00:00:00 - Hello.
00:00:01 - My name is Keith Barker.
00:00:02 - And on behalf of the
entire CBT Nuggets family,
00:00:05 - welcome to Implementing
Cisco Edge Network Security
00:00:08 - Solutions.
00:00:09 - Let's begin.
00:00:10 - Whenever I hear about a
really great tip or idea,
00:00:13 - I like to do two
things with that.
00:00:15 - Number one, I like to
go ahead and incorporate
00:00:17 - that if I can use it.
00:00:18 - And then secondly, I like
to share it with others.
00:00:20 - And what I'd like to do is share
with you some ideas and tips
00:00:22 - that we can use together as you
and I go through this course,
00:00:25 - to get the absolute
most from this course.
00:00:28 - Now as the starting
point, let's make
00:00:29 - sure we're on the same
page of where we are.
00:00:31 - This is the Implementing Edge
Network Security Solutions
00:00:34 - course.
00:00:35 - And Cisco has the acronym
of SENSS for that.
00:00:38 - The S is for Secure.
00:00:40 - And then there's the Edge
Network Security Solutions.
00:00:43 - And that's the acronym
they came up with.
00:00:45 - That acronym and this
title also corresponds
00:00:47 - to 300-206 which is the
exam number for those
00:00:51 - who want to pursue certification
regarding this content.
00:00:54 - And I remember my father
sharing with me the age old
00:00:57 - saying that, if you give a
man a fish, he eats for a day.
00:01:00 - If you teach him how to
fish, he eats for a lifetime.
00:01:03 - And it's my clear
intention for you
00:01:05 - that, as we go through
this course together,
00:01:07 - your skills will improve.
00:01:08 - So that you will be able
to improve the security
00:01:10 - posture on networks that
you're either designing
00:01:12 - and implementing or networks
that you're currently
00:01:14 - supporting.
00:01:15 - Now regarding any
type of certification
00:01:17 - from Cisco-- if we
ever need to find out,
00:01:20 - what's the latest
00:01:21 - a certain certification, the
best source to go to for that,
00:01:25 - as far as the numbers
involved and what
00:01:27 - it takes to get a
00:01:29 - the best resource
is Cisco's website.
00:01:31 - So this is the homepage
for Cisco's website.
00:01:33 - And I'm going to put my cursor
right here in the search field.
00:01:36 - And I'm going to press Enter.
00:01:38 - You can also put some
characters into a search.
00:01:40 - But what we're after is
this link right here--
00:01:42 - Training and Events.
00:01:43 - If we click on
Training and Events,
00:01:45 - and then on the right-hand side,
go to Cisco's Certifications,
00:01:48 - from here we have a bird's
eye view of the certifications
00:01:51 - available from Cisco.
00:01:52 - So we scroll down
just a little bit.
00:01:54 - Here we have our entry level
certifications, the CCENT.
00:01:58 - The associate certification,
which are mostly the CCNAs.
00:02:01 - And if we scroll down
a little further,
00:02:03 - we have the professional,
including the CCNP Security.
00:02:06 - And then the expert level where
most of the certifications
00:02:09 - are CCIE.
00:02:10 - So in our case, if we take
a look at CCNP Security
00:02:13 - and scroll down
just a little bit,
00:02:15 - here it has the
00:02:17 - says you need to be a
CCNA Security before Cisco
00:02:20 - will award you a CCNP Security.
00:02:23 - And to achieve a
CCNP Security, these
00:02:25 - are the four exams
that you must take
00:02:28 - and pass to become
a CCNP Security.
00:02:31 - And out of the four exams
required for CCNP Security,
00:02:34 - our focus in this course is
the Edge Network Security
00:02:37 - Solutions.
00:02:38 - And so from here, if we
click on that link for SENNS,
00:02:41 - and we go to Exam
Topics and scroll down
00:02:43 - just a little bit, and
here we have an overview
00:02:46 - of the blueprint for
that certification exam.
00:02:49 - So we can click on Details here
and expand any one of those.
00:02:51 - Or we can download or
look at the entire PDF.
00:02:54 - So going forward, in
the future, if you ever
00:02:56 - need to find out the
details regarding what
00:02:58 - does Cisco require for
00:03:00 - or that certification,
the best way to find out
00:03:03 - is go to the website yourself
and see what the latest
00:03:05 - information is
directly from Cisco
00:03:07 - regarding their blueprints
for their certifications.
00:03:10 - So regarding this course that
we're going to enjoy together,
00:03:12 - going through it
video by video, one
00:03:14 - of the first tips I'd
like to share with you
00:03:16 - is make sure that you
watch all the videos.
00:03:18 - That's this guy right here.
00:03:20 - Plus I'm going to ask you
to watch any specific videos
00:03:22 - that I call out in these videos.
00:03:25 - Now because it's
fresh on my mind,
00:03:26 - let's take an example of IPv6.
00:03:28 - Now in this course, we're going
to take a look at specifically
00:03:30 - some technologies that we can
use to increase IPv6 security.
00:03:34 - But I also, in that video,
recommend that if you don't yet
00:03:37 - know IPv6, maybe you go pop
over to the IPv6 course.
00:03:41 - And I have a few videos in
that course that I strongly
00:03:44 - recommend that you
watch, if you're not yet
00:03:47 - familiar with IPv6.
00:03:49 - And because our
focus in this course
00:03:50 - is implementing security,
I also may refer you
00:03:53 - to another video at
CBT Nuggets where,
00:03:57 - if you want to learn
how to do, for example,
00:03:59 - penetration testing
or taking advantage
00:04:01 - of a naked vulnerability
in a protocol like IPv6,
00:04:05 - how you could do that, as well.
00:04:06 - So again in the video
on IPv6 security,
00:04:08 - there's a recommendation
00:04:10 - who want to to go ahead and
take a look at the pen testing
00:04:13 - video, which is called
penetration testing with Linux
00:04:16 - tools that uses some of the
tools in BackTrack and Kali
00:04:19 - Linux to actually
implement an attack
00:04:21 - against IPv6 vulnerabilities.
00:04:23 - So my tip is as we're
going through these videos,
00:04:25 - if I do an audible,
and I call out saying,
00:04:28 - hey, this specific video in
this specific course I think
00:04:31 - would be a great
idea if you watched
00:04:32 - it to help reinforce
00:04:34 - I'd like you take
00:04:36 - as a literal request.
00:04:38 - Especially if your
intent is, at some point,
00:04:41 - to go ahead and take a Cisco
00:04:43 - this content.
00:04:43 - You'll want to watch
every single video
00:04:45 - in this course plus the
videos that I recommend.
00:04:48 - Another recommendation that will
be really helpful in learning
00:04:50 - the content is to take notes
as we go through it together
00:04:53 - either with a pad of
paper and a pen or pencil
00:04:56 - or electronically.
00:04:57 - Just go ahead and jot down notes
as we go through the content
00:04:59 - together.
00:05:00 - That will assist you in
remembering and internalizing
00:05:03 - that content.
00:05:04 - And where possible, I would
strongly encourage you,
00:05:06 - in a safe practice environment,
not on your production
00:05:10 - network for your first go,
but in a safe environment,
00:05:13 - I'd like you to practice
and verify the techniques
00:05:15 - that we're learning together.
00:05:17 - The environments that we're
going to be working on
00:05:19 - are switch environments and
Cisco iOS router environments
00:05:23 - and the adaptive
00:05:25 - So if you have, in
a test environment,
00:05:26 - either virtualized or
physical gear, again
00:05:29 - I would strongly recommend
that you practice and verify
00:05:32 - everything that we go through
in these videos together.
00:05:35 - And as you practice
00:05:37 - that will serve you very well.
00:05:39 - Because again,
it's another method
00:05:40 - for internalizing
00:05:42 - and getting some hands-on
practice in implementing
00:05:45 - these security techniques.
00:05:46 - Another powerful method that
can help us really learn content
00:05:49 - is to teach others.
00:05:51 - So if you have a loved one,
family member, coworker,
00:05:53 - someone who will
listen to you, I
00:05:55 - would strongly recommend
you teach them the content.
00:05:57 - My wife, bless her heart,
she has indulged me
00:06:00 - by allowing me to teach her
lots and lots of content.
00:06:02 - And she'll just sit
there and nod and listen.
00:06:06 - And really the benefit is for
me because, as I teach a concept
00:06:10 - to someone, I can hear the
words coming out my mouth.
00:06:12 - It also gives me an
opportunity to identify areas
00:06:15 - where maybe I'm a little
weak in that area.
00:06:17 - I can improve on that.
00:06:18 - And if you're teaching it
to somebody else, who's
00:06:20 - another technical
person, it's a win-win.
00:06:22 - Because as the tide rises,
all boats rise as well.
00:06:26 - And one of the huge factors for
me, as well, is to have fun.
00:06:30 - And I absolutely did have a lot
of fun creating these videos
00:06:33 - with the knowledge
that you and I would
00:06:35 - be going through them together.
00:06:36 - I would also encourage
you to have fun.
00:06:39 - Every step of the way,
enjoy the journey.
00:06:41 - Because at the end of the day,
that's what life is all about.
00:06:44 - It's about our experiences,
our memories, and the actions
00:06:47 - we take.
00:06:48 - So in keeping this
intro fairly short so
00:06:50 - that you and I can get
right into the content
00:06:52 - of implementing edge
network security solutions.
00:06:55 - And the next video is
only one click away.
00:06:58 - So again, thanks for
joining me for the intro.
00:07:00 - I look forward to
our journey together.
00:07:02 - I hope this has been
informative for you.
00:07:04 - And I'd like to thank
you for viewing.