Silabus Cisco SNPA
-
Upload
zaenal-arifin -
Category
Documents
-
view
212 -
download
0
Transcript of Silabus Cisco SNPA
-
8/19/2019 Silabus Cisco SNPA
1/3
Cisco – Securing Networks with PIX and ASA
Silabus
Chapter 1 Network SecurityChapter 2 Firewall Technologies and the Cisco Security Appliance
Chapter 3 Cisco Security Appliance
Chapter 4 System ManagementMaintenanceChapter ! "nderstanding Cisco Security Appliance Translation and Connection
Chapter # $etting Started with the Cisco Security Appliance Family o% Firewalls
Chapter & Con%iguring AccessChapter ' Modular (olicy Framework
Chapter ) Security Conte*ts
Chapter 1+ Syslog and the Cisco Security ApplianceChapter 11 ,outing and the Cisco Security ApplianceChapter 12 Cisco Security Appliance Failo-er
Chapter 13 .irtual (ri-ate Networks
Chapter 14 Con%iguring Access .(NsChapter 1! Adapti-e Security /e-ice Manager
Chapter 1# Content Filtering on the Cisco Security Appliance
Chapter 1& 0-er-iew o% AAA and the Cisco Security ApplianceChapter 1' Con%iguration o% AAA on the Cisco Security Appliance
Chapter 1) (S and Ad-anced (rotocol andling !'&Network Security
Chapter 2 Firewall Technologies and the Cisco Security Appliance
Chapter 3 Cisco Security ApplianceChapter 4 System ManagementMaintenance
Chapter ! "nderstanding Cisco Security Appliance Translation and Connection
Chapter # $etting Started with the Cisco Security Appliance Family o% FirewallsChapter & Con%iguring Access
Chapter ' Modular (olicy Framework
Chapter ) Security Conte*tsChapter 1+ Syslog and the Cisco Security Appliance
Chapter 11 ,outing and the Cisco Security Appliance
Chapter 12 Cisco Security Appliance Failo-erChapter 13 .irtual (ri-ate Networks
Chapter 14 Con%iguring Access .(NsChapter 1! Adapti-e Security /e-ice Manager
Chapter 1# Content Filtering on the Cisco Security ApplianceChapter 1& 0-er-iew o% AAA and the Cisco Security Appliance
Chapter 1' Con%iguration o% AAA on the Cisco Security Appliance
Chapter 1) (S and Ad-anced (rotocol andling
-
8/19/2019 Silabus Cisco SNPA
2/3
Description
Chapter 1, Network Securityh.Chapter 1 provides an overview of network
security, including the process and potential threats, and discusses how networksecurity has become increasingly more important to business as companiesbecome more intertwined and their network perimeters continue to fade. Chapter 1 discusses the network security policy and two Cisco programs that can assistcompanies with the design and implementation of sound security policies,processes, and architecture.
Chapter 2, Firewall echnologies and the Cisco Security !ppliance. Chapter 2
covers the different firewall technologies and the Cisco Security !ppliance. "te#amines the design of the Security !ppliance and discusses some securityadvantages of that design.
Chapter $, Cisco Security !ppliance. Chapter $ deals with the design of theSecurity !ppliance in greater detail. his chapter lists the different models of theSecurity !ppliance and their intended applications. "t discusses the variousfeatures available with each model and how each model should be implemented.
Chapter %, System &anagement'&aintenance. Chapter % covers the installation
and configuration of the Security !ppliance "(S. his chapter covers the differentconfiguration options that allow for remote management of the Security
!ppliance. Chapter ), *nderstanding Cisco Security !ppliance ranslation and Connection
his chapter covers the different transport protocols and how they are handled bythe Security !ppliance. "t also discusses network addressing and how theSecurity !ppliance can alter node or network addresses to secure those
elements. Chapter +, etting Started with the Cisco Security !ppliance Family of Firewalls
his chapter is the meat of the Security !ppliance- basic commands reuired toget the Security !ppliance operational. "t discusses the methods for connectingto the Security !ppliance and some of the many configuration options availablewith the Security !ppliance.
Chapter /, Configuring !ccess. Chapter / introduces the different configurations
that enable you to control access to your network0s using the Security !ppliance. "t also covers some of the specific configurations reuired to allowcertain protocols to pass through the firewall.
Chapter , &odular 3olicy Framework. Chapter e#plains a new method of
subdividing map4based policies to allow a more granular control over access to3"5protected networks and systems.
Chapter 6, Secure Conte#ts. Chapter 6 introduces the creation of virtual firewalls
using separate security conte#ts. "t also e#plains the benefits of multiple separatefirewalls versus a single universal firewall.
Chapter 17, Syslog and the Cisco Security !ppliance. Chapter 17 covers the
logging functions of the Security !ppliance and the configuration reuired toallow the Security !ppliance to log to a syslog server.
-
8/19/2019 Silabus Cisco SNPA
3/3
Chapter 11, 8outing and the Cisco Security !ppliance. Chapter 11 discusses
routing with the Security !ppliance, the routing protocols supported by theSecurity !ppliance, and how to implement them.
Chapter 12, Cisco Security !ppliance Failover. Chapter 12 details the
advantages of a redundant firewall configuration and the steps reuired toconfigure two Security !ppliances in the failover mode.
Chapter 1$, 9irtual 3rivate Networks. &any businesses have multiple locations
that must be interconnected. Chapter 1$ e#plains the different types of secureconnections of virtual private networks 093N that can be configured between theSecurity !ppliance and other 93N endpoints. "t covers the technologies andprotocols used for creating and maintaining 93Ns across public networks.
Chapter 1%, Configuring !ccess 93Ns. Chapter 1% discusses how the Security
!ppliance is used for creating remote4access 93Ns. Chapter 1), !daptive Security :evice &anager. he 3"5 Firewall can now be
managed using a variety of different tools. he !daptive Security :evice&anager is a web4based graphical user interface 0*" that can be used tomanage the Security !ppliance.
Chapter 1+, Content Filtering on the Cisco Security !ppliance. "t is a common
practice for hackers to embed attacks into the content of a web page. Certaintypes of program code are especially conducive to this type of attack because of their interactive nature. Chapter 1+ discusses these types of code and identifiestheir dangers.
Chapter 1/, (verview of !!! and the Cisco Security !ppliance. "t is e#tremely
important to ensure that only authori;ed users are accessing your network.Chapter 1/ discusses the different methods for configuring the Security
!ppliance to interact with authentication, authori;ation, and accounting 0!!!services. his chapter also introduces the Cisco Secure !ccess Control Server 0Cisco Secure !CS, which is the Cisco !!! server package.
Chapter 1, Configuration of !!! on the Cisco Security !ppliance. Chapter 1
discusses the specific configuration on the Security !ppliance for communicationwith the !!! server, including the Cisco Secure !CS. "t covers theimplementation, functionality, and troubleshooting of !!! on the 3"5 Firewall.
Chapter 16, "3S and !dvanced 3rotocol