 |  |  |
 |
 | Module 1 -
10:
Objectives |
|  |
 |
 | : Vulnerabilities, Threats, and Attacks |
 | Upon completion of this Module, you will be able to perform tasks related to: |
 |
 | |
| Introduction to Network Security |
 |
| Introduction to Vulnerabilities, Threats, and Attacks |
 |
| Attack Examples |
 |
| Vulnerability Analysis |
| |
|  |
 |
 | : Security Planning and Policy |
 | Upon completion of this Module, you will be able to perform tasks related to: |
 |
 | |
| Discussing Network Security and Cisco |
 |
| Endpoint Protection and Management |
 |
| Network Protection and Management |
 |
| Security Architecture |
 |
| Basic Router Security |
| |
|  |
 |
 | : Security Devices |
 | Upon completion of this Module, you will be able to perform tasks related to: |
 |
 | |
| Device Options |
 |
| Using Security Device Manager |
 |
| Introduction to the Cisco Security Appliance Family |
 |
| Getting Started with the PIX Security Appliance |
 |
| PIX Security Appliance Translations and Connections |
 |
| Manage a PIX Security Appliance with Adaptive Security Device Manager |
 |
| PIX Security Appliance Routing Capabilities |
 |
| Firewall Services Module Operation |
| |
|  |
 |
 | : Trust and Identity Technology |
 | Upon completion of this Module, you will be able to perform tasks related to: |
 |
 | |
| AAA |
 |
| Authentication Technologies |
 |
| Identity Based Networking Services (IBNS) |
 |
| Network Admission Control (NAC) |
| |
|  |
 |
 | : Cisco Secure Access Control Server |
 | Upon completion of this Module, you will be able to perform tasks related to: |
 |
 | |
| Cisco Secure Access Control Server for Windows |
 |
| Configuring RADIUS and TACACS+ with CSACS |
| |
|  |
 |
 | : Configure Trust and Identity at Layer 3 |
 | Upon completion of this Module, you will be able to perform tasks related to: |
 |
 | |
| Cisco IOS Firewall Authentication Proxy |
 |
| Introduction to PIX Security Appliance AAA Features |
 |
| Configure AAA on the PIX Security Appliance |
| |
|  |
 |
 | : Configure Trust and Identity at Layer 2 |
 | Upon completion of this Module, you will be able to perform tasks related to: |
 |
 | |
| Identity-Based Networking Services (IBNS) |
 |
| Configuring 802.1x Port-Based Authentication |
| |
|  |
 |
 | : Configure Filtering on a Router |
 | Upon completion of this Module, you will be able to perform tasks related to: |
 |
 | |
| Filtering Technologies |
 |
| Cisco IOS Firewall Context-Based Access Control |
 |
| Configure Cisco IOS Firewall Context-Based Access Control |
| |
|  |
 |
 | : Configure Filtering on a PIX Security Appliance |
 | Upon completion of this Module, you will be able to perform tasks related to: |
 |
 | |
| Configure ACLs and Content Filters |
 |
| Object Grouping |
 |
| Configure a Security Appliance Modular Policy |
 |
| Configure Advanced Protocol Inspection |
| |
|  |
 |
 | : Configure Filtering on a Switch |
 | Upon completion of this Module, you will be able to perform tasks related to: |
 |
 | |
| Introduction to Layer 2 Attacks |
 |
| MAC Address, ARP, and DHCP Vulnerabilities |
 |
| VLAN Vulnerabilities |
 |
| Spanning-Tree Protocol Vulnerabilities |
| |
|  |
 |  |  |