CCNA Security/eng

Module 1. Modern Network Security Threats
1.1 Fundamental Principles of a Secure Network
1.2 Worms, Viruses and Trojan Horses
1.3 Attack Methodologies

Module 2. Securing Network Devices  
2.1 Securing Device Access and Files
2.2 Privilege Levels and Role-Based CLI
2.3 Monitoring Devices
2.4 Using Automated Features

Module 3. Authentication, Authorization and Accounting
3.1 Purpose of AAA
3.2 Configuring Local AAA
3.3 Configure Server-Based AAA

Module 4. Implementing Firewall Technologies
4.1 Access Control Lists
4.2 Firewall Technologies
4.3 Context-Based Access Control
4.4 Zone-Based Policy Firewall

Module 5. Implementing Intrusion Prevention
5.1 IPS Technologies
5.2 Implementing IPS

Module 6. Securing the Local Area Network
6.1 Endpoint Security Considerations
6.2 Layer 2 Security Considerations
6.3 Wireless, VoIP and SAN Security Considerations
6.4 Configuring Switch Security
6.5 SPAN and RSPAN

Module 7. Cryptography
7.1 Cryptographic Services
7.2 Hashes and Digital Signatures and authentication
7.3 Symmetric and Asymmetric Encryption

Module 8. Implementing Virtual Private Networks
8.1 VPNs
8.2 IPSec VPN Components and Operation
8.3 Implementing Site-to-Site IPSec VPNs
8.4 Implementing a Remote Access VPN
8.5 Implementing SSL VPNs

Module 9. Managing a Secure Network
9.1 Secure Network Lifecycle
9.2 Self-Defending Network
9.3 Building a Comprehensive Security Policy