01 - Network security
02 - Privilege-level passwords
03 - Line passwords
04 - AAA with a local database
05 - Standard Access Control List (ACL) configuration
06 - Extended numbered ACL configuration
07 - Extended named ACL configuration
08 - ACL considerations
09 - Control Plane Policing (CoPP) theory
10 - CoPP configuration
11 - Overview of Extensible Authentication Protocol (EAP)
12 - Understanding the EAPOL 4-way handshake
13 - EAP configuration
14 - Overview of WebAuth
15 - WebAuth configuration
16 - Pre-Shared Key (PSK) theory
17 - PSK configuration
18 - Cyber Threat Defense (CTD)
19 - Endpoint hardening
20 - Next-generation firewall (NGFW)
21 - Cisco TrustSec
22 - Media Access Control Security (MACsec)
23 - Network access control (NAC) with 802.1X
24 - MAC Authentication Bypass (MAB)
25 - Web authentication (WebAuth)