Purpose
Today's organizations are challenged with responding rapidly to emerging network security threats. Security personnel configure and monitor various network security threat mitigation measures, such as device hardening, intrusion prevention systems, and firewalls, to protect data assets and network systems from attack. The purpose of this course is to provide skills and knowledge in the field of network security.
By the end of the course, students will be able to:
• Explain the various types of threats and attacks.
• Explain tools and procedures to mitigate the effects of malware and common
network attacks.
• Configure command authorization using privilege levels and role-based CLI.
• Implement the secure management and monitoring of network devices.
• Configure AAA to secure a network.
• Implement ACLs to filter traffic and mitigate network attacks on a network.
• Implement Zone-Based Policy Firewall using the CLI.
• Explain how network-based Intrusion Prevention Systems are used to help
secure a network.
• Explain endpoint vulnerabilities and protection methods.
• Implement security measures to mitigate Layer 2 attacks.
• Explain how the types of encryption, hashes, and digital signatures work
together to provide confidentiality, integrity, and authentication.
• Explain how a public key infrastructure is used to ensure data confidentiality
and provide authentication.
• Configure a site-to-site IPsec VPN, with pre-shared key authentication, using
the CLI.
• Explain how the ASA operates as an advanced stateful firewall.