2.1. Types of network traffic2.2. Securing the management plan2.3. Securing passwords2.4. Implementing connection restrictions2.5. Securing access through console lines, VTY and auxiliaries2.6. Allocation of administrative roles2.7. Securing the control plane2.8. Exercises for application