CCNA Security Course
CNA Security includes the following features:
-
Participants develop an in-depth, theoretical understanding of network security principles as well as the tools and configurations available.
-
The course emphasizes the practical application of skills needed to design, implement, and support network security.
-
Hands-on labs help participants develop critical thinking and complex problem-solving skills.
-
Packet Tracer simulation-based learning activities promote the exploration of networking security concepts and allow participants to experiment with network behavior and ask “what if” questions.
-
Innovative assessments provide immediate feedback to support the evaluation of knowledge and acquired skills.
Course Goals
- Explain network threats, mitigation techniques, and the basics of securing a network
- Secure administrative access on Cisco routers
- Secure administrative access with AAA
- Implement firewall technologies to secure the network perimeter
- Configure IPS to mitigate attacks on the network
- Describe LAN security considerations and implement endpoint and Layer 2 security features
- Describe methods for implementing data confidentiality and integrity
- Implement secure virtual private networks
- Given the security needs of an enterprise, create and implement a comprehensive security policy
- Implement firewall technologies using the ASA to secure the network perimeter
Course Outline
Table 1. CCNA Security Outline
Chapter | CCNA Security |
1 | Modern Network Security Threats |
1.1 | Fundamental Principles of a Secure Network |
1.2 | Worms, Viruses and Trojan Horses |
1.3 | Attack Methodologies |
2 | Securing Network Devices |
2.1 | Securing Device Access and Files |
2.2 | Privilege Levels and Role-Based CLI |
2.3 | Monitoring Devices |
2.4 | Using Automated Features |
3 | Authentication, Authorization and Accounting (AAA) |
3.1 | Purpose of AAA |
3.2 | Configuring Local AAA |
3.3 | Configure Server-Based AAA |
4 | Implementing Firewall Technologies |
4.1 | Access Control Lists |
4.2 | Firewall Technologies |
4.3 | Context-Based Access Control |
4.4 | Zone-Based Policy Firewall |
5 | Implementing Intrusion Prevention |
5.1 | IPS Technologies |
5.2 | Implementing IPS |
6 | Securing the Local Area Network |
6.1 | Endpoint Security Considerations |
6.2 | Layer 2 Security Considerations |
6.3 | Wireless, VoIP and SAN Security Considerations |
6.4 | Configuring Switch Security |
6.5 | SPAN and RSPAN |
7 | Cryptography |
7.1 | Cryptographic Services |
7.2 | Hashes and Digital Signatures |
7.3 | Symmetric and Asymmetric Encryption |
8 | Implementing Virtual Private Networks |
8.1 | VPNs |
8.2 | IPSec VPN Components and Operation |
8.3 | Implementing Site-to-Site IPSec VPNs |
8.4 | Implementing a Remote Access VPN |
8.5 | Implementing SSL VPNs |
9 | Managing a Secure Network |
9.1 | Secure Network Lifecycle |
9.2 | Self-Defending Network |
9.3 | Building a Comprehensive Security Policy |
Last modified: Wednesday, February 25, 2015, 2:45 PM