Week 1
|
Day 1 - February 2, 09:00- 18:00 (Lunch 12:00- 13:00)
|
- 1.0 Common Security Threats
- 1.1 Describe common security threats
- 1.1.a Common threats to the physical installation
- 1.1.b Mitigation methods for common network attacks
- 1.1.c Email-based threats
- 1.1.d Web-based attacks
- 1.1.e Mitigation methods for Worm, Virus, and Trojan Horse attacks
- 1.1.f Phases of a secure network lifecycle
- 1.1.g Security needs of a typical enterprise with a comprehensive security policy
- 1.1.h Mobile/remote security
- 1.1.i DLP
|
Day 2 - February 3, 09:00- 18:00 (Lunch 12:00- 13:00)
|
- 2.0 Security and Network Routers
- 2.1 Implement security on network routers
- 2.1.a CCP Security Audit feature
- 2.1.b CCP One-Step Lockdown feature
- 2.1.c Secure router access using strong encrypted passwords, and using IOS login enhancements, IPV6 security
- 2.1.d Multiple privilege levels
- 2.1.e Role-Based CLI
- 2.1.f Cisco IOS image and configuration files
- 2.2 Describe securing the control, data, and management plane
- 2.3 Describe CSM
- 2.4 Describe IPv4 to IPv6 transition
- 2.4.a Reasons for IPv6
- 2.4.b Understanding IPv6 addressing
- 2.4.c Assigning IPv6 addresses
- 2.4.d Routing considerations for IPv6
|
Day 3 - February 4, 09:00- 18:00 (Lunch 12:00- 13:00)
|
- 3.0 AAA on Network Devices
- 3.1 Implement AAA (authentication, authorization, and accounting)
- 3.1a AAA using CCP on routers
- 3.1b AAA using CLI on routers and switches
- 3.1c AAA on ASA
- 3.2 Describe TACACS+
- 3.3 Describe RADIUS
- 3.4 Describe AAA
- 3.4.a Authentication
- 3.4.b Authorization
- 3.4.c Accounting
|
Day 4 - February 5, 09:00- 18:00 (Lunch 12:00- 13:00)
|
- 4.0 IOS ACLs
- 4.1 Describe standard, extended, and named IP IOS ACLs to filter packets
- 4.1.a IPv4
- 4.1.b IPv6
- 4.1.c Object groups
- 4.1.d ACL operations
- 4.1.e Types of ACLs (dynamic, reflexive, time-based ACLs)
- 4.1.f ACL wild card masking
- 4.1.g Standard ACLs
- 4.1.h Extended ACLs
- 4.1.i Named ACLs
- 4.1.j VLSM
- 4.2 Describe considerations when building ACLs
- 4.2.a Sequencing of ACEs
- 4.2.b Modification of ACEs
- 4.3 Implement IP ACLs to mitigate threats in a network
- 4.3.a Filter IP traffic
- 4.3.b SNMP
- 4.3.c DDoS attacks
- 4.3.d CLI
- 4.3.e CCP
- 4.3.f IP ACLs to prevent IP spoofing
- 4.3.g VACLs
|
Day 5 - February 6, 09:00- 18:00 (Lunch 12:00- 13:00)
|
- 5.0 Secure Network Management and Reporting
- 5.1 Describe secure network management
- 5.1.a In-band
- 5.1.b Out of band
- 5.1.c Management protocols
- 5.1.d Management enclave
- 5.1.e Management plane
- 5.2 Implement secure network management
- 5.2.a SSH
- 5.2.b Syslog
- 5.2.c SNMP
- 5.2.e SCP
- 5.2.f CLI
- 5.2.g CCP
- 5.2.h SSL
|
Day 6 - February 7, 09:00- 18:00 (Lunch 12:00- 13:00)
|
Excursion to Network Operating Centre of Central Asian Research Education Network (CAREN) and Kyrgyz Research Educational Network (REN) daily management facilities.
Summary and overall practice
|