NWCCD 2020-21 Catalog 
    
    Mar 28, 2024  
NWCCD 2020-21 Catalog [This is an Archived Catalog.]

Add to Portfolio (opens a new window)

CSEC 1510 - Hardening Network Infrastructure


This course gives students an awareness of security related issues and essential skills they will need as network administrators in order to provide a secure LAN, WLAN or WAN network. Using Cisco NetAcademy courseware, the course explores secure network infrastructure, understanding core security concepts, managing secure access, VPN encryption, firewalls, intrusion prevention, web and email content security, and endpoint security. This course helps prepare students for the Cisco CCNA Security certification exam which can be attempted after the student has achieved CCNA certification status.

Credits: 3

Instructional Method Lecture/Lab

Prerequisites:
Successful completion of CSCO 2000 Cisco: CCNA 1 - Introduction to Networks, hold an active CCENT or CCNA certification or instructor consent.

Minimum Student Competencies
Upon completion of CSEC 1510 Hardening Network Infrastructure , the student will:

  1. explain network security concepts and common principles.
  2. identify common security threats.
  3. outline the fundamentals of Virtual Private Networks (VPN) technology and cryptography.
  4. describe the fundamentals of IP security.
  5. detail the process of implementing IPSEC Site-to-site VPNs.
  6. outline the process of implementing SSL Remote Access VPNs.
  7. describe mitigation techniques for email-based and web-based threats.
  8. describe firewall function, placement, benefits and limitations.
  9. outline the process of implementing a zone-based firewall on a router.
  10. describe the process of implementing basic firewall policies on an adaptive security appliance (ASA).
  11. discuss the deployment, basic configuration and performance tuning of an intrusion protection system (IPS).
  12. describe common threats to layer 2 technologies (switches) and associated mitigation techniques.
  13. explore the Network Foundation Protection framework.
  14. discuss security best practices associated with the device management plane.
  15. discuss security best practices associated with the IPV4 and IPv6 traffic in the data plane.
  16. examine the control plane and secure routing protocols.
  17. describe the methods available to secure local access.
  18. investigate Bring Your Own Device (BYOD) architecture, components and mobility device management




Add to Portfolio (opens a new window)