CISCO -
CCSP - SAFE Training (642-541)
Description
The Cisco SAFE Implementation (CSI) exam is required of candidates seeking
Cisco Certified Security Professional designation. In the CSI training course
from ATS, expert instructor Michael Storm delivers the knowledge and skills
you will need to implement the principles presented in the SAFE SMR User
White Paper. At the conclusion of this course you will understand how Cisco
devices can be used to create a complete security solution, and be prepared
to pass the CSI exam.
|
|
Course
Outline
Module 1
Section A: Introduction Security Blueprint Focus/Goals Prerequisites Objectives
SAFE Specifications
Section B: Attack Taxonomy I Types of Attacks Packet Sniffers Sniffer Defense
IP Spoofing Spoofing Defense Denial of Service DOS Defense
Section C: Attack Taxonomy II Password Attacks Password Defense Man-in-the-Middle
Hijack Defense Application Layer Intrusion Defense
Section D: Attack Taxonomy III Network Recon Recon Defense Trust Exploitation
Port Redirection Unauthorized Access Virus/Trojan Horse
Section E: Network Security Policy Implementation Security Posture Security
Wheel Evaluate Policy Policy Requirements Policy Contents
Section F: Architecture Taxonomy Devices/Components Servers & Firewalls
IDS IOS Devices Switches Server Management VPNs & Workstations
Section G: Design Fundamentals Security Architecture Design Objectives Modular
Design Security Portfolio
Section H: SAFE Axioms Routers Switches Private VLANs Hosts Networks DDOS Attacks
Applications
Module 2
Section A: Security Profile with VPNs Profile Overview VPN Solution SAFE VPN
Design VPN Components VPN Protocols IP Sec VPN 3000 Concentrator Optimized Routers
Section B: Security Profile with FW & IDS Perimeter Security IOS Firewall
PIX Firewall Intrusion Detection NIDS Secure Scanner
Section C: Security Profile Access Control AAA TACACS+ RADIUS Kerberos Secure
ACS
Section D: Security Profile-Secure Mgt Secure Management Protocol SNMP Change
Mgt Cisco Work VMS AVVID
Section E: SAFE SMR Design Overview SAFE Blueprint Expected Threats
Section F: Small Network-Internet Design Model Corporate Module Threat Defense
Design Guidelines Firewall Options Rate Limit/RFC Filter Protect Public Servers
Alternative Functions
Section G: Small Network-Campus Elements Key Devices Campus Model Threat Defense
Primary Functions Considerations Alternatives
Module 3
Section A: Medium Network-Internet Corporate Design Corporate Internet Key
Devices Threat Defense VPN Threats
Section B: Medium Network Internet Design IPS & Edge Routers Firewall Functionality
Intrusion Detection Remote Access VPN Dial-in Users Layer 2 Switches Inside
Router Design Alternatives
Section C: Medium Network-Campus Campus Design Key Devices Threats Defense Components
Core Switch Building Switches Intrusion Detection Design Alternatives
Section D: Medium Network-WAN WAN Design Key Devices Design Alternatives Branch
vs. Headend
Section E: Remote Access Design Connectivity Options Connectivity View Design
Types Key Devices Threat Defense
Section F: Remote Access Options Software Access Software Considerations Remote-site
Firewall Firewall Considerations Hardware VPN Client Hardware Advantages Remote-site
Router
Section G: Migration Strategy SAFE's Purpose Security Policy Infrastructure
Price Per User £ 560 (Bundle of 3)
Complementary Courses
Cisco SECUR
Cisco PIX Firewall
Cisco VPN Security
Cisco CSIDS Intrusion Detection Systems
Security+
<<Back
<<Contact Us
|