Description
Course info
Rating
(116)
Level
Intermediate
Updated
Nov 20, 2012
Duration
2h 2m
Description

Part 1 of 3 in the Cisco CCNA Security (640-554) series will teach you how to identify, lockdown, and secure vulnerabilities in a small to medium enterprise branch network. This course will also help you to enhance your skills in developing security infrastructure, recognizing threats, and mitigating security threats. This course is ideal for network administrators or aspiring network administrators who wish to build a stronger foundation of advanced security concepts.

About the author
About the author

Joe is a seasoned Cisco professional with over 15 years of experience, supporting Fortune 500 Companies in deploying routing, switching, unified communications, security, and data center technologies.

Section Introduction Transcripts
Section Introduction Transcripts

Fundamentals of Security
Before you can really dig into the specifics of the CCNA security exam, it's important for you to have a global view of what's involved with security in general. So what we want to do in this lesson is actually go over the fundamentals of security itself. One of the first things that's important to understand is the principle of trust, and we want to actually examine that in much more detail now. Now in approaching the whole subject of trust, you as an individual can probably appreciate the fact that you don't give universal levels of trust to everyone. In fact, trust is usually assigned by the closeness a person has toward you, where you can trust them in their motives and such. And for that reason, we want to explore trust and the levels of trust, using the analogy of a home. This can be an apartment, a house, or any one of a number of different constructs, but the point is, being able to understand the concept of trust is clarified by looking at how it relates to an individual's dwelling or home.

Security Regulations
As you begin the journey down the road to becoming a security professional, you won't be able to survive very long if you don't have some sort of a grasp of the various laws and regulations surrounding the whole area of security. We're going to concentrate on a couple of them in this particular lesson that are particular to the U. S. , but the principles actually bear application globally. The first thing you have to understand is the importance of regulations. Now just about every area of human existence has some sort of legal or government regulation, and the purpose of this is protection and safety. An example most of us are going to be familiar with is going to be the area of foods, specifically, inspection and quality. Without some supervision and certainly legal penalties for infringement, there's going to be a result of poor health and death that could happen as a result of contamination and spoilage. In exactly the same way, protection of individuals in businesses is the intentions of laws and regulation-related information security, and as an information security professional, you're guaranteed to interact with a number of legal requirements as part of your everyday job. It's just part of the experience. You don't need to be a legal expert on these regulations, and there are many more that we're even going to cover in this lesson, but you do need to understand the basic principles involved. We're going to cover three primary U. S. -based laws in this particular section of the lesson.

Cisco Security Tools
One of the important things to understand is that from your particular perspective, you are beginning down the road to becoming a Cisco network security professional. There are two aspects to that. There's the security aspect, where there are certain general industry standard principles of security that you need to know, but there are also Cisco device-specific aspects that you need to know extremely well also. So we're going to look at some of those in this particular lesson. We're going to look at some of the Cisco security products and then some specific tools for managing those products. So first, we want to begin with understanding what is contained and currently active in the Cisco security portfolio. Now one thing to understand is that Cisco originally entered the marketplace with the sales and development of its multi-protocol router, and it developed this internally. Later, Cisco took on the practice of acquiring existing companies in order to enter new product areas, and they would usually choose what they considered an industry leader. Such was the case with the acquisition of the network translation company and their pix private Internet exchange platform in November 1995. This became the Cisco pix firewall platform. The numerous subsequent development and acquisitions have rounded out security as a major pillar in Cisco's product offerings as follows. First, access control solutions, security management solutions, and content filtering solutions.