Cisco ICND2 1.1: Securing and Troubleshooting the Switched Network

This course is included in our On-demand training solution.

Overview

Security is a major concern, especially in today’s networks, and network administrators must pay close attention to it. Complete network security starts with device-based security on routers and switches. Routers and switches that are internal to an organization often have minimal security configurations. This minimal security renders them targets for malicious attacks. If an attack is launched at Layer 2 on an internal campus device, the rest of the network can be quickly compromised, often without detection. This course discusses security features that exist to protect switches and Layer 2 operations.
It is also important to keep in mind that as the number of switch features grows, so does the possibility that things will go wrong. This course also presents recommendations for implementing a functional network. It addresses some of the common reasons that port connectivity, VLAN configuration, VLAN Trunking Protocol (VTP), and Spanning Tree Protocol (STP) can fail. It also describes the information to look for to identify the source of the problem.

Target Audience

Anyone wishing to obtain the Cisco Certified Network Associate (CCNA) certification that validates the knowledge and skills required to successfully install, operate, and troubleshoot small to medium size enterprise branch network. Network administrators, network engineers, network managers, network designers, and project managers. Candidates who have completed the 640-822 Interconnecting Cisco Networking Devices Part 1 (ICND1) exam associated with the Cisco Certified Entry Network Technician certification which is the first step in achieving the Cisco Certified Network Associate certification.

Prerequisites

Expected Duration

120 min.

Course Objectives

Overview of Switch Security Concerns

  • describe the security needs of the expanded network
  • Securing Access to the Switch

  • describe the commands used to set system passwords
  • describe the commands used to secure remote access
  • Securing Switch Protocols

  • recognize how to secure switch protocols
  • describe how to mitigate compromises through a switch
  • Port Security

  • describe port security
  • describe 802.1X port-based authentication
  • Configuring the Workgroup Switch

    Troubleshooting Port Connectivity

  • describe port connectivity issues
  • Troubleshooting the Switched Network

    Troubleshooting VLANs, Trunking, and VTP

  • identify and resolve VLAN and trunking issues
  • identify and resolve VTP issues
  • Resolving the Switched Network Trouble Tickets

    Troubleshooting Spanning Tree

  • identify and resolve STP issues
  • SUBSCRIPTION COST



     

    NEED HELP OR NOT SURE?