CNA Security includes the following features:

  • Participants develop an in-depth, theoretical understanding of network security principles as  well as the tools and configurations available.
     
  • The course emphasizes the practical application of skills needed to design, implement, and support network security.
  • Hands-on labs help participants develop critical thinking and complex problem-solving skills.
  • Packet Tracer simulation-based learning activities promote the exploration of networking security concepts and allow participants to experiment with network behavior and ask “what if” questions.
  • Innovative assessments provide immediate feedback to support the evaluation of knowledge and acquired skills.

Course Goals

  • Explain network threats, mitigation techniques, and the basics of securing a network
  • Secure administrative access on Cisco routers
  • Secure administrative access with AAA
  • Implement firewall technologies to secure the network perimeter
  • Configure IPS to mitigate attacks on the network
  • Describe LAN security considerations and implement endpoint and Layer 2 security features
  • Describe methods for implementing data confidentiality and integrity
  • Implement secure virtual private networks
  • Given the security needs of an enterprise, create and implement a comprehensive security policy
  • Implement firewall technologies using the ASA to secure the network perimeter

Course Outline

Table 1. CCNA Security Outline

Chapter CCNA Security
1 Modern Network Security Threats
1.1 Fundamental Principles of a Secure Network
1.2 Worms, Viruses and Trojan Horses
1.3 Attack Methodologies
2 Securing Network Devices
2.1 Securing Device Access and Files
2.2 Privilege Levels and Role-Based CLI
2.3 Monitoring Devices
2.4 Using Automated Features
3 Authentication, Authorization and Accounting (AAA)
3.1 Purpose of AAA
3.2 Configuring Local AAA
3.3 Configure Server-Based AAA
4 Implementing Firewall Technologies
4.1 Access Control Lists
4.2 Firewall Technologies
4.3 Context-Based Access Control
4.4 Zone-Based Policy Firewall
5 Implementing Intrusion Prevention
5.1 IPS Technologies
5.2 Implementing IPS
6 Securing the Local Area Network
6.1 Endpoint Security Considerations
6.2 Layer 2 Security Considerations
6.3 Wireless, VoIP and SAN Security Considerations
6.4 Configuring Switch Security
6.5 SPAN and RSPAN
7 Cryptography
7.1 Cryptographic Services
7.2 Hashes and Digital Signatures
7.3 Symmetric and Asymmetric Encryption
8 Implementing Virtual Private Networks
8.1 VPNs
8.2 IPSec VPN Components and Operation
8.3 Implementing Site-to-Site IPSec VPNs
8.4 Implementing a Remote Access VPN
8.5 Implementing SSL VPNs
9 Managing a Secure Network
9.1 Secure Network Lifecycle
9.2 Self-Defending Network
9.3 Building a Comprehensive Security Policy
Last modified: Wednesday, February 25, 2015, 2:45 PM