Week 1
Day 1 - February 2, 09:00- 18:00 (Lunch 12:00- 13:00)
  • 1.0 Common Security Threats
  • 1.1 Describe common security threats
    • 1.1.a Common threats to the physical installation
    • 1.1.b Mitigation methods for common network attacks
    • 1.1.c Email-based threats
    • 1.1.d Web-based attacks
    • 1.1.e Mitigation methods for Worm, Virus, and Trojan Horse attacks
    • 1.1.f Phases of a secure network lifecycle
    • 1.1.g Security needs of a typical enterprise with a comprehensive security policy
    • 1.1.h Mobile/remote security
    • 1.1.i DLP
Day 2 - February 3, 09:00- 18:00 (Lunch 12:00- 13:00)
  • 2.0 Security and Network Routers
  • 2.1 Implement security on network routers
    • 2.1.a CCP Security Audit feature
    • 2.1.b CCP One-Step Lockdown feature
    • 2.1.c Secure router access using strong encrypted passwords, and using IOS login enhancements, IPV6 security
    • 2.1.d Multiple privilege levels
    • 2.1.e Role-Based CLI
    • 2.1.f Cisco IOS image and configuration files
  • 2.2 Describe securing the control, data, and management plane
  • 2.3 Describe CSM
  • 2.4 Describe IPv4 to IPv6 transition
    • 2.4.a Reasons for IPv6
    • 2.4.b Understanding IPv6 addressing
    • 2.4.c Assigning IPv6 addresses
    • 2.4.d Routing considerations for IPv6
Day 3 - February 4, 09:00- 18:00 (Lunch 12:00- 13:00)
  • 3.0 AAA on Network Devices
    • 3.1 Implement AAA (authentication, authorization, and accounting)
    • 3.1a AAA using CCP on routers
    • 3.1b AAA using CLI on routers and switches
    • 3.1c AAA on ASA
  • 3.2 Describe TACACS+
  • 3.3 Describe RADIUS
  • 3.4 Describe AAA
    • 3.4.a Authentication
    • 3.4.b Authorization
    • 3.4.c Accounting
Day 4 - February 5, 09:00- 18:00 (Lunch 12:00- 13:00)
  • 4.0 IOS ACLs
  • 4.1 Describe standard, extended, and named IP IOS ACLs to filter packets
    • 4.1.a IPv4
    • 4.1.b IPv6
    • 4.1.c Object groups
    • 4.1.d ACL operations
    • 4.1.e Types of ACLs (dynamic, reflexive, time-based ACLs)
    • 4.1.f ACL wild card masking
    • 4.1.g Standard ACLs
    • 4.1.h Extended ACLs
    • 4.1.i Named ACLs
    • 4.1.j VLSM
  • 4.2 Describe considerations when building ACLs
    • 4.2.a Sequencing of ACEs
    • 4.2.b Modification of ACEs
  • 4.3 Implement IP ACLs to mitigate threats in a network
    • 4.3.a Filter IP traffic
    • 4.3.b SNMP
    • 4.3.c DDoS attacks
    • 4.3.d CLI
    • 4.3.e CCP
    • 4.3.f IP ACLs to prevent IP spoofing
    • 4.3.g VACLs
Day 5 - February 6, 09:00- 18:00 (Lunch 12:00- 13:00)
  • 5.0 Secure Network Management and Reporting
    • 5.1 Describe secure network management
    • 5.1.a In-band
    • 5.1.b Out of band
    • 5.1.c Management protocols
    • 5.1.d Management enclave
    • 5.1.e Management plane
  • 5.2 Implement secure network management
    • 5.2.a SSH
    • 5.2.b Syslog
    • 5.2.c SNMP
    • 5.2.e SCP
    • 5.2.f CLI
    • 5.2.g CCP
    • 5.2.h SSL
Day 6 - February 7, 09:00- 18:00 (Lunch 12:00- 13:00)

Excursion to Network Operating Centre of Central Asian Research Education Network (CAREN) and Kyrgyz Research Educational Network (REN) daily management facilities. Summary and overall practice

Week 2
Day 1 - February 8, 09:00- 18:00 (Lunch 12:00- 13:00)
  • 6.0 Common Layer 2 Attacks
  • 6.1 Describe Layer 2 security using network switches
    • 6.1.a STP attacks
    • 6.1.b ARP spoofing
    • 6.1.c MAC spoofing
    • 6.1.d CAM overflows
    • 6.1.e CDP/LLDP
  • 6.2 Describe VLAN security
    • 6.2.a Voice VLAN
    • 6.2.b PVLAN
    • 6.2.c VLAN hopping
    • 6.2.d Native VLAN
  • 6.3 Implement VLANs and trunking
    • 6.3.a VLAN definition
    • 6.3.b Grouping functions into VLANs
    • 6.3.c Considering traffic source to destination paths
    • 6.3.d Trunking
    • 6.3.e Native VLAN
    • 6.3.f VLAN Trunking Protocols
    • 6.3.g Inter-VLAN Routing
  • 6.4 Implement spanning tree
    • 6.4.a Potential issues with redundant switch topologies
    • 6.4.b STP operations
    • 6.4.c Implement spanning tree
Day 2 - February 9, 09:00- 18:00 (Lunch 12:00- 13:00)
  • 7.0 Firewall Technologies
  • 7.1 Describe operational strengths and weaknesses of the different firewall technologies
    • 7.1.a Proxy firewalls
    • 7.1.b Packet and stateful packet
    • 7.1.c Application firewall
    • 7.1.d Personal firewall
  • 7.2 Describe stateful firewalls
    • 7.2.a Operations
    • 7.2.b Function of the state table
  • 7.3 Describe the types of NAT used in firewall technologies
    • 7.3.a Static
    • 7.3.b Dynamic
    • 7.3.c PAT
  • 7.4 Implement zone based policy firewall using CCP
    • 7.4.a Zone to zone
    • 7.4.b Self zone
Day 3 - February 24, 09:00- 18:00 (Lunch 12:00- 13:00)
  • 7.5 Implement Adaptive Security Appliance (ASA)
    • 7.5.a NAT
    • 7.5.b ACL
    • 7.5.c Default MPF
    • 7.5.d Cisco Adaptive Security Appliance (ASA) sec level
  • 7.6 Implement Network Address Translation (NAT) and Port Address Translation (PAT)
    • 7.6.a Functions of NAT, PAT, and NAT Overload
    • 7.6.b Translating Inside Source addresses
    • 7.6.c Overloading Inside global addresses
Day 4 - February 11, 09:00- 18:00 (Lunch 12:00- 13:00)
  • 8.0 Intrusion Prevention System
  • 8.1 Describe Intrusion Prevention System (IPS) deployment considerations
    • 8.1.a SPAN
    • 8.1.b IPS product portfolio
    • 8.1.c Placement
    • 8.1.d Caveats
  • 8.2 Describe IPS technologies
    • 8.2.a Attack responses
    • 8.2.b Monitoring options
    • 8.2.c Syslog
    • 8.2.d SDEE
    • 8.2.e Signature engines
    • 8.2.f Signatures
    • 8.2.g Global correlation and SIO
    • 8.2.h Network-based
    • 8.2.i Host-based
  • 8.3 Configure Cisco IOS IPS using CCP
    • 8.3.a Logging
    • 8.3.b Signatures
Day 5 - February 12, 09:00- 18:00 (Lunch 12:00- 13:00)
  • 9.0 VPN Technologies
  • 9.1 Describe the different methods used in cryptography
    • 9.1.a Symmetric
    • 9.1.b Asymetric
    • 9.1.c HMAC
    • 9.1.d Message digest
    • 9.1.e PKI
  • 9.2 Describe VPN technologies
    • 9.2.a IPsec
    • 9.2.b SSL
  • 9.3 Describe the building blocks of IPSec
    • 9.3.a IKE
    • 9.3.b ESP
    • 9.3.c AH
    • 9.3.d Tunnel mode
    • 9.3.e Transport mode
  • 9.4 Implement an IOS IPSec site-to-site VPN with pre-shared key authentication
    • 9.4.a CCP
    • 9.4.b CLI
  • 9.5 Verify VPN operations
  • 9.6 Implement SSL VPN using ASA device manager
    • 9.6.a Clientless
    • 9.6.b AnyConnect
Day 6 - February 13, 09:00- 18:00 (Lunch 12:00- 13:00)
  • 10. Monitoring , Security & Resource management
  • 10.1 Monitoring Tools
    • a. Monitoring Web Server (Webalizer, Awstats)
    • ab. MRTG + RRD Tools
    • ac. Nagios + Plugins
    • ad. Cacti
    • ae. ZenOSS
    • af. NetflowAnalizer (NFSEN+plugins)
    • ag. Network protocol Analizers (TCP Dump / Ethereal)
    • ah. Port scanning tool (Nmap)
    • ai. Trouble Ticketing System (osticket)
    • aj. Configuration management and its role
  • 10.2 Security Services
    • a. Secure RemoteAaccess Services (SSH, Webmin)
    • b. TCP Wrappers
    • c. Firewall (iptables, shorewall)
    • d. ClamAV
    • e. IDS/IPS (Snort)
    • f. VPN in general (PPTP, IPSec, OpenVPN)