Sei sulla pagina 1di 3

IINS Version 1 IINS Version 2

Describe the security threats facing Common Security Threats


modern network infrastructures

Describe and list mitigation methods for


common network attacks
Describe and list mitigation methods for Describe common security threats
Worm, Virus, and Trojan Horse attacks
Describe the Cisco Self Defending
Network architecture

Secure Cisco routers Security and Cisco Routers

Secure Cisco routers using the SDM Describe Cisco Security Manager
Security Audit feature
Use the One-Step Lockdown feature in
SDM to secure a Cisco router

Secure administrative access to Cisco Describe securing the control,


routers by setting strong encrypted data, and management plane
passwords, exec timeout, login failure
rate and using IOS login enhancements

Secure administrative access to Cisco Implement security on Cisco


routers by configuring multiple privilege routers
levels
Secure administrative access to Cisco
routers by configuring role based CLI
Secure the Cisco IOS image and
configuration file

Describe IPv4 to IPv6 transition

Implement AAA on Cisco routers using AAA on Cisco Devices


local router database and external ACS

Explain the functions and importance of Describe AAA


AAA

Describe the features of TACACS+ and Describe TACACS+


RADIUS AAA protocols
Describe RADIUS

Configure AAA authentication Implement AAA (authentication,


authorization, and accounting)
Configure AAA authorization Verify AAA functionality
Configure AAA accounting

Mitigate threats to Cisco routers and IOS ACLs


networks using ACLs

Explain the functionality of standard, Describe standard, extended, and


extended, and named IP ACLs used by named IP IOS access control lists
routers to filter packets (ACLs) to filter packets

Configure and verify IP ACLs to mitigate Implement IP ACLs to mitigate


given threats (filter IP traffic destined for threats in a network
Telnet, SNMP, and DDoS attacks) in a
network using CLI
Configure IP ACLs to prevent IP address
spoofing using CLI

Discuss the caveats to be considered Describe considerations when


when building ACLs building ACLs

Implement secure network management Secure Network Management and


and reporting Reporting

Describe secure network


management
Use CLI and SDM to configure SSH on Implement secure network
Cisco routers to enable secured management
management access
Use CLI and SDM to configure Cisco
routers to send Syslog messages to a
Syslog server

Mitigate common Layer 2 attacks Common Layer 2 Attacks

Describe how to prevent layer 2 attacks Describe Layer 2 security using


by configuring basic Catalyst switch Cisco switches
security features
Describe VLAN security
Implement VLANs and trunking
Implement spanning tree

Implement the Cisco IOS firewall feature Cisco Firewall Technologies


set using SDM

Describe the operational strengths and Describe operational strengths and


weaknesses of the different firewall weaknesses of the different firewall
technologies technologies

Explain stateful firewall operations and Describe stateful firewalls


the function of the state table

Implement Zone Based Firewall using Implement zone-based policy


SDM firewall using CCP

Implement the Cisco Adaptive


Security Appliance (ASA)
Describe the types of NAT used in
firewall technologies
Implement Network Address
Translation (NAT) and Port
Address Translation (PAT)

Implement the Cisco IOS IPS feature set Cisco IPS


using SDM

Define network based vs. host based Describe IPS technologies


intrusion detection and prevention

Explain IPS technologies, attack Describe Cisco Intrusion


responses, and monitoring options Prevention System (IPS)
deployment considerations

Enable and verify Cisco IOS IPS Configure Cisco IOS IPS using
operations using SDM CCP
Implement site-to-site VPNs on Cisco VPN Technologies
Routers using SDM

Explain the different methods used in Describe the different methods


cryptography used in cryptography

Explain IKE protocol functionality and Describe VPN technologies


phases

Describe the building blocks of IPSec Describe the building blocks of


and the security functions it provides IPSec

Configure and verify an IPSec site-to-site Implement an IOS IPSec site-to-


VPN with pre-shared key authentication site VPN with pre-shared key
using SDM authentication
Verify VPN operations

Implement Secure Sockets Layer


(SSL) VPN using ASA device
manager

Potrebbero piacerti anche