What you will learn
By the end of this course, participants will be able to:
- Have an in-depth understanding of advanced routing protocols (IS-IS, MPLS)
- Implement and manage advanced features in BGP for enterprise networks
- Design and configure secure IPv6 routing infrastructures
- Implement security measures in enterprise routing environments
- Configure and manage VPNs for secure communication
- Optimize Network Address Translation (NAT) and Port Address Translation (PAT)
- Develop and execute a security incident response plan
- Perform network forensics and adhere to legal considerations
- Implement and manage firewalls and Intrusion Prevention Systems (IPS)
Beneficial for
This course is suitable for:
- Network Engineers
- System Administrators
- Security Engineers
- IT Managers
Course Pre-requisite
Participants should have a basic understanding of:
- Proficiency in basic networking concepts
- Familiarity with routing protocols (OSPF, EIGRP, BGP)
- Prior experience in network security concepts
Course Outline
Review of traditional routing protocols (OSPF, EIGRP, BGP)
Introduction to advanced routing protocols (IS-IS, MPLS)
Use cases and scenarios for advanced routing protocols
Understanding the IS-IS routing protocol
Configuring and managing IS-IS in enterprise networks
Interoperability with OSPF and BGP
Basics of MPLS and its role in enterprise networks
Label distribution and forwarding in MPLS networks
MPLS applications: L3VPN, L2VPN, Traffic Engineering
BGP route filtering and policy enforcement
BGP route aggregation and summarization
Route reflectors and confederations in BGP
Implementation of IPv6 in enterprise networks
IPv6 routing protocols (OSPFv3, BGPv6)
Transition mechanisms: Dual-stack, 6to4, and more
Threats and vulnerabilities in enterprise routing
Implementing Access Control Lists (ACLs) for routing security
Routing protocol authentication and integrity mechanisms
Overview of VPN technologies (IPsec, SSL/TLS, MPLS VPN)
Configuring and managing site-to-site VPNs
Implementing secure remote access VPNs
Fundamentals of NAT and PAT
Configuring and optimizing NAT in enterprise networks
Address translation for IPv6 networks
Design principles and deployment scenarios for firewalls
Configuring stateful and stateless firewalls
Intrusion Prevention Systems: Implementation and best practices
Developing and implementing a security incident response plan
Network forensics: Tools and techniques
Legal and regulatory considerations in security incident response