You are on page 1of 4

91 - 9000444287 contact@21cssindia.

com Home About Us Training Development US Staffing Support Services Careers Sitemap Contact Us CCSP Online Training Company News Click Here For Enquiry Batches going on CA Siteminder Steminder Federation Tibco BW Blade Logic Server Automation Cognos PHP Salesforce Oracle ADF SAP HANA SAP GRC Batches going to be started OAM SAP Hana Oracle Directory Services 11g Openstack Cloud Computing Mobile Applications Obiee ========1======== MODULE 1: Securing networks on routers and switches (SNRS) ACL Time-based Access List Reflexive Access List Dynamic Access List Preventing IP Spoofing Using ACL's and RPF IOS Services Configuring NAT on Routers Configuring IP TCP Intercept Configuring NTP Disabling Unnecessary Services on the Routers Implementing Quos for Traffic Control and Congestion Management Configuring CB-WFQ Configuring LLQ Rate-limiting Using NBAR Using NBAR for CB-WFQ Using NBAR for LLQ Using NBAR for Traffic Analysis Blocking Attacks Using ACL's Blocking Fraggle, Smurf and Fragment Attacks IP Spoofing Attacks Mitigating Layer 2 Attacks Mitigating MAC Spoofing Attacks

Mitigating ARP Spoofing Attacks Mitigating Man-in-the-Middle Attacks Preventing VLAN Hopping Attacks Mitigating DHCP Attacks Preventing DoS Attacks Mitigating DoS attacks using CAR Mitigating DoS and Syn attacks using CBAC Mitigating DoS and Syn attacks using IP TCP Intercept Mitigating Attacks using NBAR and FPM Blocking HTTP attacks using NBAR Blocking File Transfer Attacks using NBAR Blocking Fragmented UDP Attacks using FPM Blocking TCP SYN Flood Attacks using FPM Service Provider Security Blocking Attacks using PBR Blocking Attacks Using Remote Triggered Black Hole Troubleshooting Module-2 Firewalls ASA & IOS Firewall Basic ASA/IOS Configurations Basic Configurations Configure Static and Default Routes Translations using Dynamic NAT/PAT configurations ========2======== Configuring communications between interface with the same security level interf aces. Configuring Translations Configuring Timeouts and Connection Limits Configuring Management Protocols on the ASA Configuring Service Protocols on the ASA Access Control Object Groups Running RIP on the ASA Running OSPF on the ASA Running EIGRP on the ASA Configuring Multicast Routing on the ASA Configuring Java, ActiveX and URL Filtering Advanced ASA Configurations Layer 2 Transparent Firewall Configuring Management on a Transparent Firewall Configuring ACLs on a Transparent Firewall Configuring ARP Inspection on a Transparent Firewall Configuring Failover Configuring State full Failover Configuring Application Aware Inspection Configuring Quos on the ASA Configuring TCP Normalization Security Contexts and Redundancy Configuring Multiple Contexts Active/Active Failover using Security Contexts Multi-Mode Transparent Firewall Interface Redundancy Route Tracking Using SLA Monitor IOS Firewall Basic Configurations Basic IOS Firewall Configurations Tuning DoS attack parameters Enabling Auditing Filtering (Java and URL Filtering) PAM

IOS Firewall Advanced Configurations Configuring Zone Based Firewall Creation of Zones Configuring Zone Based Firewall Configuring Traffic Policies for Inter-zone Traf fic Configuring Parameter-Maps for DoS Thresholds and Deep Packet Inspections Module -3 Virtual Private Networks (VPN) LAN to LAN Tunnels Basic IPSec LAN-to-LAN Router to Router VPN GRE/IPSec Using IPSec Profiles IPSec LAN-to-LAN Router to ASA VPN IPSec LAN-to-LAN Disabling NAT-T thru ASA Multi-Point GRE Tunnel LAN-to-LAN Advanced IPSec LAN-to-LAN using DMVPN IPSec LAN-to-LAN with NAT (Overlapping Subnets) High Availability VPN Without HSRP ========3======== High Availability VPN Using HSRP IPSec LAN-to-LAN using GET VPN IPSec LAN-to-LAN using ISAKMP Profiles EZVPN Configurations EZVPN Router-Router Client Mode EZVPN Router-Router Network Extension Mode EZVPN with Router-Cisco VPN Client EZVPN ASA to Router/Cisco VPN client IPSec Hair pinning with EZVPN IPSec using CA Server IPSec LAN-to-LAN Router Using CA Server DMVPN Using CA Server SSL VPN SSL VPN on the ASA Basic SSL VPN on the ASA Advanced Module 4 IPS/IDS IPS Sensor Configurations Inline Mode IPS Sensor in Inline Mode Signature Tuning on IPS Sensor Signature Firing Throttle Parameters Configuring Multiple Virtual Sensors Inline Mode Custom Signatures Configuring Custom Stream Signatures Configuring Custom Packet Signatures Configuring Custom HTTP Signatures Tuning Fragmentation Parameters on the IPS Sensor Configuring Custom Meta Signature Configuring Custom AIC Signatures IPS Sensor Tuning Configuring Event Overrides Configuring Event Filtering Configuring SNMP Traps Module-5 Access Management Configuring AAA Authentication for Management Access Configuring AAA Clients on ACS Server Configuring User & Group Accounts on the ACS Server Configuring AAA Authentication on Routers/Switches Configuring AAA Authentication on ASA Configuring AAA for Command Authorization Configuring AAA Command Authorization for Routers/Switches Configuring AAA Command Authorization for ASA

Configuring Configuring Configuring Configuring Configuring Configuring

AAA Accounting AAA Accounting for Router/Switches AAA Accounting for ASA AAA Usage Quotas for Users Advanced Features Authorization Proxy on the Router

========4======== Configuring Authorization Proxy on the ASA Configuring Downloadable ACLS on the ASA Configuring HTTP Authentication & Authorization on the Router What we do Training Follow Us Contact Us Us Staffing Corporate Training Web Development Software Development Remote DBA Support Searc h Engine Optimization Talend Hyperion IBM Unica Siteminder SharePoint Informatica SalesForce Facebook Twitter Linkedin Google + Flickr Rss Feed Address :37-12-14,Plot no-27,NGGOs colony,Visakhapatnam-07 Branch : Ground Floor,8-3-214/3/A,S.R Nagar -500038,Hyderabad Email : contact@21cssindia.com Mobile : +91-40-65890128 21cssindia.com 2013. All rights reserved. | ISO 9001:2008 - ISO/IEC :20000:1:201 1 Certified Company. ========5========

You might also like