Sale!

Security Technologies Course Pack (50+ Hours)

Original price was: $125.00.Current price is: $29.00.

Price: 29.00 USD | Size: 15.6 GB |   Duration : 50.37 Hours  | 188 Video Lessons | 

BRAND:

ENGLISH | INSTANT DOWNLOAD | ⭐️⭐️⭐️⭐️⭐️4.9

Description

Price: 29.00 USD | Size: 15.6 GB |   Duration : 50.37 Hours  | 188 Video Lessons | 

BRAND: Expert TRAINING | ENGLISH | INSTANT DOWNLOAD | ⭐️⭐️⭐️⭐️⭐️4.9

 

Security Technologies Course Pack (50+ Hours)

“Advanced Security Technologies Mastery: Comprehensive Course Pack (50+ Hours)”

Implementing a Cisco ASA 9.x Firewall

Overview and Basic Initialization

  • ASA Overview and Traffic Flow
  • Basic Initialization

Configuring Routing on the ASA

  • Routing on the ASA – Static Routes
  • Routing on the ASA – RIPv2
  • Routing on the ASA – EIGRP
  • Routing on the ASA – OSPF
  • Routing on the ASA – BGP

Traffic Flow

  • Controlling Thru Traffic Using an Access Control Lists (ACL)
  • Controlling Traffic to the Firewall

Remote Management

  • Remote Management Access to the Firewall
  • Configuring Management Access Using TELNET
  • Configuring Management Access Using SSH
  • Configuring Management Access Using HTTP using ASDM

Network Address Transalation (NAT)

  • Overview of NAT and Dynamic NAT
  • Static NAT
  • Destination NAT
  • Dynamic PAT
  • Static PAT
  • Policy NAT

Transparent Layer 2 Firewall

  • Overview and Basic Initialization of Transparent Firewall
  • Routing Thru a Transparent Firewall
  • Ethertype ACLs on a Transparent Firewall

Virtualization and Redundancy

  • Redundant Interfaces
  • Port-Channels
  • Security Contexts
  • Active Standby Failover – Stateless
  • Active Standby Failover – Stateful
  • Active Active Failover
  • ASA Clustering Overview
  • ASA Clustering – Spanned Mode

Deep Packet Inspection (DPI)

  • Deep Packet Inspection Overview
  • DPI – ICMP Inspection
  • DPI – FTP on a Non-Standard Port

Virtual Private Networks (VPNs)

  • IPSec Overview
  • Site-To-Site IPSec thru a Firewall – without NAT-T
  • Site-To-Site IPSec thru a Firewall – with NAT-T
  • LAN-To-LAN VPN between a Router and an ASA
  • Configuring ASDM for Management
  • Configuring WebVPN
  • Remote Access VPN using AnyConnect

Virtual Private Networks (VPNs)

Basic VPNs

  • VPN Overview
  • LAN-To-LAN Tunnel without NAT-T
  • LAN-To-LAN Tunnel with NAT-T
  • Point-to-Point GRE
  • Encrypting GRE Tunnels using IPSec
  • IPSec Tunnel Interface – Static Virtual Tunnel Interface

Advanced VPNs

  • Multipoint GRE (mGRE) Tunnel
  • Configuring DMVPN – Phase I
  • Configuring DMVPN – Phase II
  • Configuring DMVPN – Phase III
  • Configuring DMVPN Phase III with Dual Hub
  • Encrypting DMVPN Traffic using IPSec
  • Configuring GETVPN-small
  • Configuring GETVPN with Redundancy
  • Configuring VRF aware VPN
  • Configuring a Router as a CA Server

Configuring VPNs using IKEV2

  • Site-To-Site IPSec VPN using IKEv2 – Crypto Maps
  • Site-To-Site IPSec VPN using IKEv2 – S-VTI

Configuring FLEX VPNs

  • Site-To-Site IPSec VPN using IKEv2 – Crypto Maps
  • Site-To-Site IPSec VPN using IKEv2 – S-VTI

ASA VPNs

  • Site-To-Site IPSec thru a Firewall – without NAT-T
  • Site-To-Site IPSec thru a Firewall – with NAT-T
  • LAN – To -LAN VPN between a Router and an ASA
  • Configuring ASDM for Management
  • Configuring WebVPN
  • Remote Access VPN using AnyConnect

Firepower Threat Defense (FTD)

Overview of FTD & Basic Configuration

  • Overview of FTD – Video
  • Initializing the FMC – CLI
  • Initializing the FMC – GUI
  • Initializing the FTD – CLI
  • Integrating FTD with FMC
  • Basic Intialization of FTD Interfaces

Routing on the FTD

  • Routing Configuration – Static Routing
  • Routing Configuration – OSPF
  • Redsitributing Static Routes into OSPF
  • Routing Configuration – RIPv2 with Redistribution
  • Routing Configuration – BGP
  • Verifying Routing on the Routers
  • Allowing traffic thru the FTD using a Basic Access Control Policy
  • Review of Basic Setup & EIGRP Flex Config

Network Address Translation (NAT)

  • Overview of NAT
  • Dynamic NAT
  • Static NAT
  • Dynamic PAT
  • Static PAT
  • Policy NAT- Manual NAT
  • ACP Using L3-L4 Characteristics
  • Verifying NAT & ACP

Access Control Policy (ACP) – Advanced

  • Geo Location based Blocking
  • URL Filtering
  • Access Control Policy Analysis
  • Application Visibility Control (AVC) Control
  • Logging & Alerting
  • Intrusion Prevention Overview
  • Intrusion Prevention Policies – Default Policies
  • Intrusion Prevention Policies – Custom Policies
  • Network AMP-File Policies
  • Packet flow thru the FTD
  • Creating the Pre-Filter

Redundancy & Multi-Instance

  • Redundancy & Multi-Context Overview
  • Configuring Active-Standby Failover
  • Multi-Instance Overview
  • Verifying Active-Standby Failover

Transparent Firewalls

  • Configuring a Transparent Firewall Overview
  • Configuring Transparent Firewall – CLI
  • Configuring Transparent Firewall – GUI
  • Configuring the Access Policy

ISE

Overview and Initialization of ISE

  • Overview of ISE
  • Configuring the base network for Wired ISE
  • ISE Common CLI Configurations
  • ISE Initial Configuration in GUI

Integrating ISE and Switch for 801.1X Authentication

  • Configure the relationship between ISE & Switch
  • Create Groups and Assign Users to them
  • Create an Authorization Profile to specify the VLAN to be assigned
  • Configure an Authorization Policy to link the Group to the Profile
  • Configuring the Switch for Dot1x Authentication use the ISE Configuration Validator Tool
  • Configuring the SVIs and DHCP Pools on SW2
  • Configuring the Clients for Dot1x Authentication and Verifying the VLAN Assignments
  • Downloadable ACLs (DACLs)

Configuring ISE for a Wireless Network

  • Configuring the Wired Topology including Smart Macro
  • Configuring Routing Protocols for the Wired Topology
  • Configuring DHCP & DHCP Relay Agent for a wireless network to register the AP to the WLC
  • Registering APs to WLC – Manual Configurations
  • Initializing the WLC – CLI
  • Verifying AP registrations on the WLC
  • Configuring a Wifi Network – Controller-based Central Switched

Integration ISE & WLC

  • Integrating ISE & WLC for Authentication
  • Create Groups and Assign Users to them
  • Create an Authorization Profile to specify the VLAN to be assigned
  • Configure an Authorization Policy to link the Group to the Profile
  • Configuring WLAN using WPA+WPA2 (802.1x with ISE)
  • Recap of ISE-WLC Integration and DACL

Integrating Active Directory & ISE

  • Add Active Directory to ISE
  • Incorporating the AD Groups into your Policy
  • Using AD with Certificate based Authentication

Configuring MAB

  • Configuring MAB for Access Points

Device Administration using ISE

Overview and Initialization of ISE

  • Device Administration Overview
  • Configuring Network Devices in NDGs using TACACS+ & RADIUS

Overview of AAA

  • Authentication Overview
  • Authorization Overview
  • Accounting Overview

Configuring Device Administration using TACACS+

  • Using TACACS+ for Authentication, Authorization & Accounting for Routers – Routers
  • Using TACACS+ for Authentication, Authorization & Accounting for Routers – ISE
  • Using TACACS+ for Authentication, Authorization & Accounting for Routers – Verification
  • Using TACACS+ for Authentication, Authorization & Accounting for Switches – Switches
  • Using TACACS+ for Authentication, Authorization & Accounting for Switches – ISE
  • Using TACACS+ for Authentication, Authorization & Accounting for Switches – Verifications
  • Using TACACS+ for Authentication, Authorization & Accounting for WLC – WLC
  • Using TACACS+ for Authentication, Authorization & Accounting for WLC – ISE
  • Using TACACS+ for Authentication, Authorization & Accounting for WLC – Verification
  • Using TACACS+ for Authentication, Authorization & Accounting for ASA – ISE
  • Using TACACS+ for Authentication, Authorization & Accounting for ASA – ASA
  • Using TACACS+ for Authentication, Authorization & Accounting for ASA – Verification

Configuring Device Administration using RADIUS

  • Using RADIUS for Authentication & Accounting for Routers – Routers
  • Using RADIUS for Authentication & Accounting for Routers – ISE
  • Using RADIUS for Authentication & Accounting for Routers – Verification
  • Using RADIUS for Authentication & Accounting for Switches – Switches
  • Using RADIUS for Authentication & Accounting for Switches – ISE
  • Using RADIUS for Authentication & Accounting for Switches – Verification
  • Using RADIUS for Authentication & Accounting for WLC – WLC
  • Using RADIUS for Authentication & Accounting for WLC – ISE
  • Using RADIUS for Authentication & Accounting for WLC – Verification

Web Security Appliance (WSA)

Overview and Initialization of WSA

  • Overview of WSA
  • Configuring the base network for WSA
  • Initialization of WSA from CLI
  • Initialization of WSA from GUI

Configuring Transparent Redirection

  • Configure the WCCP Relationship between the WSA & Router – WSA
  • Configure the WCCP Relationship between the WSA & Router – Router
  • Verifying Transparent Redirection

Configuring Identities & Access Policies

  • Configure Identities
  • Configure Access Policies to block specific Sites for Specific Identities

Configuring Custom Categories

  • Configuring Custom Categories – Whitelist
  • Using Custom Categories in your Access Policies – Whitelist
  • Configuring Custom Categories – Blacklist
  • Using Custom Categories in your Access Policies – Blacklist

E-Mail Security Appliance (ESA)

Overview Mail and ESA

  • Overview of E-Mail propagation
  • Forwarding E-Mails normally without an ESA
  • Overview of ESA

Initializing & Configuring the ESA Appliance

  • Initialization of ESA from CLI
  • Initialization of ESA from GUI
  • Configuring the ESA as the Relay Host
  • Re-configuring the DNS Server
  • Verifying of forwarding of the E-mails thru the ESA

Configuring Custom Filters

  • Configure Outgoing Content Filters
  • Configure Incoming Content Filters
  • Configure Incoming Mail Policy
  • Configure Outgoing Mail Policy
  • Verifying the use of the Mail Policy

Discover more from Expert Training

Subscribe to get the latest posts sent to your email.

Reviews

There are no reviews yet.

Only logged in customers who have purchased this product may leave a review.

You may also like…