Silabus Cisco SNPA

download Silabus Cisco SNPA

of 3

Transcript of Silabus Cisco SNPA

  • 8/19/2019 Silabus Cisco SNPA

    1/3

    Cisco – Securing Networks with PIX and ASA

    Silabus

    Chapter 1 Network SecurityChapter 2 Firewall Technologies and the Cisco Security Appliance

    Chapter 3 Cisco Security Appliance

    Chapter 4 System ManagementMaintenanceChapter ! "nderstanding Cisco Security Appliance Translation and Connection

    Chapter # $etting Started with the Cisco Security Appliance Family o% Firewalls

    Chapter & Con%iguring AccessChapter ' Modular (olicy Framework

    Chapter ) Security Conte*ts

    Chapter 1+ Syslog and the Cisco Security ApplianceChapter 11 ,outing and the Cisco Security ApplianceChapter 12 Cisco Security Appliance Failo-er

    Chapter 13 .irtual (ri-ate Networks

    Chapter 14 Con%iguring Access .(NsChapter 1! Adapti-e Security /e-ice Manager

    Chapter 1# Content Filtering on the Cisco Security Appliance

    Chapter 1& 0-er-iew o% AAA and the Cisco Security ApplianceChapter 1' Con%iguration o% AAA on the Cisco Security Appliance

    Chapter 1) (S and Ad-anced (rotocol andling !'&Network Security

    Chapter 2 Firewall Technologies and the Cisco Security Appliance

    Chapter 3 Cisco Security ApplianceChapter 4 System ManagementMaintenance

    Chapter ! "nderstanding Cisco Security Appliance Translation and Connection

    Chapter # $etting Started with the Cisco Security Appliance Family o% FirewallsChapter & Con%iguring Access

    Chapter ' Modular (olicy Framework

    Chapter ) Security Conte*tsChapter 1+ Syslog and the Cisco Security Appliance

    Chapter 11 ,outing and the Cisco Security Appliance

    Chapter 12 Cisco Security Appliance Failo-erChapter 13 .irtual (ri-ate Networks

    Chapter 14 Con%iguring Access .(NsChapter 1! Adapti-e Security /e-ice Manager

    Chapter 1# Content Filtering on the Cisco Security ApplianceChapter 1& 0-er-iew o% AAA and the Cisco Security Appliance

    Chapter 1' Con%iguration o% AAA on the Cisco Security Appliance

    Chapter 1) (S and Ad-anced (rotocol andling

  • 8/19/2019 Silabus Cisco SNPA

    2/3

    Description

    Chapter 1, Network Securityh.Chapter 1 provides an overview of network

    security, including the process and potential threats, and discusses how networksecurity has become increasingly more important to business as companiesbecome more intertwined and their network perimeters continue to fade. Chapter 1 discusses the network security policy and two Cisco programs that can assistcompanies with the design and implementation of sound security policies,processes, and architecture.

    Chapter 2, Firewall echnologies and the Cisco Security !ppliance. Chapter 2

    covers the different firewall technologies and the Cisco Security !ppliance. "te#amines the design of the Security !ppliance and discusses some securityadvantages of that design.

    Chapter $, Cisco Security !ppliance. Chapter $ deals with the design of theSecurity !ppliance in greater detail. his chapter lists the different models of theSecurity !ppliance and their intended applications. "t discusses the variousfeatures available with each model and how each model should be implemented.

    Chapter %, System &anagement'&aintenance. Chapter % covers the installation

    and configuration of the Security !ppliance "(S. his chapter covers the differentconfiguration options that allow for remote management of the Security

     !ppliance. Chapter ), *nderstanding Cisco Security !ppliance ranslation and Connection

    his chapter covers the different transport protocols and how they are handled bythe Security !ppliance. "t also discusses network addressing and how theSecurity !ppliance can alter node or network addresses to secure those

    elements. Chapter +, etting Started with the Cisco Security !ppliance Family of Firewalls

    his chapter is the meat of the Security !ppliance- basic commands reuired toget the Security !ppliance operational. "t discusses the methods for connectingto the Security !ppliance and some of the many configuration options availablewith the Security !ppliance.

    Chapter /, Configuring !ccess. Chapter / introduces the different configurations

    that enable you to control access to your network0s using the Security !ppliance. "t also covers some of the specific configurations reuired to allowcertain protocols to pass through the firewall.

    Chapter , &odular 3olicy Framework. Chapter e#plains a new method of 

    subdividing map4based policies to allow a more granular control over access to3"5protected networks and systems.

    Chapter 6, Secure Conte#ts. Chapter 6 introduces the creation of virtual firewalls

    using separate security conte#ts. "t also e#plains the benefits of multiple separatefirewalls versus a single universal firewall.

    Chapter 17, Syslog and the Cisco Security !ppliance. Chapter 17 covers the

    logging functions of the Security !ppliance and the configuration reuired toallow the Security !ppliance to log to a syslog server.

  • 8/19/2019 Silabus Cisco SNPA

    3/3

    Chapter 11, 8outing and the Cisco Security !ppliance. Chapter 11 discusses

    routing with the Security !ppliance, the routing protocols supported by theSecurity !ppliance, and how to implement them.

    Chapter 12, Cisco Security !ppliance Failover. Chapter 12 details the

    advantages of a redundant firewall configuration and the steps reuired toconfigure two Security !ppliances in the failover mode.

    Chapter 1$, 9irtual 3rivate Networks. &any businesses have multiple locations

    that must be interconnected. Chapter 1$ e#plains the different types of secureconnections of virtual private networks 093N that can be configured between theSecurity !ppliance and other 93N endpoints. "t covers the technologies andprotocols used for creating and maintaining 93Ns across public networks.

    Chapter 1%, Configuring !ccess 93Ns. Chapter 1% discusses how the Security

     !ppliance is used for creating remote4access 93Ns. Chapter 1), !daptive Security :evice &anager. he 3"5 Firewall can now be

    managed using a variety of different tools. he !daptive Security :evice&anager is a web4based graphical user interface 0*" that can be used tomanage the Security !ppliance.

    Chapter 1+, Content Filtering on the Cisco Security !ppliance. "t is a common

    practice for hackers to embed attacks into the content of a web page. Certaintypes of program code are especially conducive to this type of attack because of their interactive nature. Chapter 1+ discusses these types of code and identifiestheir dangers.

    Chapter 1/, (verview of !!! and the Cisco Security !ppliance. "t is e#tremely

    important to ensure that only authori;ed users are accessing your network.Chapter 1/ discusses the different methods for configuring the Security

     !ppliance to interact with authentication, authori;ation, and accounting 0!!!services. his chapter also introduces the Cisco Secure !ccess Control Server 0Cisco Secure !CS, which is the Cisco !!! server package.

    Chapter 1, Configuration of !!! on the Cisco Security !ppliance. Chapter 1

    discusses the specific configuration on the Security !ppliance for communicationwith the !!! server, including the Cisco Secure !CS. "t covers theimplementation, functionality, and troubleshooting of !!! on the 3"5 Firewall.

    Chapter 16, "3S and !dvanced 3rotocol