> > > ACST

Advanced Cisco Security Training (ACST)

Course Description Schedule

Who should attend

CCSP qualified professionals or individuals working in an environment that includes the implementation and support of Ciscos security appliances.


CCSP certification or equivalent knowledge.

Course Objectives

The course delves deep into appropriate security technologies to compliment the working environment and pressures of the modern security engineer through theory and lab reinforcement.

Course Content

The first three days of this 4 day course will include theory and lab reinforcements. The final day will feature an enhanced lab where delegates will implement a complete security solution for given customer requirements. Delegates can then penetration test to validate configuration.

General Networking

  • Networking Basics
  • OSI Layers
  • TCP/IP Protocols
  • Switching (VTP, VLANs, Spanning Tree, Trunking, etc.)
  • Routing Protocols (RIP, EIGRP, OSPF, and BGP)
  • IP Multicast

Security Protocols, Ciphers and Hash Algorithms

  • Ciphers RSA, DSS, RC4
  • Message Digest 5 (MD5)
  • Secure Hash Algorithm (SHA)
  • Data Encryption Standard (DES)
  • Triple DES (3DES)
  • Advanced Encryption Standard (AES)
  • IP Security (IPSec)
  • Authentication Header (AH)
  • Encapsulating Security Payload (ESP)
  • Internet Key Exchange (IKE)
  • Certificate Enrollment Protocol (CEP)
  • Transport Layer Security (TLS)
  • Secure Socket Layer (SSL)
  • Point to Point Tunneling Protocol (PPTP)
  • Layer 2 Tunneling Protocol (L2TP)
  • Generic Route Encapsulation (GRE)
  • Secure Shell (SSH)
  • Pretty Good Privacy (PGP)

Application Protocols

  • Hypertext Transfer Protocol (HTTP)
  • Simple Mail Transfer Protocol (SMTP)
  • File Transfer Protocol (FTP)
  • Domain Name System (DNS)
  • Trivial File Transfer Protocol (TFTP)
  • Network Time Protocol (NTP)
  • Lightweight Directory Access Protocol (LDAP)
  • Syslog

Security Technologies

  • Packet Filtering
  • Content Filtering
  • URL Filtering
  • Authentication Technologies
  • Authorisation technologies
  • Proxy Authentication
  • Public Key Infrastructure (PKI)
  • IPSec VPN
  • Network Intrusion Prevention Systems
  • Host Intrusion Prevention Systems
  • Event Correlation
  • Adaptive Threat Defense (ATD)
  • Network Admission Control (NAC)
  • 802.1x
  • Endpoint Security
  • Network Address Translation

Cisco Security Appliances and Applications

  • Cisco Secure PIX Firewall
  • Cisco Intrusion Prevention System (IPS)
  • Cisco VPN 3000 Series Concentrators
  • Cisco EzVPN Software and Hardware Clients
  • Cisco Adaptive Security Appliance (ASA) Firewall
  • Cisco Security Monitoring, Analysis and Response System (MARS)
  • Cisco IOS Firewall
  • Cisco IOS Intrusion Prevention System
  • Cisco IOS IPSec VPN
  • Cisco IOS Trust and Identity
  • Cisco Secure ACS for Windows
  • Cisco Secure ACS Solution Engine
  • Cisco Traffic Anomaly Detectors
  • Cisco Guard DDoS Mitigation Appliance
  • Cisco Catalyst 6500 Series Security Modules (FWSM, IDSM, VPNSM, WebVPN, SSL modules)
  • Cisco Traffic Anomaly Detector Module & Cisco Guard Service Module

Cisco Security Management

  • Cisco Adaptive Security Device Manager (ASDM)
  • Cisco Router & Security Device Manager (SDM)
  • Cisco Security Manager (CSM)

Cisco Security General

  • IOS Specifics
  • Routing and Switching Security Features: IP & MAC Spoofing, MAC Address Controls, Port Security, DHCP Snoop, DNS Spoof.
  • NetFlow
  • Layer 2 Security Features
  • Layer 3 Security Features
  • Wireless Security
  • IPv6 Security

Security Solutions

  • Network Attack Mitigation
  • Virus and Worms Outbreaks
  • Theft of Information
  • DoS/DDoS Attacks
  • Web Server & Web Application Security

Security General

  • Policies - Security Policy Best Practices
  • Information Security Standards (ISO 17799, ISO 27001, BS7799)
  • Standards Bodies
  • Common RFCs (e.g. RFC1918, RFC2827, RFC2401)
  • BCP 38
  • Attacks, Vulnerabilities and Common Exploits - recon, scan, priv escalation, penetration, cleanup, backdoor
  • Security Audit & Validation
  • Risk Assessment
  • Change Management Process
  • Incident Response Framework
  • Computer Security Forensics
Classroom Training
Modality: C

Duration 4 days

Price (excl. tax)
  • Australia: 4,000.- AUD
  • New Zealand: 5,290.- NZD
  • Singapore: 3,800.- SGD
  • Indonesia: US$ 3,300.-
  • India: 125,000.- INR
  • Philippines: 124,000.- PHP
  • Thailand: US$ 3,300.-
  • Vietnam: US$ 3,300.-
  • Sri Lanka: US$ 3,300.-
Dates and Booking
Online Training
Modality: L
Price (excl. tax)
  • Australia: 4,000.- AUD
Dates and Booking

Currently there are no training dates scheduled for this course.  Enquire a date