ICND1 2.0: Managing Network Device Security
Interconnecting Cisco Network Devices Part 1 is essential for students preparing for the CCNA Routing and Switching or CCENT certifications. Students pursuing the CCNA Routing and Switching certification should complete parts 1 & 2 of the ICND learning path. Students pursuing the CCENT certification need only attend part 1 of the ICND curriculum.Anyone wishing to obtain Cisco Certified Network Associate (CCNA) 100-101 certification that validates the knowledge and skills required to successfully install, operate, and troubleshoot small to medium size enterprise branch network. Network administrators, network engineers, network managers, network designers, and project managers. Familiarity of navigating PC operating systems, the Internet, and basic IP addressing knowledge skills recommended.
Please contact us for information about prerequisites.
When physical access has been enabled, you must secure access to the switch via the console port and the vty ports. You must also filter access to network devices from remote or internal locations.This course describes the steps that are required to secure local and remote access to network. It then goes on to describing the need for securing unused ports. It presents port security as a solution to the problem of maintaining control of utilized ports. The need to disable unused services is illustrated, and configuration examples show how to disable them. Why the correct system time is important and what can happen if the system time is not correct is explained. NTP is introduced, with a configuration example detailed.
Once you understand how ACLs operate, you can implement them for an important network security mechanism: traffic filtering. Standard ACLs provide only limited traffic filtering. Extended ACLs can provide more precise traffic-filtering capabilities. This course also describes access-list configuration mode. This course enables you to define named ACLs, which are identified with descriptive names instead of numbers. The course also shows how to verify that ACLs are functioning properly and discusses some common configuration errors.
Securing Administrative Access
Implementing Device Hardening
Implementing Traffic Filtering with ACLs