Course |
Length |
Format |
Select an option
  
|
Securing Networks with ASA Fundamentals (SNAF) v1.0
|
5 days
|
Lecture/lab
|
Course description |
The Cisco ASA 5500 Series Adaptive Security Appliance delivers converged firewall, IPS, network antivirus, and VPN services. As a key component of the Cisco Self-Defending Network, it provides proactive threat mitigation that stops attacks before they spread, controls network activity and application traffic, and delivers flexible VPN connectivity.
This task-oriented course teaches the knowledge and skills needed to configure, maintain, and operate Cisco ASA 5500 Series appliances.
Note: This course replaces the Securing Networks with PIX and ASA (SNPA) course.
|
Learning objectives |
After you complete this course, you will be able to:
- Identify the Cisco ASA and PIX security appliance models
- Explain the Cisco ASA security appliance licensing options
- Configure the security appliance for basic network connectivity
- Configure NAT
- Configure ACLs and content filtering
- Configure object grouping
- Configure switching and routing functionality
- Define, configure, and monitor AAA
- Configure a modular policy
- Configure advanced protocol handling
- Configure Threat Detection
- Configure Site-to-Site VPNs
- Configure Remote-Access VPNs
- Configure SSL VPNs
- Configure Transparent Firewall Mode
- Configure the security appliance to support multiple contexts
- Configure failover
- Secure and upgrade system access
|
Who should attend |
This course is designed for anyone tasked with implementing or maintaining a secure network using Cisco ASA firewalls. Candidates seeking the Cisco CCSP security certification must also take this course.
|
Recommended prerequisites |
- CCNA certification or equivalent knowledge
- Basic knowledge of the Windows operating system
- Securing Cisco Network Devices (SND)
|
Related training |
|

|
CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, Cisco, Cisco IOS, Cisco Systems,
the Cisco Systems logo, and Networking Academy are registered trademarks
or trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S.
and certain other countries. All other trademarks mentioned in this document
or Web site are the property of their respective owners.
|
|