Learn your way! Get started

Interconnecting Cisco Networking Devices (CCENT), Part 3: Network Device Security

with expert Kenneth Mayer


Watch trailer


Course at a glance

Included in these subscriptions:

  • Dev & IT Pro Video
  • Dev & IT Pro Power Pack

Release date 5/9/2018
Level Intermediate
Runtime 3h 52m
Closed captioning N/A
Transcript N/A
eBooks / courseware N/A
Hands-on labs N/A
Sample code N/A
Exams Included


Enterprise Solutions

Need reporting, custom learning tracks, or SCORM? Learn More



Course description

Interconnecting Cisco Networking Devices Part 1 is the exam associated with the Cisco Certified Entry Network Technician (CCENT) certification or the first half of the Cisco Certified Network Associate Routing and Switching (CCNA Routing and Switching). Managing Network device security is important. This course will cover, passwords, securing administrative access, hardening devices, access control lists and traffic filtering.

Prerequisites

This is part 3 in the series.

Learning Paths

This course will help you prepare for the following certification and exam:
Interconnecting Cisco Networking Devices
100-105 ICND1: Interconnecting Cisco Networking Devices

Meet the expert

Kenneth Mayer As a certified Microsoft Instructor, Ken has focused his career on various security aspects of computer and network technology since the early 1980s. He has offered a wide variety of IT training and high level consulting projects for Fortune 500 companies globally. Through the course of his extensive career, he has taught a full line of Microsoft, CompTIA, Cisco, and other high level IT Security curricula.


Course outline



Administrative Access and Device Hardening

Securing Administative Access (33:23)
  • Introduction (00:10)
  • Securing Administrative Access (02:51)
  • Securing Remote Access (02:27)
  • Service Password Encryption (00:58)
  • Securing Physical Access (03:25)
  • Securing VTY Lines (02:05)
  • Using SSH (04:26)
  • Verify SSH Configuration (01:51)
  • Remote Access Reply (01:05)
  • SSH (01:10)
  • Encryption Process (02:40)
  • Configuration Steps (02:16)
  • Using ACL for Remote Access Security (02:22)
  • Other Authentication Options (01:26)
  • Using the Login Banner (01:59)
  • Summary (01:56)
  • Summary (00:08)
Implementing Device Hardening (47:02)
  • Introduction (00:06)
  • Implementing Device Hardening (01:30)
  • How to Disable a Port (02:03)
  • Port Security (03:09)
  • How to Configure Port Security (03:34)
  • Verify Port Security (01:58)
  • Verify Port Security Continued (00:44)
  • Turning off Unused Services (03:13)
  • Turning off Unused Services Continued (01:06)
  • NTP (02:34)
  • How to Configure NTP (01:12)
  • Verify NTP (01:15)
  • AAA (04:47)
  • Authentication (04:56)
  • Authentication Continued (05:58)
  • AAA Configuration (02:33)
  • Authentication Servers (02:02)
  • AAA Configuration Continued (02:59)
  • Summary (01:05)
  • Summary (00:08)

Traffic Filtering with ACLs

Implementing Traffic Filtering with ACLs (48:17)
  • Introduction (00:09)
  • Filtering Traffic with ACLs (00:40)
  • How an Outbound ACL Functions (01:35)
  • How to Apply an ACL to an Interface (03:49)
  • Introducing the Extended ACL (02:20)
  • Creating a Numbered Extended ACL (03:02)
  • Using a Named ACL (04:49)
  • Configuration Guidelines (01:24)
  • Monitoring ACLs (01:29)
  • Troubleshooting ACL Take 1 and 2 (02:40)
  • Troubleshooting ACL Take 3 and 4 (03:48)
  • Troubleshooting ACL Take 5 and 6 (02:58)
  • Troubleshooting ACL Take 7 (02:07)
  • Summary (01:17)
  • Demo: Configure CLI (05:19)
  • Demo: Sessions (05:00)
  • Demo: Encrypt Passwords (05:35)
  • Summary (00:08)
Traffic Filtering Demo Part 1 (53:17)
  • Introduction (00:09)
  • Demo: Enable SSH (05:20)
  • Demo: Repeat SSH Enabling (03:35)
  • Demo: Limit Remote Access (06:10)
  • Demo: Add Login Banner (04:52)
  • Demo: Banner of the Day (02:20)
  • Demo: Shut Down Ports (06:33)
  • Demo: Repeat Shut Down Ports (02:45)
  • Demo: Port Security (05:47)
  • Demo: Port Security Options (06:54)
  • Demo: Disable Unused Services (05:37)
  • Demo: NTP Connection (03:00)
  • Summary (00:08)
Traffic Filtering Demo Part 2 (50:33)
  • Introduction (00:09)
  • Demo: Extended ACL (05:45)
  • Demo: Troubleshoot ACL (05:50)
  • Demo: SSH (04:25)
  • Demo: Local User (05:20)
  • Demo: NTP (04:40)
  • Demo: Authenticate NTP (05:04)
  • Demo: RADIUS (10:42)
  • Demo: Locate DHCP Servers (04:18)
  • Demo: Locate DHCP Servers Continued (04:07)
  • Summary (00:08)