Maricopa Community Colleges  CNT210   20082-99999 
Official Course Description: MCCCD Approval: 12/11/07
CNT210 20082-99999 L+L 4 Credit(s) 6 Period(s)
Cisco CCNP II: Implementing Secure Converged Wide Area Networks
Development of knowledge and skills in implementing secure enterprise-class network service for teleworkers and branch sites. Secure and expand the reach of an enterprise network with focus on VPN configuration and securing network access. Preparation for Cisco Certified Network Professional (CCNP) exam.
Prerequisites: CNT170 or CCNA industry certification, or permission of instructor. Corequisites: CNT200 and CNT220.
Go to Competencies    Go to Outline
 
MCCCD Official Course Competencies:
 
CNT210   20082-99999 Cisco CCNP II: Implementing Secure Converged Wide Area Networks
1. Explain the Cicso hierarchical network model as it pertains to the Wide-area Network (WAN). (I)
2. Describe and implement teleworker configuration and access. (II)
3. Describe and configure a site-to-site Internet Protocol Security (IPsec) Virtual Private Network (VPN). (III)
4. Describe and configure a Cisco Easy Virtual Private Network (EZVPN). (III)
5. Implement and verify frame mode Multiprotocol Label Switching (MPLS). (IV)
6. Explain the strategies used to mitigate network attacks. (V)
7. Describe and configure Cisco device hardening. (V)
8. Describe and configure Internetworking Operating System (IOS) firewall and Intrusion Prevention Systems (IPS). (VI)
Go to Description    Go to top of Competencies
 
MCCCD Official Course Outline:
 
CNT210   20082-99999 Cisco CCNP II: Implementing Secure Converged Wide Area Networks
    I. Remote Network Connectivity Requirements
        A. Hierarchical network model
        B. Cisco enterprise architecture
        C. Remote connection requirements in a converged network
        D. Remote connection considerations
        E. Intelligent Information Network (IIN)
        F. Cisco Service-Oriented Network Architecture (SONA)
      II. Teleworker Connectivity
          A. Describing remote connection topologies for teleworkers
          B. Describing cable technology
          C. Deploying cable system technology
          D. Deploying Asynchronous Digital Subscriber Line (ADSL)
          E. Configuring the customer premise equipment (CPE) as the Point-to-Point Protocol over Ethernet (PPPoE) or Point-to- Point Protocol over Asynchronous Transfer Method (ATM)
        III. Internet Protocol Security (IPsec) Virtual Private Networks (VPNs)
            A. Introduction to VPN technology
            B. Understanding IPSec components and IPSec VPN features
            C. Implementing site-to-site IPsec VPN operations
            D. Configuring IPsec site-to-site VPN using Security Device Manager (SDM)
            E. Configuring Generic Routing Encapsulation (GRE) tunnels over IPsec
            F. Configuring high-availability VPNs
            G. Introducing Cisco Easy VPN
            H. Configuring Easy VPN Server using Cisco SDM
            I. Implementing the Cisco VPN client
          IV. Frame Mode Multiprotocol Label Switching (MPLS) Implementation
              A. Introducing MPLS networks
              B. Assigning MPLS labels to packets
              C. Implementing Frame Mode MPLS
              D. Describing MPLS VPN technology
            V. Cisco Device Hardening
                A. Thinking like a hacker
                B. Mitigating network attacks
                C. Network attacks using intelligence
                D. Disabling unused Cisco router network services and interfaces
                E. Securing Cisco router administrative access
                F. Configuring role-based command-line interface (CLI)
                G. Mitigating threats and attacks with access lists
                H. Securing management and reporting features
                I. Configuring Simple Network Message Protocol (SNMP)
                J. Configuring the Network Time Protocol (NTP) client
                K. Configuring Authentication Authorization Accounting (AAA) on Cisco routers
              VI. Cisco IOS Threat Defense Features
                  A. Introducing the Cisco IOS firewall
                  B. Configuring Cisco IOS firewall from the CLI
                  C. Basic and advanced firewall wizards
                  D. Introducing Cisco IOS Intrusion Protection Systems (IPS)
                  E. Configuring Cisco IOS IPS
              Go to Description    Go to top of Competencies    Go to top of Outline