Oct 18, 2018
CSEC 1510 - Hardening Network Infrastructure
This course gives students an awareness of security related issues and essential skills they will need as network administrators in order to provide a secure LAN, WLAN or WAN network. The course explores secure network infrastructure, understanding core security concepts, managing secure access, VPN encryption, firewalls, intrusion prevention, web and email content security, and endpoint security. This course helps prepare students for the Cisco CCNA Security 210-260 certification exam which can be attempted after the student has achieved CCENT or CCNA certification status.
Successful completion of CSCO 2000 Cisco: CCNA 1 and CSCO 2020 Cisco: CCNA 2, or hold an active CCENT or CCNA certification or instructor consent
Minimum Student Competencies
Upon completion of CSEC 1510 Hardening Network Infrastructure , the student will:
- explain network security concepts and common principles.
- identify common security threats.
- outline the fundamentals of Virtual Private Networks (VPN) technology and cryptography.
- describe the fundamentals of IP security.
- detail the process of implementing IPSEC Site-to-site VPNs.
- outline the process of implementing SSL Remote Access VPNs.
- describe mitigation techniques for email-based and web-based threats.
- describe firewall function, placement, benefits and limitations.
- outline the process of implementing a zone-based firewall on a router.
- describe the process of implementing basic firewall policies on an adaptive security appliance (ASA).
- discuss the deployment, basic configuration and performance tuning of an intrusion protection system (IPS).
- describe common threats to layer 2 technologies (switches) and associated mitigation techniques.
- explore the Network Foundation Protection framework.
- discuss security best practices associated with the device management plane.
- discuss security best practices associated with the IPV4 and IPv6 traffic in the data plane.
- examine the control plane and secure routing protocols.
- describe the methods available to secure local access.
- investigate Bring Your Own Device (BYOD) architecture, components and mobility device management.
Instructional Method Lecture/Lab
Contact Hours: 4.5 hours/week
[Add to Portfolio]