Intro To ISCW

* Network Modeling
* Remote Connectivity Methods
* Basic (and Not-So-Basic) Security
* Authentication, Authorization, and Accounting (AAA)
* MultiProtocol Label Switching (MPLS)
* Virtual Private Networks (VPNs)
* Firewalls
* Intrusion Prevention System (IPS)

Network Modeling

* The Cisco Three-Layer Model
* The Cisco Enterprise Architecture
* Cisco IIN and SONA
* Teleworking: Questions to Ask Before Implementing

Remote Connectivity Method

* Intro to Broadband
* DSL Delivery Options
* Cable Modem Boot Process
* PPPoE, PPPoA, and RFC 1483/2684 Bridging
* Basic Troubleshooting
* Hybrid Fiber-Coaxial

Basic (and Not-So-Basic) Security

* Password Basics
* NTP and Router Clocks
* Telnet and SSH
* Banners
* TCP Intercept
* IP Spoofing and 3704 Filtering
* Views and Superviews
* SNMP Security Basics
* Autosecure (CLI and SDM)
* Basic Logging Commands

Authentication, Authorization, and Accounting (AAA)

* Authentication and Authentication Lists
* Configuring AAA at the CLI
* Configuring AAA with SDM
* Debugging AAA
* Authorization
* Privilege Levels
* Account

MultiProtocol Label Switching (MPLS)

* Types, Modes, and Router Roles
* ”push, swap, pop”
* Labels, the Control Plane, and the Data Plane
* The MPLS Process
* Penultimate Hop Popping
* The FIB, LIB, and LFIB
* Basic MPLS Configuration
* MPLS VPNs
* Route Distinguishers and VRFs
* MTU Sizing

Virtual Private Networks (VPNs)

* Terminology
* Tunneling Protocols
* Data and Key Encryption Methods
* IPSec Architecture
* Configuring Site-to-Site VPNs, Policies, and Transform Sets
* Crypto ACLs
* Configuring GRE over IPSec (Using SDM)
* GRE Tips
* Easy VPN Theory and Configuration
* Stateless and Stateful VPN Failover Methods

Firewalls

* Intro to Firewalls
* Stateless and Stateful Filtering
* IOS Firewall Feature Set Components
* Extended ACL Review
* CBAC Operation and Benefits
* Firewall Configuration at the CLI
* Firewall Configuration with SDM - Basic and Advanced
* SDM Basics
* Direction of Your Lists
* Disabling IP Inspection

Intrusion Prevention System (IPS)

* Comparing IPS and IDS
* Approaches to Intrusion Prevention
* Signatures and Signature Types
* SDFs
* Signature Actions
* SDEE and Syslog
* ”False Positives”
* Configuring IPS with SDM
=========================

https://rapidshare.com/files/1238656...642.part01.rar
https://rapidshare.com/files/1238653...642.part02.rar
https://rapidshare.com/files/1238653...642.part03.rar
https://rapidshare.com/files/1238653...642.part04.rar
https://rapidshare.com/files/1238653...642.part05.rar
https://rapidshare.com/files/1238653...642.part06.rar


Regards