CBT Nuggets Cisco CCNA Security 640-553 IINS
CBT Nuggets Cisco CCNA Security 640-553 IINS
CBT Nuggets Cisco CCNA Security 640-553 IINS 英文正式版(教程)(DVD版)
Are you an IT Pro responsible for network security? Do you have CCNA
certification and want to take the next step in network security? Are you
working towards CCSP certification? If any of these are you, this is the
training you』re looking for.
Jump into security with Jeremy Cioara』s Cisco CCNA Security video series.
Jeremy puts you in the mind of hackers and intruders and shows you how to
defeat these black hats. Soon you』ll be recognizing different types of
attackers and threats and eliminating the damage that can follows security
You』ll learn all about your security enemies --whether they』re hackers,
phreakers, hacktivists, hobby hackers or script kiddies. And you』ll learn
how these bad guys:
Investigate your network
Identify and target your operating system and applications
Break into your system
Steal logins, user names and passwords
Create network backdoors so they can mount future attacks
Cisco Security gives you lots of great tools for discovering and defeating
attackers. Self-Defending Network (SDN) helps you automatically identify
threats, both internal and external. MARS (Monitoring Analysis & Response
System) analyzes threats and identifies false alarms. In fact, Cisco Security
provides you with tons of network protection, but doesn』t bury you with
Jeremy』s videos move from one "cool topic" to the next -- showing you the
big picture involved in securing your network. By the time you』ve finished
watching the full series, you』ll have a terrific foundation in Cisco
security. And you』ll be respected for the confidentiality, integrity and
availability that you bring to your organization』s network data.
This training is mapped to Cisco CCNA Security exam 640-533 IINS, so you』
ll be ready to pass the certification test.
By the time you"re done you"ll thoroughly understand the following topics
about Cisco CCNA Security Exam-Pack 640-553: IINS Series:
Welcome to CCNA Security: Cisco Certification and Getting the Most from
Welcome to CCNA Security: Understanding the Threats
Welcome to CCNA Security: Understanding the Threats, Part 2
Foundation Router Security: Using SDM to Lock Down Your Router
Foundation Router Security: Implementing Secure Router Management
Foundation Router Security: Understanding and Implementing AAA
Foundation Router Security: Using IOS-based Tools for Administrative Access
Foundation Router Security: Becoming an ACL Wizard
Foundation Switch Security: Locking Down the Catalyst Switch
Foundation Switch Security: Locking Down the Catalyst Switch, Part 2
Foundation Switch Security: Understanding NAC, Cisco CSA. and VoIP Security
Security Services: Implementing Router-Based Firewalls
Security Services: Implementing Router-Based Firewalls, Part 2
Security Services: Implementing Router-Based IPS
Security Services: Understanding VPN Components - IPSec and Encryption
Security Services: Understanding VPN Components - Digital Signatures and PKI
Security Services: Understanding VPN Architecture
Security Services: Implementing Site-to-Site VPNs via Command Line
Security Services: Implementing Site-to-Site VPNs via SDM
A Final Word to CCNA Security Test Takers
Here"s what you"ll learn in each video of the Cisco CCNA Security - Exam-Pack
640-553: IINS Series:
Video 1 - "Welcome to CCNA Security: Cisco Certification and Getting the Most
from This Series" - With every new program, there is typically an included "
Read Me First" text file. In the same sense, consider this nugget the "
Watch Me First" of the series. This nugget presents the strategies you can
use for getting the most from the series, changes to the Cisco
certification program, and the ideal CCNA Security lab environment.
Video 2 - "Welcome to CCNA Security: Understanding the Threats" - It"s
impossible to defend against something you don"t understand. In this
nugget, Jeremy defines the goal behind having a secure network and the
categories of intruders and attacks.
Video 3 - "Welcome to CCNA Security: Understanding the Threats, Part 2" -
Jeremy continues defining the properties of a secure network by discussing
many of the network attacks you can face and a general mitigation strategy.
In addition, Jeremy discusses the components behind the Cisco Self-
Defending Network system.
Video 4 - "Foundation Router Security: Using SDM to Lock Down Your Router"
- The Cisco Security Device Manager (SDM) is a powerful graphic interface you
can use to manage your router and perform complex tasks with the click of a
mouse button. This nugget walks through the process of configuring your
router to support Cisco SDM and using the SDM to perform a security audit
or one-step lockdown of your device.
Video 5 - "Foundation Router Security: Implementing Secure Router Management"
- One of the first areas of security you should consider is the management
traffic between you and the network devices. In this nugget, Jeremy describes
creating an Out Of Band (OOB) management network and three areas of network
management: syslog, SNMP, and SSH.
Video 6 - "Foundation Router Security: Understanding and Implementing AAA"
- AAA is more than just roadside assistance; it represents authentication,
authorization, and accounting (AAA) methods you can use on a Cisco device.
This nugget describes the concepts behind AAA and walks through the setup
of a AAA device and the Cisco ACS TACACS+ server.
Video 7 - "Foundation Router Security: Using IOS-based Tools for
Administrative Access" - While server security is essential, network security
is of the utmost importance. One of the first network areas requiring more
security is the area of administrative access. By default Cisco switches
and routers will allow someone to attempt to logon to the device
infinitely. This nugget focuses on locking down this logon prompt,
configuring role-based access (sub-administrators), and securing the IOS
and configuration files on your devices.
Video 8 - "Foundation Router Security: Becoming an ACL Wizard" -
Understanding the implementation of Access Control Lists (ACLs) is critical
for any Cisco environment, however, you can apply ACLs in more ways than one.
In this nugget, Jeremy walks through guidelines for using ACLs followed by
four practical scenarios of ACL implementation.
Video 9 - "Foundation Switch Security: Locking Down the Catalyst Switch" - In
this nugget, all eyes turn to the internal network as Jeremy discusses
Layer 2 security for your network. This initial nugget explores the reasons
for L2 security, common attacks at L2, and concludes with one of the core
mitigation techniques: port security.
Video 10 - "Foundation Switch Security: Locking Down the Catalyst Switch,
Part 2" - Layer 2 security continues as Jeremy builds multiple layers of
security at the switch level including Spanning Tree Protocol (STP)
protection, Rogue DHCP server control, Storm Control, SPAN, and Private
Video 11 - "Foundation Switch Security: Understanding NAC, Cisco CSA and VoIP
Security" - The evolution of network attacks have dictated an entire new
generation of Layer 2 security methods. In this nugget, Jeremy discusses
these newer forms of security such as Network Admission Control (NAC), 802.
1x, the Cisco Security Agent (CSA), and VoIP security.
Video 12 - "Security Services: Implementing Router-Based Firewalls" - The
security focus moves from the switch environment to the routed network.
This initial nugget discusses Cisco"s two firewall strategies: The Cisco
IOS Classic Firewall and the Zone-based Firewall.
Video 13 - "Security Services: Implementing Router-Based Firewalls, Part 2" -
Cisco"s Zone-based Firewall strategy is a completely new style of firewall
for IOS routers. This nugget walks through the implementation of the new
Zone-based Firewall on live Cisco gear.
Video 14 - "Security Services: Implementing Router-Based IPS" - The Cisco
Integrated Service Router (ISR) product line was designed to implement many
traditionally separate network functions into a single device. This made
the implementation of Intrusion Prevention System (IPS) a natural one. In
this nugget, Jeremy discusses the place and configuration of Cisco IPS on
an ISR device.
Video 15 - "Security Services: Understanding VPN Components - IPSec and
Encryption Virtual Private Networks" - (VPNs) have become a commonplace
technology to allow remote users to access a network and bridge multiple
offices connected to the Internet into a seamless network fabric. The
architecture behind VPN technology is anything but commonplace. In this
nugget, Jeremy discusses the IP Security (IPSec) protocol used to create
VPN connections, focusing specifically on the encryption capabilities.
Video 16 - "Security Services: Understanding VPN Components - Digital
Signatures and PKI" - The VPN discussion continues as Jeremy explains the
ideas behind the Public Key Infrastructure (PKI) and certificate-based
Video 17 - "Security Services: Understanding VPN Architecture" - This
final, conceptual nugget on VPN technology focuses on the process devices
go through when establishing a VPN connection. Special attention is given
to the important concepts of identifying interesting traffic and the Internet
Key Exchange (IKE) phases.
Video 18 - "Security Services: Implementing Site-to-Site VPNs via Command
Line" - It"s time to put the VPN concepts into action! In this nugget, Jeremy
walks through the step-by-step process to configure a site-to-site VPN
using the command line interface.
Video 19 - "Security Services: Implementing Site-to-Site VPNs via SDM" - Once
you have seen the command-line configuration of a site-to-site VPN, this
nugget shows you the "easy configuration method" by setting up the same VPN
using the Cisco Security Device Manager (SDM) graphic interface.
Video 20 - "A Final Word to CCNA Security Test Takers" - To conclude the CCNA
Security series, Jeremy gives some final tips to those focused on the