The page uses Browser Access Keys to help with keyboard navigation. Click to learn moreSkip to Navigation

Different browsers use different keystrokes to activate accesskey shortcuts. Please reference the following list to use access keys on your system.

Alt and the accesskey, for Internet Explorer on Windows
Shift and Alt and the accesskey, for Firefox on Windows
Shift and Esc and the accesskey, for Windows or Mac
Ctrl and the accesskey, for the following browsers on a Mac: Internet Explorer 5.2, Safari 1.2, Firefox, Mozilla, Netscape 6+.

We use the following access keys on our gateway

n Skip to Navigation
k Accesskeys description
h Help
Northern Wyoming Community College District    
NWCCD 2017-18 Catalog 
  
 
  Dec 16, 2017
 
NWCCD 2017-18 Catalog
[Add to Portfolio]

CSEC 1510 - Hardening Network Infrastructure


This course gives students an awareness of security related issues and essential skills they will need as network administrators in order to provide a secure LAN, WLAN or WAN network. The course explores secure network infrastructure, understanding core security concepts, managing secure access, VPN encryption, firewalls, intrusion prevention, web and email content security, and endpoint security. This course helps prepare students for the Cisco CCNA Security 210-260 certification exam which can be attempted after the student has achieved CCENT or CCNA certification status.

Prerequisites:
Successful completion of CSCO 2000 Cisco: CCNA 1 and CSCO 2020 Cisco: CCNA 2, or hold an active CCENT or CCNA certification or instructor consent

Minimum Student Competencies
Upon completion of CSEC 1510 Hardening Network Infrastructure , the student will:

  1. explain network security concepts and common principles.
  2. identify common security threats.
  3. outline the fundamentals of Virtual Private Networks (VPN) technology and cryptography.
  4. describe the fundamentals of IP security.
  5. detail the process of implementing IPSEC Site-to-site VPNs.
  6. outline the process of implementing SSL Remote Access VPNs.
  7. describe mitigation techniques for email-based and web-based threats.
  8. describe firewall function, placement, benefits and limitations.
  9. outline the process of implementing a zone-based firewall on a router.
  10. describe the process of implementing basic firewall policies on an adaptive security appliance (ASA).
  11. discuss the deployment, basic configuration and performance tuning of an intrusion protection system (IPS).
  12. describe common threats to layer 2 technologies (switches) and associated mitigation techniques.
  13. explore the Network Foundation Protection framework.
  14. discuss security best practices associated with the device management plane.
  15. discuss security best practices associated with the IPV4 and IPv6 traffic in the data plane.
  16. examine the control plane and secure routing protocols.
  17. describe the methods available to secure local access.
  18. investigate Bring Your Own Device (BYOD) architecture, components and mobility device management.


Credits: 3

Instructional Method Lecture/Lab

Contact Hours: 4.5 hours/week



[Add to Portfolio]