SlideShare une entreprise Scribd logo
1  sur  3
CCNA Security – 640-554
Posted on May 28, 2012




                            Out with the old and in with new Cisco is updating its well-known
certification CCNA Security. Candidates that are studying for the older exam (640-553) are
suggested to take it on or before September 30th 2012. What has changed in the exam? For the
most part Cisco SDM is no longer covered, as it has reached its “End of Life” and in fact Cisco
Engineering stopped covering the product from developing and testing on February 26th 2012.
You can still renew the product for support (Cisco SmartNet) until March 24th of 2013 and the last
date the product will get support will be February 28th of 2014 after that it will become an old
friend      . Let’s compare these two CCNA Security Exams and see what has changed, removed
and added. (640-553 & 640-554)


I have compared these two exams side-by-side. If you take look at these two exams, the red on
the older exam means it is no longer covered on the (640-554 exam) and the blue on the new
exam is new material that is not covered on the (640-553 exam). For the most part Cisco SDM is
no longer available instead it is the Cisco Configuration Professional along with that the new
exam mentions the Cisco ASA system and walking you into the ASDM along with the different
products and services the ASA system offers.

CCNA Security Exam Topics – (640-553)                     CCNA Security Exam Topics –
Describe the security threats facing modern               (640-554)
network infrastructures                                   Common Security Threats

    Describe and list mitigation methods for                Describe common security threats
     common network attacks                               Security and Cisco Routers
   Describe and list mitigation methods for
     Worm, Virus, and Trojan Horse attacks                      Implement security on Cisco routers
   Describe the Cisco Self Defending Network                   Describe securing the control, data,
     architecture                                                and management plane
Secure Cisco routers                                            Describe Cisco Security Manager

        Secure Cisco routers using the SDM Security            Describe IPv4 to IPv6 transition
         Audit feature
                                                          AAA on Cisco Devices
        Use the One-Step Lockdown feature in SDM to
         secure a Cisco router                                  Implement AAA (authentication,
                                                                 authorization, and accounting)
        Secure administrative access to Cisco routers          Describe TACACS+
         by setting strong encrypted passwords, exec            Describe RADIUS
timeout, login failure rate and using IOS login       Describe AAA
      enhancements                                          Verify AAA functionality
   Secure administrative access to Cisco routers       IOS ACLs
      by configuring multiple privilege levels
   Secure administrative access to Cisco routers           Describe standard, extended, and
      by configuring role based CLI                          named IP IOS access control lists
   Secure the Cisco IOS image and configuration             (ACLs) to filter packets
      file                                                 Describe considerations when
Implement AAA on Cisco routers using local                   building ACLs
router database and external ACS                           Implement IP ACLs to mitigate
                                                             threats in a network
     Explain the functions and importance of AAA       Secure Network Management and
     Describe the features of TACACS+ and              Reporting
      RADIUS AAA protocols
   Configure AAA authentication                             Describe secure network
   Configure AAA authorization                               management
   Configure AAA accounting
Mitigate threats to Cisco routers and networks               Implement secure network
using ACLs                                                    management

     Explain the functionality of standard, extended, Common Layer 2 Attacks
      and named IP ACLs used by routers to filter
      packets                                             Describe Layer 2 security using
   Configure and verify IP ACLs to mitigate                 Cisco switches
      given threats (filter IP traffic destined for       Describe VLAN security
      Telnet, SNMP, and DDoS attacks) in a network        Implement VLANs and trunking
      using CLI                                           Implement spanning tree
   Configure IP ACLs to prevent IP address            Cisco Firewall Technologies
      spoofing using CLI
   Discuss the caveats to be considered when             Describe operational strengths and
      building ACLs                                          weaknesses of the different firewall
Implement secure network management and                      technologies
reporting                                                 Describe stateful firewalls
                                                          Describe the types of NAT used in
   Use CLI and SDM to configure SSH on Cisco                firewall technologies
      routers to enable secured management access
                                                          Implement zone-based policy
   Use CLI and SDM to configure Cisco routers               firewall using CCP
      to send Syslog messages to a Syslog server
                                                          Implement the Cisco Adaptive
Mitigate common Layer 2 attacks                              Security Appliance (ASA)

    Describe how to prevent layer 2 attacks by              Implement Network Address
     configuring basic Catalyst switch security               Translation (NAT) and Port
     features                                                 Address Translation (PAT)
Implement the Cisco IOS firewall feature set using
SDM                                                     Cisco IPS

     Describe the operational strengths and                 Describe Cisco Intrusion Prevention
      weaknesses of the different firewall                    System (IPS) deployment
      technologies                                            considerations
     Explain stateful firewall operations and the           Describe IPS technologies
function of the state table                            Configure Cisco IOS IPS using
     Implement Zone Based Firewall using SDM                 CCP

Implement the Cisco IOS IPS feature set using           VPN Technologies
SDM
                                                             Describe the different methods used
     Define network based vs. host based intrusion           in cryptography
      detection and prevention                               Describe VPN technologies
     Explain IPS technologies, attack responses, and        Describe the building blocks of
      monitoring options                                      IPSec
     Enable and verify Cisco IOS IPS operations             Implement an IOS IPSec site-to-site
      using SDM                                               VPN with pre-shared key
                                                              authentication
Implement site-to-site VPNs on Cisco Routers                 Verify VPN operations
using SDM                                                    Implement Secure Sockets Layer
                                                              (SSL) VPN using ASA device
     Explain the different methods used in                   manage
      cryptography
     Explain IKE protocol functionality and phases
     Describe the building blocks of IPSecand the
      security functions it provides
     Configure and verify an IPSec site-to-site VPN
      with pre-shared key authentication using SDM

Contenu connexe

Tendances

Cisco VSG_Конкурс продуктов портала VirtualizationSecurityGroup.Ru
Cisco VSG_Конкурс продуктов портала VirtualizationSecurityGroup.RuCisco VSG_Конкурс продуктов портала VirtualizationSecurityGroup.Ru
Cisco VSG_Конкурс продуктов портала VirtualizationSecurityGroup.Ru
VirtSGR
 
Hillstone-Corporate-Overview-EN-V3.0
Hillstone-Corporate-Overview-EN-V3.0Hillstone-Corporate-Overview-EN-V3.0
Hillstone-Corporate-Overview-EN-V3.0
Shamal Abeyrathne
 

Tendances (20)

Skyjacking A Cisco WLAN - What it means and how to protect against it?
Skyjacking A Cisco WLAN - What it means and how to protect against it?Skyjacking A Cisco WLAN - What it means and how to protect against it?
Skyjacking A Cisco WLAN - What it means and how to protect against it?
 
Cisco VSG_Конкурс продуктов портала VirtualizationSecurityGroup.Ru
Cisco VSG_Конкурс продуктов портала VirtualizationSecurityGroup.RuCisco VSG_Конкурс продуктов портала VirtualizationSecurityGroup.Ru
Cisco VSG_Конкурс продуктов портала VirtualizationSecurityGroup.Ru
 
A Hitchhiker's Guide to the Inter-Cloud
A Hitchhiker's Guide to the Inter-CloudA Hitchhiker's Guide to the Inter-Cloud
A Hitchhiker's Guide to the Inter-Cloud
 
Hillstone-Corporate-Overview-EN-V3.0
Hillstone-Corporate-Overview-EN-V3.0Hillstone-Corporate-Overview-EN-V3.0
Hillstone-Corporate-Overview-EN-V3.0
 
TechWiseTV Workshop: Q&A OpenDNS and AnyConnect
TechWiseTV Workshop: Q&A OpenDNS and AnyConnect TechWiseTV Workshop: Q&A OpenDNS and AnyConnect
TechWiseTV Workshop: Q&A OpenDNS and AnyConnect
 
Building Secure Architectures on AWS
Building Secure Architectures on AWSBuilding Secure Architectures on AWS
Building Secure Architectures on AWS
 
Simplifying the secure data center
Simplifying the secure data centerSimplifying the secure data center
Simplifying the secure data center
 
Putting Firepower into the Next Generation Firewall
Putting Firepower into the Next Generation FirewallPutting Firepower into the Next Generation Firewall
Putting Firepower into the Next Generation Firewall
 
TechWiseTV Workshop: Stealthwatch Learning Network License
TechWiseTV Workshop: Stealthwatch Learning Network LicenseTechWiseTV Workshop: Stealthwatch Learning Network License
TechWiseTV Workshop: Stealthwatch Learning Network License
 
Deployment of cisco_iron_portweb_security_appliance
Deployment of cisco_iron_portweb_security_applianceDeployment of cisco_iron_portweb_security_appliance
Deployment of cisco_iron_portweb_security_appliance
 
(SACON) Madhu Akula - Automated Defense Using Cloud Service Aws, Azure, Gcp
(SACON) Madhu Akula  - Automated Defense Using Cloud Service Aws, Azure, Gcp(SACON) Madhu Akula  - Automated Defense Using Cloud Service Aws, Azure, Gcp
(SACON) Madhu Akula - Automated Defense Using Cloud Service Aws, Azure, Gcp
 
UCS Automation through the use of API's and UCS PowerTool
UCS Automation through the use of API's and UCS PowerToolUCS Automation through the use of API's and UCS PowerTool
UCS Automation through the use of API's and UCS PowerTool
 
CCNA Security 012- cryptographic systems
CCNA Security 012- cryptographic systemsCCNA Security 012- cryptographic systems
CCNA Security 012- cryptographic systems
 
Barracuda in Microsoft Azure
Barracuda in Microsoft AzureBarracuda in Microsoft Azure
Barracuda in Microsoft Azure
 
Cisco asa 5500 x series migration options-asa 5555-x, asa 5525-x & asa 55...
Cisco asa 5500 x series migration options-asa 5555-x, asa 5525-x & asa 55...Cisco asa 5500 x series migration options-asa 5555-x, asa 5525-x & asa 55...
Cisco asa 5500 x series migration options-asa 5555-x, asa 5525-x & asa 55...
 
Collaboration d’équipe de nouvelle génération (Partie 1 de 2)
Collaboration d’équipe de nouvelle génération (Partie 1 de 2)Collaboration d’équipe de nouvelle génération (Partie 1 de 2)
Collaboration d’équipe de nouvelle génération (Partie 1 de 2)
 
VMworld 2013: Security Automation Workflows with NSX
VMworld 2013: Security Automation Workflows with NSX VMworld 2013: Security Automation Workflows with NSX
VMworld 2013: Security Automation Workflows with NSX
 
Cisco asa fire power services
Cisco asa fire power servicesCisco asa fire power services
Cisco asa fire power services
 
VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...
VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...
VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...
 
Nsx security deep dive
Nsx security deep diveNsx security deep dive
Nsx security deep dive
 

Similaire à Ccna security comparison

Ccna security
Ccna securityCcna security
Ccna security
dkaya
 
Whitepaper c27 574041
Whitepaper c27 574041Whitepaper c27 574041
Whitepaper c27 574041
Iman Mansouri
 
Network Engineer
Network EngineerNetwork Engineer
Network Engineer
varma ksn
 
Chapter 5 overview
Chapter 5 overviewChapter 5 overview
Chapter 5 overview
ali raza
 

Similaire à Ccna security comparison (20)

Ccna security
Ccna security Ccna security
Ccna security
 
Ccna sec
Ccna secCcna sec
Ccna sec
 
Ccna security
Ccna securityCcna security
Ccna security
 
Ccna security
Ccna security Ccna security
Ccna security
 
Ccna security
Ccna security Ccna security
Ccna security
 
Whitepaper c27 574041
Whitepaper c27 574041Whitepaper c27 574041
Whitepaper c27 574041
 
Sem cis ise
Sem cis iseSem cis ise
Sem cis ise
 
Asif Ali Resume
Asif Ali ResumeAsif Ali Resume
Asif Ali Resume
 
Cisco Connect 2018 Thailand - Software defined access a transformational appr...
Cisco Connect 2018 Thailand - Software defined access a transformational appr...Cisco Connect 2018 Thailand - Software defined access a transformational appr...
Cisco Connect 2018 Thailand - Software defined access a transformational appr...
 
Syed Aman Hussain Updated Cv
Syed Aman Hussain Updated CvSyed Aman Hussain Updated Cv
Syed Aman Hussain Updated Cv
 
Cisco Trustsec & Security Group Tagging
Cisco Trustsec & Security Group TaggingCisco Trustsec & Security Group Tagging
Cisco Trustsec & Security Group Tagging
 
Managing an Enterprise WLAN with Cisco Prime NCS & WCS
Managing an Enterprise WLAN with Cisco Prime NCS & WCSManaging an Enterprise WLAN with Cisco Prime NCS & WCS
Managing an Enterprise WLAN with Cisco Prime NCS & WCS
 
Network Engineer
Network EngineerNetwork Engineer
Network Engineer
 
Cisco CSR1000V, VMware, and RESTful APIs
Cisco CSR1000V, VMware, and RESTful APIsCisco CSR1000V, VMware, and RESTful APIs
Cisco CSR1000V, VMware, and RESTful APIs
 
Ccnp course details
Ccnp course detailsCcnp course details
Ccnp course details
 
Chapter 5 overview
Chapter 5 overviewChapter 5 overview
Chapter 5 overview
 
Pass4sure 640-554 Cisco IOS Network Security
Pass4sure 640-554 Cisco IOS Network SecurityPass4sure 640-554 Cisco IOS Network Security
Pass4sure 640-554 Cisco IOS Network Security
 
How to Configure a Cisco Router
How to Configure a Cisco RouterHow to Configure a Cisco Router
How to Configure a Cisco Router
 
Course syllabus ccna
Course syllabus ccnaCourse syllabus ccna
Course syllabus ccna
 
Cisco Ccna Certification
Cisco Ccna CertificationCisco Ccna Certification
Cisco Ccna Certification
 

Dernier

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Dernier (20)

Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 

Ccna security comparison

  • 1. CCNA Security – 640-554 Posted on May 28, 2012 Out with the old and in with new Cisco is updating its well-known certification CCNA Security. Candidates that are studying for the older exam (640-553) are suggested to take it on or before September 30th 2012. What has changed in the exam? For the most part Cisco SDM is no longer covered, as it has reached its “End of Life” and in fact Cisco Engineering stopped covering the product from developing and testing on February 26th 2012. You can still renew the product for support (Cisco SmartNet) until March 24th of 2013 and the last date the product will get support will be February 28th of 2014 after that it will become an old friend . Let’s compare these two CCNA Security Exams and see what has changed, removed and added. (640-553 & 640-554) I have compared these two exams side-by-side. If you take look at these two exams, the red on the older exam means it is no longer covered on the (640-554 exam) and the blue on the new exam is new material that is not covered on the (640-553 exam). For the most part Cisco SDM is no longer available instead it is the Cisco Configuration Professional along with that the new exam mentions the Cisco ASA system and walking you into the ASDM along with the different products and services the ASA system offers. CCNA Security Exam Topics – (640-553) CCNA Security Exam Topics – Describe the security threats facing modern (640-554) network infrastructures Common Security Threats  Describe and list mitigation methods for  Describe common security threats common network attacks Security and Cisco Routers  Describe and list mitigation methods for Worm, Virus, and Trojan Horse attacks  Implement security on Cisco routers  Describe the Cisco Self Defending Network  Describe securing the control, data, architecture and management plane Secure Cisco routers  Describe Cisco Security Manager  Secure Cisco routers using the SDM Security  Describe IPv4 to IPv6 transition Audit feature AAA on Cisco Devices  Use the One-Step Lockdown feature in SDM to secure a Cisco router  Implement AAA (authentication, authorization, and accounting)  Secure administrative access to Cisco routers  Describe TACACS+ by setting strong encrypted passwords, exec  Describe RADIUS
  • 2. timeout, login failure rate and using IOS login  Describe AAA enhancements  Verify AAA functionality  Secure administrative access to Cisco routers IOS ACLs by configuring multiple privilege levels  Secure administrative access to Cisco routers  Describe standard, extended, and by configuring role based CLI named IP IOS access control lists  Secure the Cisco IOS image and configuration (ACLs) to filter packets file  Describe considerations when Implement AAA on Cisco routers using local building ACLs router database and external ACS  Implement IP ACLs to mitigate threats in a network  Explain the functions and importance of AAA Secure Network Management and  Describe the features of TACACS+ and Reporting RADIUS AAA protocols  Configure AAA authentication  Describe secure network  Configure AAA authorization management  Configure AAA accounting Mitigate threats to Cisco routers and networks  Implement secure network using ACLs management  Explain the functionality of standard, extended, Common Layer 2 Attacks and named IP ACLs used by routers to filter packets  Describe Layer 2 security using  Configure and verify IP ACLs to mitigate Cisco switches given threats (filter IP traffic destined for  Describe VLAN security Telnet, SNMP, and DDoS attacks) in a network  Implement VLANs and trunking using CLI  Implement spanning tree  Configure IP ACLs to prevent IP address Cisco Firewall Technologies spoofing using CLI  Discuss the caveats to be considered when  Describe operational strengths and building ACLs weaknesses of the different firewall Implement secure network management and technologies reporting  Describe stateful firewalls  Describe the types of NAT used in  Use CLI and SDM to configure SSH on Cisco firewall technologies routers to enable secured management access  Implement zone-based policy  Use CLI and SDM to configure Cisco routers firewall using CCP to send Syslog messages to a Syslog server  Implement the Cisco Adaptive Mitigate common Layer 2 attacks Security Appliance (ASA)  Describe how to prevent layer 2 attacks by  Implement Network Address configuring basic Catalyst switch security Translation (NAT) and Port features Address Translation (PAT) Implement the Cisco IOS firewall feature set using SDM Cisco IPS  Describe the operational strengths and  Describe Cisco Intrusion Prevention weaknesses of the different firewall System (IPS) deployment technologies considerations  Explain stateful firewall operations and the  Describe IPS technologies
  • 3. function of the state table  Configure Cisco IOS IPS using  Implement Zone Based Firewall using SDM CCP Implement the Cisco IOS IPS feature set using VPN Technologies SDM  Describe the different methods used  Define network based vs. host based intrusion in cryptography detection and prevention  Describe VPN technologies  Explain IPS technologies, attack responses, and  Describe the building blocks of monitoring options IPSec  Enable and verify Cisco IOS IPS operations  Implement an IOS IPSec site-to-site using SDM VPN with pre-shared key authentication Implement site-to-site VPNs on Cisco Routers  Verify VPN operations using SDM  Implement Secure Sockets Layer (SSL) VPN using ASA device  Explain the different methods used in manage cryptography  Explain IKE protocol functionality and phases  Describe the building blocks of IPSecand the security functions it provides  Configure and verify an IPSec site-to-site VPN with pre-shared key authentication using SDM