Showing posts with label ccna7 200-301 New Modules in Details. Show all posts
Showing posts with label ccna7 200-301 New Modules in Details. Show all posts

Saturday 21 December 2019

ccna7 200-301 New Modules in Details

New Module: LAN Security Concepts
       Endpoint Security:  Network attacks, Security devices, Endpoint Protection, Email and Web Security
       Access Control: Local Password, Authentication, Authorization, Accounting, 802.1x
       Security Threats: Layer 2 Vulnerabilities, Switch Attack Categories, Switch attack mitigation techniques
       MAC Address Table Attacks and mitigation
       LAN Attacks: VLAN Hopping, VLAN Double Tagging, DHCP Attacks, ARP Attacks, Address Spoofing attacks, STP Attacks, CDP Reconnaissance
New Module: Switch Security Configuration
       Implement Port Security: Secure unused ports, Mitigate MAC Address Table Attacks, Enable Port Security, Limit and Learn MAC Addresses, Port Security Aging, Port Security Violation Modes, Ports in err-disabled state, Verify Port Security
       Mitigate VLAN Attacks: Mitigate VLAN Hopping
       Mitigate DHCP Attacks: DHCP Snooping, Configuration
       Mitigate ARP Attacks: Dyn ARP Inspection,  DAI Implementation
       Mitigate STP Attacks: PortFast and BPDU Guard, Configuration
New Module: WLAN Concepts
       Introduction to Wireless: Benefits of Wireless, Type of Wireless networks, Wireless Technologies, 802.11, Radio Frequencies, Wireless Standards Organizaions
       WLAN Components: Wireless NIC, Wireless Home Router, Wireless Access Point, AP Categories, Wireless Antennas
       WLAN Operation: 802.11 Modes, BSS and ESS, 802.11 Frame Structure, CSMA/CA, Client and AP Association, Passive and Active discovery
       CAPWAP Operation: Introduction to CAPWAP, Split MAC Architecture, DTLS Encryption, FlexConnect APs
       Channel Management: Frequency Channel Saturation, Channel Selection, Planning a WLAN Deployment
       WLAN Threats: DoS attacks, Rouge Access Points, MITM Attack
       Secure WLANs: SSID Cloaking and MAC Filtering, 802.11 Original Auth. Methods, Shared Key auth. Methods, Authenticating a home user, Encryption Methods, Auth. In the Enterprise, WPA3
New Module: WLAN Configuration
       Remote Site WLAN Configuration: Wireless Router, Log in to Wireless Router, Basic Network setup, Configure a wireless mesh network, NAT for IPv4, QoS
       Configure a Basic WLAN on the WLC: WLC Topology, Log into the WLC, View AP Information, Advanced Settings, Configure a WLAN
       Configure a WPA2 Enterprise WLAN on the WLC: SNMP and RADIUS, Configure SNMP Server Information, Configure RADIUS Server Information, Configure a VLAN for a New WLAN, Topology with VLAN 5 Addressing, Configure a new Interface, Configure a DHCP in a new WLAN, Configure DHCP Scope, Configure WPA2 Enterprise WLAN
       Troubleshoot WLAN Issues: Wireless Client not connecting, Network is slow, Updating Firmware
New Module: Network Security Concepts
       Current State of Cybersecurity: Current state of Affairs, Vectors of network attacks, Data Loss
       Threat Actors: The Hacker, Evolution of Hackers, Cyber Criminals, Hacktivists, State-Sponsored Hackers
       Threat Actor Tools: Attack Tools, Evolution of Security Tools, Attack Types
       Malware: Viruses and Trojan Horses, Types of Malware
       Common Network Attacks: Reconnaissance, Access, Social Engineering, Dos and DDoS
       IP Vulnerabilities and Threats: ICMP, Amplification and Reflection, Address Spoofing Attacks
       TCP and UDP Vulnerabilities: TCP and UDP Segment Header, TCP Services, TCP Attacks, UDP Attacks
       IP Services: ARP Vulnerabilities, ARP Cache poisoning, DNS Attacks, DNS Tunneling, DHCP Attacks
       Network Security Best Practices: CIA, Defence-in-Depth approach, Firewalls, IPS, Content Security Appliances
       Cryptography: Securing communication, Data Integrity, Hash Functions, Origin Auth., Data Confidentiality, Symmetric Encryption, Asymmetric Encryption, Deffie-Helman

New Module: VPN and IPsec Concepts
       VPN Technology: VPN Benefits, Site-to-Site and Remote-access VPN, Enterprise and Service provider VPN
       Types of VPN: Remote-access, SSL, Site-to-Site IPsec, GRE over IPsec, DMVPN, IPsec Virtual Tunnel Interface, Service Provider MPLS
       IPsec: IPsec  concepts, IPsec technologies, IPsec protocol encapsulation, Confidentiality, Integrity, Authentication, Secure Key Exchange with DH, IPsec transport and Tunnel modes
New Module: Network Automation
       Automation Overview
       Data Formats: Data formats concept, data format rules, JSON, YAML, XML
       APIs: API Concept, API Example, Open, Internal and Partner APIs, Types of Web Service APIs
       REST: REST and RESTful API, RESTful implementation, URI/URN/URL, Anatomy of RESTful Request, RESTful API Applications
       Configuration Management Tools: Traditional Network Configuration, Network Automation, Ansible, Chef, Puppet, SaltStack
       IBN and Cisco DNA Center: Intent Based Networking, Network Infrastructure as Fabric, Cisco DNA, CDA Center