×
Order Processing
Checkout
Full Name:
Email address:
Password:
Retype Password:
Existing User
Existing User
Continue
Exclusive features inside this offer:
30 Days Money Back Guarantee
Instant Certificate of Completion
Lifetime Access
Get up to date Information
Practical Knowledge
Best Teaching Methodology
Quick access, anytime & anywhere
Autoplay
Autocomplete
Previous Lesson
Complete and Continue
CCNA Security (640-554) Training
Security and Cisco Routers
Security and Cisco Routers: Supplemental Materials
Introduction (1:13)
Network Security Objectives (2:22)
Risk Management Analysis (4:28)
Who are Potential Threats? (1:24)
How do Attacks Take Place? (3:37)
Types of Attacks (4:19)
Attack Prevention (2:13)
Network Device Lifestyle (2:26)
Impact and Risk Value (1:43)
Security State Assessment (3:03)
Security Policies (2:19)
Chapter 1 Knowledge Check (1:06)
Summary (0:27)
Introduction (0:32)
Network Foundation Protection (NFP) (1:20)
Management Plan Security (2:37)
Control Plane Security (1:04)
Data Plane Security (3:23)
Cisco Security Manager (1:38)
Chapter 2 Knowledge Check (1:02)
Summary (0:30)
Introduction (1:03)
Overview of IPv6 (3:07)
IPv6 Addressing (3:12)
Global Unicast Addresses (1:27)
Unique Local Unicast Addresses (1:06)
Link-Local Addresses (1:36)
EUI-64 (1:10)
IPv6 Auto-Configuration (0:56)
IPv6 Multicast (2:48)
Chapter 3 Knowledge Check (0:49)
Summary (1:07)
AAA on Cisco Devices
Introduction (0:51)
AAA on Cisco Devices: Supplemental Materials
RADIUS (1:13)
TACACS+ (1:44)
Authentication of Devices (3:51)
Chapter 1 Knowledge Check (0:56)
Summary (0:29)
Introduction (0:19)
Overview of AAA (3:06)
AAA Configuration (1:39)
Chapter 2 Knowledge Check (1:08)
AAA Verification (4:47)
Summary (0:47)
IOS ACLs
IOS ACLs: Supplemental Materials
Introduction (0:29)
Types of ACLs (1:58)
Overview of ACLs (2:13)
Standard Access Lists (0:46)
Extended Access Lists (2:05)
Named Access Lists (2:08)
Chapter 1 Knowledge Check (0:42)
ACLs and Security (1:23)
Types of Attacks (6:20)
Chapter 2 Knowledge Check (1:19)
Summary (0:53)
Secure Network Management
Secure Network Management: Supplemental Materials
Management Plane Traffic (1:49)
Introduction (0:55)
Strong Passwords (3:41)
AAA (2:21)
RBAC and Management Protocols (1:25)
Logging (2:53)
Simple Network Management Protocol (SNMP) (1:40)
SNMPv3 (2:53)
NTP and Securing System Files (3:02)
Knowledge Check (1:05)
Summary (0:45)
Common Layer 2 Attacks
Common Layer 2 Attacks: Supplemental Materials
VLAN Trunking (5:42)
Defining and Configuring VLANs (4:16)
Introduction (1:02)
VLAN Trunking Protocol (VTP) (5:37)
InterVLAN Routing (1:37)
InterVLAN Routing Configuration and Verification (2:08)
Port Security (3:47)
Configuring Port Security (1:20)
Port Security Verification (3:39)
Chapter 1 Knowledge Check (0:54)
Switch Security Options (1:29)
Device Security (2:39)
Disabling IOS Services (1:55)
Telnet/SSH Access (0:35)
Switchport Maintenance (2:18)
Chapter 2 Knowledge Check (1:05)
Spanning Tree Protocol – 802.1d (3:20)
Root Bridge (1:01)
Root Port and Designated Port (0:27)
STP Path Costs (1:13)
Optimizing Spanning Tree (1:41)
Chapter 3 Knowledge Check (0:45)
Summary (0:57)
Cisco Firewall Technologies
Cisco Firewall Technologies: Supplemental Materials
Introduction (0:52)
Types of Firewall Technologies (1:49)
Firewall Policy Properties (1:43)
Configuring Firewalls (2:14)
Proxy Firewalls (0:31)
Static Packet Filtering (1:02)
Stateful Packet Filtering (1:13)
Transparent Firewalls (0:37)
Application Inspection Firewall (0:29)
Firewall Design and Implementation (1:01)
Knowledge Check (0:21)
Summary
Overview of Zone-Based Firewalls (1:02)
Rules for Zone-Based Firewalls (0:33)
Features of Zone-Based Firewalls (1:35)
Policy Maps (4:58)
Policy Maps (1:33)
Adaptive Security Appliance Features (9:22)
Overview of Adaptive Security Appliance (2:00)
Knowledge Check (0:50)
Purpose of NAT (1:23)
Summary (0:22)
Static NAT (1:59)
Dynamic NAT (1:41)
Overloading NAT with PAT (1:26)
Policy NAT/PAT (4:13)
Knowledge Check (0:50)
Summary (0:47)
Cisco IPS
Cisco IPS: Supplemental Materials
Introduction (0:42)
IPS Fundamentals (1:52)
IPS Sensor Options (1:10)
Identifying Malicious Traffic (2:32)
Configuring Cisco IPS (6:22)
IPS Best Practices (1:37)
Knowledge Check (0:58)
Summary (0:41)
VPN Technologies
Introduction (1:06)
VPN Technologies: Supplemental Materials
Overview of VPN (0:47)
Elements of Cryptography (5:49)
Types of VPN Technologies (1:06)
Types of VPN (1:52)
VPN Tunnel (9:21)
Knowledge Check (0:39)
Site-to-Site VPN Overview (1:45)
Site-to-Site VPN Authentication (3:13)
SSL VPN (1:05)
SSL and TLS (0:50)
SSL VPN Options (1:15)
SSL VPN Configuration (3:34)
Knowledge Check (0:49)
Summary (0:41)
How do Attacks Take Place?
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock