Cisco Security Certification - Cisco Security

Course

In Cardiff

£ 1,859 + VAT

Description

  • Type

    Course

  • Location

    Cardiff (Wales)

  • Duration

    5 Days

  • Start date

    Different dates available

Delegate pack consisting of course notes and exercises Manual Certificate Experienced Instructor Refreshments

Facilities

Location

Start date

Cardiff
See map
Castle Street, CF10 1SZ

Start date

Different dates availableEnrolment now open

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

This centre's achievements

2016

All courses are up to date

The average rating is higher than 3.7

More than 50 reviews in the last 12 months

This centre has featured on Emagister for 8 years

Subjects

  • Access Control
  • Management
  • Access
  • Security
  • Basic
  • Cisco
  • Internet
  • IT
  • Basic IT training
  • Network
  • WAN
  • Basic IT
  • Performance
  • Design
  • Communications
  • Systems
  • Engineering
  • IT Security
  • Network Training
  • IT Management
  • Architectural

Course programme

The Knowledge Academy Security Solutions for System Engineers 5 day course covers the following topics:

Introduction

This course covers claims and evidence identified for the new Advanced Security SE Specialisation. The Security Solutions for Systems Engineers training is part of the Channel SE program.

The SSSE course will form the basis for the Security Cisco Qualified Specialist certification.

Who should attend?

This course is intended for:

  • Systems engineers
  • Network designers
  • Security professionals designing security solutions in enterprise environments

Pre-requisites

  • Valid CCDA Certification

Course Objectives

Upon completing this course, you will be able to:

  • Recognize modern threats to enterprise business processes
  • Recognize modern security controls
  • Choose appropriate controls for specific threats and environments
  • Apply basic security design guidelines
  • Recognize basic customer requirements and environment limitations and build an optimal solution based on them
  • Position Cisco security products in basic customer scenarios

Course Outline

The Threat Landscape and Goals of Security Engineering

1: General Principles

  • Risks to Enterprise Business Processes
  • Security Terminology
  • Types of Attackers
  • Value of Assets and Cost of Incidents
  • Security Engineering

2: Physical Attacks

  • Physical Access
  • Theft
  • Physical Intrusion and Destruction
  • Electromagnetic Leakage and Interference

3: Network Infrastructure Attacks

  • Impact of Network Infrastructure Attacks
  • Device- and Link-Focused Attacks
  • Attacks Against Network Infrastructure Signaling Processes
  • Attacks Against Management Protocols and Supporting Infrastructure Applications

4: System and Application Attacks

  • Impact of System and Application Attacks
  • Attacks Against Network and Application Protocols
  • Attacks Against Operating Systems
  • Attacks Against Applications Lesson 5: User Attacks
  • Impact of User Attacks
  • Types of User Attacks

Overview of Security Controls

1: Organizational Controls

  • Security Policies and Procedures
  • Organizational Controls
  • Security Life-Cycle Management
  • Security Life-Cycle Management Models
  • Security Regulation
  • Security Evaluation and Assurance

2: Types of Controls

  • Access Control
  • Detection and Response
  • Proactive and Reactive Controls
  • Network, Endpoint, and Data-Centric Controls

3: Security Engineering Principles

  • Matching Controls to Threats
  • Realistic Assumptions
  • Simplicity
  • Fail-Open and Fail-Closed Controls
  • Defense in Depth
  • Limiting Damage

4: Distribution of Controls Between Network and Endpoints

  • Infrastructure-Endpoint Architecture
  • Perimeter-Endpoint Architecture
  • Endpoint-Only Architecture
  • Combining Security Architectures

5: Cryptographic Services

  • Cryptographic Controls
  • Confidentiality as a Cryptographic Service
  • Integrity as a Cryptographic Service
  • Authentication as a Cryptographic Service
  • Nonrepudiation as a Cryptographic Service
  • Key Management

6: Authentication and Identity Management

  • Identity Management
  • Subjects and Credentials
  • Authentication Protocols
  • Authentication Architectures

7: Network Controls

  • Network Infrastructure Controls
  • Network Separation and Boundary Controls

8: System Controls

  • Native Operating System Controls
  • Operating System Security Extensions

9: Application Controls

  • Secure Application Protocols
  • Secure Development, Testing, and Operations
  • Data Validation
  • Access Control and Auditing

Network Infrastructure Protection Solutions

1: Overview of Threats, Controls, and Specific Customer Requirements

  • Threats Against the Network Infrastructure
  • Customer Environment and Requirements

2: Architectures and Design Guidelines

  • Architecture Components
  • Device Hardening Design
  • Network Signaling Protection Design
  • Permanent Traffic Filtering Design
  • On-Demand Traffic Filtering Design
  • Edge User Access Control Design
  • Edge User Compliance Verification Design
  • Secure Management Design

3: Case Studies

The lesson includes these topics:

  • Network Infrastructure Security for Enterprise IP Telephony
  • Enterprise Infrastructure-Based Worm Defence

Enterprise Internet Access Solutions

1: Overview of Threats, Controls, and Specific Customer Requirements

  • Threats Against Enterprise Internet Access
  • Customer Environment and Requirements

2: Architectures and Design Guidelines

  • Architectural Components
  • Resource Separation Design
  • Infrastructure Security Design
  • Boundary Network Access Control Design
  • Endpoint Protection Design
  • High-Availability and High-Performance Solutions Design
  • Management Support Design

3: Case Studies

  • Enterprise Internet Access Case Study
  • Internet Access Protection Technology Demonstration

Solutions for Exposed Enterprise Services and Data Centers

1: Overview of Threats, Controls, and Specific Customer Requirements

  • Threats with Exposed Enterprise Services and Data Centers
  • Customer Environment and Requirements

2: Architectures and Design Guidelines

  • Architectural Components
  • Resource Separation Design
  • Infrastructure Security Design
  • Boundary Network Access Control Design
  • Endpoint Protection Design
  • High-Availability and High-Performance Solutions Design
  • Management Support Design

3: Case Studies

  • Exposed Enterprise Service Case Study
  • Protection of Enterprise Exposed Services

Unified Communications Protection Solutions

1: Overview of Threats, Controls, and Specific Customer Requirements

  • Threats Against Unified Communications Systems
  • Customer Environment and Requirements

2: Architectures and Design Guidelines

  • Architectural Components
  • Physical Security Design
  • Resource Separation Design
  • Network Infrastructure Security Design
  • Boundary Network Access Control Design
  • Endpoint Protection Design
  • Management Support Design

3: Case Studies

  • Unified Communications Protection Solutions

Secure WAN Solutions

1: Overview of Threats, Controls, and Specific Customer Requirements

  • Threats Against Enterprise WANs
  • Customer Environment and Requirements

2: Architectures and Design Guidelines

  • Architectural Components
  • Authentication and Transmission Protection Design
  • Infrastructure Security Design
  • Point-to-Point Secure WAN Design
  • Hub-and-Spoke Secure WAN Design
  • Meshed Secure WAN Design
  • High-Availability and High-Performance Design
  • Management Support Design
  • Secure WAN Feature Matrix

3: Case Studies

  • Hub-and-Spoke IPsec WAN
  • Fully-Meshed IPsec WAN
  • Demonstration of an On-Demand Fully Meshed IPsec VPN

Secure Remote Access Solutions

1: Overview of Threats, Controls, and Specific Customer Requirements

  • Threats Against Enterprise Remote Access and Mobility
  • Customer Environment and Requirements

2: Architectures and Design Guidelines

  • Architectural Components
  • Authentication and Transmission Protection Design
  • Infrastructure Security Design
  • Remote Access Solutions Design
  • High-Availability and High-Performance Design
  • Network and Content Access Control Design
  • Remote User Protection and Data Loss Protection Design
  • Management Support Design

3: Case Studies

  • Enterprise Remote Access
  • Secure Remote Access Technology Demonstration

Enterprise Wireless Security Solutions

1: Overview of Threats, Controls, and Specific Customer Requirements

  • Threats Against Enterprise Wireless Access
  • Customer Environment and Requirements

2: Architectures and Design Guidelines

  • Architectural Components
  • Infrastructure Security Design
  • Authentication Design
  • Transmission Protection Design
  • Endpoint Protection Design
  • Guest Access Design
  • Management Support Design

3: Case Studies

  • Enterprise WLAN Case Study

Enterprise Security Management Solutions

1: Overview of Specific Customer Requirements

  • Customer Environment and Requirements

2: Architectures and Design Guidelines

  • Architectural Components
  • Management Network and System Protection Design
  • Infrastructure Security Design
  • Policy Provisioning Design
  • Secure Monitoring and SIM Design
  • Design Compliance Assessment

3: Case Studies

  • Enterprise Security Management Case Study

Additional information

  • Cisco training provided by the Largest Training Company globally
  • Valid CCDA Certification is a pre-requisite for this course
  • Systems Engineers, Network Designers and Security Professionals recommended
  • GUARANTEED LOWEST PRICE IN THE INDUSTRY
  • This course covers claims and evidence identified for the new Advanced Security SE Specialisation
  • Courses delivered by world class Cisco training instructors in luxury venues
  • The Cisco training course includes material, manuals and exam preparation
  • Book Online or Call 01344 203999 to speak to a Cisco training advisor today

Cisco Security Certification - Cisco Security

£ 1,859 + VAT