Loading...

+91 9347295958

★ One to one coaching sessions available ★ Weekend batches available ★ 100 % job assistance ★ Demo classes available on every weekends ★

Networking Security

Network security is any activity designed to protect the usability and integrity of your network and data.

Course Modules

F5 LTM Load Balancer:

Setting Up the BIG-IP System
  • Introducing the BIG-IP System
  • Initially Setting Up the BIG-IP System

Reviewing Local Traffic Configuration
  • Reviewing Nodes, Pools, and Virtual Servers
  • Reviewing Managing BIG-IP Configuration Data
  • Reviewing Traffic Behavior Modification with Profiles
  • Reviewing Application Health Monitoring

Load Balancing Traffic with LTM
  • Exploring Load Balancing Options
  • Using Priority Group Activation and Fallback Host
  • Comparing Member and Node Load Balancing

Modifying Traffic Behavior with Persistence
  • Reviewing Persistence
  • Introducing Cookie Persistence
  • Specifying Default and Fallback Persistence
  • Introducing SSL Persistence
  • Introducing SIP Persistence
  • Introducing Universal Persistence
  • Introducing Destination Address Affinity Persistence
  • Using Match Across Options for Persistence

Monitoring Application Health
  • Differentiating Monitor Types
  • Customizing the HTTP Monitor
  • Monitoring an Alias Address and Port
  • Monitoring a Path vs. Monitoring a Device
  • Managing Multiple Monitors
  • Using Application Check Monitors
  • Using Manual Resume and Advanced Monitor Timer Settings

Processing Traffic with SNATs
  • Overview of SNATs
  • Using SNAT Pools
  • SNATs as Listeners
  • SNAT Specificity
  • VIP Bounceback
  • Additional SNAT Options

Modifying Traffic Behavior with Profiles
  • Profiles Overview
  • TCP Express Optimization
  • TCP Profiles Overview
  • HTTP Profile Options
  • HTTP/2 Profile Options
  • OneConnect
  • Offloading HTTP Compression to BIG-IP
  • Web Acceleration Profile and HTTP Caching
  • Stream Profiles
  • F5 Acceleration Technologies

Selected Topics
  • VLAN, VLAN Tagging, and Trunking
  • Restricting Network Access
  • SNMP Features
  • Segmenting Network Traffic with Route Domains

Customizing Application Delivery with iRules
  • Getting Started with iRules
  • Understanding When iRules are Triggered
  • Deploying iRules
  • Constructing an iRule
  • Testing and Debugging iRules

Customizing Application Delivery with Local Traffic Policies
  • Understanding Today's Threat Landscape
  • Integrating LTM Into Your Security Strategy
  • Defending Your Environment Against SYN Flood Attacks
  • Defending Your Environment Against Other Volumetric Attacks
  • Addressing Application Vulnerabilities with iRules and Local Traffic Policies
  • Detecting and Mitigating Other Common HTTP Threats

CCNA Security 210-260

Secure Access
  • Implementing AAA in Cisco IOS 35
  • Bring Your Own Device (BYOD) 71

Virtual Private Networks (VPN)
  • Fundamentals of VPN Technology and Cryptography 83
  • Fundamentals of IP Security
  • Implementing IPsec Site-to-Site VPNs
  • Implementing SSL VPNs Using Cisco ASA

Secure Routing and Switching
  • Securing Layer 2 Technologies
  • 0 Network Foundation Protection
  • Securing the Management Plane on Cisco IOS Devices
  • Securing the Data Plane in IPv6
  • Securing Routing Protocols and the Control Plane

Cisco Firewall Technologies and Intrusion Prevention System Technologies
  • Understanding Firewall Fundamentals
  • Implementing Cisco IOS Zone-Based Firewalls
  • Configuring Basic Firewall Policies on Cisco ASA
  • Cisco IDS/IPS Fundamentals

Content and Endpoint Security
  • Mitigation Technologies for E-mail-Based and Web-Based Threats
  • Mitigation Technologies for Endpoint Threats

Final Preparation
  • Final Preparation

CCNP Security Certification

Security Concepts
  • Common threats
  • Differences among common security vulnerabilities
  • Functions of cryptography components
  • Compare VPN deployment types
  • Security intelligence
  • Role of endpoint
  • DNAC APIs for Network
  • Interpret basic Python scripts

Network Security
  • Network Security Solutions
  • Understand NetFlow
  • Network infrastructure security methods
  • Implementing the following:
  • Congure the following:

Securing the Cloud
  • Security solutions
  • Compare the following for various cloud service models
  • Understand DevSecOps
  • Implementation in cloud environments
  • Explain the following concepts:
  • Configuration

Content Security
  • Implement trafc redirection
  • Understand web proxy identity and authentication
  • Compare local and cloud-based web solutions
  • Compare remote access methods and security implications
  • Configure the following:

Endpoint protection and Detection
  • Endpoint Protection Platforms (EPP) solutions  Endpoint Detection and Response (EDR) solutions