Intro To ISCW
* Network Modeling
* Remote Connectivity Methods
* Basic (and Not-So-Basic) Security
* Authentication, Authorization, and Accounting (AAA)
* MultiProtocol Label Switching (MPLS)
* Virtual Private Networks (VPNs)
* Firewalls
* Intrusion Prevention System (IPS)
Network Modeling
* The Cisco Three-Layer Model
* The Cisco Enterprise Architecture
* Cisco IIN and SONA
* Teleworking: Questions to Ask Before Implementing
Remote Connectivity Method
* Intro to Broadband
* DSL Delivery Options
* Cable Modem Boot Process
* PPPoE, PPPoA, and RFC 1483/2684 Bridging
* Basic Troubleshooting
* Hybrid Fiber-Coaxial
Basic (and Not-So-Basic) Security
* Password Basics
* NTP and Router Clocks
* Telnet and SSH
* Banners
* TCP Intercept
* IP Spoofing and 3704 Filtering
* Views and Superviews
* SNMP Security Basics
* Autosecure (CLI and SDM)
* Basic Logging Commands
Authentication, Authorization, and Accounting (AAA)
* Authentication and Authentication Lists
* Configuring AAA at the CLI
* Configuring AAA with SDM
* Debugging AAA
* Authorization
* Privilege Levels
* Account
MultiProtocol Label Switching (MPLS)
* Types, Modes, and Router Roles
* ”push, swap, pop”
* Labels, the Control Plane, and the Data Plane
* The MPLS Process
* Penultimate Hop Popping
* The FIB, LIB, and LFIB
* Basic MPLS Configuration
* MPLS VPNs
* Route Distinguishers and VRFs
* MTU Sizing
Virtual Private Networks (VPNs)
* Terminology
* Tunneling Protocols
* Data and Key Encryption Methods
* IPSec Architecture
* Configuring Site-to-Site VPNs, Policies, and Transform Sets
* Crypto ACLs
* Configuring GRE over IPSec (Using SDM)
* GRE Tips
* Easy VPN Theory and Configuration
* Stateless and Stateful VPN Failover Methods
Firewalls
* Intro to Firewalls
* Stateless and Stateful Filtering
* IOS Firewall Feature Set Components
* Extended ACL Review
* CBAC Operation and Benefits
* Firewall Configuration at the CLI
* Firewall Configuration with SDM - Basic and Advanced
* SDM Basics
* Direction of Your Lists
* Disabling IP Inspection
Intrusion Prevention System (IPS)
* Comparing IPS and IDS
* Approaches to Intrusion Prevention
* Signatures and Signature Types
* SDFs
* Signature Actions
* SDEE and Syslog
* ”False Positives”
* Configuring IPS with SDM
=========================
https://rapidshare.com/files/1238656...642.part01.rar
https://rapidshare.com/files/1238653...642.part02.rar
https://rapidshare.com/files/1238653...642.part03.rar
https://rapidshare.com/files/1238653...642.part04.rar
https://rapidshare.com/files/1238653...642.part05.rar
https://rapidshare.com/files/1238653...642.part06.rar
Regards
المفضلات