Descrizione
I laboratori Cisco Vega Training sono costruiti per essere allineati pienamente ai contenuti Didattici Ufficiali dei corsi Cisco. L’accesso è totalmente Web-Based o attraverso VPN per rispondere alle esigenze di versatilità assolutamente necessaria nei contesti attuali. Attrezzatura Reale, Emulazioni e Virtualizzazioni con elevate Potenze di calcolo, Storage performante e un deploy immediato rendono questa soluzione praticamente obbligata per chi voglia perseguire agevolmente i propri obiettivi di Certificazione, di Formazione Continua, o semplicemente per sperimentare nuove tecnologie prima di implementarle in produzione.
Obiettivi Corso Correlato:
Modern Network Security Threats
Securing Networks
Network Threats
Mitigating Threats
Securing Network Devices
Securing Device Access
Securing the Edge Router
Configuring Secure Administrative Access
Configuring Enhanced Security fort Virtual Logins
Configuring SSH
Assigning Administrative Roles
Configuring Privilege Levels
Configuring Role-Based CLI
Monitoring and Managing Devices
Securing Cisco IOS Image and Configuration Files
Secure Management and Reporting
Using Syslog for Network Security
Using SNMP for Network Security
Using NTP
Using Automated Security Features
Performing a Security Audit
Locking Down a Router Using AutoSecure
Securing the Control Plane
Routing Protocol Authentication
Control Plane Policing
Authentication, Authorization, and Accounting Purpose of AAA
Purpose of the AAA
Local AAA Authentication
Server-Based AAA Authentication
Server-Based AAA Authorization
Server-Based AAA Accounting
Implementing Firewall Technologies
Access Control Lists
Mitigating Attacks with ACLs
Firewall Technologies
Securing Networks with Firewalls
Firewalls in Network Design
Classic Firewall
Zone-Based Policy Firewalls
Implementing Intrusion Prevention
IPS Technologies
IDS and IPS Characteristics
Network-Based IPS Implementations
Cisco Switched Port Analyzer
IPS Signatures Characteristics
IPS Signatures Alarms
IPS Signatures Actions
Manage and Monitor IPS
IPS Global Correlation
Implement IPS
Securing the Local Area Network
Endpoint Security
Antimalware Protection
Email and Web Security
Controlling Network Access
Layer 2 Security Threats
Mitigating CAM Table Attacks
Mitigating VLAN Attacks
Mitigating DHCP Attacks
Mitigating ARP Attacks
Mitigating Address Spoofing Attacks
Mitigating STP Attacks
Cryptographic Systems
Cryptographic Services
Securing Communications
Cryptography, Cryptanalysis, Cryptology
Basic Integrity and Authenticity
Cryptographic Hashes
Integrity with MD5, SHA-1, and SHA-2
Authenticity with HMAC
Key Management
Confidentiality
Encryption
Data Encryption Standard (DES)
Alternate Encryption Algorithms (AES)
Diffie-Hellman Key Exchange
Public Key Cryptography
Symmetric Versus Asymmetric Encryption
Digital Signatures
Public Key Infrastructure (PKI)
Implementing Virtual Private Networks
VPN Topologies
IPsec VPN Components and Operation
IPsec Protocols
Internet Key Exchange (IKE)
Implementing Site-to-Site IPsec VPNs with CLI
ISAKMP Policy
IPsec Policy
Crypto Map
Implementing the Cisco Adaptive Security Appliance (ASA)
ASA Solutions
Basic ASA Configuration
ASA Firewall Configuration
Configuring Management Settings and Services
Object Groups on an ASA
ACLs on an ASA
NAT Services on an ASA
AAA on an ASA
Service Policies on an ASA
Advanced Cisco Adaptive Security Appliance
ASA Security Device Manager
ASDM Wizard Menu
Configuring Advanced ASDM Features
ASA VPN Configuration
Site-to-Site VPNs on an ASA
Remote-Access VPNs on an ASA
Configuring Clientless SSL VPN
Configuring AnyConnect SSL VPN
Managing a Secure Network
Network Security Testing Techniques
Network Security Testing Tools
Developing a Comprehensive Security Policy
Structure of a Security Policy
Standards, Guidelines, and Procedures
Roles and Responsibilities
Security Awareness Training
Responding to a Security Breach
Recensioni
Ancora non ci sono recensioni.