Cisco Certified Network Professional (CCNP) - Enterprise
1 Introduction to Enterprise Networks
1-1 Enterprise Network Architecture
1-2 Network Design Principles
1-3 Network Security in Enterprise Environments
1-4 Network Management and Monitoring
2 Network Infrastructure
2-1 Cabling and Connectivity
2-2 Network Topologies
2-3 Network Devices (Switches, Routers, Firewalls)
2-4 Network Addressing (IP, Subnetting)
3 Switching Technologies
3-1 Layer 2 Switching
3-2 VLANs and Trunking
3-3 Spanning Tree Protocol (STP)
3-4 EtherChannel and Link Aggregation
3-5 Virtual Switching Systems (VSS)
4 Routing Technologies
4-1 Static Routing
4-2 Dynamic Routing Protocols (RIP, EIGRP, OSPF, BGP)
4-3 Route Redistribution and Filtering
4-4 IPv6 Routing
4-5 Policy-Based Routing (PBR)
5 Network Automation and Programmability
5-1 Introduction to Network Automation
5-2 Python for Network Automation
5-3 RESTful APIs and NETCONFYANG
5-4 Ansible for Network Automation
5-5 Network Programmability with Cisco DNA Center
6 Network Security
6-1 Network Security Fundamentals
6-2 Access Control Lists (ACLs)
6-3 Intrusion Detection and Prevention Systems (IDSIPS)
6-4 Virtual Private Networks (VPNs)
6-5 Firewalls and Security Zones
7 Wireless Networking
7-1 Wireless LAN Fundamentals
7-2 Wireless Security Protocols (WPA, WPA2, WPA3)
7-3 Wireless Site Surveys
7-4 Wireless Network Design
7-5 Wireless Network Management
8 Network Services
8-1 DHCP and DNS
8-2 Network Time Protocol (NTP)
8-3 Quality of Service (QoS)
8-4 Network Address Translation (NAT)
8-5 Network Management Protocols (SNMP, Syslog)
9 Network Troubleshooting
9-1 Troubleshooting Methodologies
9-2 Common Network Issues
9-3 Troubleshooting Tools (Ping, Traceroute, Wireshark)
9-4 Troubleshooting Wireless Networks
9-5 Troubleshooting Security Issues
10 Enterprise Network Design
10-1 Network Design Models (Hub-and-Spoke, Mesh)
10-2 Network Redundancy and High Availability
10-3 Network Scalability and Performance
10-4 Network Documentation and Diagrams
10-5 Case Studies and Real-World Scenarios
6 Network Security

6 Network Security

Key Concepts

Firewalls

Firewalls are network security devices that monitor and control incoming and outgoing network traffic based on predetermined security rules. They act as a barrier between a trusted internal network and untrusted external networks, such as the internet. Firewalls can be hardware-based, software-based, or a combination of both.

Example: Think of a firewall as a bouncer at a nightclub who checks IDs and ensures that only authorized individuals (allowed traffic) enter while keeping out unwanted guests (unauthorized traffic).

Intrusion Detection Systems (IDS)

IDS are security tools that monitor network or system activities for malicious activities or policy violations. They detect potential threats by analyzing network traffic and system logs. IDS can be network-based, which monitors traffic between devices across the network, or host-based, which monitors the traffic on individual devices.

Example: Consider IDS as a surveillance system in a store that monitors activities (network traffic) and alerts the security team (administrators) if it detects any suspicious behavior (malicious activities).

Intrusion Prevention Systems (IPS)

IPS are advanced security tools that not only detect but also prevent intrusions. They actively monitor network traffic and take immediate action to block or mitigate threats. IPS can be integrated into firewalls or operate as standalone devices. They use signatures, heuristics, and anomaly detection to identify and stop malicious activities.

Example: Think of IPS as a security guard in a museum who not only watches for thieves (detects threats) but also steps in to stop them (prevents intrusions) by sounding an alarm or physically intervening.

Virtual Private Networks (VPNs)

VPNs create secure, encrypted connections over less secure networks, such as the internet. They allow remote users to access a private network and its resources securely. VPNs use protocols like IPSec, SSL/TLS, and PPTP to establish secure connections. They are commonly used by businesses to enable remote work and secure data transmission.

Example: Consider a VPN as a secure tunnel that protects your data (encrypted connection) as it travels through a public road (less secure network). This ensures that your data remains private and safe from prying eyes.

Access Control Lists (ACLs)

ACLs are a series of rules used to filter traffic entering or leaving a network. They are applied to routers and switches to control access to network resources. ACLs can be used to allow or deny traffic based on criteria such as source IP address, destination IP address, protocol, and port number.

Example: Think of ACLs as a doorman at an apartment building who checks IDs (traffic) and allows residents (allowed traffic) to enter while keeping out strangers (unauthorized traffic) based on predefined rules.

Security Information and Event Management (SIEM)

SIEM is a security management system that collects and analyzes log data from various sources across the network. It provides real-time monitoring, correlation of events, and threat detection. SIEM tools help organizations comply with regulatory requirements and improve their overall security posture.

Example: Consider SIEM as a central command center that gathers information from various security cameras (log data) and uses advanced analytics to detect and respond to security incidents in real-time.