Online And On-Site Computer Training Across The USA. CISSP CASP Security+ A+ MCDBA MCST MCSE CCNA CCNP CCVP CCSP PMP ITIL Web Design Certification Courses


Exam 640-554 Training: Implementing Cisco IOS Network Security (IINS) Offical Edition

YOUR TRUSTED, ON-SITE, ONLINE, AND HOME-STUDY TRAINING PARTNER
Please help us to share the discount!

Online, Home and Office Study at Affordable Price for Exam 640-554 Training.
Product ID: RTK-CIS-640-554

Implementing Cisco IOS Network Security

The Best Alternative to In-Class Training:

I bought it @RTEK 2000! best online exam 640-554 training
  • Repeat as many times as you want;
  • Full Audio, Video, and Demonstration components;
  • Interactive Hands-on-lab Simulations;
  • Access the course with your iPhone or iPad;
  • Learn at your place (home or office)
  • Schedule at your own pace and time: 24x7!

Shortcuts to:

  Save hundred of dollars with RTEK 2000!
Order Now! for only USD$435.00!
(Orig: $495.00). $60.00 instant discount!

Cisco CCNA Security Training - OnDemand Learning for certification examSchedule our instructor led classroom training at your convenience and never miss another lecture or fall behind. We have invited the brightest Cisco Trainers in the industry to help us develop the ultimate training and certification program which includes everything you will need to fully prepare for the Cisco certification exams.

Cisco CCNA Security Training - OnDemand Learning for certification examCisco Certified Network Associate Security (CCNA Security) validates associate-level knowledge and skills required to secure Cisco networks. With a CCNA Security certification, a network professional demonstrates the skills required to develop a security infrastructure, recognize threats and vulnerabilities to networks, and mitigate security threats. The CCNA Security curriculum emphasizes core security technologies, the installation, troubleshooting and monitoring of network devices to maintain integrity, confidentiality and availability of data and devices, and competency in the technologies that Cisco uses in its security structure.

Our Cisco CCNA Security training program strictly follows the Cisco's Official training curriculums.

Package Includes:
  • 12 months online access featuring live instructor-led classroom sessions with full audio, video and demonstration components
  • Interactive Chapter Review Quizzes
  • Access the course with your iPhone or iPad;
  • Proven technique- Actual Exam Secrets Review
  • Free 1 Year Upgrade Policy

The Expert Trainers:
Exam 640-554 Trainer Kenneth Mayer - Certified CEH Trainer (CCSI, MCT, CCNP, CCDA)

Ken is a Microsoft Certified Trainer as well as a Cisco Certified Trainer, Linux Trainer and Security Consultant. He started his career in computer technology in the 1980's and has gone on to offer a wide variety of IT training and high level consulting projects for Fortune 500 companies across the United States and Western Europe. Ken has been involved in nearly all aspects of the Enterprise Network Architecture, from the Network Operating systems of Microsoft, Novell, and Linux platforms to the infrastructure design, implementation, and management using Cisco and Juniper products. His many certifications include MS Networking Trainer & Consultant - Windows 2003/2008, Microsoft Certified Instructor (MCT), Cisco Certified Instructor (CCSI), CCNA, CCDA, CCNP, CISSP, Juniper Certified Instructor, Juniper JNCIA, JNCIS, JNCIP (M-Series), Juniper JNCIS (Enterprise Routing), Juniper JNCIA/S (FWV/SSL/IDP), Certified Ethical Hacker (EC Council) certified trainer and consultant, Certified Computer Examiner (Digital Forensics), Certified Pen Testing Specialist and Instructor.



Course Outline
click on module name!
Module 1 - Introduction to Network Security Principles
  • Introduction to Network Security Principles
  • Examining Network Security Fundamentals
  • Threats to Security
  • Addressing Internal Threats
  • External Threats
  • Threat Capabilities - More Dangerous and Easier to Use
  • Size of the Problem
  • The Evolution of Intent
  • Vulnerable Custom Applications
  • Network Security Objectives
  • Confidentiality
  • Integrity
  • Availability
  • Information Classification
  • Classification Levels
  • Classification Criteria
  • Information Classification Procedures
  • Distribution of Classified Materials
  • Information Classification Roles
  • Security Controls
  • Administrative Controls
  • Technical Controls
  • Physical Controls
  • Type of Controls
  • Computer Crime Investigations
  • Computer Crime Complications
  • Collection of Evidence
  • Types of Law
  • Ethics
  • Liability
  • Legal and Government Policy Issues
  • Section 1 - Review
  • Examining Network Attack Methodologies
  • Vulnerabilities, Risks, and Exploits
  • Main Vulnerability Categories
  • The Human Vulnerability Factor
  • Adversaries
  • Hackers, Crackers, and Phreakers
  • Computer Security Hackers
  • Motivations
  • Academic Hackers
  • Hobby Hackers
  • Thinking Like a Hacker
  • The Purpose of Defense in Depth
  • What Is Defense in Depth?
  • Examples of Defense in Depth
  • Early Defense in Depth Example
  • Defense in Depth Technical Example
  • Defense in Depth Non-Example
  • IP Spoofing
  • IP Spoofing - A Technical Discussion
  • IP Spoofing - Types of Attack
  • IP Source Routing Options
  • Man-in-the-Middle Attacks
  • Demo - MITM
  • Confidentiality Violations
  • Ping Sweeps and Port Scans
  • Packet Sniffers
  • Emanations Capturing
  • Overt and Covert Channels
  • Overt Channel Example
  • Stenography
  • Covert Channel Example
  • Phishing, Pharming, and Identity Theft
  • Integrity Violations
  • Trust Exploitation
  • Port Redirection
  • Password Attacks
  • Availability Violations
  • Botnets
  • DoS and DDoS Attacks
  • DDoS Example
  • TCP SYN Flooding
  • DoS Attacks Using ICMP
  • Smurf Attack
  • Electrical Power
  • Computing Environment
  • Best Practices to Defeat Hackers
  • Section 2 - Review
  • Examining Operations Security
  • Operations Security
  • Secure Network Lifecycle
  • Initiation Phase
  • Acquisition and Development Phase
  • Implementation Phase
  • Operations and Maintenance Phase
  • Disposition Phase
  • Principles of Operations Security
  • Separation of Duties
  • Rotation of Duties
  • Trusted Recovery
  • Change and Configuration Control
  • Network Security Testing and the System Development Life Cycle
  • Security Testing Techniques
  • Common Testing Tools
  • Nmap
  • SuperScan by Foundstone
  • Disaster Recovery and Business Continuity Planning
  • Disaster Recovery
  • Disruptions
  • Backups
  • Section 3 - Review
  • Understanding and Developing a Comprehensive Network Security Policy
  • Figure Out What You Are Protecting
  • Why Do You Need a Security Policy?
  • Who Uses the Security Policy?
  • Components of a Comprehensive Security Policy
  • Governing Policy Comes from the Top
  • Technical and End-User Policies
  • Standards, Guidelines, and Procedures
  • Standards
  • Guidelines
  • Procedures
  • Responsibilities for the Security Policy
  • Threat Identification and Risk Analysis
  • Risk Analysis
  • Quantitative Risk Analysis Formula
  • Benefits of Risk Analysis
  • Threat Identification and Risk Analysis Example
  • Risk Management and Risk Avoidance
  • Manage the Risk
  • Avoid the Risk
  • Secure Network Design Factors
  • Realistic Assumptions
  • Realistic Assumptions Example
  • Least Privilege Concept
  • Least Privilege Example
  • Design and Implementation Simplicity
  • Simplicity Example
  • Security Awareness
  • Awareness
  • Education and Training
  • Results of Security Awareness
  • Section 4 - Review
  • Building Cisco Self-Defending Networks
  • Threat Evolution
  • A Blurred Network Perimeter
  • The SQL Slammer Worm 30 minutes After "Release"
  • Cisco Self-Defending Network Overview
  • Benefits of Cisco Self-Defending Networks
  • Collaborative Systems Enabling Unparalleled Security
  • Cisco Self-Defending Network Defined
  • Threat Control and Containment
  • Secure Communications - Secure Data, Voice, Video, and Wireless
  • Operational Control and Policy Management
  • Cisco Security Manager Overview
  • Cisco Security MARS
  • Secure Network Platform
  • Section 5 - Review
  • Module 1 Review
Module 2 - Perimeter Security
  • Perimeter Security
  • Securing Administrative Access to Cisco Routers
  • Router Security Principles
  • How Routers Enforce Perimeter Security Policy
  • Cisco Integrated Services Routers
  • Cisco Integrated Services Router Features
  • Local and Remote Administrative Access
  • Configuring the Router Passwords
  • Password Creation Rules
  • Configuring a Router Password
  • Setting Timeouts for Router Lines
  • Configuring Minimum Password Lengths
  • Enhanced Username Password Security
  • Securing ROM Monitor
  • Configuring Multiple Privilege Levels
  • Configuring Role-Based CLI
  • Example: Creating a View Named "NetOps"
  • Example: Verifying Commands Available to the NetOps View
  • Securing the Cisco IOS Image and Configuration Files
  • Configuring Enhanced Support for Virtual Logins
  • Configuring Banner Messages
  • Section 1 - Review
  • Introducing Cisco SDM
  • Cisco SDM Overview
  • Starting Cisco SDM and Cisco SDM Express
  • Files Required to Run Cisco SDM from a Router
  • Launching Cisco SDM Express
  • Launching Cisco SDM
  • Navigating the Cisco SDM Interface
  • Cisco SDM Wizards in Configure Mode
  • Configure Mode - Advanced Configuration
  • Monitor Mode
  • Demo - Password Protecting a Router
  • Demo - Login Policies
  • Demo - View Editing
  • Section 2 - Review
  • Configuring AAA on a Cisco Router Using the Local Database
  • AAA Model - Network Security Architecture
  • Implementing Cisco AAA
  • Implementing Authentication Using Local Services
  • Authenticating Router Access
  • Router Local Authentication Configuration Steps
  • Configuring User Accounts Using Cisco SDM
  • Enabling and Disabling AAA Using Cisco SDM
  • Configuring AAA Authentication Using Cisco SDM
  • Additional AAA CLI Commands
  • AAA Configuration Example
  • Troubleshooting AAA Using the debug aaa authentication Command
  • Section 3 - Review
  • Configuring AAA on a Cisco Router to Use Cisco Secure ACS
  • Why Use Cisco Secure ACS?
  • Implementing Authentication Using External Servers
  • Cisco Secure ACS
  • Cisco Secure ACS Features
  • Cisco Secure ACS from Windows
  • Cisco Secure ACS Solution Engine
  • Cisco Secure ACS Express 5.0
  • Cisco Secure ACS View 4.0
  • TACACS+ and RADIUS AAA Protocols
  • TACACS+ Overview
  • RADIUS Overview
  • TACACS+/RADIUS Comparison
  • Cisco Secure ACS Prerequisites
  • Cisco Secure ACS 4.1 Homepage
  • Network Configuration
  • Interface Configuration
  • External Databases
  • Windows Database
  • Unknown User Policy
  • Group Setup
  • User Setup
  • Adding a AAA Server
  • Creating a AAA Login Authentication Policy
  • Applying an Authentication Policy
  • Creating a AAA Exec Authorization Policy
  • Creating a AAA Network Authorization Policy
  • AAA Accounting Configuration
  • AAA Configuration for TACACS+ Example
  • debug tacacs
  • debug tacacs events
  • Demo - AAA Authentication
  • Demo - Authentication Servers
  • Demo - ACS Server
  • Section 4 - Review
  • Implementing Secure Management and Reporting
  • Considerations for Secure Management and Reporting
  • Secure Management and Reporting Architecture
  • Secure Management and Reporting Guidelines
  • Syslog Systems
  • Cisco Security MARS
  • Cisco Security MARS Process Flow
  • Implementing Log Messaging for Security
  • Cisco Log Severity Levels
  • Log Message Format
  • Enabling Syslog Logging
  • Using Logs to Monitor Network Security
  • SNMPv1 and SNMPv2 Architecture
  • Community Strings
  • SNMPv3 Architecture
  • SNMP Security Models and Levels
  • Enabling SNMP with Cisco SDM
  • SNMP Trap Receiver
  • Secure Shell
  • Enabling SSH Using Cisco SDM
  • VTY Settings
  • Configuring an SSH Daemon Using the CLI
  • Manually Configuring Data and Time Settings
  • Network Time Protocol
  • Enabling NTP with Cisco SDM
  • Section 5 - Review
  • Locking Down the Router
  • Vulnerable Router Services and Interfaces
  • Management Service Vulnerabilities
  • Security Audit Home Page
  • Performing a Security Audit
  • Performing a One-Step Lockdown
  • Locking Down a Router Using Cisco Auto Secure
  • Limitations and Cautions
  • Demo - Router Hardening
  • Section 6 - Review
  • Module 2 Review
Module 03 - Network Security Using Cisco IOS Firewalls
  • Network Security Using Cisco IOS Firewalls
  • Introducing Firewall Technologies
  • What is a Firewall?
  • Expanding on the Definition
  • Firewall Benefits
  • Firewall Limitations
  • Firewalls in a Layered Defense Strategy
  • Static Packet Filtering Firewalls
  • Static Packet Filtering Example
  • Advantages and Disadvantages of Packet Filters
  • Application Layer Gateways
  • Proxy Server Communication Process
  • Advantages, Limitations, and Uses of Application Layer Gateways
  • Dynamic or Stateful Packet Filtering
  • Stateful Packet Filtering
  • Uses and Limitations of Stateful Packet Filters
  • Application Inspection Firewalls
  • Transparent Firewalls
  • Cisco IOS Firewall Features
  • Cisco Security Router Certifications
  • Cisco PIX 500 Series Security Appliances
  • Cisco ASA 5500 Series Adaptive Security Appliances
  • Firewall Best Practices
  • Section 1 - Review
  • Creating Static Packet Filters Using ACLs
  • Access Control Lists
  • Mitigating Threats Using ACLs
  • Outbound ACL Operation
  • Inbound ACL Operation
  • A List of Tests - Deny of Permit
  • Types of IP ACLs
  • Identifying ACLs
  • IP Access List Entry Sequence Numbering
  • ACL Configuration Guidelines
  • Wildcard Bits - How to Check the Corresponding Address Bits
  • Wildcard Bits to Match IP Subnets
  • Wildcard Bit Mask Abbreviations
  • Numbered Standard IPv4 ACL Configuration
  • Numbered Standard IPv4 ACL
  • Applying Standard ACLs to Control vty Access
  • Numbered Extended IPv4 ACL Configuration
  • Established Command
  • Displaying ACLs
  • Guidelines for Developing ACLs
  • ACL Caveats
  • ACL Editor - Access Rules
  • Standard Rule
  • Associate with an Interface (1)
  • Extended Rule
  • Associate with an Interface (2)
  • Routing Protocol Entries
  • IP Address Spoof Mitigation - Inbound
  • IP Address Spoof Mitigation - Outbound
  • Filtering ICMP Messages - Inbound
  • Filtering ICMP Messages - Outbound
  • Permitting Common Services
  • Router Service Traffic
  • Demo - ACL
  • Section 2 - Review
  • Configuring Cisco IOS Zone-Based Policy Firewall
  • Cisco IOS Zone-Based Policy Firewall
  • In the Beginning
  • Traditional Cisco IOS Firewall Stateful Inspection
  • The New Era: Cisco IOS Zone-Based Policy Firewall
  • Benefits of Zone-Based Policy Firewall
  • Zone-Based Policy Firewall Actions
  • Zone-Based Policy Firewall Rules for Application Traffic
  • Zone-Based Policy Firewall Rules for Router Traffic
  • Basic Firewall Configuration Wizard
  • Basic Firewall Interface Configuration
  • Applying Security Policy
  • Finishing the Wizard
  • Manually Configuring a Zone-Based Policy Firewall
  • Define Zones
  • Define Class Maps
  • Define Policy Maps
  • Assign Policy Maps to Zone Pairs
  • Reviewing the Cisco IOS Zone-Based Policy Firewall
  • Cisco IOS Zone-Based Firewall Policy Configuration
  • Viewing the Firewall Log
  • Monitoring the Cisco IOS Zone-Based Policy Firewall
  • Section 3 - Review
  • Module 3 Review
Module 4 - Site-to-Site VPNs
  • Site-to-Site VPNs
  • Examining Cryptographic Services
  • Cryptology Overview
  • Cryptography History
  • Substitution Cipher
  • Vigenere Cipher
  • Transposition
  • One-Time Pads
  • Transforming Plaintext into Ciphertext
  • Cryptanalysis
  • Encryption Algorithm Features
  • Encryption Keys
  • Symmetric Encryption Algorithms
  • Asymmetric Encryption Algorithms
  • Block and Stream Ciphers
  • Choosing an Encryption Algorithm
  • Key Comparisons
  • Overview of Cryptographic Hashes
  • What Is Key Management?
  • Keyspaces
  • Key Length Issues
  • SSL Overview
  • SSL Tunnel Establishment
  • Section 1 - Review
  • Examining Symmetric Encryption
  • Symmetric Encryption Overview
  • Symmetric Encryption Key Lengths
  • Acceptable Key Lengths
  • DES
  • DES Modes
  • DES ECB vs. CBC Mode
  • DES Usage Guidelines
  • 3DES
  • 3DES Encryption Process
  • AES
  • SEAL
  • RC Algorithms
  • Section 2 - Review
  • Examining Cryptographic Hashes and Digital Signatures
  • Overview of Hash Algorithms and HMACs
  • What Is a Hash Function?
  • Hashing in Action
  • Hashed Message Authentication Code
  • HMAC in Action
  • Message Digest 5
  • Secure Hash Algorithm 1
  • MD5 and SHA-1 Compared
  • Hash and HMAC Best Practices
  • Overview of Digital Signatures
  • Digital Signatures in Action
  • Digital Signatures Example
  • Digital Signature Standard
  • Digital Signature Best Practices
  • Section 3 - Review
  • Examining Asymmetric Encryption and PKI
  • Asymmetric Encryption Overview
  • Asymmetric Encryption Algorithms
  • Public Key Confidentiality Scenario
  • Asymmetric Confidentiality Process
  • Public Key Authentication Scenario
  • Asymmetric Authentication Process
  • RSA Algorithm
  • RSA Digital Signatures
  • RSA Usage Guidelines
  • The DH Algorithm
  • The DH Key Exchange Algorithm
  • Trusted Third-Party Protocols
  • Trusted Third-Party Example
  • PKI Terminology and Components
  • PKI Topologies - Single - Root CA
  • PKI Topologies - Hierarchical Cas
  • PKI Topologies - Cross - Certified Cas
  • PKI and Usage Keys
  • PKI Server Offload
  • Overview of Standardization
  • X.509v3
  • Public-Key Cryptography Standards
  • Simple Certificate Enrollment Protocol
  • Identity Management Using Digital Certificates and CAs
  • Retrieving CA Certificates
  • Certificate Enrollment
  • Authentication Using Certificates
  • Features of Digital Certificates and CAs
  • Caveats of Digital Certificates and CAs
  • Applications of Certificates
  • Section 4 - Review
  • Examining IPSec Fundamentals
  • What Is a VPN?
  • Benefits of VPNs
  • Site-to-Site VPNs
  • Remote-Access VPNs
  • Cisco IOS SSL VPN
  • Cisco VPN Products
  • Cisco VPN-Enabled IOS Routers
  • Cisco ASA Adaptive Security Appliances
  • VPN Clients
  • Hardware-Based Encryption
  • What is IPSec?
  • IPSec Security Services
  • Encryption Algorithms
  • DH Key Exchange
  • Data Integrity
  • Authentication
  • IPSec Advantages
  • IPSec Versus SSL
  • IPSec Security Protocols
  • Authentication Header
  • AH Authentication and Integrity
  • Encapsulating Security Payload
  • ESP Protocol
  • Modes of Use - Tunnel Versus Transport Mode
  • Tunnel Mode
  • IPSec Framework
  • Internet Key Exchange
  • IKE Communication Negotiation Phases
  • IKE Phase 1
  • First Exchange - IKE Policy Is Negotiated
  • Second Exchange - DH Key Exchange
  • Third Exchange - Authenticate Peer Identity
  • IKE Phase 2
  • Section 5 - Review
  • Building a Site-to-Site IPSec VPN
  • Site-to-Site IPSec VPN
  • Site-to-Site IPSec Configuration
  • Step 1: Ensure That ACLs Are Compatible with IPSec
  • Step 2: Create ISAKMP (IKE) Policies
  • IKE Policy Negotiation
  • Configure PSKs
  • Site-to-Site IPSec Configuration - Phase 1
  • Step 3: Configure Transform Sets
  • Transform Set Negotiation
  • Purpose of Crypto ACLs
  • Step 4: Create Crypto ACLs Using Extended ACLs
  • Configure Symmetric Peer Crypto ACLs
  • Crypto Map Parameters
  • Step 5: Configure IPSec Crypto Maps
  • Example: Crypto Map Commands
  • Applying Crypto Maps to Interfaces
  • Test and Verify IPSec
  • show crypto isakmp policy Command
  • show crypto ipsec transform-set Command
  • show crypto map Command
  • show crypto ipsec sa
  • Section 6 - Review
  • Configuring IPSec on a Site-to-Site VPN Using Cisco SDM
  • Introducing the Cisco SDM VPN Wizard Interface
  • Site-to-Site VPN Components
  • Launching the Site-to-Site VPN Wizard
  • Quick Setup
  • Step-by-Step Setup
  • Connection Settings
  • IKE Proposals
  • IPSec Transform Sets
  • Option 1: Single Source and Destination Subnet
  • Option 2: Using an ACL
  • Review the Generated Configuration
  • Test Tunnel Configuration and Operation
  • Monitor Tunnel Operation
  • Advanced Monitoring
  • Troubleshooting
  • Demo - IPSec
  • Section 7 - Review
  • Module 4 Review
Module 5 - Network Security Using Cisco IOS IPS
  • Network Security Using Cisco IOS IPS
  • Introducing IPS Technologies
  • Defining IDS and IPS
  • IDS and IPS Common Characteristics
  • IDS and IPS Operational Differences
  • Comparing IDS and IPS Solutions
  • Types of IDS and IPS Sensors
  • IPS Attack Responses
  • Event Monitoring and Management
  • Cisco IPS Management Software
  • Cisco IDS Event Viewer
  • Cisco Security MARS
  • HIPS Features
  • How HIPS Operates
  • Cisco HIPS Deployment
  • Network IPS Features
  • Cisco Network IPS Deployment
  • Comparing HIPS and Network IPS
  • Cisco IPS Appliances
  • Cisco IPS 4200 Series Sensors
  • Cisco ASA AIP-SSM
  • Cisco Catalyst 6500 Series IDSM-2
  • Cisco IPS AIM
  • IPS Signature Operational Characteristics
  • Signature Micro-Engines
  • Supported Signature Micro-Engines
  • Cisco Signature Alarm Types
  • Implementing Alarms in Signatures
  • IPS Configuration Best Practices
  • Section 1 - Review
  • Configuring Cisco IOS IPS Using Cisco SDM
  • Cisco IOS IPS Intrusion Prevention Technology
  • Primary Benefits of the Cisco IOS IPS Solution
  • Cisco IOS IPS Signature Features
  • Using Cisco SDM to Configure IPS
  • IPS Policies Wizard
  • IPS Config Location and Category
  • IPS Policy Summary
  • Cisco IOS IPS CLI Configuration
  • Setting Signature Severity
  • Configuring Signature Actions
  • Editing Signatures Using Cisco SDM
  • Support for SDEE and Syslog
  • Viewing SDEE Alarm Messages
  • Viewing Syslog IPS Alarms
  • Verifying IPS Policies
  • Verify IPS Operation
  • Section 2 - Review
  • Module 5 Review
Module 6 - LAN, SAN, Voice, and Endpoint Security Overview
  • LAN, SAN, Voice, and Endpoint Security Overview
  • Examining Endpoint Security
  • Cisco Host Security Strategy
  • Software Security Concepts
  • Operating System Vulnerabilities
  • Application Vulnerabilities
  • Input Validation
  • Buffer Overflows
  • Types of Buffer Overflows
  • Worms, Viruses, and Trojan Horses
  • Anatomy of a Worm Attack
  • Worm and Virus - Exploit Comparison (~20 Yrs)
  • IronPort Perimeter Security Appliances
  • IronPort E-Mail Security Appliance
  • IronPort Web Security Appliance
  • Cisco NAC Products
  • NAC Framework
  • Cisco NAC Appliance Overview - Components
  • Cisco NAC Appliance Overview - Process Flow
  • Cisco NAC Appliance Overview - Agent
  • Cisco Security Agent Architecture
  • Appliance, Kernel, and Interceptors
  • Cisco Security Agent Interceptors
  • Cisco Security Agent Attack Response
  • Operating System Guidelines
  • Application Guidelines
  • Section 1 - Review
  • Examining SAN Security
  • What Is a SAN?
  • Why Use SANs?
  • Benefits of a SAN
  • SAN Basics
  • LUN Masking
  • World Wide Names
  • Fibre Channel Fabric Zoning
  • Virtual SANs
  • SAN Security Scope
  • SAN Management Threats
  • Fabric and Target Access Threats
  • Target Access Security - Zoning
  • IP Storage and Transmission Security
  • Section 2 - Review
  • Examining Voice Security
  • What is VoIP?
  • Business Case for VoIP
  • Components of a VoIP Network
  • Major VoIP Protocols
  • Threats to IP Telephony Endpoints
  • Spam over IP Telephony
  • SPIT Example
  • Fraud
  • SIP Vulnerabilities
  • Separate Voice VLAN
  • Protect IP Telephony with Firewalls
  • Protect IP Telephony with VPNs
  • Protect IP Telephony Endpoints
  • Protect IP Telephony Servers
  • Section 3 - Review
  • Mitigating Layer 2 Attacks
  • Why Worry About Layer 2 Security?
  • Domino Effect
  • VLAN Overview
  • VLAN Hopping by Rogue Trunk
  • VLAN Hopping by Double Tagging
  • Mitigating VLAN Hopping Network Attacks
  • Redundant Topology
  • Loop Resolution with STP
  • STP Operation
  • STP Root Bridge Selection
  • STP Manipulation
  • PortFast
  • BPDU Guard
  • Root Guard
  • Verifying BPDU Guard
  • CAM Table Overflow Attack
  • MAC Address Spoofing Attack
  • Port Security
  • Configuring Port Security
  • Configuring Port Security Aging
  • Port Security Example
  • Verifying Port Security
  • Notification of Intrusions
  • Switched Port Analyzer
  • Remote SPAN
  • Lan Storm
  • Storm Control
  • Layer 2 Security Best Practices
  • Demo - Layer 2 Security
  • Section 4 - Review
  • Module 6 Review
  • Course Closure

Course Features:

  • Video Lectures and Expert Instruction
    Practical knowledge is essential for success in a real world environment and we have chosen our instructors with this in mind - many of our instructors are business owners and have been employed in their respective fields for decades!
  • PowerPoint
    Utilizing PowerPoint presentations enhances the delivery by displaying a variety of visual information to the user. This type of representation allows the user to better interpret the material through charts, definitions, graphs, and more...
  • Easy Navigation
    Move forward, back, and repeat entire topics or just a section. A progress bar illuminates as you advance through exercises.
  • Printable Study Guides
    Printable study guides for the entire course are available. This allows all material to be viewed, reviewed, and printed for viewing at a later date.
  • Review Exercises
    Each section has a review quiz to aid in the learning process by validating the comprehension of the material covered before moving on to a new section.
  • Resume Option
    All courses are resumed to where you left off last session allowing you to learn when it is convenient for you without the hassle of remembering where you where.
  • Full Motion Video
    All courses feature full-motion videos of instructors teaching the information as if they are speaking directly to you. Our unique delivery simulates a one-on-one classroom environment creating a more personal lesson and learning experience.
  • Certificate of Completion
    Upon completion of your training course, you will receive a Certificate of completion displaying your full name, course completed as well as the date of completion. You can print this out or save it digitally to showcase your accomplishment.
  • Live, Hands-On Demonstrations
    Demonstrations are a way for the instructor to show and tell the user how to perform a task by actually doing it on screen in front of them.
  • Mobile Access: All our training courses are now available across all mobile devices.