Description
Course Content
Security Threats and Aruba Security Strategy
- Threats Overview
- Attack Stages
- Aruba Security Strategy
Security Technologies
- Regulatory Compliance
- Secure Communications: Symmetric Encryption and Hash-Based Authentication
- Secure Communications: Asymmetric Encryption and Digital Certificates
- Secure Communications: TLS
- Authentication, Authorization, Accounting (AAA)
Harden Aruba Switches
- Hardening Overview
- Set Up Out-of-Band Management
- Authenticate Managers Securely
- Ensure Physical Security and Other Hardening Actions
Harden ArubaOS Wireless Devices
- Lock Down Administrative Access
- Lock Down Services
- Use CPSec
Enhance LAN Security
- Spanning Tree Protections
- DHCP Snooping and ARP Protection
- Secure Routing Technologies
Network Authentication Technologies
- Network Authentication
- WLAN Security—Encryption + Authentication
Enforce Edge Security with an Aruba Infrastructure
- Enforce WPA3-Enterprise
- Enforce 802.1X on the Wired Network
Enforce Role-Based Authentication and Access Control
- Aruba Role-Based Firewall Policies
- Dynamic Segmentation
Identify and Classify Endpoints
- Endpoint Classification Introduction
- DHCP Fingerprinting with ArubaOS Mobility Devices
- Aruba ClearPass Policy Manager Device Profiler
- ClearPass Device Insight
Branch Security
- Introduction to Aruba SD-Branch Solutions
Implement Threat Detection and Forensics
- Understand Forensics
- Analyze ArubaOS WIP Events
Troubleshoot and Monitor
- Introduction to Troubleshooting Authentication Issues
- Using ClearPass Tools to Troubleshoot Some Common Issues
- Packet Captures
- Monitoring
Who should attend
A network or help desk engineer working in a customer or partner environment that has six months to a year of experience in networking. In both wired and wireless environments.
Certifications
This course is part of the following Certifications:
Aruba Certified Network Security Associate
Course Objectives
After you successfully complete this course, expect to be able to:
Protect and Defend
- Define security terminology
- Harden devices
- Secure a WLAN
- Secure a wired LAN
- Secure the WAN
- Classify endpoints
Analyze
- Threat detection
- Troubleshooting
- Endpoint classification
Investigate
- Forensics