Está en la página 1de 3

Cisco Securing Networks with PIX and ASA

Silabus
Chapter 1 Network Security
Chapter 2 Firewall Technologies and the Cisco Security Appliance
Chapter 3 Cisco Security Appliance
Chapter 4 System Management/Maintenance
Chapter 5 Understanding Cisco Security Appliance Translation and Connection
Chapter 6 Getting Started with the Cisco Security Appliance Family of Firewalls
Chapter 7 Configuring Access
Chapter 8 Modular Policy Framework
Chapter 9 Security Contexts
Chapter 10 Syslog and the Cisco Security Appliance
Chapter 11 Routing and the Cisco Security Appliance
Chapter 12 Cisco Security Appliance Failover
Chapter 13 Virtual Private Networks
Chapter 14 Configuring Access VPNs
Chapter 15 Adaptive Security Device Manager
Chapter 16 Content Filtering on the Cisco Security Appliance
Chapter 17 Overview of AAA and the Cisco Security Appliance
Chapter 18 Configuration of AAA on the Cisco Security Appliance
Chapter 19 IPS and Advanced Protocol Handling 587Network Security
Chapter 2 Firewall Technologies and the Cisco Security Appliance
Chapter 3 Cisco Security Appliance
Chapter 4 System Management/Maintenance
Chapter 5 Understanding Cisco Security Appliance Translation and Connection
Chapter 6 Getting Started with the Cisco Security Appliance Family of Firewalls
Chapter 7 Configuring Access
Chapter 8 Modular Policy Framework
Chapter 9 Security Contexts
Chapter 10 Syslog and the Cisco Security Appliance
Chapter 11 Routing and the Cisco Security Appliance
Chapter 12 Cisco Security Appliance Failover
Chapter 13 Virtual Private Networks
Chapter 14 Configuring Access VPNs
Chapter 15 Adaptive Security Device Manager
Chapter 16 Content Filtering on the Cisco Security Appliance
Chapter 17 Overview of AAA and the Cisco Security Appliance
Chapter 18 Configuration of AAA on the Cisco Security Appliance
Chapter 19 IPS and Advanced Protocol Handling

Description
Chapter 1, Network Securityh.Chapter 1 provides an overview of network
security, including the process and potential threats, and discusses how network
security has become increasingly more important to business as companies
become more intertwined and their network perimeters continue to fade. Chapter
1 discusses the network security policy and two Cisco programs that can assist
companies with the design and implementation of sound security policies,
processes, and architecture.
Chapter 2, Firewall Technologies and the Cisco Security Appliance. Chapter 2
covers the different firewall technologies and the Cisco Security Appliance. It
examines the design of the Security Appliance and discusses some security
advantages of that design.
Chapter 3, Cisco Security Appliance. Chapter 3 deals with the design of the
Security Appliance in greater detail. This chapter lists the different models of the
Security Appliance and their intended applications. It discusses the various
features available with each model and how each model should be implemented.
Chapter 4, System Management/Maintenance. Chapter 4 covers the installation
and configuration of the Security Appliance IOS. This chapter covers the different
configuration options that allow for remote management of the Security
Appliance.
Chapter 5, Understanding Cisco Security Appliance Translation and Connection.
This chapter covers the different transport protocols and how they are handled by
the Security Appliance. It also discusses network addressing and how the
Security Appliance can alter node or network addresses to secure those
elements.
Chapter 6, Getting Started with the Cisco Security Appliance Family of Firewalls.
This chapter is the meat of the Security Appliance: basic commands required to
get the Security Appliance operational. It discusses the methods for connecting
to the Security Appliance and some of the many configuration options available
with the Security Appliance.
Chapter 7, Configuring Access. Chapter 7 introduces the different configurations
that enable you to control access to your network(s) using the Security
Appliance. It also covers some of the specific configurations required to allow
certain protocols to pass through the firewall.
Chapter 8, Modular Policy Framework. Chapter 8 explains a new method of
subdividing map-based policies to allow a more granular control over access to
PIXprotected networks and systems.
Chapter 9, Secure Contexts. Chapter 9 introduces the creation of virtual firewalls
using separate security contexts. It also explains the benefits of multiple separate
firewalls versus a single universal firewall.
Chapter 10, Syslog and the Cisco Security Appliance. Chapter 10 covers the
logging functions of the Security Appliance and the configuration required to
allow the Security Appliance to log to a syslog server.

Chapter 11, Routing and the Cisco Security Appliance. Chapter 11 discusses
routing with the Security Appliance, the routing protocols supported by the
Security Appliance, and how to implement them.
Chapter 12, Cisco Security Appliance Failover. Chapter 12 details the
advantages of a redundant firewall configuration and the steps required to
configure two Security Appliances in the failover mode.
Chapter 13, Virtual Private Networks. Many businesses have multiple locations
that must be interconnected. Chapter 13 explains the different types of secure
connections of virtual private networks (VPN) that can be configured between the
Security Appliance and other VPN endpoints. It covers the technologies and
protocols used for creating and maintaining VPNs across public networks.
Chapter 14, Configuring Access VPNs. Chapter 14 discusses how the Security
Appliance is used for creating remote-access VPNs.
Chapter 15, Adaptive Security Device Manager. The PIX Firewall can now be
managed using a variety of different tools. The Adaptive Security Device
Manager is a web-based graphical user interface (GUI) that can be used to
manage the Security Appliance.
Chapter 16, Content Filtering on the Cisco Security Appliance. It is a common
practice for hackers to embed attacks into the content of a web page. Certain
types of program code are especially conducive to this type of attack because of
their interactive nature. Chapter 16 discusses these types of code and identifies
their dangers.
Chapter 17, Overview of AAA and the Cisco Security Appliance. It is extremely
important to ensure that only authorized users are accessing your network.
Chapter 17 discusses the different methods for configuring the Security
Appliance to interact with authentication, authorization, and accounting (AAA)
services. This chapter also introduces the Cisco Secure Access Control Server
(Cisco Secure ACS), which is the Cisco AAA server package.
Chapter 18, Configuration of AAA on the Cisco Security Appliance. Chapter 18
discusses the specific configuration on the Security Appliance for communication
with the AAA server, including the Cisco Secure ACS. It covers the
implementation, functionality, and troubleshooting of AAA on the PIX Firewall.
Chapter 19, IPS and Advanced Protocol Handling. Many different attacks can be
launched against a network and its perimeter security devices. Chapter 19
explains some of the most common attacks and how the Security Appliance can
be configured to repel such an attack.

También podría gustarte