CISCO -
CCSP - SECUR (642-501)
Description
Securing Cisco IOS Networks (SECUR) is one of four exams required to achieve
Cisco Security Specialist, and is an elective for the Cisco Certified
Internetworking Professional (CCIP) designation. The SECUR trainingcourse
from ATS meets or exceeds all exam objectives for the Cisco SECUR exam.
Expert instructor Michael Storm explains network security essentials including
security policy development and evaluating security threats, as well as
demonstrating how to configure various CiscoSecure components including
PIX firewalls, perimeter routers and virtual private network clients.
At the conclusion of this training course you will understand basic network
security principles and be prepared to pass Cisco SECUR exam.
|
|
Course
Outline
Module 1
Section A: Introduction Overview Cisco Certifications Advanced Certification
Outline
Section B: Security Weaknesses Unit One Primary Network Security Issue Security
Issues Technology Weaknesses TCP/IP Weaknesses OS & Network Weaknesses Configuration
Weaknesses Security Policy Weaknesses
Section C: CiscoSecure Products Overview PIX Firewall Integrated Software VPN
Client Access Control Server CiscoSecure Scanner Intruder Detection System Consulting
Services
Section D: Cisco's Security Approach Overview Rules 1-2 Rules 3-4 Rules 5-6
Rules 7-9 Rules 10-12 Cisco Security Solution
Section E: Network Reconnaissance Know Your Enemy Internal & External Threats
Network Intrusion Reconnaissance Target Discovery Ping Sweeps & Port Scans
Eavesdropping Counter-reconnaissance
Section F: Unauthorized Access Overview Gain Privileged Access Password Attacks
Gain Secondary Access Unsecure IP Applications Countermeasures Examples Attack
Prevention
Module 2
Section A: Denial of Service Overview Resource Overload Attack Out-of-Band Data
Attack Overlapped Packet Other DOS Attacks Countermeasures
Section B: Data Manipulation Overview IP Spoofing Session Replay & Hijacking
Session Replay Exploit Rerouting Exploit
Section C: Network Case Study Background Information Project Scope Security
Goals Dialup Access Internet Access Departments Proposed Secure Network
Section D: Network Security Policy Cost of Security Security Posture Assessment
SPA Phases Policy Rules Policy Requirements Policy Comments Using a Policy Monitor
Network Security Test Security Auditing Tools Random Auditing Improve Security
Posture
Section E: Securing the Admin Interface Potential Threats Common Vulnerabilities
Physical Devices Control Access Administrative Interface Secure Router Encrypt
Passwords Control Telnet Access
Section F: Securing SNMP Control SNMP Access SNMP Agent Functions SNMP Agent
Configuration Configuration Example Configure Traps & Informs
Module 3
Section A: Router-to-Router Security Overview Plaintext Authentication MDS Authentication
Secure Configuration Files Control Route Updates Filter Options Inside-out Network
Filter Router HTTP Control
Section B: Securing Ethernet Switches Password Options Telnet and SNMP Access
Switchport Security Campus Security Lab Verify Configuration Configure MD5 View
Configuration Secure SNMP Secure Telnet View Configuration
Section C: AAA Authentication AAA Security Architecture AAA Technology Protect
Access with AAA Authentication Methods S/Key Authentication S/Key Server Component
Token Card Authentication PAP & CHAP Authentication
Section D: AAA Security Authorization Methods Accounting Methods AAA Security
Servers TACACS RADIUS Kerberos Version 5 CiscoSecure ACS ACS for Windows NT
ACS for UNIX CiscoSecure GRS
Section E: AAA NAS Configuration NAS AAA Steps Secure Access Ports Globally
Enable AAA AAA Authentication Authentication Examples AAA Authorization AAA
Accounting Debut & Log
Module 4
Section A: CiscoSecure ACS Overview CSNT Features CSNT Requirements CSUNIX Features
ACS Interface User Setup Group Setup Network Configuration System Configuration
Interface Configuration
Section B: The Perimeter Environment Perimeter Routers Router Features Firewall
Feature Set Perimeter Components Firewall Implementations Firewall Products
Section C: Perimeter IOS Features Prevent Internet Attacks TCP/IP Control Commands
Packet Filtering Lock-and-Key Prevent DOS Attacks Control SYN Attacks Network
Layer Encryption
Section D: Perimeter Configuration Address Management NAT & PAT Translations
Dynamic NAT Logging Events Lab Requirements Security Configuration Access Lists
Section E: IOS Firewall Overview Intrusion Detection IDS Example IOS Firewall
Planning CBAC CBAC Restrictions CBAC Configuration
Section F: PIX Firewall Features Overview PIX Firewall Features Additional Features
Module 5
Section A: Basic PIX Operations Basic Concepts Adaptive Security Algorithm ASA
Advantages ASA Example ASA Operation Conduits & Static Static & Conduit
Example Rowe Command Cut-through Proxy
Section B: PIX Firewall Models Higher PIX Models Lower PIX Models Configure
PIX Firewall PDM Configuration Command Line Configuration
Section C: Basic PIX Configuration PIX Interface Security Built-in Security
Rules Additional Configuration Firewall Translations Test Basic Config Case
Study Complete Basic Config
Section D: Advanced PIX Configuration Overview Network Address Translation NAT
Commands NAT Example Required Configuration Multimedia Applications PIX Mail
Guard Other Protocols Syslog Output Other Useful Commands
Section E: PIX Management Functions PIX AAA Support PIX AAA Configuration Outbound
Access Control Outbound Access Examples URL Filtering SNMP on the PIX Configure
SNMP Failover Option Failover Configuration
Module 6
Section A: PIX Advanced Lab Requirements PIX Configuration More PIX Config
Section B: PIX Legacy VPN VPN Features Legacy VPN Example PPTP Support CiscoSecure
Policy Manager PIX Maintenance
Section C: Understanding Encryption Technology Encryption Benefits Encryption
Components Encryption Types DES Encryption MD5 Message Hashing DSS Encryption
Diffie-Hellman Key Agreement
Section D: Implementing CET Overview CET Operation Configure CET Crypto Maps
Test & Verify Diagnose Encryption CET Implementation
Section E: IPSec Basics Overview VPN Protocols IPSec Security Associations IKE
IPSec Transforms IPSec Modes IPSec Protection Scale IPSec Networks
Section F: Configuring IPSec Configuration Phases Preparation Preparing Sub-steps
IKE Policy IPSec Policy Final Prep Steps - IPSec Create Peer Policy Configure
Preshared Keys Verify IKE Policy Configure IPSec - Phase III Transform Sets
& Lifetimes Crypto ACL/Cry Test & Verify IPSec - Phase IV PIX Firewall
Section G: Scaling IPSec Using CA Sample CA Configuration Verify & Update
CA Use Dynamic Crypto MAP VPN Lab Configuration Check IPSec Configuration
Price Per User £ 810 (Bundle of 6)
Complementary Courses
Cisco VPN Secuity Training
Cisco PIX Firewall
Cisco CSIDS Intrusion Detection Systems
Cisco SAFE
Security+
<<Back
<<Contact Us
|