You are able to implement data security solutions using data security equipment.
You are able to configure and maintain a modern firewall.
You are able to implement virtual private networks using routers and firewalls.
You are able to harden routers and switches against the most common attacks.
Prerequisites and co-requisites
Basics of networking
Data networks 1
Data networks 2
How do you implement firewall rules from a security policy?
How do you implement secure access to a local network for remote users?
How do you validate the identity of networks users?
How do you discover an intruder in the network?