وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Advanced Cisco Network Security: How to Configure Network Infrastructure Security Online Training

سرفصل های دوره

This Advanced Cisco Network Security: How to Configure Network Infrastructure Security training prepares network security admins to design a security plan for their network that protects the entire infrastructure – not just data or identities, but everything.

Network infrastructure security is a large collection of policies, protocols and practices that are designed to keep all elements of a network and its infrastructure safe from unauthorized access and modification. Network security is actually a subset of network infrastructure security, which also includes the policies and plans to keep domains, databases, physical workstations and operational technologies safe and secure.


1 Configure and Verify Cisco Port Security
  • 1 Introducing Port Security
  • 2 Understanding Port Security and Why we Need It
  • 3 Port Security Defaults
  • 4 Implementing Port Security on Layer 2 Interface
  • 5 Customizing Port Security
  • 6 Configuring Auto Errdisable Recovery
  • 7 Applying Port Security Skills in Production
  • 8 Review of Configure and Verify Cisco Port Security

  • 2 Configure and Verify Cisco DHCP Snooping
  • 9 Introducing DHCP Snooping
  • 10 Why is DHCP Snooping Needed
  • 11 The Recipe for DHCP Snooping
  • 12 Building and Implementing DHCP Snooping in PT
  • 13 Adding Source Guard to a Switch
  • 14 Applying DHCP Snooping in Production
  • 15 Review of Configure and Verify Cisco DHCP Snooping

  • 3 Configure and Verify Cisco Dynamic ARP Inspection
  • 16 Introducing Dynamic ARP Inspection (DAI)
  • 17 Why is DAI Needed
  • 18 The Recipe and Commands for DAI
  • 19 Implementing DAI
  • 20 ARP Access Lists for Non-DHCP Devices
  • 21 Additional DAI Options and Features
  • 22 Applying DAI to the Production Network
  • 23 Review of Configure and Verify Cisco Dynamic ARP Inspection

  • 4 Private VLANS
  • 24 Introduction to Private VLANs
  • 25 PVLANs Overview
  • 26 Promiscuous Ports
  • 27 PVLAN Design
  • 28 Implement PVLANs
  • 29 Verify PVLANs
  • 30 Trunking and PVLANs
  • 31 PVLAN Summary

  • 5 VRF-lite
  • 32 Introduction to VRF-lite
  • 33 VRF-lite Overview
  • 34 VRF-lite Configuration Basics
  • 35 VRFs on a Multi-Layer Switch
  • 36 VRF-lite Design
  • 37 VRF-lite Implementation
  • 38 VRF-lite Adding Routing
  • 39 VRF-lite Routing Verification
  • 40 DHCP VRF Services
  • 41 VRF-lite Summary

  • 6 Network Infrastructure Device Hardening
  • 42 Introduction to Device Hardening
  • 43 Device Hardening Overview

  • 10 Troubleshoot OSPF Authentication for IPv4
  • 69 Intro to IPv4 OSPF Authentication and Troubleshooting
  • 70 Overview of OSPF Authentication
  • 71 Implement OSPF Authentication
  • 72 Virtual Links and Authentication
  • 73 Troubleshooting OSPF Authentication Lab 01
  • 74 Troubleshooting OSPF Authentication Lab 02

  • 11 Troubleshoot OSPF Authentication for IPv6
  • 75 Intro to IPv6 OSPF Authentication and Troubleshooting
  • 76 IPv6 OSPF Authentication Overview
  • 77 Implement and Verify Authentication
  • 78 Troubleshooting OSPF Authentication Lab 01
  • 79 Troubleshooting OSPF Authentication Lab 02
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    مدرس:
    شناسه: 6685
    حجم: 2514 مگابایت
    مدت زمان: 307 دقیقه
    تاریخ انتشار: 8 اسفند 1401
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید