✆ (855)77/87-616102
delicious
facebook
email
  • Home
  • Courses
    • Upcoming Courses
  • Partners
  • Contact Us
    • Why with us?
    • About Us

Cisco CCNA Security

January 18, 2022
by admin
CCNA Security, Cisco, Security
0 Comment

CCNA Security is End Of Life (EoF) and It upgrade to Network Security Course.

Target Audience

The Cisco CCNA® Security course is designed for Cisco Networking Academy® students seeking career-oriented, entry-level security specialist skills. This includes individuals enrolled in technology degree programs at institutions of higher education and IT professionals who want to enhance their core routing and switching skills.

CCNA Security provides a next step for Cisco CCENT® or CCNA Routing and Switching students who want to expand their skill set to prepare for a career in network security.

Prerequisites

CCNA Security students are expected to have the following skills and knowledge:
● CCENT-level networking concepts and skills
● Basic PC and Internet navigation skills

Target Certifications

The CCNA Security curriculum prepares students for the Implementing Cisco IOS® Network Security (IINS) certification exam (640-554), which leads to the CCNA Security certification.

Curriculum Description

CCNA Security helps students prepare for entry-level security specialist careers by developing an in-depth understanding of network security principles and the tools and configurations needed to secure a network. This hands-on course emphasizes practical experience and blends both online and classroom learning.

Students complete hands-on activities ranging from procedural and troubleshooting labs to skills integration challenges and model building. All hands-on labs can be completed on physical equipment or in conjunction with the NDG NETLAB solution. Most chapters also include Cisco Packet Tracer-based skills integration challenges.

Curriculum Objectives

The goals of CCNA Security are as follows:
● Provide an in-depth, theoretical understanding of network security
● Equip students with the knowledge and skills needed to design and support network security
● Provide an experience-oriented course that employs industry-relevant instructional approaches to prepare students for entry-level IT security jobs
● Enable significant hands-on interaction with IT equipment to prepare students for certification exams and career opportunities

Upon completion of the CCNA Security course, students will be able to perform the following tasks:

● Describe the security threats facing modern network infrastructures
● Secure Cisco routers
● Implement AAA on Cisco routers using a local router database and external ACS
● Mitigate threats to Cisco routers and networks using ACLs
● Implement secure network design, management, and reporting
● Mitigate common Layer 2 attacks
● Implement the Cisco IOS firewall feature set
● Implement the Cisco IOS IPS feature set
● Implement a site-to-site VPN
● Implement a remote access VPN

Chapter/SectionGoals/Objectives
Chapter 1. Modern Network Security ThreatsDescribe security threats facing modern network infrastructures
1.1 Fundamental Principles of a Secure NetworkDescribe the fundamental principles of securing a network
1.2 Viruses, Worms, and Trojan HorsesDescribe common network attack methodologies and mitigation techniques such as Reconnaissance, Access, Denial of Service, and DDoS
1.3 Attack MethodologiesDescribe the characteristics of Worms, Viruses, and Trojan Horses and mitigation methods
1.4 Cisco Network Foundation Protection FrameworkDescribe the Cisco Network Foundation Protection framework to include the control, management, and data (forwarding) planes
Chapter 2. Securing Network DevicesSecure administrative access on Cisco routers
2.1 Securing Device AccessConfigure basic security for local and remote administrative access
2.2 Assigning Administrative RolesConfigure command authorization using privilege levels and role-based CLI
2.3 Monitoring and Managing DevicesImplement secure management, monitoring, and resiliency of network devices
2.4 Using Automated Security FeaturesSecure IOS-based routers using automated features
Chapter 3. Authentication, Authorization, and AccountingSecure administrative access with AAA
3.1 Purpose of AAADescribe the purpose and protocols for implementing AAA
3.2 Local AAA AuthenticationImplement AAA on Cisco routers using the local router database
3.3 Server-Based AAAImplement server-based AAA
3.4 Server-Based AAA AuthenticationImplement server-based AAA authentication using TACACS+ and RADIUS protocols
3.5 Server-Based AAA Authorization and AccountingImplement server-based AAA authorization and accounting
Chapter 4. Implementing Firewall TechnologiesImplement firewall technologies to secure the network perimeter
4.1 Access Control ListsMitigate threats to Cisco routers and networks using ACLs
4.2 Firewall TechnologiesImplement classic firewall to mitigate network attacks
4.3 Zone-Based Policy FirewallImplement Zone-Based Policy Firewall
Chapter 5. Implementing Intrusion PreventionConfigure IPS to mitigate attacks on the network
5.1 IPS TechnologiesDescribe network-based and host-based intrusion detection and prevention
5.2 IPS SignaturesDescribe how signatures are used to detect malicious network traffic
5.3 Implementing IPSImplement Cisco IOS IPS operations using CLI and CCP
5.4 Verify and Monitor IPSVerify and monitor the Cisco IOS IPS operations using CLI and CCP
Chapter 6. Securing the Local-Area NetworkDescribe LAN security considerations and implement endpoint and Layer 2 security features
6.1 Endpoint SecurityDescribe endpoint vulnerabilities and protective measures
6.2 Layer 2 Security ConsiderationsDescribe Layer 2 vulnerabilities and implement security measures
6.3 Configuring Layer 2 SecurityConfigure and verify switch security features, including port security and storm control
6.4 Wireless, VoIP, and SAN SecurityDescribe Wireless, VoIP, and SAN security considerations
Chapter 7. Cryptographic SystemsDescribe methods for protecting data confidentiality and integrity
7.1 Cryptographic ServicesDescribe how the types of encryption, hashing, and digital signatures provide confidentiality, integrity, authentication, and non-repudiation
7.2 Basic Integrity and AuthenticityDescribe the mechanisms used to ensure data integrity and authentication
7.3 ConfidentialityDescribe the mechanisms used to ensure data confidentiality
7.4 Public Key CryptographyDescribe the mechanisms used in a public key cryptography
Chapter 8. Implementing Virtual Private NetworksImplement secure virtual private networks
8.1 VPNsDescribe the purpose and operation of VPNs
8.2 GRE VPNsImplement a site-to-site VPN GRE tunnel
8.3 IPSec VPN Components and OperationDescribe the components and operations of IPSec VPNs
8.4 Implementing Site-to-Site IPSec VPNs with CLIUse CLI to configure and verify a site-to-site IPSec VPN with pre-shared key authentication
8.5 Implementing Site-to-Site IPSec VPNs with CCPUse CCP to configure and verify a site-to-site IPSec VPN with pre-shared key authentication
8.6 Implementing Remote-Access VPNsConfigure and verify a remote-access VPN
Chapter 9. Implementing the Cisco Adaptive Security Appliance (ASA)Given the security needs of an enterprise, create and implement a comprehensive security policy
9.1 Introduction to the ASADescribe the ASA as an advanced stateful firewall
9.2 ASA Firewall ConfigurationImplement an ASA Firewall configuration
9.3 ASA VPN ConfigurationConfigure and verify a remote access VPN on an ASA
Chapter 10. Managing a Secure NetworkImplement firewall technologies using the ASA to secure the network perimeter
10.1 Principles of Secure Network DesignDescribe the principles of secure network design
10.2 Security ArchitectureDescribe the Cisco SecureX Architecture
10.3 Operations SecurityDescribe the implementation of a comprehensive security policy
10.4 Network Security TestingDescribe the various techniques and tools used for network security testing
10.5 Business Continuity Planning and Disaster RecoveryDescribe the principles of business continuity planning and disaster recovery
10.6 System Development Life CycleDescribe SDLC and how to use it to design a Secure Network Life Cycle management process
10.7 Developing a Comprehensive Security PolicyDescribe the functions, goals, role, and structure of a comprehensive security policy
Social Share
Other Courses
  • Upcoming Courses
  • IT Essentials
  • Cisco CCNAv7
  • Cisco CCNA1v7
  • Cisco CCNA2v7
  • Cisco CCNA3v7
  • Introduction to Cybersecurity
  • Cybersecurity Essentials
  • CyberOps Associate
  • Network Security
  • Cloud Security
  • MikroTik MTCNA
  • INE
  • VoIP and PABX
  • CCNA Exam Preparation

PPIC is qualified IT Training Center that authorized to teach Cisco and MikroTik courses in Phnom Penh, Cambodia.

Address: #194D, Russian Federation Blvd, CPC, Toeuk Thlar, Sen Sok, Phnom Penh, Cambodia.

  • Why with us?
  • Upcoming Courses
  • Contact Us
Facebook Pagelike Widget
https://t.me/ppictraining Our Telegram Channel
✆ (855)77-616102 ✆ (855)87-616102 ✉ info@ppic-training.com
© Copyright 2022, PPIC