Cisco SWITCH 2.0: Campus Network Security I New Horizons Jordan
Price: TBA
  • Duration: 2 Hours

Course details

Layer 2 security implementation is often forgotten. However, you should take the basic security measures to guard against a host of attacks that can be launched at a switch and its ports. Two common security measures are implementing port security and port access lists. Network or host misconfigurations, host malfunctions, or intentional DoS attacks may flood the network with traffic storms. Cisco IOS switches provide the storm control feature to limit the impact of traffic storms and, if necessary, take appropriate actions. In this course you'll learn what a traffic storm is and how to control it, you'll also learn how to configure storm control and verify its behavior. In addition, this course will introduce the importance of switch security, and describe all the recommended practices for securing a switch. Lastly, you'll learn how to configure and verify simple port security, configure and verify port security by using sticky MAC address, what can cause ports to become error-disabled and how to recover from this state as well as how to define and configure port access lists. This course offers the official training for the Implementing Cisco IP Switched Networks 2.0 certification exam which is a component exam for the CCNP and CCDP certifications. Passing this exam will also refresh CCNA certification, which expires after three years

  • Topic T2 Objective O3
  • start the course
  • Topic T6 Objective O7
  • describe the importance of switch access security
  • Topic T10 Objective O11
  • configure a secure password on a switch
  • Topic T14 Objective O15
  • recognize the recommended practices for using system banners
  • Topic T18 Objective O19
  • recognize the recommended practices for securing console access
  • Topic T22 Objective O23
  • recognize the recommended practices for securing VTY access
  • Topic T26 Objective O27
  • recognize the recommended practices for securing web access
  • Topic T30 Objective O31
  • recognize the recommended practices of using SSH instead of Telnet
  • Topic T34 Objective O35
  • recognize the recommended practices for securing SNMP access
  • Topic T38 Objective O39
  • recognize the recommended practices for securing STP
  • Topic T42 Objective O43
  • recognize the recommended practices for securing CDP
  • Topic T46 Objective O47
  • recognize the recommended practices for securing unused switch ports
  • Topic T50 Objective O51
  • describe how a rogue d
Updated on 29 March, 2018

About New Horizons Jordan

As changes in technology have accelerated, it’s become even more essential for people to master technology to be productive, invaluable employees who optimize, program and invent solutions—and even grow companies of their own. For 30 years, New Horizons has provided more than 30 million students with industry-leading technical training that delivers the most relevant and intuitive computer ctheirses and certifications. they’re now the world’s largest independent IT training company, and they continue to lead:
  • 300 computer training centers in 70 countries (and counting)
  • Largest Guaranteed-to-Run ctheirse schedule in the world
  • Ranked in the top 5% of the industry for training quality and customer satisfaction
  • Official training partner for technology leaders such as Microsoft, Cisco, CompTIA and VMware
  • Microsoft’s largest training provider, delivering more than 40% of all authorized Microsoft training worldwide
  • World’s largest Cisco-authorized training partner
See all New Horizons Jordan courses
Are you from New Horizons Jordan ? Claim your course!
Courses you can instantly connect with... Do an online course on Cisco starting now. See all courses

Is this the right course for you?

Didn't find what you were looking for ?

or