0332 3491911
info@ict-trainings.com

CCNA Security

CCNA [Cisco Certified Network Associate] [Download Outline] CCNA Security Course Contents Outline Building a Simple Network Establish...

CCNA Security

Enrolled

2894

Investment

20,000

Course Overview

Everything you need to know about this comprehensive Meta marketing course

CCNA [Cisco Certified Network Associate]

[Download Outline]

CCNA Security Course Contents

Outline

  • Building a Simple Network
  • Establishing Internet Connectivity
  • Managing Network Device Security
  • Introducing IPv6 Building a Medium-Sized Network
  • Troubleshooting Basic Connectivity Wide Area Networks
  • Implementing an EIGRP-Based Solution
  • Implementing a Scalable OSPF-Based Solution Network Device Management

Describe common security threats

  • Common threats to the physical installation
  • Mitigation methods for common network attacks
  • Email-based threats
  • Web-based attacks
  • Mitigation methods for Worm, Virus, and Trojan Horse attacks
  • Phases of a secure network lifecycle
  • Security needs of a typical enterprise with a comprehensive security policy
  • Mobile/remote security
  • DLP

Security and Cisco Routers

Implement Security on Cisco routers

  • CCP Security Audit feature
  • CCP One-Step Lockdown feature
  • Secure router access using strong encrypted passwords, and using IOS login enhancements, IPV6 security
  • Multiple privilege levels
  • Role-Based CLI
  • Cisco IOS image and configuration files

Describe securing the control, data and management plane

Describe CSM

Describe IPv4 to IPv6 transition

  • Reasons for IPv6
  • Understanding IPv6 addressing
  • Assigning IPv6 addresses
  • Routing considerations for IPv6

AAA on Cisco Devices

Implement authentication, authorization, and accounting (AAA)

  • 8.1.a AAA using CCP on routers
  • 8.1.b AAA using CLI on routers and switches
  • AAA on ASA

Describe TACACS+

Describe RADIUS

Describe AAA

  • Authentication
  • Authorization
  • Accounting

Verify AAA functionality

IOS ACLs

Describe standard, extended, and named IP IOS ACLs to filter packets

  • IPv4
  • IPv6
  • Object groups
  • ACL operations
  • Types of ACLs (dynamic, reflexive, time-based ACLs)
  • ACL wild card masking
  • Standard ACLs
  • Extended ACLs
  • Named ACLs
  • VLSM

Describe considerations when building ACLs

  • Sequencing of ACEs
  • Modification of ACEs

Implement IP ACLs to mitigate threats in a network

  • Filter IP traffic
  • SNMP
  • DDoS attacks
  • CLI
  • CCP
  • IP ACLs to prevent IP spoofing
  • VACLs

Secure Network Management and Reporting

Describe secure network management

  • In-band
  • Out of band
  • Management protocols
  • Management enclave
  • Management plane

Implement secure network management

  • SSH
  • syslog
  • SNMP
  • NTP
  • SCP
  • CLI
  • CCP
  • SSL

Common Layer 2 Attacks

 

Describe Layer 2 security using Cisco switches

  • STP attacks
  • ARP spoofing
  • MAC spoofing
  • CAM overflows
  • CDP/LLDP

Describe VLAN Security

  • Voice VLAN
  • PVLAN
  • VLAN hopping
  • Native VLAN

Implement VLANs and trunking

  • VLAN definition
  • Grouping functions into VLANs
  • Considering traffic source to destination paths
  • Trunking
  • Native VLAN
  • VLAN trunking protocols
  • Inter-VLAN routing

Implement Spanning Tree

  • Potential issues with redundant switch topologies
  • STP operations
  • Resolving issues with STP

Cisco Firewall Technologies

 

Describe operational strengths and weaknesses of the different firewall technologies

  • Proxy firewalls
  • Packet and stateful packet
  • Application firewall
  • Personal firewall

Describe stateful firewalls

  • Operations
  • Function of the state table

Describe the types of NAT used in firewall technologies

  • Static
  • Dynamic
  • PAT

Implement Zone Based Firewall using CCP

  • Zone to zone
  • Self zone

Implement the Cisco Adaptive Security Appliance (ASA)

  • NAT
  • ACL
  • Default MPF
  • Cisco ASA sec level

Implement NAT and PAT

  • Functions of NAT, PAT, and NAT Overload
  • Translating inside source addresses
  • 7.6.c Overloading Inside global addresses

Cisco IPS

Describe IPS deployment considerations

  • SPAN
  • IPS product portfolio
  • Placement
  • Caveats

Describe IPS technologies

  • Attack responses
  • Monitoring options
  • Syslog
  • SDEE
  • Signature engines
  • Signatures
  • Global correlation and SIO
  • Network-based
  • Host-based

Configure Cisco IOS IPS using CCP

  • Logging
  • Signatures

VPN Technologies

 

Describe the different methods used in cryptography

  • Symmetric
  • Asymmetric
  • HMAC
  • Message digest
  • PKI

Describe VPN technologies

  • IPsec
  • SSL

Describe the building blocks of IPSec

  • IKE
  • ESP
  • AH
  • Tunnel mode
  • Transport mode

Implement an IOS IPSec site-to-site VPN with pre-shared key authentication

  • CCP
  • CLI

Verify VPN operations

Implement SSL VPN using ASA device manager

  • Clientless
  • AnyConnect

Practical Approach

  • A real-time examples will be given throughout the lectures, starting from design, analysis, implementation and maintenance of network.

www.ict-trainings.com/curriculum/ccna-security-leaflet.pdf

What you will learn

  • Develop a strong understanding of core concepts and best practices
  • Apply theoretical knowledge to real-world projects
  • Build practical skills through hands-on exercises
  • Improve problem-solving and critical-thinking abilities
  • Learn to plan, execute, and optimize projects effectively
  • Communicate ideas and strategies clearly and professionally
  • Use industry-standard tools and techniques confidently
  • Manage time and resources efficiently to meet deadlines
  • Work collaboratively and adapt to team environments
  • Analyze performance and implement data-driven improvements
  • Gain confidence to apply your learning in a professional setting
  • Prepare for advanced learning or career opportunities in the field

Reviews

3.5/5
Based on 3844 reviews
5 stars
4 stars
3 stars
2 stars
1 stars

No reviews yet. Be the first to review this course!


You must be logged in to submit a review.

Login to Review

Book Online

PKR 20,000
Add to wishlist
No money charged in this step

Frequently Asked Questions

Find quick solutions to common queries and get the most out of your learning experience

View More Questions

Related Courses

Courses that help building your career