CISCO - CCSP - SAFE Training (642-541)


The Cisco SAFE Implementation (CSI) exam is required of candidates seeking Cisco Certified Security Professional designation. In the CSI training course from ATS, expert instructor Michael Storm delivers the knowledge and skills you will need to implement the principles presented in the SAFE SMR User White Paper. At the conclusion of this course you will understand how Cisco devices can be used to create a complete security solution, and be prepared to pass the CSI exam.

Course Outline

Module 1
Section A: Introduction Security Blueprint Focus/Goals Prerequisites Objectives SAFE Specifications
Section B: Attack Taxonomy I Types of Attacks Packet Sniffers Sniffer Defense IP Spoofing Spoofing Defense Denial of Service DOS Defense
Section C: Attack Taxonomy II Password Attacks Password Defense Man-in-the-Middle Hijack Defense Application Layer Intrusion Defense
Section D: Attack Taxonomy III Network Recon Recon Defense Trust Exploitation Port Redirection Unauthorized Access Virus/Trojan Horse
Section E: Network Security Policy Implementation Security Posture Security Wheel Evaluate Policy Policy Requirements Policy Contents
Section F: Architecture Taxonomy Devices/Components Servers & Firewalls IDS IOS Devices Switches Server Management VPNs & Workstations
Section G: Design Fundamentals Security Architecture Design Objectives Modular Design Security Portfolio
Section H: SAFE Axioms Routers Switches Private VLANs Hosts Networks DDOS Attacks Applications

Module 2
Section A: Security Profile with VPNs Profile Overview VPN Solution SAFE VPN Design VPN Components VPN Protocols IP Sec VPN 3000 Concentrator Optimized Routers
Section B: Security Profile with FW & IDS Perimeter Security IOS Firewall PIX Firewall Intrusion Detection NIDS Secure Scanner
Section C: Security Profile Access Control AAA TACACS+ RADIUS Kerberos Secure ACS
Section D: Security Profile-Secure Mgt Secure Management Protocol SNMP Change Mgt Cisco Work VMS AVVID
Section E: SAFE SMR Design Overview SAFE Blueprint Expected Threats
Section F: Small Network-Internet Design Model Corporate Module Threat Defense Design Guidelines Firewall Options Rate Limit/RFC Filter Protect Public Servers Alternative Functions
Section G: Small Network-Campus Elements Key Devices Campus Model Threat Defense Primary Functions Considerations Alternatives

Module 3
Section A: Medium Network-Internet Corporate Design Corporate Internet Key Devices Threat Defense VPN Threats
Section B: Medium Network Internet Design IPS & Edge Routers Firewall Functionality Intrusion Detection Remote Access VPN Dial-in Users Layer 2 Switches Inside Router Design Alternatives
Section C: Medium Network-Campus Campus Design Key Devices Threats Defense Components Core Switch Building Switches Intrusion Detection Design Alternatives
Section D: Medium Network-WAN WAN Design Key Devices Design Alternatives Branch vs. Headend
Section E: Remote Access Design Connectivity Options Connectivity View Design Types Key Devices Threat Defense
Section F: Remote Access Options Software Access Software Considerations Remote-site Firewall Firewall Considerations Hardware VPN Client Hardware Advantages Remote-site Router
Section G: Migration Strategy SAFE's Purpose Security Policy Infrastructure

Price Per User £ 560 (Bundle of 3)

Complementary Courses
Cisco PIX Firewall
Cisco VPN Security
Cisco CSIDS Intrusion Detection Systems

<<Back <<Contact Us