HBFITES Data Center, Collaboration, Security, Storage, Wireless, Telepresence Training +91-9886770046 info@hbfites.com

SSSE v3.0 - Security Solutions for System Engineers

Description

The Security Solutions for System Engineers (SSSE) v3.0 course is recommended for system engineers, network designers, and security professionals designing security solutions in enterprise environments. The course provides an introduction to security design best practices for both host- and network-centric security controls. The course includes a systematic overview of modern threats, controls, and defensive architectures for a variety of common business scenarios, and enables the learner to choose the optimal architecture and Cisco products to satisfy business risk management requirements. The course also includes practice labs, which demonstrate the application of security technologies used in the case studies within the course.

Objectives

  • Recognize modern threats to enterprise business processes
  • Recognize modern security controls
  • Choose appropriate controls for specific threats and environments
  • Apply basic security design guidelines
  • Recognize basic customer requirements and environment limitations, and build an optimal solution based on them
  • Position Cisco security products in basic customer scenarios

Prerequisites

  • Basic network design concepts (can be obtained attending the Designing for Cisco Internetwork Solutions [DESGN] course)
  • Intermediate user-level operating system concepts, especially for Microsoft Windows

Who Should Attend

  • System engineers, network designers, and security professionals designing security solutions in enterprise environments

Outline

  • Module 1: The Threat Landscape and Goals of Security Engineering
    • Lesson 1: General Principles
    • Lesson 2: Physical Attacks
    • Lesson 3: Network Infrastructure Attacks
    • Lesson 4: System and Application Attacks
    • Lesson 5: User Attacks
  • Module 2: Overview of Security Controls
    • Lesson 1: Organizational Controls
    • Lesson 2: Types of Controls
    • Lesson 3: Security Engineering Principles
    • Lesson 4: Distribution of Controls Between Network and Endpoints
    • Lesson 5: Cryptographic Services
    • Lesson 6: Authentication and Identity Management
    • Lesson 7: Network Controls
    • Lesson 8: System Controls
    • Lesson 9: Application Controls
  • Module 3: Network Infrastructure Protection Solutions
    • Lesson 1: Overview of Threats, Controls, and Specific Customer Requirements
    • Lesson 2: Architectures and Design Guidelines
    • Lesson 3: Case Studies
  • Module 4: Enterprise Internet Access Solutions
    • Lesson 1: Overview of Threats, Controls, and Specific Customer Requirements
    • Lesson 2: Architectures and Design Guidelines
    • Lesson 3: Case Studies
  • Module 5: Solutions for Exposed Enterprise Services and Data Centers
    • Lesson 1: Overview of Threats, Controls, and Specific Customer Requirements
    • Lesson 2: Architectures and Design Guidelines
    • Lesson 3: Case Studies
  • Module 6: Unified Communications Protection Solutions
    • Lesson 1: Overview of Threats, Controls, and Specific Customer Requirements
    • Lesson 2: Architectures and Design Guidelines
    • Lesson 3: Case Studies
  • Module 7: Secure WAN Solutions
    • Lesson 1: Overview of Threats, Controls, and Specific Customer Requirements
    • Lesson 2: Architectures and Design Guidelines
    • Lesson 3: Case Studies
  • Module 8: Secure Remote Access Solutions
    • Lesson 1: Overview of Threats, Controls, and Specific Customer Requirements
    • Lesson 2: Architectures and Design Guidelines
    • Lesson 3: Case Studies
  • Module 9: Enterprise Wireless Security Solutions
    • Lesson 1: Overview of Threats, Controls, and Specific Customer Requirements
    • Lesson 2: Architectures and Design Guidelines
    • Lesson 3: Case Studies
  • Module 10: Enterprise Security Management Solutions
    • Lesson 1: Overview of Specific Customer Requirements
    • Lesson 2: Architectures and Design Guidelines
    • Lesson 3: Case Studies

Lab Outline

  • Lab 1-1: Demonstration of Modern Threats
  • Lab 3-1: Network Infrastructure Protection Technology Demonstration
  • Lab 4-1: Internet Access Protection Technology Demonstration
  • Lab 5-1: Protection of Enterprise Exposed Services
  • Lab 7-1: Demonstration of an On-Demand Fully Meshed IPsec VPN
  • Lab 8-1: Secure Remote Access Technology Demonstration