I*P*EXPERT: Workbook & Advanced Technologies Class on demand
Workbooks: http://www.rapidshare.com/files/398889563/SECWKB5.rar
Advanced Technologies Class on demand:
Day 1 part 1: ASA Overview
Day 1 part 2: ASA Routing
Day 1 part 3: ACLS and Failover
Day 1 part 4: ASA Failover
Day 1 Part 5: Contexts
Day 1 part 6: transparent firewall
Day 2 part 1: ACLs, lock and key ACLs
Day 2 part 2: TCP Intercept & IOS Firewall configuration
Day 2 part 3: IOS Firewall Tunning
Day 2 part 4: Zone based firewall
Day 2 part 5: VPN Ipsec
Day 2 part 6: VPN Configuration and Troubleshooting
Day 2 part 7: IOS Certificate authority
Day 3 part 1: VPN, Certificate map config and debug
Day 3 part 2: ASA VPN Configuration
Day 3 part 3: DMVPN Intro and Configuration
Day 3 part 4: DMVPN Routing configuration
Day 3 part 5: VPN Features, ISAKMP key encryption
Day 3 part 6: Group Encrypted Transport part 1
Day 3 part 7: Group Encrypted Transport part 2
Day 3 part 8: AAA Introduction
Day 3 part 9: ACS Interface GUI Overview
Day 3 part 10: AAA Command Authorization & Accounting config
Day 4 part 1: ASA Cut-through TACACS+
Day 04 part 2: Cut-through Radius - Local vs DL Part 1
Day 04 part 03: Cut-through Radius - Local vs DL Part 2
Day 04 part 04: Cut-through Radius - Local vs DL Part 3
Day 04 part 05: Dot1x Configuration - Router as client
Day 04 part 06: Online documentation navigation & review
Day 04 part 07: IPS & IDS Introduction
Day 04 part 08: IPS Part 2 - Configuration
Day 04 part 09: IPS Blocking configuration
Day 04 part 10: IPS Inline mode
Day 04 part 11: ASA shunning & ASA IPS
Day 05 part 1: Role Based CLI
Day 05 part 2: Management SNMP
Day 5 part 3: Management Logging
Day 5 part 4: ASA Policy tunning - MPF - BGP Example
Day 5 part 5: Flexible Packet Matching
Day 5 part 6: Switch features
Day 5 part 7: Attack Mitigation
Day 5 part 8: Attack Mitigation part 2
Workbooks: http://www.rapidshare.com/files/398889563/SECWKB5.rar
Advanced Technologies Class on demand:
Day 1 part 1: ASA Overview
Day 1 part 2: ASA Routing
Day 1 part 3: ACLS and Failover
Day 1 part 4: ASA Failover
Day 1 Part 5: Contexts
Day 1 part 6: transparent firewall
Day 2 part 1: ACLs, lock and key ACLs
Day 2 part 2: TCP Intercept & IOS Firewall configuration
Day 2 part 3: IOS Firewall Tunning
Day 2 part 4: Zone based firewall
Day 2 part 5: VPN Ipsec
Day 2 part 6: VPN Configuration and Troubleshooting
Day 2 part 7: IOS Certificate authority
Day 3 part 1: VPN, Certificate map config and debug
Day 3 part 2: ASA VPN Configuration
Day 3 part 3: DMVPN Intro and Configuration
Day 3 part 4: DMVPN Routing configuration
Day 3 part 5: VPN Features, ISAKMP key encryption
Day 3 part 6: Group Encrypted Transport part 1
Day 3 part 7: Group Encrypted Transport part 2
Day 3 part 8: AAA Introduction
Day 3 part 9: ACS Interface GUI Overview
Day 3 part 10: AAA Command Authorization & Accounting config
Day 4 part 1: ASA Cut-through TACACS+
Day 04 part 2: Cut-through Radius - Local vs DL Part 1
Day 04 part 03: Cut-through Radius - Local vs DL Part 2
Day 04 part 04: Cut-through Radius - Local vs DL Part 3
Day 04 part 05: Dot1x Configuration - Router as client
Day 04 part 06: Online documentation navigation & review
Day 04 part 07: IPS & IDS Introduction
Day 04 part 08: IPS Part 2 - Configuration
Day 04 part 09: IPS Blocking configuration
Day 04 part 10: IPS Inline mode
Day 04 part 11: ASA shunning & ASA IPS
Day 05 part 1: Role Based CLI
Day 05 part 2: Management SNMP
Day 5 part 3: Management Logging
Day 5 part 4: ASA Policy tunning - MPF - BGP Example
Day 5 part 5: Flexible Packet Matching
Day 5 part 6: Switch features
Day 5 part 7: Attack Mitigation
Day 5 part 8: Attack Mitigation part 2