Maricopa Community Colleges  CNT187   20056-20086 
Official Course Description: MCCCD Approval: 07/22/08
CNT187 20056-20086 LEC 3 Credit(s) 3 Period(s)
Cisco SAFE Implementation
Knowledge and skills needed to implement and use the principles and axioms presented in the SAFE white papers for small, medium, and remote user (SMR) Enterprise, Internet Protocol(IP) telephony and wireless Local Area Network (LAN) networks on specific devices. Describe the functionality and implement the configuration needed to build end-to-end security solutions using SAFE SMR as the blueprint. Basic implementation of SAFE wireless LAN.
Prerequisites: CNT181 or permission of Instructor.
Go to Competencies    Go to Outline
 
MCCCD Official Course Competencies:
 
CNT187   20056-20086 Cisco SAFE Implementation
1. Identify the functions of the key modules and devices in a small, medium, remote and enterprise network. (I)
2. Identify the specific threats to the small, medium, remote and enterprise network. (I, II)
3. Describe the mitigation roles of Cisco devices in a small, medium, remote and enterprise network. (II, III)
4. Implement specific configurations to apply the mitigation roles in a small, medium, remote and enterprise network. (II, III, IV, V, VI, VII)
5. Recommend alternative devices that can fulfill the same mitigation roles in a small, medium, remote and enterprise network. (II, III, IV, V, VI, VII)
6. Overview of the technologies and architecture involved in building a SAFE IP telephony network and SAFE wireless network. (II, VIII, IX)
7. Describe the mitigation roles of Cisco devices in an IP telephony and wireless network. (III)
8. Identify the functions of the key modules and devices in an IP telephony network and SAFE wireless LAN. (VIII, IX)
9. Identify the specific threats to an IP telephony network and wireless LAN. (VIII, IX)
Go to Description    Go to top of Competencies
 
MCCCD Official Course Outline:
 
CNT187   20056-20086 Cisco SAFE Implementation
    I. Security Fundamentals
        A. Defining SAFE
        B. SAFE Design Fundamentals
        C. SAFE Design Concepts
        D. Understanding SAFE Small, Medium and Remote User Modules
      II. Architectural overview
          A. Defining a Security Policy
          B. Classifying Rudimentary Network Attacks
          C. Classifying Sophisticated Network Attacks
          D. Mitigating Sophisticated Network Attacks
          E. SAFE Network Management Guidelines
        III. Cisco security portfolio
            A. Cisco Perimeter Security Products
            B. Cisco Network Core Security Products
            C. New and Emerging Security Technologies
          IV. Designing and Implementing Small SAFE Networks
              A. Components of SAFE Small Network Design
              B. Corporate Internet Module in Small Networks
              C. Campus Module in Small Networks
              D. Branch versus Headend/Standalone Considerations for Small Networks
              E. General Implementation Recommendations
              F. Using the Internet Service Provider (ISP) Router in Small Networks
              G. Using the Cisco Internetwork Operating System (IOS) Firewall Router in Small Networks
              H. Using the Private Internet Exchange (PIX) Firewall in Small Networks
              I. Alternative Implementations
            V. Designing and Implementing medium SAFE Networks
                A. Components of SAFE medium-sized Network Design
                B. Corporate Internet Module in Medium-Sized Networks
                C. Campus Module in Medium-sized Networks
                D. Wireless Area Network (WAN) Module in Medium-sized Networks
                E. Branch versus Headend/Standalone considerations for Medium-sized Networks
                F. General Implementation Recommendations
                G. Using the ISP Router in Medium-sized Networks
                H. Using the Edge Router in Medium-sized Networks
                I. Using the Cisco IOS Firewall Router in Medium-sized Networks
                J. Using the PIX Firewall in Medium-sized Networks
                K. Network intrusion Detection System Overview
                L. Host-based Intrusion Prevention System Overview
                M. Virtual Private Network (VPN) 3000 Series Concentrator Overview
                N. Configuring the Layer 3 switch
              VI. Designing SAFE Enterprise Networks
                  A. Components of SAFE Enterprise Network Design
                  B. The Enterprise Campus Layer
                  C. The Enterprise Edge Layer
                  D. The WAN Module
                VII. Designing Remote SAFE Networks
                    A. Configuration Options for Remote-User Network Design
                    B. Key Devices for Remote-User Networks
                    C. Mitigating Threats in Remote-User Networks
                    D. Design Guidelines for Remote-User Networks
                  VIII. SAFE IP Telephony Design
                      A. Examining SAFE IP Telephony Design Fundamentals
                      B. Understanding SAFE IP Telephony Axioms
                      C. Understanding SAFE IP Telephony Network Designs
                    IX. SAFE Wireless LAN Design
                        A. Basic Wireless Concepts
                        B. Cisco Wireless Local Area Network (WLAN) Portfolio
                        C. SAFE WLAN Axioms
                        D. WLAN Design Approach
                        E. Large-Enterprise WLAN Design
                        F. Medium WLAN Design
                        G. Small WLAN Design
                        H. Remote WLAN Design
                    Go to Description    Go to top of Competencies    Go to top of Outline