• Online, Self-Paced
Course Description

Securing the network, especially at the perimeter, is a critical part of network administration. Discover how to use Access Control Lists to permit or deny access to network resources.

Learning Objectives

CCENT: Access Control Lists Part 2

  • describe additional ACLs that may need to be configured
  • use and apply named access lists on a virtual interface

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Network Services