Course description
Interconnecting Cisco Networking Devices Part 1 is the exam associated with the Cisco Certified Entry Network Technician (CCENT) certification or the first half of the Cisco Certified Network Associate Routing and Switching (CCNA Routing and Switching). Managing Network device security is important. This course will cover, passwords, securing administrative access, hardening devices, access control lists and traffic filtering.
Each LearnNowOnline training course is made up of Modules (typically an hour in length). Within each module there are Topics (typically 15-30 minutes each) and Subtopics (typically 2-5 minutes each). There is a Post Exam for each Module that must be passed with a score of 70% or higher to successfully and fully complete the course.
Prerequisites
This is part 3 in the series.
Meet the expert
Kenneth Mayer
As a certified Microsoft Instructor, Ken has focused his career on various security aspects of computer and network technology since the early 1980s. He has offered a wide variety of IT training and high level consulting projects for Fortune 500 companies globally. Through the course of his extensive career, he has taught a full line of Microsoft, CompTIA, Cisco, and other high level IT Security curricula.
Video Runtime
232 Minutes
Time to complete
272 Minutes
Course Outline
Administrative Access and Device Hardening
Securing Administative Access (33:23)
- Introduction (00:10)
- Securing Administrative Access (02:51)
- Securing Remote Access (02:27)
- Service Password Encryption (00:58)
- Securing Physical Access (03:25)
- Securing VTY Lines (02:05)
- Using SSH (04:26)
- Verify SSH Configuration (01:51)
- Remote Access Reply (01:05)
- SSH (01:10)
- Encryption Process (02:40)
- Configuration Steps (02:16)
- Using ACL for Remote Access Security (02:22)
- Other Authentication Options (01:26)
- Using the Login Banner (01:59)
- Summary (01:56)
- Summary (00:08)
Implementing Device Hardening (47:02)
- Introduction (00:06)
- Implementing Device Hardening (01:30)
- How to Disable a Port (02:03)
- Port Security (03:09)
- How to Configure Port Security (03:34)
- Verify Port Security (01:58)
- Verify Port Security Continued (00:44)
- Turning off Unused Services (03:13)
- Turning off Unused Services Continued (01:06)
- NTP (02:34)
- How to Configure NTP (01:12)
- Verify NTP (01:15)
- AAA (04:47)
- Authentication (04:56)
- Authentication Continued (05:58)
- AAA Configuration (02:33)
- Authentication Servers (02:02)
- AAA Configuration Continued (02:59)
- Summary (01:05)
- Summary (00:08)
Traffic Filtering with ACLs
Implementing Traffic Filtering with ACLs (48:17)
- Introduction (00:09)
- Filtering Traffic with ACLs (00:40)
- How an Outbound ACL Functions (01:35)
- How to Apply an ACL to an Interface (03:49)
- Introducing the Extended ACL (02:20)
- Creating a Numbered Extended ACL (03:02)
- Using a Named ACL (04:49)
- Configuration Guidelines (01:24)
- Monitoring ACLs (01:29)
- Troubleshooting ACL Take 1 and 2 (02:40)
- Troubleshooting ACL Take 3 and 4 (03:48)
- Troubleshooting ACL Take 5 and 6 (02:58)
- Troubleshooting ACL Take 7 (02:07)
- Summary (01:17)
- Demo: Configure CLI (05:19)
- Demo: Sessions (05:00)
- Demo: Encrypt Passwords (05:35)
- Summary (00:08)
Traffic Filtering Demo Part 1 (53:17)
- Introduction (00:09)
- Demo: Enable SSH (05:20)
- Demo: Repeat SSH Enabling (03:35)
- Demo: Limit Remote Access (06:10)
- Demo: Add Login Banner (04:52)
- Demo: Banner of the Day (02:20)
- Demo: Shut Down Ports (06:33)
- Demo: Repeat Shut Down Ports (02:45)
- Demo: Port Security (05:47)
- Demo: Port Security Options (06:54)
- Demo: Disable Unused Services (05:37)
- Demo: NTP Connection (03:00)
- Summary (00:08)
Traffic Filtering Demo Part 2 (50:33)
- Introduction (00:09)
- Demo: Extended ACL (05:45)
- Demo: Troubleshoot ACL (05:50)
- Demo: SSH (04:25)
- Demo: Local User (05:20)
- Demo: NTP (04:40)
- Demo: Authenticate NTP (05:04)
- Demo: RADIUS (10:42)
- Demo: Locate DHCP Servers (04:18)
- Demo: Locate DHCP Servers Continued (04:07)
- Summary (00:08)