Network Security - Common Security Attacks/Mitigation's - Hacking - Malicious Codes (Virus, Worms) - Threat Defense
01. Before OSI
|
min | ||
02. OSI Layers
|
preview | min | |
03. Application Layers
|
min | ||
04. Presentation Layer
|
min | ||
05. Session layer
|
min | ||
06. Transport Layer
|
min | ||
07. Network Layer part 1
|
min | ||
08. Network Layer part 2
|
min | ||
09. Protocol & port no
|
min | ||
10. Data Link Layer
|
min | ||
11. Physical Layer
|
min | ||
12. Devices on OSI Layers
|
min | ||
13. What is PDU
|
min | ||
14. Data encapsulation & De-encapsulation process
|
min | ||
15. OSI Peer to Peer model
|
min | ||
16. OSI & TCP-IP
|
min | ||
5. Introduction of GRE
|
min | ||
22. Object Group & Its Type
|
min |
001. Access Control List Intro & Implementation Rules
|
min | ||
002. Task & Solution --Numbered & Named Standard ACL
|
min | ||
003. Task & Solution --Numbered & Named Extended ACL
|
min | ||
04. Routing Protocols & ACL part 1
|
min | ||
05. Routing Protocols & ACL part 2
|
min | ||
06. Time-Based Access Control List
|
preview | min | |
07. Remote Access Security ---(Time-based)
|
min | ||
08. Monitoring SYN-Attack with Attacker IP & MAC Address
|
min | ||
09. Dynamic ACL--LOCK & KEY
|
min | ||
010. Reflexive Access-List
|
min | ||
011. IOS Firewall ---Context-Based Access Control
|
min | ||
012. Zone Based Firewall
|
preview | min | |
013. Unicast Reverse Path Forwarding—URPF
|
min | ||
014. TCP Intercept--INTERCEPT & WATCH MODE part 1
|
min | ||
015. TCP Intercept--INTERCEPT & WATCH MODE part 2
|
min |
1. Telnet is not Secure
|
min | ||
2. Secure Remote Session with SSH--(telnet vs ssh)
|
min | ||
3. Auto Command User Security
|
min | ||
4. Users Privilege Level Security
|
preview | min | |
5. IOS Login Enhancement---Un-Authorize Login Block
|
min | ||
6. IOS Login Enhancement---Quiet Mode with Extended ACL
|
min | ||
7. IOS Login Enhancement---Slow Down login Attack
|
min | ||
8. IOS Login Enhancement---Authorize & Un-Authorize Logs
|
min | ||
9. dot1x security part 1
|
min | ||
10-dot1x security part 2
|
preview | min |
1. NAT & its Advantages
|
min | ||
2. Types of NAT
|
min | ||
3. Range of Private IP address
|
min | ||
4. Lab diagram for Static --dynamic-- PAT
|
preview | min | |
5. TEST before NAT configuration part 1
|
min | ||
6. TEST before NAT configuration part 2
|
min | ||
7. NAT Interface commands (INSIDE & OUTSIDE)
|
min | ||
8. STATIC NAT lab configuration
|
preview | min | |
9. DYNAMIC NAT lab configuration
|
min | ||
10. PAT lab configuration
|
min | ||
11. Configure CISCO Router as a DNS SERVER
|
min |
1. Syslog Server & Syslog Messages
|
min | ||
2. Configure & verify Syslog Server Message
|
min | ||
3. AAA Security part 1
|
min | ||
4. AAA Security part 2
|
min | ||
5. SNMP & Its Components
|
preview | min | |
6. SNMP version 1 Messages
|
min | ||
7. SNMP version 2c
|
min | ||
8. SNMP version 3 & Its Configuration Steps
|
min | ||
9. SNMP version 3 LAB--Verification of User Authentication & Traffic Encryption
|
min | ||
10. NTP Server ---Client –Authentication
|
min | ||
11. Parser View
|
min |
1. How to configure DHCP on CISCO Router--T
|
min | ||
2. How to configure DHCP on CISCO Router--L
|
min | ||
3. DHCP Packets OR DORA Process
|
min | ||
4. Man-In-The-Middle Attack via Rogue DHCP server
|
preview | min | |
5. Mitigate DHCP Attack via DHCP Snooping
|
min | ||
5. Mitigate DHCP Attack via DHCP Snooping
|
min | ||
6. Switchport Security with Protected Mode
|
min | ||
7. Port-Security with MAC Address
|
preview | min | |
8. VACL--VLAN Access Control List part 1
|
min | ||
9. VACL--VLAN Access Control List Part 2
|
min | ||
10. VACL--VLAN Access Control List Part 3
|
min | ||
11. Private Vlan security part 1
|
min | ||
12. Private Vlan Security part 2
|
min | ||
13. Port mirroring or SPAN
|
min | ||
14. Local SPAN with Access Link
|
min | ||
15. Local SPAN with VLAN --TRUNK--EC
|
min | ||
16. Remote SPAN
|
min | ||
17. Protect Switch Topology with BPDUGUARD
|
preview | min | |
18. How to Recover Error disable Port
|
min | ||
19. Protect Switch Topology with ROOT GUARD
|
min | ||
20. Protect Switch Topology with BPDU FIlter
|
min |
1. Basic Fundamental of VPN
|
min | ||
2. Types of VPN Model
|
min | ||
3. Classification of VPN
|
min | ||
4. VPN Terminology in Overlay model --GRE
|
min | ||
6. Configuration of Single & Multiple GRE Tunnels
|
min | ||
7. Site -To- Site VPN --IPSEC part 1
|
min | ||
8. Site -To- Site VPN --IPSEC part 2
|
min | ||
9. IPSec over GRE part 1
|
min | ||
10. IPSec over GRE part 2
|
preview | min |
1.What is Firewall ?
|
min | ||
2. Types of Cisco Firewall
|
preview | min | |
3. Firewall Technologies
|
min | ||
4. Types of Table in ASA Firewall
|
min | ||
5. State Table & its Components for TCP & UDP part 1
|
min | ||
6. State Table & its Components for TCP & UDP part 2
|
min | ||
7. TCP Pointer or TCP Flag
|
min | ||
8. Security Algorithm Rules
|
min | ||
9. Firewall Security Levels
|
min | ||
10. Firewall Logical Names
|
min | ||
11. Inbound & Outbound Connections
|
preview | min | |
12. How Cisco ASA works Part 1
|
min | ||
13. How Cisco ASA works Part 2
|
min | ||
14. How Cisco ASA works Part 3
|
min | ||
15. Basic Configuration of ASA Part 1
|
preview | min | |
16. Basic Configuration of ASA Part 2
|
min | ||
17. Testing of ASA Default behavior Part 1
|
min | ||
18. Testing of ASA Default behavior Part 2
|
min | ||
19. How to Telnet ASA from Inside & DMZ
|
min | ||
20. Configuring Static & Default Route on ASA part 1
|
min | ||
21. Configuring Static & Default Route on ASA part 2
|
min | ||
23. Configure Network Object Group part 1
|
min | ||
24. Configure Network Object Group part 2
|
min | ||
25. Configure Network Object Group part 3
|
min | ||
26. Static NAT Part 1
|
preview | min | |
27. Static NAT Part 2
|
min | ||
28. Dynamic NAT Part 1
|
min | ||
29. Dynamic NAT Part 2
|
min | ||
30. Dynamic PAT Part 1
|
min | ||
31. Dynamic PAT Part 2
|
min | ||
32. FTP Traffic Inspection via MPF Part 1
|
min | ||
33. FTP Traffic Inspection via MPF Part 2
|
min |
Syllabus:-CCNA SECURITY
Total No. of Videos: 141
Running Time: Approx 40hrs.
001-OSI
01. Before OSI
02. No. of OSI Layers
03. Application Layer
04. Presentation Layer
05. Session layer
06. Transport Layer
07. Network Layer part 1
08. Network Layer part 2
09. Protocol & port no
10. Data Link Layer
11. Physical Layer
12. Devices on OSI Layers
13. What is PDU
14. Data encapsulation & De-encapsulation process
15. OSI Peer to Peer model
16. OSI & TCP-IP
002.Introduction of Network Security Terms
01. Network Security Terms--ASSET-Vulnerability-- Counter Measure
02. Data security & Traffic Classification part 1
03. Data security & Traffic Classification part 2
04. IPsec VPN is a combination of multiple protocols
003. Layer 3 Security--Types of ACL
01. Access Control List Intro & Implementation Rules
02. Task & Solution --Numbered & Named Standard ACL
03. Task & Solution --Numbered & Named Extended ACL
04. Routing Protocols & ACL part 1
05. Routing Protocols & ACL part 2
06. Time-Based Access Control List
07. Remote Access Security ---(Time-based)
08. Monitoring SYN-Attack with Attacker IP & MAC Address
09. Dynamic ACL--LOCK & KEY
10. Reflexive Access-List
11. IOS Firewall ---Context-Based Access Control
12. Zone Based Firewall
13. Unicast Reverse Path Forwarding—URPF
14. TCP Intercept--INTERCEPT& WATCH MODE part 1
15. TCP Intercept--INTERCEPT& WATCH MODE part 2
004. Layer 3 Security-- User Based
1. Telnet is not Secure
2. Secure Remote Session with SSH--(telnet vs ssh)
3. Auto Command User Security
4. Users Privilege Level Security
5. IOS Login Enhancement---Un-Authorize Login Block
6. IOS Login Enhancement---Quiet Mode with Extended ACL
7. IOS Login Enhancement---Slow Down login Attack
8. IOS Login Enhancement---Authorize & Un-Authorize Logs
9. dot1x security part 1
10. dot1x security part 2
005. SECURING ROUTING PROTOCOLS & LINK
1. Secure RIPv2 updates--RIP AUTHENTICATION
2. Secure OSPF Updates--OSPFv2 AUTHENTICATION
3. Secure EIGRP Updates-- EIGRP AUTHENTICATION
4. Secure BGP Updates ---BGP AUTHENTICATION
5. PPP Authentication
6. Event Manager-Link Security
006.Types of NAT on Cisco Router
1. NAT & its Advantages
2. Types of NAT
3. Range of Private Ip address
4. Comman Lab diagram for Static --dynamic-- PAT
5. TEST before NAT configuration part 1
6. TEST before NAT configuration part 2
7. NAT Interface commands (INSIDE & OUTSIDE)
8. STATIC NAT lab configuration
9. DYNAMIC NAT lab configuration
10. PAT lab configuration
11. Configure CISCO Router as a DNS SERVER
007. CONTROL PLANE Protection --CCP &CPPr
1. ICMP Rate Limit with CoPP--Control Plane policy
2. Control-Plane policy Vs Control-Plane Protection
3. Block TELNET to the CPU Via Control-Plane host(CPPr)
4. Drop ARP to CPU--Control Plane cef-exception(CPPr)
5. Filter Traffic based on Packet Length
008. Management Plane Protection
1. Syslog Server & Syslog Messages
2. Configure & verify Syslog Server Message
3. AAA Security part 1
4. AAA Security part 2
5. SNMP & Its Components
6. SNMP version 1 Messages
7. SNMP version 2c
8. SNMP version 3 & Its Configuration Steps
9. SNMP version 3 LAB--Verification of User Authentication & Traffic Encryption
10. NTP Server ---Client –Authentication
11. Parser View -
09.LAYER 2 SECURITY
1. How to configure DHCP on CISCO Router--Theory
2. How to configure DHCP on CISCO Router--LAB
3. DHCP Packets OR DORA Process
4. Man-In-The-Middle Attack via Rogue DHCP server
5. Mitigate DHCP Attack via DHCP Snooping
6. Switchport Security with Protected Mode
7. Port-Security with MAC Address
8. VACL--VLAN Access Control List part 1
9. VACL--VLAN Access Control List Part 2
10. VACL--VLAN Access Control List Part 3
11. Private Vlan security part 1
12. Private Vlan Security part 2
13. Port mirroring or SPAN
14. Local SPAN with Access Link
15. Local SPAN with VLAN --TRUNK--EC
16. Remote SPAN
17. Protect Switch Topology with BPDUGUARD
18. How to Recover Error-disable Port
19. Protect Switch Topology with ROOT GUARD
20. Protect Switch Topology with BPDU Filter
010.VPN SECURITY
1. Basic Fundamental of VPN
2. Types of VPN Model
3. Classification of VPN
4. VPN Terminology in Overlay model --GRE
5. Introduction of GRE
6. Configuration of Single & Multiple GRE Tunnels
7. Site -To- Site VPN --IPSEC part 1
8. Site -To- Site VPN --IPSEC part 2
9. IPSec over GRE part 1
10. IPSec over GRE part 2
011.CISCO ADAPTIVE SECURITY APPLIANCE
1. What is Firewall
2. Types of Cisco Firewall
3. Firewall Technologies
4. Types of Table in ASA Firewall
5. State Table & its Components for TCP & UDP part 1
6. State Table & its Components for TCP & UDP part 2
7. TCP Pointer or TCP Flag
8. Security Algorithm Rules
9. Firewall Security Levels
10. Firewall Logical Names
11. Inbound & Outbound Connection
12. How Cisco ASA works Part 1
13. How Cisco ASA works Part 2
14. How Cisco ASA works Part 3
15. Basic Configuration of ASA Part 1
16. Basic Configuration of ASA Part 2
17. Testing of ASA Default behavior Part 1
18. Testing of ASA Default behavior Part 2
19. How to Telnet ASA from Inside & DMZ
20. Configuring Static & Default Route on ASA part 1
21. Configuring Static & Default Route on ASA part 2
22. Object Group & Its Type
23. Configure Network Object Group part 1
24. Configure Network Object Group part 2
25. Configure Network Object Group part 3
26. Static NAT Part 1
27. Static NAT Part 2
28. Dynamic NAT Part 1
29. Dynamic NAT Part 2
30. Dynamic PAT Part 1
31. Dynamic PAT Part 2
32. FTP Traffic Inspection via MPF Part 1
33. FTP Traffic Inspection via MPF Part 2
CCNA 11am to 1pm Regular (11th March 2024)
Anwar did his B.E. in Electronics & communication from Jamia Millia Islamia (a Central University), New Delhi, India. He has more than 27 years of industry experience in india & abroad. He started his career in CISCO domain in mid 2004 when he was in Kuwait Army, State of Kuwait. Since then he has been enlightening minds in the networking field and provides guidance and training to both highly skilled professional as well as freshers.
He has ultimate knowledge in multiple domain like CCIE(R&S), CCNP(R&S), BGP, MPLS, CCNA(R&S), CCNA(SEC), PALOALTO, LTM, GTM, SDWAN, MCP, MCSA,ASA, DMVPN, IPV6, QOS etc...
Currently he is the Director of NETWORKING CORE PROGRAM.He has worked with CISCO Network Academy(Jamia Hamdard), Minstry of Defense - Kuwait Army, CMC, L&T, Vision Communication, VTPL etc.