Module 1 - 10: Objectives

: Vulnerabilities, Threats, and Attacks
Upon completion of this Module, you will be able to perform tasks related to:
Introduction to Network Security
Introduction to Vulnerabilities, Threats, and Attacks
Attack Examples
Vulnerability Analysis

: Security Planning and Policy
Upon completion of this Module, you will be able to perform tasks related to:
Discussing Network Security and Cisco
Endpoint Protection and Management
Network Protection and Management
Security Architecture
Basic Router Security

: Security Devices
Upon completion of this Module, you will be able to perform tasks related to:
Device Options
Using Security Device Manager
Introduction to the Cisco Security Appliance Family
Getting Started with the PIX Security Appliance
PIX Security Appliance Translations and Connections
Manage a PIX Security Appliance with Adaptive Security Device Manager
PIX Security Appliance Routing Capabilities
Firewall Services Module Operation

: Trust and Identity Technology
Upon completion of this Module, you will be able to perform tasks related to:
AAA
Authentication Technologies
Identity Based Networking Services (IBNS)
Network Admission Control (NAC)

: Cisco Secure Access Control Server
Upon completion of this Module, you will be able to perform tasks related to:
Cisco Secure Access Control Server for Windows
Configuring RADIUS and TACACS+ with CSACS

: Configure Trust and Identity at Layer 3
Upon completion of this Module, you will be able to perform tasks related to:
Cisco IOS Firewall Authentication Proxy
Introduction to PIX Security Appliance AAA Features
Configure AAA on the PIX Security Appliance

: Configure Trust and Identity at Layer 2
Upon completion of this Module, you will be able to perform tasks related to:
Identity-Based Networking Services (IBNS)
Configuring 802.1x Port-Based Authentication

: Configure Filtering on a Router
Upon completion of this Module, you will be able to perform tasks related to:
Filtering Technologies
Cisco IOS Firewall Context-Based Access Control
Configure Cisco IOS Firewall Context-Based Access Control

: Configure Filtering on a PIX Security Appliance
Upon completion of this Module, you will be able to perform tasks related to:
Configure ACLs and Content Filters
Object Grouping
Configure a Security Appliance Modular Policy
Configure Advanced Protocol Inspection

: Configure Filtering on a Switch
Upon completion of this Module, you will be able to perform tasks related to:
Introduction to Layer 2 Attacks
MAC Address, ARP, and DHCP Vulnerabilities
VLAN Vulnerabilities
Spanning-Tree Protocol Vulnerabilities



Close Window
All contents copyright ©2001-2005 Cisco Systems, Inc. All rights reserved.