MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.


I'm not curious

Cisco CCNA Security: AAA and IP Security

Course Summary

Part 2 of 3 in the Cisco CCNA Security (640-554) series. This course will teach you how to identify, lockdown, and secure vulnerabilities in a small to medium enterprise branch network. This course will also help you to enhance your skills in developing s


  • +

    Course Syllabus

    ● Authentication, Authorization, and Accounting (AAA)
        ◦ Understanding AAA Framework
        ◦ Understanding TACACS+
        ◦ Demo: Configuring TACACS+
        ◦ Understanding RADIUS
        ◦ Demo: Configuring RADIUS
        ◦ Cisco Secure ACS
        ◦ Key Terms You Should Know
    ● VLAN Security
        ◦ Review of VLANs
        ◦ Inter-VLAN Routing
        ◦ VLAN Attack and Defense
        ◦ Demo: Configuring Port-Security
        ◦ Spoofing Attacks
        ◦ Demo: DHCP Snooping
        ◦ MAC Flooding/CAM Overflow
        ◦ Key Terms You Should Know
    ● Spanning-Tree Security
        ◦ Review of Spanning-Tree
        ◦ STP Attack and Defense
        ◦ Demo: Configuring BPDU Guard
        ◦ Root Guard
        ◦ Storm Control
        ◦ Demo: Configuring Storm Control
        ◦ Key Terms You Should Know
    ● Securing IPv4 Routing
        ◦ Introduction
        ◦ Review of IPv4 Routing
        ◦ IPv4 Routing Vulnerabilities
        ◦ IPv4 Routing Defenses
        ◦ Demo: Configuring EIGRP Authentication
        ◦ Key Terms You Should Know
    ● IPv4 Services Vulnerabilities
        ◦ Review of IPv4 Services
        ◦ IPv4 Services Vulnerabilities
        ◦ IPv4 Services Defenses
        ◦ Demo: Configuring Rate-Limiting
        ◦ Key Terms You Should Know
    ● Securing IPv6
        ◦ Introduction
        ◦ Review of IPv6
        ◦ Multicast
        ◦ Anycast
        ◦ IPv6 Unicast Address Types
        ◦ IPv6 Address Representation
        ◦ IPv6 Address Abbreviation
        ◦ Demo: Configuring IPv6
        ◦ IPv6 Vulnerabilities
        ◦ IPv6 Protection
        ◦ Demo: Configuring IPv6 Defenses
        ◦ Key Terms You Should Know
    ● Access-List Fundamentals
        ◦ Access-List Basics
        ◦ Wildcard Masks
        ◦ Access-List Mechanics
        ◦ Demo: Exploring Access-Lists
        ◦ Key Terms You Should Know
    ● IPv4 Standard Access-Lists
        ◦ Standard IPv4 ACL Basics
        ◦ Demo: ACL Configuration Methods
        ◦ Interface Behavior
        ◦ Demo: Applying Standard Access-Lists
        ◦ Standard ACL Mechanics
        ◦ Demo: Exploring Access-Lists
        ◦ Key Terms You Should Know
    ● IPv4 Extended Access-Lists
        ◦ Extended IPv4 ACL Basics
        ◦ Demo: Extended ACL Filtering
        ◦ Extended ACL Mechanics
        ◦ Demo: Anti-Spoofing Protection Using ACL's
        ◦ Additional Access-List Options
        ◦ Key Terms You Should Know
    ● IPv6 Access-Lists
        ◦ IPv6 ACL Basics
        ◦ IPv4 and IPv6 ACL Similarities
        ◦ IPv4 and IPv6 ACL Differences
        ◦ Demo: IPv6 Packet Filtering
        ◦ Extended ACL Mechanics
        ◦ Key Terms You Should Know

     


Course Fee:
USD 29

Course Type:

Self-Study

Course Status:

Active

Workload:

1 - 4 hours / week

Attended this course?

Back to Top

Awards & Accolades for MyTechLogy
Winner of
REDHERRING
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url

Back to Top