Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword or section
Like this
1Activity

Table Of Contents

0 of .
Results for:
No results containing your search query
P. 1
CCNA Security Prep From Net Workers

CCNA Security Prep From Net Workers

Ratings: (0)|Views: 17 |Likes:
Published by draganastek68

More info:

Published by: draganastek68 on Jul 21, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

07/21/2011

pdf

text

original

 
©2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr 1
©2008 Cisco Systems, Inc. All rights reserved.Cisco Public
1
BRKCRT-110414381_04_2008_c1©2008 Cisco Systems, Inc. All rights reserved.Cisco Public
2
BRKCRT-110414381_04_2008_c1
CCNA Security:A New Associate LevelCareer Path Option
BRKCRT-1104
 
©2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr 2
©2008 Cisco Systems, Inc. All rights reserved.Cisco Public
3
BRKCRT-110414381_04_2008_c1
Agenda
Introduction
Disclaimer 
Attack Methodologies
Security Policy
Cryptography Fundamentals
Securing Administrative Access
Firewall
VPN
IPS
Layer 2 Security
Sample Questions
Answer Key
©2008 Cisco Systems, Inc. All rights reserved.Cisco Public
4
BRKCRT-110414381_04_2008_c1
Goals of This Session
What this session willnotbe:
A replacement to the 5 day IINS courseAn exam cram session focusing on the content of theIINS examAn exact match to the content of the IINS course
What this sessionwillinclude:
A discussion of security issues and technology relevant to thosepursuing a career in Network Security at the associate levelA presentation based on, but not limited by, the conceptscovered in the IINS classA demonstration of attack methodologies and mitigation of theattack using Cisco security technology
 
©2006, Cisco Systems, Inc. All rights reserved.Presentation_ID.scr 3
©2008 Cisco Systems, Inc. All rights reserved.Cisco Public
5
BRKCRT-110414381_04_2008_c1
Agenda
Introduction
Disclaimer 
Attack Methodologies
Security Policy
Cryptography Fundamentals
Securing Administrative Access
Firewall
VPN
IPS
Layer 2 Security
Sample Questions
Answer Key
©2008 Cisco Systems, Inc. All rights reserved.Cisco Public
6
BRKCRT-110414381_04_2008_c1
Disclaimer
Do not repeat the exercises demonstrated during thispresentation on any network for which you do not have completeauthorization to do so. The demonstrations are carried out on anisolated network within the Global Knowledge remote labsenvironment. Practicing similar exercises outside of thisenvironment requires many considerations including, but notlimited to:
1.Many organizations have security policies explicitly forbidding the use of these types of tools on the their networks. Job termination and/or criminalprosecution may be the penalty.2.Often these types of tools are distributed with hidden malware. By installingsuch tools you may unknowingly also be installing keystroke loggers, backdoors, or other types of malware.3.Use of these types of tools with targets that are owned by otherentitiesmay violate local, state and/or federal laws.

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->