Online And On-Site Computer Training Across The USA. CISSP CASP Security+ A+ MCDBA MCST MCSE CCNA CCNP CCVP CCSP PMP ITIL Web Design Certification Courses
YOUR TRUSTED, ON-SITE, ONLINE, AND HOME-STUDY TRAINING PARTNER
Please help us to share the discount!
Online, Home and Office Study at Affordable Price for Exam 640-554 Training.
Product ID: RTK-CIS-640-554
Implementing Cisco IOS Network Security
The Best Alternative to In-Class Training:

- Repeat as many times as you want;
- Full Audio, Video, and Demonstration components;
- Interactive Hands-on-lab Simulations;
- Access the course with your iPhone or iPad;
- Learn at your place (home or office)
- Schedule at your own pace and time: 24x7!
Shortcuts to:
 Schedule our instructor led classroom training at your convenience and never miss another lecture or fall behind. We have invited the brightest Cisco Trainers in the industry to help us develop the ultimate training and certification program which includes everything you will need to fully prepare for the Cisco certification exams.
Cisco Certified Network Associate Security (CCNA Security) validates associate-level knowledge and skills required to secure Cisco networks. With a CCNA Security certification, a network professional demonstrates the skills required to develop a security infrastructure, recognize threats and vulnerabilities to networks, and mitigate security threats. The CCNA Security curriculum emphasizes core security technologies, the installation, troubleshooting and monitoring of network devices to maintain integrity, confidentiality and availability of data and devices, and competency in the technologies that Cisco uses in its security structure.
Our Cisco CCNA Security training program strictly follows the Cisco's Official training curriculums.
Package Includes:
- 12 months online access featuring live instructor-led classroom sessions with full audio, video and demonstration components
- Interactive Chapter Review Quizzes
- Access the course with your iPhone or iPad;
- Proven technique- Actual Exam Secrets Review
- Free 1 Year Upgrade Policy
The Expert Trainers:
Kenneth Mayer - Certified CEH Trainer (CCSI, MCT, CCNP, CCDA)
Ken is a Microsoft Certified Trainer as well as a Cisco Certified Trainer, Linux Trainer and Security Consultant. He started his career in computer technology in the 1980's and has gone on to offer a wide variety of IT training and high level consulting projects for Fortune 500 companies across the United States and Western Europe. Ken has been involved in nearly all aspects of the Enterprise Network Architecture, from the Network Operating systems of Microsoft, Novell, and Linux platforms to the infrastructure design, implementation, and management using Cisco and Juniper products. His many certifications include MS Networking Trainer & Consultant - Windows 2003/2008, Microsoft Certified Instructor (MCT), Cisco Certified Instructor (CCSI), CCNA, CCDA, CCNP, CISSP, Juniper Certified Instructor, Juniper JNCIA, JNCIS, JNCIP (M-Series), Juniper JNCIS (Enterprise Routing), Juniper JNCIA/S (FWV/SSL/IDP), Certified Ethical Hacker (EC Council) certified trainer and consultant, Certified Computer Examiner (Digital Forensics), Certified Pen Testing Specialist and Instructor.
Course Outline
click on module name!
Module 1 - Introduction to Network Security Principles
- Introduction to Network Security Principles
- Examining Network Security Fundamentals
- Threats to Security
- Addressing Internal Threats
- External Threats
- Threat Capabilities - More Dangerous and Easier to Use
- Size of the Problem
- The Evolution of Intent
- Vulnerable Custom Applications
- Network Security Objectives
- Confidentiality
- Integrity
- Availability
- Information Classification
- Classification Levels
- Classification Criteria
- Information Classification Procedures
- Distribution of Classified Materials
- Information Classification Roles
- Security Controls
- Administrative Controls
- Technical Controls
- Physical Controls
- Type of Controls
- Computer Crime Investigations
- Computer Crime Complications
- Collection of Evidence
- Types of Law
- Ethics
- Liability
- Legal and Government Policy Issues
- Section 1 - Review
- Examining Network Attack Methodologies
- Vulnerabilities, Risks, and Exploits
- Main Vulnerability Categories
- The Human Vulnerability Factor
- Adversaries
- Hackers, Crackers, and Phreakers
- Computer Security Hackers
- Motivations
- Academic Hackers
- Hobby Hackers
- Thinking Like a Hacker
- The Purpose of Defense in Depth
- What Is Defense in Depth?
- Examples of Defense in Depth
- Early Defense in Depth Example
- Defense in Depth Technical Example
- Defense in Depth Non-Example
- IP Spoofing
- IP Spoofing - A Technical Discussion
- IP Spoofing - Types of Attack
- IP Source Routing Options
- Man-in-the-Middle Attacks
- Demo - MITM
- Confidentiality Violations
- Ping Sweeps and Port Scans
- Packet Sniffers
- Emanations Capturing
- Overt and Covert Channels
- Overt Channel Example
- Stenography
- Covert Channel Example
- Phishing, Pharming, and Identity Theft
- Integrity Violations
- Trust Exploitation
- Port Redirection
- Password Attacks
- Availability Violations
- Botnets
- DoS and DDoS Attacks
- DDoS Example
- TCP SYN Flooding
- DoS Attacks Using ICMP
- Smurf Attack
- Electrical Power
- Computing Environment
- Best Practices to Defeat Hackers
- Section 2 - Review
- Examining Operations Security
- Operations Security
- Secure Network Lifecycle
- Initiation Phase
- Acquisition and Development Phase
- Implementation Phase
- Operations and Maintenance Phase
- Disposition Phase
- Principles of Operations Security
- Separation of Duties
- Rotation of Duties
- Trusted Recovery
- Change and Configuration Control
- Network Security Testing and the System Development Life Cycle
- Security Testing Techniques
- Common Testing Tools
- Nmap
- SuperScan by Foundstone
- Disaster Recovery and Business Continuity Planning
- Disaster Recovery
- Disruptions
- Backups
- Section 3 - Review
- Understanding and Developing a Comprehensive Network Security Policy
- Figure Out What You Are Protecting
- Why Do You Need a Security Policy?
- Who Uses the Security Policy?
- Components of a Comprehensive Security Policy
- Governing Policy Comes from the Top
- Technical and End-User Policies
- Standards, Guidelines, and Procedures
- Standards
- Guidelines
- Procedures
- Responsibilities for the Security Policy
- Threat Identification and Risk Analysis
- Risk Analysis
- Quantitative Risk Analysis Formula
- Benefits of Risk Analysis
- Threat Identification and Risk Analysis Example
- Risk Management and Risk Avoidance
- Manage the Risk
- Avoid the Risk
- Secure Network Design Factors
- Realistic Assumptions
- Realistic Assumptions Example
- Least Privilege Concept
- Least Privilege Example
- Design and Implementation Simplicity
- Simplicity Example
- Security Awareness
- Awareness
- Education and Training
- Results of Security Awareness
- Section 4 - Review
- Building Cisco Self-Defending Networks
- Threat Evolution
- A Blurred Network Perimeter
- The SQL Slammer Worm 30 minutes After "Release"
- Cisco Self-Defending Network Overview
- Benefits of Cisco Self-Defending Networks
- Collaborative Systems Enabling Unparalleled Security
- Cisco Self-Defending Network Defined
- Threat Control and Containment
- Secure Communications - Secure Data, Voice, Video, and Wireless
- Operational Control and Policy Management
- Cisco Security Manager Overview
- Cisco Security MARS
- Secure Network Platform
- Section 5 - Review
- Module 1 Review
Module 2 - Perimeter Security
Module 03 - Network Security Using Cisco IOS Firewalls
- Network Security Using Cisco IOS Firewalls
- Introducing Firewall Technologies
- What is a Firewall?
- Expanding on the Definition
- Firewall Benefits
- Firewall Limitations
- Firewalls in a Layered Defense Strategy
- Static Packet Filtering Firewalls
- Static Packet Filtering Example
- Advantages and Disadvantages of Packet Filters
- Application Layer Gateways
- Proxy Server Communication Process
- Advantages, Limitations, and Uses of Application Layer Gateways
- Dynamic or Stateful Packet Filtering
- Stateful Packet Filtering
- Uses and Limitations of Stateful Packet Filters
- Application Inspection Firewalls
- Transparent Firewalls
- Cisco IOS Firewall Features
- Cisco Security Router Certifications
- Cisco PIX 500 Series Security Appliances
- Cisco ASA 5500 Series Adaptive Security Appliances
- Firewall Best Practices
- Section 1 - Review
- Creating Static Packet Filters Using ACLs
- Access Control Lists
- Mitigating Threats Using ACLs
- Outbound ACL Operation
- Inbound ACL Operation
- A List of Tests - Deny of Permit
- Types of IP ACLs
- Identifying ACLs
- IP Access List Entry Sequence Numbering
- ACL Configuration Guidelines
- Wildcard Bits - How to Check the Corresponding Address Bits
- Wildcard Bits to Match IP Subnets
- Wildcard Bit Mask Abbreviations
- Numbered Standard IPv4 ACL Configuration
- Numbered Standard IPv4 ACL
- Applying Standard ACLs to Control vty Access
- Numbered Extended IPv4 ACL Configuration
- Established Command
- Displaying ACLs
- Guidelines for Developing ACLs
- ACL Caveats
- ACL Editor - Access Rules
- Standard Rule
- Associate with an Interface (1)
- Extended Rule
- Associate with an Interface (2)
- Routing Protocol Entries
- IP Address Spoof Mitigation - Inbound
- IP Address Spoof Mitigation - Outbound
- Filtering ICMP Messages - Inbound
- Filtering ICMP Messages - Outbound
- Permitting Common Services
- Router Service Traffic
- Demo - ACL
- Section 2 - Review
- Configuring Cisco IOS Zone-Based Policy Firewall
- Cisco IOS Zone-Based Policy Firewall
- In the Beginning
- Traditional Cisco IOS Firewall Stateful Inspection
- The New Era: Cisco IOS Zone-Based Policy Firewall
- Benefits of Zone-Based Policy Firewall
- Zone-Based Policy Firewall Actions
- Zone-Based Policy Firewall Rules for Application Traffic
- Zone-Based Policy Firewall Rules for Router Traffic
- Basic Firewall Configuration Wizard
- Basic Firewall Interface Configuration
- Applying Security Policy
- Finishing the Wizard
- Manually Configuring a Zone-Based Policy Firewall
- Define Zones
- Define Class Maps
- Define Policy Maps
- Assign Policy Maps to Zone Pairs
- Reviewing the Cisco IOS Zone-Based Policy Firewall
- Cisco IOS Zone-Based Firewall Policy Configuration
- Viewing the Firewall Log
- Monitoring the Cisco IOS Zone-Based Policy Firewall
- Section 3 - Review
- Module 3 Review
Module 4 - Site-to-Site VPNs
Module 5 - Network Security Using Cisco IOS IPS
- Network Security Using Cisco IOS IPS
- Introducing IPS Technologies
- Defining IDS and IPS
- IDS and IPS Common Characteristics
- IDS and IPS Operational Differences
- Comparing IDS and IPS Solutions
- Types of IDS and IPS Sensors
- IPS Attack Responses
- Event Monitoring and Management
- Cisco IPS Management Software
- Cisco IDS Event Viewer
- Cisco Security MARS
- HIPS Features
- How HIPS Operates
- Cisco HIPS Deployment
- Network IPS Features
- Cisco Network IPS Deployment
- Comparing HIPS and Network IPS
- Cisco IPS Appliances
- Cisco IPS 4200 Series Sensors
- Cisco ASA AIP-SSM
- Cisco Catalyst 6500 Series IDSM-2
- Cisco IPS AIM
- IPS Signature Operational Characteristics
- Signature Micro-Engines
- Supported Signature Micro-Engines
- Cisco Signature Alarm Types
- Implementing Alarms in Signatures
- IPS Configuration Best Practices
- Section 1 - Review
- Configuring Cisco IOS IPS Using Cisco SDM
- Cisco IOS IPS Intrusion Prevention Technology
- Primary Benefits of the Cisco IOS IPS Solution
- Cisco IOS IPS Signature Features
- Using Cisco SDM to Configure IPS
- IPS Policies Wizard
- IPS Config Location and Category
- IPS Policy Summary
- Cisco IOS IPS CLI Configuration
- Setting Signature Severity
- Configuring Signature Actions
- Editing Signatures Using Cisco SDM
- Support for SDEE and Syslog
- Viewing SDEE Alarm Messages
- Viewing Syslog IPS Alarms
- Verifying IPS Policies
- Verify IPS Operation
- Section 2 - Review
- Module 5 Review
Module 6 - LAN, SAN, Voice, and Endpoint Security Overview
- LAN, SAN, Voice, and Endpoint Security Overview
- Examining Endpoint Security
- Cisco Host Security Strategy
- Software Security Concepts
- Operating System Vulnerabilities
- Application Vulnerabilities
- Input Validation
- Buffer Overflows
- Types of Buffer Overflows
- Worms, Viruses, and Trojan Horses
- Anatomy of a Worm Attack
- Worm and Virus - Exploit Comparison (~20 Yrs)
- IronPort Perimeter Security Appliances
- IronPort E-Mail Security Appliance
- IronPort Web Security Appliance
- Cisco NAC Products
- NAC Framework
- Cisco NAC Appliance Overview - Components
- Cisco NAC Appliance Overview - Process Flow
- Cisco NAC Appliance Overview - Agent
- Cisco Security Agent Architecture
- Appliance, Kernel, and Interceptors
- Cisco Security Agent Interceptors
- Cisco Security Agent Attack Response
- Operating System Guidelines
- Application Guidelines
- Section 1 - Review
- Examining SAN Security
- What Is a SAN?
- Why Use SANs?
- Benefits of a SAN
- SAN Basics
- LUN Masking
- World Wide Names
- Fibre Channel Fabric Zoning
- Virtual SANs
- SAN Security Scope
- SAN Management Threats
- Fabric and Target Access Threats
- Target Access Security - Zoning
- IP Storage and Transmission Security
- Section 2 - Review
- Examining Voice Security
- What is VoIP?
- Business Case for VoIP
- Components of a VoIP Network
- Major VoIP Protocols
- Threats to IP Telephony Endpoints
- Spam over IP Telephony
- SPIT Example
- Fraud
- SIP Vulnerabilities
- Separate Voice VLAN
- Protect IP Telephony with Firewalls
- Protect IP Telephony with VPNs
- Protect IP Telephony Endpoints
- Protect IP Telephony Servers
- Section 3 - Review
- Mitigating Layer 2 Attacks
- Why Worry About Layer 2 Security?
- Domino Effect
- VLAN Overview
- VLAN Hopping by Rogue Trunk
- VLAN Hopping by Double Tagging
- Mitigating VLAN Hopping Network Attacks
- Redundant Topology
- Loop Resolution with STP
- STP Operation
- STP Root Bridge Selection
- STP Manipulation
- PortFast
- BPDU Guard
- Root Guard
- Verifying BPDU Guard
- CAM Table Overflow Attack
- MAC Address Spoofing Attack
- Port Security
- Configuring Port Security
- Configuring Port Security Aging
- Port Security Example
- Verifying Port Security
- Notification of Intrusions
- Switched Port Analyzer
- Remote SPAN
- Lan Storm
- Storm Control
- Layer 2 Security Best Practices
- Demo - Layer 2 Security
- Section 4 - Review
- Module 6 Review
- Course Closure
Course Features:
- Video Lectures and Expert Instruction
Practical knowledge is essential for success in a real world environment and we have chosen our instructors with this in mind - many of our instructors are business owners and have been employed in their respective fields for decades!
- PowerPoint
Utilizing PowerPoint presentations enhances the delivery by displaying a variety of visual information to the user. This type of representation allows the user to better interpret the material through charts, definitions, graphs, and more...
- Easy Navigation
Move forward, back, and repeat entire topics or just a section. A progress bar illuminates as you advance through exercises.
- Printable Study Guides
Printable study guides for the entire course are available. This allows all material to be viewed, reviewed, and printed for viewing at a later date.
- Review Exercises
Each section has a review quiz to aid in the learning process by validating the comprehension of the material covered before moving on to a new section.
- Resume Option
All courses are resumed to where you left off last session allowing you to learn when it is convenient for you without the hassle of remembering where you where.
- Full Motion Video
All courses feature full-motion videos of instructors teaching the information as if they are speaking directly to you. Our unique delivery simulates a one-on-one classroom environment creating a more personal lesson and learning experience.
- Certificate of Completion
Upon completion of your training course, you will receive a Certificate of completion displaying your full name, course completed as well as the date of completion. You can print this out or save it digitally to showcase your accomplishment.
- Live, Hands-On Demonstrations
Demonstrations are a way for the instructor to show and tell the user how to perform a task by actually doing it on screen in front of them.
- Mobile Access: All our training courses are now available across all mobile devices.
|