• Online, Self-Paced
Course Description

When you think about attacking a network with a rogue DHCP device, you realize it is such a relatively easy attack to carry out. In this course, you'll learn about the DHCP snooping feature and how it is configured. Next, you'll examine how multiple different security features can leverage the DHCP snooping database that results from a proper implementation of DHCP snooping, including a demonstration of both the DAI and IP Source Guard features. You'll learn about the often intimidating security feature private VLANs, including the details of these structures and the reason why they exist. Finally, you'll explore traffic storms, including when they occur, how they create excessive traffic and can degrade network performance, and how to use the traffic storm control feature. This course can be used in preparation for the 350-701: Implementing and Operating Cisco Security Core Technologies (SCOR) certification exam.

Learning Objectives

{"recognize the purpose of DHCP snooping","identify the type of port associated with DHCP servers","identify DHCP snooping configuration commands"}

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Cyber Operational Planning
  • Cyber Operations
  • Cybersecurity Management
  • Executive Cyber Leadership
  • Network Services
  • Threat Analysis

Feedback

If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.