(*)- Evaluate security threats and corresponding defense mechanisms for network environments based on specific use cases (K5)
- Create and optimize a basic firewall policy (K3)
- Set up and configure VPNs, including selecting appropriate protocols and encryption methods (K3, K5)
- Configure security features on layer-3 switches (such as AAA, DHCP snooping) (K3)
|
(*)- Basic terminology and concepts: redundancy, automation, detection and response, defense in depth, visibility, zero trust, (micro)segmentation, SDN, SSE, SASE
- Firewalls, VPN and remote access: firewall policies and rules, evolution of firewalls, IDS/IPS, SD-WAN, ZTNA, overview of VPN protocols
- Securing protocols and AAA: restricting MAC-learning in switches, DHCP snooping, ARP protection, port-based authentication, protection against VLAN and STP attacks, anti-spoofing, RADIUS, 802.1X, protocols for network authentication and encryption
These topics are presented as an overview; a selected set of concepts is discussed in greater detail and is also practiced in hands-on labs.
|