CCNA Security Course
Completion requirements
CNA Security includes the following features:
-
Participants develop an in-depth, theoretical understanding of network security principles as well as the tools and configurations available.
-
The course emphasizes the practical application of skills needed to design, implement, and support network security.
-
Hands-on labs help participants develop critical thinking and complex problem-solving skills.
-
Packet Tracer simulation-based learning activities promote the exploration of networking security concepts and allow participants to experiment with network behavior and ask “what if” questions.
-
Innovative assessments provide immediate feedback to support the evaluation of knowledge and acquired skills.
Course Goals
- Explain network threats, mitigation techniques, and the basics of securing a network
- Secure administrative access on Cisco routers
- Secure administrative access with AAA
- Implement firewall technologies to secure the network perimeter
- Configure IPS to mitigate attacks on the network
- Describe LAN security considerations and implement endpoint and Layer 2 security features
- Describe methods for implementing data confidentiality and integrity
- Implement secure virtual private networks
- Given the security needs of an enterprise, create and implement a comprehensive security policy
- Implement firewall technologies using the ASA to secure the network perimeter
Course Outline
Table 1. CCNA Security Outline
| Chapter | CCNA Security |
| 1 | Modern Network Security Threats |
| 1.1 | Fundamental Principles of a Secure Network |
| 1.2 | Worms, Viruses and Trojan Horses |
| 1.3 | Attack Methodologies |
| 2 | Securing Network Devices |
| 2.1 | Securing Device Access and Files |
| 2.2 | Privilege Levels and Role-Based CLI |
| 2.3 | Monitoring Devices |
| 2.4 | Using Automated Features |
| 3 | Authentication, Authorization and Accounting (AAA) |
| 3.1 | Purpose of AAA |
| 3.2 | Configuring Local AAA |
| 3.3 | Configure Server-Based AAA |
| 4 | Implementing Firewall Technologies |
| 4.1 | Access Control Lists |
| 4.2 | Firewall Technologies |
| 4.3 | Context-Based Access Control |
| 4.4 | Zone-Based Policy Firewall |
| 5 | Implementing Intrusion Prevention |
| 5.1 | IPS Technologies |
| 5.2 | Implementing IPS |
| 6 | Securing the Local Area Network |
| 6.1 | Endpoint Security Considerations |
| 6.2 | Layer 2 Security Considerations |
| 6.3 | Wireless, VoIP and SAN Security Considerations |
| 6.4 | Configuring Switch Security |
| 6.5 | SPAN and RSPAN |
| 7 | Cryptography |
| 7.1 | Cryptographic Services |
| 7.2 | Hashes and Digital Signatures |
| 7.3 | Symmetric and Asymmetric Encryption |
| 8 | Implementing Virtual Private Networks |
| 8.1 | VPNs |
| 8.2 | IPSec VPN Components and Operation |
| 8.3 | Implementing Site-to-Site IPSec VPNs |
| 8.4 | Implementing a Remote Access VPN |
| 8.5 | Implementing SSL VPNs |
| 9 | Managing a Secure Network |
| 9.1 | Secure Network Lifecycle |
| 9.2 | Self-Defending Network |
| 9.3 | Building a Comprehensive Security Policy |
Last modified: Wednesday, February 25, 2015, 2:45 PM
