Description
CONTENT
- Securing Networks
- Network Threats
- Mitigating Threats
- Secure Device Access
- Assign Administrative Roles
- Device Monitoring and Management
- Authentication, Authorization, and Accounting (AAA)
- Access Control Lists
- Firewall Technologies
- Zone-Based Policy Firewalls
- IPS Technologies
- IPS Operation and Implementation
- Endpoint Security
- Layer 2 Security Considerations
- Cryptographic Services
- Basic Integrity and Authenticity
- Public Key Cryptography
- VPNs
- Implement Site-to-Site IPsec VPNs with CLI
- Introduction to the ASA
- ASA Firewall Configuration
- Network Security Testing
TARGET AUDIENCE:
- Students or IT professionals who wants to pursue a career in Security Operations
- CCNA level knowledge is needed for success