Laboratorio IINS Implementing Cisco Network Security – CCNA Security

540,00

Tipo Laboratorio: Laboratorio Remoto Cisco;
Nome Corso Correlato: IINS Implementing Cisco Network Security;
Certificazione di riferimento: CCNA Security;
Materiale Aggiuntivo: Include Guida Laboratoriale;
Durata Accesso al Laboratorio: 5 gg full Time (Lunedì – Venerdì);
Supporto: Assistenza 24/07;
Prenotazione: Necessita di prenotazione e verifica disponibilità;
Vedi anche il corso correlato in Aula e in Video Conferenza Tempo Reale: Corso Cisco CCNA Security

Laboratori Cisco

    Descrizione

    I laboratori Cisco Vega Training sono costruiti per essere allineati pienamente ai contenuti Didattici Ufficiali dei corsi Cisco. L’accesso è totalmente Web-Based o attraverso VPN per rispondere alle esigenze di versatilità assolutamente necessaria nei contesti attuali. Attrezzatura Reale, Emulazioni e Virtualizzazioni con elevate Potenze di calcolo, Storage performante e un deploy immediato rendono questa soluzione praticamente obbligata per chi voglia perseguire agevolmente i propri obiettivi di Certificazione, di Formazione Continua, o semplicemente per sperimentare nuove tecnologie prima di implementarle in produzione.

    Obiettivi Corso Correlato:

    Modern Network Security Threats
    Securing Networks
    Network Threats
    Mitigating Threats
    Securing Network Devices
    Securing Device Access
    Securing the Edge Router
    Configuring Secure Administrative Access
    Configuring Enhanced Security fort Virtual Logins
    Configuring SSH
    Assigning Administrative Roles
    Configuring Privilege Levels
    Configuring Role-Based CLI
    Monitoring and Managing Devices
    Securing Cisco IOS Image and Configuration Files
    Secure Management and Reporting
    Using Syslog for Network Security
    Using SNMP for Network Security
    Using NTP
    Using Automated Security Features
    Performing a Security Audit
    Locking Down a Router Using AutoSecure
    Securing the Control Plane
    Routing Protocol Authentication
    Control Plane Policing
    Authentication, Authorization, and Accounting Purpose of AAA
    Purpose of the AAA
    Local AAA Authentication
    Server-Based AAA Authentication
    Server-Based AAA Authorization
    Server-Based AAA Accounting
    Implementing Firewall Technologies
    Access Control Lists
    Mitigating Attacks with ACLs
    Firewall Technologies
    Securing Networks with Firewalls
    Firewalls in Network Design
    Classic Firewall
    Zone-Based Policy Firewalls
    Implementing Intrusion Prevention
    IPS Technologies
    IDS and IPS Characteristics
    Network-Based IPS Implementations
    Cisco Switched Port Analyzer
    IPS Signatures Characteristics
    IPS Signatures Alarms
    IPS Signatures Actions
    Manage and Monitor IPS
    IPS Global Correlation
    Implement IPS
    Securing the Local Area Network
    Endpoint Security
    Antimalware Protection
    Email and Web Security
    Controlling Network Access
    Layer 2 Security Threats
    Mitigating CAM Table Attacks
    Mitigating VLAN Attacks
    Mitigating DHCP Attacks
    Mitigating ARP Attacks
    Mitigating Address Spoofing Attacks
    Mitigating STP Attacks
    Cryptographic Systems
    Cryptographic Services
    Securing Communications
    Cryptography, Cryptanalysis, Cryptology
    Basic Integrity and Authenticity
    Cryptographic Hashes
    Integrity with MD5, SHA-1, and SHA-2
    Authenticity with HMAC
    Key Management
    Confidentiality
    Encryption
    Data Encryption Standard (DES)
    Alternate Encryption Algorithms (AES)
    Diffie-Hellman Key Exchange
    Public Key Cryptography
    Symmetric Versus Asymmetric Encryption
    Digital Signatures
    Public Key Infrastructure (PKI)
    Implementing Virtual Private Networks
    VPN Topologies
    IPsec VPN Components and Operation
    IPsec Protocols
    Internet Key Exchange (IKE)
    Implementing Site-to-Site IPsec VPNs with CLI
    ISAKMP Policy
    IPsec Policy
    Crypto Map
    Implementing the Cisco Adaptive Security Appliance (ASA)
    ASA Solutions
    Basic ASA Configuration
    ASA Firewall Configuration
    Configuring Management Settings and Services
    Object Groups on an ASA
    ACLs on an ASA
    NAT Services on an ASA
    AAA on an ASA
    Service Policies on an ASA
    Advanced Cisco Adaptive Security Appliance
    ASA Security Device Manager
    ASDM Wizard Menu
    Configuring Advanced ASDM Features
    ASA VPN Configuration
    Site-to-Site VPNs on an ASA
    Remote-Access VPNs on an ASA
    Configuring Clientless SSL VPN
    Configuring AnyConnect SSL VPN
    Managing a Secure Network
    Network Security Testing Techniques
    Network Security Testing Tools
    Developing a Comprehensive Security Policy
    Structure of a Security Policy
    Standards, Guidelines, and Procedures
    Roles and Responsibilities
    Security Awareness Training
    Responding to a Security Breach

    Recensioni

    Ancora non ci sono recensioni.

    Solamente clienti che hanno effettuato l'accesso ed hanno acquistato questo prodotto possono lasciare una recensione.