Cisco Security Training Courses

Cisco Security Training

Cisco Security training

Cisco Security Course Outlines

ID Name Duration Overview
206462 One Day Workshop for AAA of Cisco Devices using a Windows-based TACACS+ Server 7 hours Suitable for network planners, engineers or anyone interested in TACACS+ operation with Cisco IOS devices. Course is almost entirely practical if one day. If extended to 2 days due to lack of pre-reqs it will be around 50% practical. Objectives Review the operation of TACACS+ AAA process. Configure Cisco IOS devices to use TACACS+ for access to the management software. Configure Windows users/groups to authorise the TACACS+ requests. Configure TACACS+ server files for proper operation. Test successful operation of TACACS+. Equipment used in Practical Sessions: Cisco routers and/or switches running v12 of IOS. Windows 2008 R2 server running software.
417042 Cisco ASA/Pix Operation 28 hours A 4 day instructor-led practical course designed to familiarise delegates with the Cisco ASA Firewall CLI and ASDM. The course details the key commands used to configure and secure networks using the ASA Firewall with v8 of the operating system and version 6 of the ASDM. Delegates will configure the ASA using the console port, TFTP server, telnet and SSH using local and RADIUS authentication. The device will be configured to utilise Syslog and SNMP. ASA Firewalls will also be configured to use Access-Lists, Network Address Translation and VPN's utilising IPSec protocols. The course will cover the theory of Public/Private Keys, shared secret keys and their use in forming Site to site VPN's between ASA Firewalls using IKE and IPSec. Students will configure the units to create site to site VPN's, remote access VPN's using the Cisco Secure VPN Client and Web VPN's. The course will cover the theory of failover and delegates will configure Active/Standby failover on the ASA. Privileged commands and protocol analyser traces will be used, where necessary, to debug protocols and ensure proper operation of the ASA Firewall. Students will also perform password recovery operations. This course will involve interfacing the ASA with other network equipment, such as routers and switches, as would be expected in a network environment. Audience: Course is suitable for anyone involved in ASA firewall configuration and network security Course is approximately 50% practical Objectives: At the end of this course the student will be able to configure ASA Firewalls to: Allow configuration via console port, telnet and SSH Copy configurations and upgrade OS image. Authenticate users using RADIUS and local authentication. Act as a DHCP Server, Client and Relay. Operate as a Routed or Transparent Firewall. Operate in Failover mode. Support VLANs. Run routing protocols (OSPF and RIP) and exchange routing information with Cisco routers. Support Access Control Lists and content filtering. Support Object Grouping. Establish Internet connections using NAT and PAT. Setup site to site VPN's using IKE and IPSec. Setup Remote Access VPN's using Cisco secure VPN client. Setup Web VPN's Log access-list activity using a syslog server. Send traps to an SNMP Server. Password recovery Practical Exercises Lab Exercise 1: Basic Configuration of Cisco ASA. Lab Exercise 2: Configure support for VLANs on ASA. Lab Exercise 3: Connectivity via Telnet and Local/RADIUS authentication. Lab Exercise 4: Configure Static and Dynamic routing on ASA. Lab Exercise 5: Filter traffic using Access Control Lists. Lab Exercise 6: Configure NAT on ASA. Lab Exercise 7: Configure VPN's on ASA. Lab Exercise 8: Configure Active/Standby Failover on ASA/Pix. Lab Exercise 9: Password Recovery on Cisco ASA. Equipment Used in Practical Exercises: 4 Cisco ASA 5505 Firewalls running v8 of the CLI and capable of Active/Standby Failover. Pix 515E firewalls running v8 of the CLI, Cisco routers, switches and hubs as required.
417039 Workshop for Cisco IOS Devices Implementing IPSec using Certificate Authentication via a Windows 2008 R2 CA 7 hours This one day workshop covers the configuration and operation of negotiating IKE/IPSec Security Association (SA) between Cisco IOS devices. The devices will authenticate using certificates provided through enrollment with a Windows 2008 R2 Certification Authority. The Windows 2008 R2 server will run the Simple Certificate Enrollment Process (SCEP) using the Network Device Enrollment Service (NDES). Audience: Suitable for network planners, engineers or anyone interested in operation of Cisco IOS devices running IPSec using certificate authentication. Objectives: Review the operation of IPSec SA negotiation. Configure Cisco Router/ASA to authenticate and enroll with a Windows 2008 R2 CA. Configure Windows 2008 R2 Server to perform network device enrollment using NDES. Test successful operation of IPSec with certificate authentication. Equipment used in Practical Sessions: Cisco IOS devices running v12 of IOS and Windows 2008 R2 server acting as an enterprise CA and running NDES and certificate enrollment.
417038 One Day Workshop for PEAP Authentication of Windows 7 Supplicant using a Cisco Switch as Authenticator and Windows 2008 R2 Server 7 hours This one day workshop covers the configuration and operation of the IEEE802.1x protocol in the authentication and authorisation of a wired Windows 7 supplicant. The authenticator is a Cisco Switch and the server is Windows NPS running on Windows 2008 R2 server, operating as a Certification Authority (CA). The EAP protocol is Protected EAP (PEAP) and a successful request will be allocated a VLAN on the switch via RADIUS attributes received from the server following successful authentication. The procedure for a wired supplicant is almost identical to that of a wireless supplicant. Audience: Suitable for network planners, engineers or anyone interested in operation of PEAP with Cisco IOS Devices and NPS. Objectives Review the operation of IEEE802.1x process. Configure Cisco Switch to use IEEE802.1x and RADIUS. Configure Cisco Switch to authorise VLAN assignment via RADIUS attributes from server. Configure Windows 7 supplicant for dot1x authentication and install certificate from CA as a trusted computer certificate. Configure connection request and network policies on NPS to authenticate and to pass VLAN assignment to switch. Configure Windows users/groups on Windows 2008 R2 server to enable NPS authentication. Configure Windows 2008 R2 server as a DHCP server. Configure ip helper addresses and inter-VLAN routing on Cisco L3 switch. Test successful PEAP authentication and PING PCs in different VLANs. Equipment used in Practical Sessions: Cisco L2 and L3 switches running v12 of IOS. Windows 2008 R2 server running Network Policy Server (NPS).
417040 One Day Workshop for AAA of Cisco Devices using Windows 2008 NPS RADIUS 7 hours This one day workshop covers the configuration and operation of the RADIUS protocol in the authentication, authorisation and accounting of accessing the management software of Cisco IOS devices. The RADIUS server is Network Policy Server (NPS) in Windows 2008 R2. Audience: Suitable for network planners, engineers or anyone interested in RADIUS operation with Cisco IOS Devices and NPS. Workshop is almost all practical. If extended to 2 days it will be approximately 50% practical. Objectives: Review the operation of RADIUS AAA process. Configure Cisco IOS devices to use RADIUS for access to the management software. Configure connection request and network policies on NPS. Configure Windows users/groups to authorise the RADIUS requests. Test successful operation of RADIUS using NPS. Equipment used in Practical Sessions: Cisco routers and/or switches running v12 of IOS. Windows 2008 R2 server running Network Policy Server (NPS).
464110 Cisco CCNA Syllabus in 5 Days 35 hours A 5 day practical networking course designed to familiarise students with Cisco IOS (version 12). The course details the key commands used to configure and secure Cisco routers and switches, and covers the CCNA syllabus - including wired and wireless LAN access. Students will inter-connect networks by implementing static routes, distance-vector and link-state based dynamic routing protocols. The devices will be configured to route traffic across LAN/VLAN//WAN boundaries, by encapsulating datagrams across serial data links using various WAN protocols, such as HDLC, Frame Relay, ISDN and PPP (with CHAP authentication). VLAN encapsulation/tagging will be via IEEE802.1Q/P. Standard and Extended Access Control Lists will be configured and applied to router interfaces to filter traffic based on IP address and/or traffic type. Students will configure static and dynamic NAT to route between private and public networks and cover the theory of Virtual Private Networks (VPN's) Students will copy router configurations and IOS images to/from a TFTP Server. Privileged commands will be used to debug TCP/IP protocols to ensure proper operation of the routers. Students will also perform password recovery operations. The course is primarily aimed at IP v4 but does give an overview of IP v6 addressing and covers migration from an IP v4 to an IP v6 network. Other protocols and technologies (VPN's / Wireless) may be demonstrated if time permits. Course can be customised to precise requirements of customer. Audience: This course is suitable for anyone looking for a basic understanding of internetworking with Cisco devices and covers the CCNA syllabus. Course is approximately 50% practical Objectives: At the end of this course the student will be able to configure Cisco routers to: Inter-connect networks using static routes Inter-connect networks using RIP, OSPF and EIGRP. Route between VLAN's. Encapsulate datagrams using PPP Apply Standard and Extended Access Control Lists Encapsulate datagrams using HDLC Encapsulate datagrams using Frame Relay Configure Frame Relay Switching. Support ISDN dial backup. Route between public and private networks using NAT. At the end of this course the student will be able to configure Cisco switches to: Run Spanning Tree Protocol. Support VLANs. Connect switches via VLAN Trunks. Practical Exercises: Lab Exercise 1: Connectivity and Testing Lab Exercise 2: Checking ARP Cache Lab Exercise 3: Traceroute Lab Exercise 4: Telnet into a Router Lab Exercise 5: Configuring routers using TFTP Lab Exercise 6: Configuration and Connectivity using RIP Lab Exercise 7: Network Failure Lab Exercise 8: Running other Routing Protocols Lab Exercise 9: Spanning Tree Protocol Lab Exercise 10: VLAN Exercise Lab Exercise 11: Inter-VLAN Routing. Lab Exercise 12: Classful & Classless Routing - Subnetting at Byte Boundaries Lab Exercise 13: Access Lists Lab Exercise 14: PPP Encapsulation Lab Exercise 15: Frame Relay Encapsulation and ISDN dial backup. Lab Exercise 16: Static and Dynamic NAT Configuration.
464101 Implementing Cisco Unified Wireless Networking Essentials 35 hours Overview The goal is to provide students with the information and practice activities necessary to prepare them for designing, installing, configuring, monitoring and conducting basic troubleshooting tasks on a Cisco WLAN in SMB and Enterprise installations. This is an associate level course and as such aims to provide only entry level information, and does not specialise in any of the advanced features of the Cisco WLAN networks solutions. Audience The primary audience is those individuals interested in gaining an overview of a Cisco WLAN and the technologies that can be deployed within that Network. After you complete this course you will be able to: Describe the fundamentals of wireless networks Install a Cisco Unified Wireless Network Describe and configure a basic wireless client using either the default operating system or Cisco Wireless LAN (WLAN) adapter configuration utilities Configure wireless security Manage the wireless network with Cisco WCS Maintain and troubleshoot a wireless network Wireless Fundamentals Describing Wireless Networks and Topologies Describing WLAN RF Principles Describing RF Mathematics Describing Antennas Describing Spread Spectrum Technologies Describing Wireless Regulation Bodies, Standards, and Certifications Examining Wireless Media Access Examining Non-802.11 Wireless Technologies and Their Impact on WLANs Reviewing the Wireless Frame Journey: End to End Identifying Design and Site-Survey Considerations Basic Cisco WLAN Installation Understanding Cisco Unified wireless Network Basics Architecture Configuring a controller Discovering and associating with a controller Describing Access Point Operational Modes Roaming Managing the network from the controller Configuring and migrating stand-alone access points Wireless Clients Using default configuration tools Configuring the Cisco AnyConnect Secure Mobility Client Understanding the Cisco Compatible extensions program WLAN Security Describing WLAN Security Components Establishing IEEE 802.11 Security Centralizing WLAN Authentication Describing EAP Authentications Managing authentication and encryption through WPA and WPA2 Configuring Wireless Security on Controllers and Clients WCS Administration Introducing Cisco WCS and Cisco Navigator Navigating the Cisco WCS Interface Working with controllers from WCS Working with Preconfigured Maps Monitoring the network with WCS Working with Cisco CleanAir in Cisco WCS WLAN Maintenance and Troubleshooting Maintaining the System Troubleshooting a Wireless Network Labs Lab 1-1: Becoming Familiar with Antennas and Ranges Lab 1-2: Creating an Ad Hoc IBSS) Network and Analyzing the Communication Lab 2-1: Configuring a Cisco 2504 WLC Lab 2-2: Downgrading a Controller-Based AP to an Autonomous AP Lab 3-1: Configuring Cisco AnyConnect Secure Mobility Client Lab 3-2: Experiencing Connections and Roaming Lab 4-1: Configuring WLC PSK Authentication Lab 4-2: Configuring Cisco Autonomous Access Point PSK Authentication Lab 4-3: Configuring EAP-FAST Authentication with WPA Lab 4-4: Configuring 802.1Q and Web Authentication Lab 5-1: Configuring Controllers and APs from Cisco WCS Lab 5-2: Working with Cisco WCS Lab 5-3: Monitoring the Network and Containing Devices Lab 6-1: Backing Up the Cisco WLC Configuration Files Lab 6-2: Troubleshooting Lab 6-3: Troubleshooting with Wireshark and Converting an Autonomous AP to WLC Mode
805568 SIP protocol in VoIP 21 hours The course consists of two complementary parts – a theoretical and a practical one. The first is a one day introduction covering motivation, philosophy, fundamentals and rules of operation of the SIP protocol and ways it is used to implement telecom services with focus on IP telephony and VoIP. The second two-day part enables participants to learn practical aspects of service operation within a framework of hand-on laboratory exercises giving detailed insight into configuration of components of SIP telephony architecture, SIP signalling at both message sequence chart and internal message structure levels, and assists in understanding of typical problems and troubleshooting including security and telecom fraud aspects. The trainers will share their experience in launching, operation and management of SIP telephony covering also virtualization and cloud based solutions. Practical part is presented using both SIP hardphones and softphones and IP telephony servers (Asterisk and Freeswitch). Participants can take advantage of the fact trainers have got rich technical and business experience in IP telephony and submit their own problems and questions. They will be included in the agenda at wrap-up as a supplement to the training to meet current urgent needs of clients. Training is addressed to participants with basic knowledge and experience in telecom services – specifically in VoIP and IP networking.  Part I: Introduction Introduction History and motivation Types of VoIP and its evolution SIP – main concepts SIP standardization (RFC 3261 and other relevant standards) Architecture UA – User Agent Predefined servers: Registrar, Location, Proxy and Redirect Application servers Identification and addressing SIP trapezoid Servers and their operation Registration  SIP server in Proxy and Redirect modes Stateless and stateful Proxy servers Location server SRV records and DNS uri/url/urn, ENUM and NAPTR records SIP signalling messages (including Instant Messaging i Presence – IMP extensions) Message structure Requests Responses Example of a call Headers and parameters IMP models SDP (Session Description Protocol) Description of media Standard list of codecs Session negotiation rules Call flows – SIP signalling SIP session – main  RFC 3261 example Sample call scenarios Conferencing and IP PBX Changing media during a session Using IMP Routing of SIP requests and responses VIA header ROUTE and RECORD-ROUTE headers SIP-PSTN interworking SIP-T and SIP-I SIP early media and SIP trunking SIP-PSTN signalling SIP – security problems Secure SIP, Secure RTP and Secure RTCP Typical implementations of Secure SIP Practical problems and perspectives NAT and firewall traversal QoS SIP and SDP in 3GPP IMS architecture Wrap-up and discussion Part II: Hands on SIP in LAN environment: XLite SIP UA + Asterisk Creating Asterisk accounts with a simple dial plan Configuration of XLite SIP UA (dtmf, codecs, nat, rtp, timer, register) and SIP phones (Polycom, Gigaset, Yealink, Linphone) Registration, initiating and receiving calls P2P calls with Linphone Analyzing of SIP signalling using Wireshark Configuration of a server Registration of SIP signalling and RTP media streams SIP packet analysis. Retrieval of a specific call Voice quality problems. Jitter buffer. Retrieval of DTMF signalling (RFC 2833, INFO). Codec and DTMF troubleshooting (transcoding, GSM codec failure, DTMF tone duplication) VoIP monitor SDP, Instant Messaging and Presence (IM&P) SDP parameters and attributes SUBSCRIBE, PUBLISH and MESSAGE SIP methods Practising IM&P with XLite and Linphone SIP call flows SIP Registration with DNS SIP SRV record SIP phone registration using DNS-SRV Call Flows with DNS Analysing SIP call signalling using Wireshark Troubleshooting – DNS timeout, latency SIP trunks Establishing a test SIP trunk Troubleshooting (DOS, DDOS, fraud, cps) SIP security issues SIP security with IPSec Security with Secure SIP IP telephony – risk of frauds Preventing DDOS and other types of attacks Launching SIP based VoIP services Configuration of a switch SIP client configuration and registration Software Asterisk PBX / Freeswitch softswitch / Cisco Call Manager Linux CentOS TDM2IP drivers Softphones (XLite, Linphone) Hardware Server TDM2IP card/gateway Hardphone (Polycom, Gigaset, Yealink) Softphone/Hardphone Configuration Codecs User/Password/SIP Server/Proxy/Ports Operation and signalling for: 3-Way Calling Call Forwarding Attendant Call Transfer MWI, BLF Yealink autoprovisioning Vendor dependent constraints SIP & Network Adress Translation (NAT) problems Type and structure of NATs STUN (Simple Traversal of UDP Through NATs) Quality of VoIP calls – troubleshooting Call connected – missing media Key QoS factors Delay, jitter, play buffer size VoIP quality metrics RTCP – delay and jitter MOS according to ITU-T G.107 E-model VoIP quality monitoring tools (Voipmonitor) Cloud based IP telephony Wrap up and addressing SIP and VoIP related issues submitted by participants

Course Discounts

Course Venue Course Date Course Price [Remote/Classroom]
Programming in C# 5.0 with Visual Studio 2012 Poznan, Garbary Mon, 2016-05-30 09:00 2685PLN / 1822PLN
Introduction to Machine Learning Wrocław, ul.Ludwika Rydygiera 2a/22 Mon, 2016-05-30 09:00 2730PLN / 1940PLN
Adobe Captivate Kielce Tue, 2016-05-31 09:00 1318PLN / 1127PLN
Excel and VBA Programming for Audit and Finance Professionals Szczecin Tue, 2016-05-31 09:00 1913PLN / 1513PLN
Programming in WPF 4.5 Warszawa, ul. Złota 3/11 Tue, 2016-05-31 09:00 2359PLN / 1355PLN
SQL Fundamentals Warszawa, ul. Złota 3/11 Wed, 2016-06-01 09:00 1358PLN / 853PLN
MS Excel - poziom średniozaawansowany Łódź, ul. Tatrzańska 11 Wed, 2016-06-01 09:00 1044PLN / 840PLN
SQL language in MSSQL Toruń, ul. Żeglarska 10/14 Wed, 2016-06-01 09:00 1568PLN / 1198PLN
Bezpieczeństwo aplikacji internetowych Katowice Wed, 2016-06-01 09:30 3606PLN / 2531PLN
Test Automation with Selenium Kraków Mon, 2016-06-06 09:00 3200PLN / 2433PLN
Test Automation with Selenium Katowice Tue, 2016-06-07 09:30 3431PLN / 2469PLN
MS Excel - poziom średniozaawansowany Katowice Wed, 2016-06-08 09:00 700PLN / 771PLN
Programming in C++ Olsztyn, ul. Kajki 3/1 Mon, 2016-06-13 09:00 2936PLN / 2395PLN
Container management with Docker Trójmiasto Tue, 2016-06-14 09:00 4360PLN / 2774PLN
Excel Advanced Katowice Mon, 2016-06-20 09:00 775PLN / 933PLN
Test Automation with Selenium Warszawa, ul. Złota 3/11 Mon, 2016-06-20 09:00 3431PLN / 2327PLN
PostgreSQL Administration Lublin Mon, 2016-06-20 09:30 4025PLN / 3134PLN
Introduction to R Warszawa, ul. Złota 3/11 Tue, 2016-06-21 09:00 3058PLN / 2123PLN
Creating and managing Web sites Wrocław, ul.Ludwika Rydygiera 2a/22 Mon, 2016-06-27 09:00 3410PLN / 2555PLN
Programming in C Gdynia Mon, 2016-06-27 09:00 1590PLN / 1143PLN
Distributed Messaging with Apache Kafka Katowice Mon, 2016-06-27 09:30 4998PLN / 3288PLN
Design Patterns in C# Wrocław, ul.Ludwika Rydygiera 2a/22 Wed, 2016-06-29 09:00 1865PLN / 1392PLN
Visual Basic for Applications (VBA) for Analysts Poznan, Garbary Mon, 2016-07-04 09:00 1912PLN / 1278PLN
Debian Administration Poznan, Garbary Mon, 2016-07-04 09:00 3157PLN / 2083PLN
A Practical Guide to Successful Pricing Strategies Poznan, Garbary Wed, 2016-07-06 09:00 1427PLN / 1093PLN
Excel and VBA Programming for Audit and Finance Professionals Warszawa, ul. Złota 3/11 Mon, 2016-07-11 09:00 1913PLN / 1441PLN
Machine Learning Fundamentals with R Warszawa, ul. Złota 3/11 Mon, 2016-07-18 09:00 2523PLN / 1828PLN
Building Web Apps using the MEAN stack Szczecin Mon, 2016-07-18 09:00 5538PLN / 3351PLN
Microsoft Access - download the data Poznan, Garbary Wed, 2016-07-20 09:00 1117PLN / 856PLN
Python Programming Warszawa, ul. Złota 3/11 Mon, 2016-08-01 09:00 5790PLN / 3753PLN
Programming in WPF 4.5 Warszawa, ul. Złota 3/11 Mon, 2016-09-05 09:00 2359PLN / 1355PLN
BPMN 2.0 for Business Analysts Wrocław, ul.Ludwika Rydygiera 2a/22 Tue, 2016-09-27 09:00 3110PLN / 2337PLN

Upcoming Courses

Weekend Cisco Security courses, Evening Cisco Security training, Cisco Security boot camp, Cisco Security instructor-led , Cisco Security coaching, Cisco Security private courses, Evening Cisco Security courses, Cisco Security trainer , Cisco Security training courses, Cisco Security on-site,Weekend Cisco Security training, Cisco Security classes, Cisco Security instructor

Some of our clients