Rating 4.65 out of 5 (16 ratings in Udemy)
What you'll learn- Having in-depth, theoretical understanding of network security.
- Having the knowledge and skills necessary to design and support network security.
- Having experience-oriented course that employs industry-relevant instructional approaches to prepare students for entry-level jobs in the industry.
- Enable students to have significant hands-on interaction with IT equipment to prepare them for exams and career opportunities.
- Helps …
Rating 4.65 out of 5 (16 ratings in Udemy)
What you'll learn- Having in-depth, theoretical understanding of network security.
- Having the knowledge and skills necessary to design and support network security.
- Having experience-oriented course that employs industry-relevant instructional approaches to prepare students for entry-level jobs in the industry.
- Enable students to have significant hands-on interaction with IT equipment to prepare them for exams and career opportunities.
- Helps students prepare for the Cisco Network Security certification exam.
DescriptionWhen teaching Cisco Network Security course I've foundthat students often have difficulty in findingmethods to troubleshootnetwork issues.Moreover,students have difficultyinremembering configuration commands on Cisco netwoking devices. The way to solve theseissuesis to practice on the networkscenarios as much as possible. And this course is designed to guide students doing all the Network Security Activities on Packet Tracer simulation Software. In each video, the teacher will givethe problem that need to be solved, the knowledge needs to be to applied, and the configuration commands need to be used. With the step-by-step guide video, the students can more understand the knowledge and remember the way using configuration commands.
PACKET TRACER ACTIVITIES GUIDE INCLUDE:
Explain the various types of threats and attacks.
Explain the tools and procedures to mitigate the effects of malware and common network attacks.
Configure command authorization using privilege levels and role-based CLI.
Implement the secure management and monitoring of network devices.
Configure AAA to secure a network.
Implement ACLs to filter traffic and mitigate network attacks on a network.
Implement Zone-Based Policy Firewall using the CLI.
Explain how network-based Intrusion Prevention Systems are used to help secure a network.
Explain endpoint vulnerabilities and protection methods.
Implement security measures to mitigate Layer 2 attacks.
Explain how the types of encryption, hashes, and digital signatures work together to provide
confidentiality, integrity, and authentication.
Explain how a public key infrastructure is used to ensure data confidentiality and provide authentication.
Configure a site-to-site IPsec VPN, with pre-shared key authentication, using the CLI.
Explain how the ASA operates as an advanced stateful firewall.
Implement an ASA firewall configuration.
Implement an ASA firewall configuration using ASDM (optional).
Test network security.