وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Advanced Cisco Network Security: How to Configure Network Infrastructure Security Online Training

سرفصل های دوره

This Advanced Cisco Network Security: How to Configure Network Infrastructure Security training prepares network security admins to design a security plan for their network that protects the entire infrastructure – not just data or identities, but everything.

Network infrastructure security is a large collection of policies, protocols and practices that are designed to keep all elements of a network and its infrastructure safe from unauthorized access and modification. Network security is actually a subset of network infrastructure security, which also includes the policies and plans to keep domains, databases, physical workstations and operational technologies safe and secure.


1 Configure and Verify Cisco Port Security
  • 1 Introducing Port Security
  • 2 Understanding Port Security and Why we Need It
  • 3 Port Security Defaults
  • 4 Implementing Port Security on Layer 2 Interface
  • 5 Customizing Port Security
  • 6 Configuring Auto Errdisable Recovery
  • 7 Applying Port Security Skills in Production
  • 8 Review of Configure and Verify Cisco Port Security

  • 2 Configure and Verify Cisco DHCP Snooping
  • 9 Introducing DHCP Snooping
  • 10 Why is DHCP Snooping Needed
  • 11 The Recipe for DHCP Snooping
  • 12 Building and Implementing DHCP Snooping in PT
  • 13 Adding Source Guard to a Switch
  • 14 Applying DHCP Snooping in Production
  • 15 Review of Configure and Verify Cisco DHCP Snooping

  • 3 Configure and Verify Cisco Dynamic ARP Inspection
  • 16 Introducing Dynamic ARP Inspection (DAI)
  • 17 Why is DAI Needed
  • 18 The Recipe and Commands for DAI
  • 19 Implementing DAI
  • 20 ARP Access Lists for Non-DHCP Devices
  • 21 Additional DAI Options and Features
  • 22 Applying DAI to the Production Network
  • 23 Review of Configure and Verify Cisco Dynamic ARP Inspection

  • 4 Private VLANS
  • 24 Introduction to Private VLANs
  • 25 PVLANs Overview
  • 26 Promiscuous Ports
  • 27 PVLAN Design
  • 28 Implement PVLANs
  • 29 Verify PVLANs
  • 30 Trunking and PVLANs
  • 31 PVLAN Summary

  • 5 VRF-lite
  • 32 Introduction to VRF-lite
  • 33 VRF-lite Overview
  • 34 VRF-lite Configuration Basics
  • 35 VRFs on a Multi-Layer Switch
  • 36 VRF-lite Design
  • 37 VRF-lite Implementation
  • 38 VRF-lite Adding Routing
  • 39 VRF-lite Routing Verification
  • 40 DHCP VRF Services
  • 41 VRF-lite Summary

  • 6 Network Infrastructure Device Hardening
  • 42 Introduction to Device Hardening
  • 43 Device Hardening Overview

  • 10 Troubleshoot OSPF Authentication for IPv4
  • 69 Intro to IPv4 OSPF Authentication and Troubleshooting
  • 70 Overview of OSPF Authentication
  • 71 Implement OSPF Authentication
  • 72 Virtual Links and Authentication
  • 73 Troubleshooting OSPF Authentication Lab 01
  • 74 Troubleshooting OSPF Authentication Lab 02

  • 11 Troubleshoot OSPF Authentication for IPv6
  • 75 Intro to IPv6 OSPF Authentication and Troubleshooting
  • 76 IPv6 OSPF Authentication Overview
  • 77 Implement and Verify Authentication
  • 78 Troubleshooting OSPF Authentication Lab 01
  • 79 Troubleshooting OSPF Authentication Lab 02
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    مدرس:
    شناسه: 6685
    حجم: 2514 مگابایت
    مدت زمان: 307 دقیقه
    تاریخ انتشار: ۸ اسفند ۱۴۰۱
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید