ICND1 2.0: Managing Network Device Security

Interconnecting Cisco Network Devices Part 1 is essential for students preparing for the CCNA Routing and Switching or CCENT certifications. Students pursuing the CCNA Routing and Switching certification should complete parts 1 & 2 of the ICND learning path. Students pursuing the CCENT certification need only attend part 1 of the ICND curriculum.Anyone wishing to obtain Cisco Certified Network Associate (CCNA) 100-101 certification that validates the knowledge and skills required to successfully install, operate, and troubleshoot small to medium size enterprise branch network. Network administrators, network engineers, network managers, network designers, and project managers. Familiarity of navigating PC operating systems, the Internet, and basic IP addressing knowledge skills recommended.

Please contact us for information about prerequisites.

Expected Duration
117 minutes

When physical access has been enabled, you must secure access to the switch via the console port and the vty ports. You must also filter access to network devices from remote or internal locations.This course describes the steps that are required to secure local and remote access to network. It then goes on to describing the need for securing unused ports. It presents port security as a solution to the problem of maintaining control of utilized ports. The need to disable unused services is illustrated, and configuration examples show how to disable them. Why the correct system time is important and what can happen if the system time is not correct is explained. NTP is introduced, with a configuration example detailed.
Once you understand how ACLs operate, you can implement them for an important network security mechanism: traffic filtering. Standard ACLs provide only limited traffic filtering. Extended ACLs can provide more precise traffic-filtering capabilities. This course also describes access-list configuration mode. This course enables you to define named ACLs, which are identified with descriptive names instead of numbers. The course also shows how to verify that ACLs are functioning properly and discusses some common configuration errors.


Securing Administrative Access

  • describe how to secure access to the privileged EXEC mode
  • recognize how to secure console access to a network device
  • describe how to secure remote access to a network device
  • describe how to configure a switch so it can be accessed remotely
  • specify why external authentication should be used for larger networks
  • configure a login banner
  • Implementing Device Hardening

  • describe the characteristics of port security
  • recognize how to configure and verify port security
  • identify best practices for disabling unused services
  • recognize how to configure and verify basic NTP
  • Not Applicable
  • Implementing Traffic Filtering with ACLs

  • describe ACL operations
  • configure named ACLs in a given scenario
  • describe ACL configuration guidelines
  • monitor and verify ACLs in a given scenario
  • identify how to resolve common ACL configurations
  • Not Applicable




    Multi-license discounts available for Annual and Monthly subscriptions.