CCNA Security Training

Cisco Certified Network Associate (Security) – CCNA Security Training

Cisco Certified Network Associate Security (CCNA® Security) validates associate-level knowledge and skills required to secure Cisco networks. With a CCNA Security certification, a network professional demonstrates the skills required to develop a security infrastructure, recognize threats and vulnerabilities to networks, and mitigate security threats. The CCNA Security curriculum emphasizes core security technologies, the installation, troubleshooting and monitoring of network devices to maintain integrity, confidentiality and availability of data and devices, and competency in the technologies that Cisco uses in its security structure.

Students completing the recommended Cisco training will gain an introduction to security technologies as well as how to develop security policies and mitigate risks. IT organizations that employ CCNA Security-holders will have IT staff that can develop a security infrastructure, recognize threats and vulnerabilities to networks, and mitigate security threats.

CCNA Security Syllabus:

Fundamentals of Security

Introduction to CIA

Goals of Security

Profiles of Attackers

Types of Attackers

Typical Threats/Attacks

Security Device Manager (SDM)

Introduction to SDM

Prerequisites of SDM

Configuring SDM

Troubleshooting SDM

Cisco Device Security

Configuring SSH server

Configuring Syslog Server

Configuring NTP server

Role based access

AAA ( Authentication, Authorization & Accounting)

Understanding AAA Framework

Implement AAA on Cisco routers using

Understanding TACACS+

Configuring TACACS+

Configuring Cisco Secure ACS

CISCO Router Based Firewalls

Classic IOS Firewall

Drawbacks of CBAC

CBAC Configuration

Configuring Zone Based Firewalls

Implement the Cisco IOS firewall feature set using SDM

Access control Lists

Access-List Basics

Exploring Access-Lists

Applying standard Access /lists

Extended ACL configuration

Intrusion Detection & Prevention

IDS/IPS Fundamentals

Threat Detection Techniques

Configuring IOS based IPS

Virtual Private Network

Introduction to VPN

Types of VPNs

Internet Key Exchange

IPSEC Fundamentals

Configuring Router based Remote Access VPN

Configuring Site-to-site VPN

Hardening Router

Running Vulnerability assessment of a router

Auditing cisco router using SDM

Configuring one step Lockdown

Implement secure network management and reporting

Switch Security

VLAN Attack and Defense

Spoofing Attacks

MAC Flooding/CAM Overflow

STP Attack and Defense

Configuring BPDU Guard

Configuring Root Guard

Overview of Storm control

Configuring Storm control

Download Soft Copy Request Course Details