1
Lesson 1: Compare network security solutions that provide intrusion prevention and firewall capabilities
2
Lesson 2: Describe deployment models of network security solutions and architectures that provide intrusion prevention and firewall capabilities
3
Lesson 3: Describe the components, capabilities, and benefits of NetFlow and Flexible NetFlow records
4
Lesson 4: Configure and verify network infrastructure security methods (router, switch, wireless)
5
Lesson 5: Implement segmentation, access control policies, AVC, URL filtering, and malware protection
6
Lesson 6: Implement management options for network security solutions such as intrusion prevention and perimeter security (Single vs. multidevice manager, in-band vs. out-of-band, CDP, DNS, SCP, SFTP, and DHCP security and risks)
7
Lesson 7: Configure AAA for device and network access (authentication and authorization, TACACS , RADIUS and RADIUS flows, accounting, and dACL)
8
Lesson 8: Configure secure network management of perimeter security and infrastructure devices (secure device management, SNMPv3, views, groups, users, authentication, and encryption, secure logging, and NTP with authentication)
9
Lesson 9: Configure and verify site-to-site VPN and remote access VPN
Questions
My Question