as how to configure zone-based policies for firewalls. In addition, you'll both learn how to apply the fundamentals of network security and the inner workings of cryptographic services.
This course is offered as:
This will be a five-day course, and you will be required to take several prerequisite courses before you can attend this class. These include classes in Interconnecting Cisco Network Devices 1 and Interconnecting Cisco Network Devices 2, or the Cisco CCNA Boot Camp v2.0. You'll also need a working knowledge of the Windows operating system.
This class will teach you how to configure and protect routers and switches using pods that include a 2811 router, a 1841 router, and a 3560 switch coupled with a VMware server and 10 Virtual Machines. The topography within these are designed to simulate what you'll experience when working with small to mid-sized business using practical, realistic scenarios.
You'll also take a crash course in the basics of Network Address Translation as well as PAT. This will involve configuring the Network Address Translation at the perimeter so that the internal network can connect to the external network. Then, you must test and verify that the Network Address Translation is working, before finally verifying that the Network Address Translation configurations are sound.
Once this has been completed, you will begin the course on Ethical Hacking. It will first involve a demostration of the vulnerabilities of a network using freely available tools if there has not been proper configuration of the security features. You will then undo these attacks in later lessons.
The next lesson the class will teach you how protect access to the IOS Command Line. You will be required to implement passwords and secrets in order to fulfill the basic security requirements. To this aims you will learn how to program in a minimum length for the passwords.Then, you will need to use the service password encryption feature, before means-testing your password security with a variety of attacks aimed at cracking the passwords. Finally, all that's left is to set privilege levels and verify the IOS-FW Configuration.
The fourth lesson to be taught will be on how to prepare and install Cisco SDM on the configured and secure router. The lab will instruct you on how to maintain public/private key pairs and on how to use self-signed digital certificates to prevent the use of HTTPS from being too cumbersome.
In the fifth lesson, you will be examining Authentication, Authorization, and Accounting (AAA) features using local databases. Users will need to be implemented in the database so that they may be linked to privilege levels set up in previous lessons so that they may be ultimately authorized. Role-based CLI will be introduced so that command sets can be assigned to groups of users.
The sixth lab will involve the aforementioned Authentication, Authorization, and Accounting concepts using Cisco Secure Access Control Server as an AAA server. You will need to integrate with Active Directory in order to match groups for authorization. Finally, you will perform command-level accounting, and test what would happen in case the AAA server fails.
The seventh and eight labs deal collectively with IOS Security Management and IOS Router Services. You will have to configure SSH protocol to give secure connections to the CLI. You will have to create a Syslog so that all security events will be reported to a Syslog server. In addition, you will need to create a security audit using SDM, and run them so that you may analyze the results and determine how it should correct the problems found.
The ninth lab centers around packet filtering and the practical applications of it in securing your computer. You will need to set a packet filtering on the Perimeter Router so that the IOS-FW can be dedicated to dealing with more troublesome issues.
The tenth lab will teach you the power of IOS Zone-Based Firewalls and their place in the stateful inspection of IOS Firewalls, allowing you to deny traffic between zones.
The eleventh and twelfth labs will instruct you on Site-To-Site VPN, teaching you how to configure them and using GRE with IPSec in order to get around the incompatibility between it and the Zone-Based Firewall.
The thirteenth lab will provide a look into IOS IPS Functionality and signature definitions. You will need to use the freely provided IPS Manager Express application to monitor IPS events.
The final lesson will give you a detailed examination on Layer 2 Security. This will teach you how to protect against attackers coming from the same subnet using special security features built into the switch, no matter the topography involved. This lesson will take lessons learned from all of the previous labs and mix them together so that you may learn how to successfully repel such attackers.
Click here to get more information about this class!
Live, Online, Self-Paced, Classroom - contact us for details on each.
Base Course. Best for refresher courses
Most popular self-pace option.
Our top rated trainign experience
As close to the classroom from home
The instructor was the best teacher I have ever had at any level. I learned more in the last 7 days than I did studying on my own for the past 6 months. The material was presented in a way that was easy for everyone to understand. He by far had the most knowledge of anyone I have ever met in the subject and I hope to learn more from him in the future.
- Stephen Muma
I was very pleased with the class and instruction. All material provided was revelant to the course and will provide a good source of review at work.
- Kenneth W. Jones
The instructor was very informative and held a good pace through the material. The hands-on material is great.
- Leo Lee
Booz Allen Hamilton
The course material is excellent. This bootcamp was the best bootcamp I ever attended. I improved my skills tenfold.
- Cesar Culot
The instructors real world experience lent insight towards the material and helped us to apply or study beyond the textbooks. The prestudy material will help guide me as a reference resource in the future. The lab books provided endless excersises to master the skills being taught in the classroom.
- James Tillman
The course materials gave insight to ccna, but more importantly the real world situations.
- Justin Hopper
Cisco Press and Cisco Networking Academy books were excellent. The instructor was very knowledgable, fun, helpful, covered all of the material, clearly presented information and shared great ideas on calculating network size, masks, and hosts.
- Jeffrey L. Paulson
USAF - Schriever AFB
The materials provided are geared to people that may not have the experiene but the knowledge. I plan to study from them often and also take them along with me when working in the field.
- Lisa N. Silverman
The course work was well written, easy to follow and the instructor was willing to stay as late as anyone needed him.
- Matt Waechter
Excellent training material and the best instructor I have ever had.
- J Walsh - CCNA
Very good teacher. Knowledgeable, easy to understand, took the time to help you. Course material was very thorough and it was easy to find the answer to something if i needed too.
- Ryan DiAndrea
General Dynamics CM
I have really enjoyed this boot camp...I am leaving here with a much greater knowledge of Cisco than I had previously. The course materials were spot on!
- Kelly Burnette
My instructor is a genius. He has the perfect combination of knowledge and humor. I learned so much this week and enjoyed every minute of it!
- Matthew Miller
Fantastic instructor! Really knew the material, and was adept at communicating in an understandable manner to those without an IT background. I couldn't ask for a more genuine, concerned instructor who had her students successful learning as the main motivator for everything she did. Simply superb!
- Timothy Dalhouse
A great instructor, very intelligent and well spoken and excellent course materials.
- Jeff Clemmons
Incredible instructor. The coursework covered 300 topics in 10 domains, and he was able to speak intelligently on all of them. Better, his teaching style was relaxed and informal, which lessened the feelings of impending doom about the exam we were about to undertake. He knew exactly which sections of the material to emphasize, when we needed a break, and in many cases was speaking ahead of the slides (he knew exactly what was coming up before turning the slides). Rare gem.
- Thomas Dunn
Georgia Tech Research Institute
My instructor is an excellent instructor. knowledgeable and good in the Net+, generally in computer training and other related area. he is very good. The quality of the course materials are perfect.
- Lucy Fakeye - Net+
One of the most intelligent and well-spoken instructors I have ever had the privilege to work with. His in depth knowledge of the 10 domains in CISSP surpassed my expectations as well as the expectations of my classmates. His teaching style kept the otherwise dry information very memorable and exciting. I would HIGHLY recommend this course to my peers.
National Institutes of Health
Instructor demonstrated advanced knowledge of the subject matter as well as INFOSEC in general. He provided us with all of the tools and reference materials we needed to perform the DIACAP process. The course materials are great!
- TR Piller
My instructor is a freaking genius, however he really enjoys bringing the info and material to life so in a way you do catch a bit of genius by the end of the course.
- Samuel Angura
The instructor was very knowledgeable about the pen testing and ethical hacking. He was great in delivering the lectures, lab and was very helpful in having us complete the capture the flag exercises. In addition, he provided valuable insight about security in general and pen testing in particular.
- Tijan Drammeh
University of Maryland University College
Instructor did a fantastic job of delivering a large set of very dense course material cogently to the class. She obviously had the material down cold and could easily break down elements of the different knowledge domains in clear explanations.
- Byron Caswell
The instructor had an excellent demeanor and candor, very knowledgable about IT industry in general and many different fields in specific.
- Jose Rengel
Instructor was very intelligent and had lots of experience to draw on, outside of the written paterial that made it more interesting. I was very pleased with him.
- Sandra L. Speck
Sandra Speck Company
Instructor was to the point, and stayed on topic. Appreciated that he doesn't get led off tangents by students questions.
- Mark Yu
Excellent instructor. One of the best I have had in over 27 years in the IT business. Genuinely cared about the students understanding the subject material and their success in passing the exam. She taught how to think and reason to pass the test. That is something not found in any text book.
- Craig Calder