CCNA Security Course Overview

Course Structure

The CCNA® Security course provides a next step for individuals who want to enhance their CCNA-level skill set and help meet the growing demand for network security professionals. The curriculum provides an introduction to the core security concepts and skills needed for the installation, troubleshooting, and monitoring of network devices to maintain the integrity, confidentiality, and availability of data and devices. CCNA Security includes the following features:

  • Participants develop an in-depth, theoretical understanding of network security principles as  well as the tools and configurations available.
     
  • The course emphasizes the practical application of skills needed to design, implement, and support network security.
  • Hands-on labs help participants develop critical thinking and complex problem-solving skills.
  • Packet Tracer simulation-based learning activities promote the exploration of networking security concepts and allow participants to experiment with network behavior and ask “what if” questions.
  • Innovative assessments provide immediate feedback to support the evaluation of knowledge and acquired skills.

Course Outline

Table 1. CCNA Security Outline

Chapter CCNA Security
1 Modern Network Security Threats
1.1 Fundamental Principles of a Secure Network
1.2 Worms, Viruses and Trojan Horses
1.3 Attack Methodologies
2 Securing Network Devices
2.1 Securing Device Access and Files
2.2 Privilege Levels and Role-Based CLI
2.3 Monitoring Devices
2.4 Using Automated Features
3 Authentication, Authorization and Accounting (AAA)
3.1 Purpose of AAA
3.2 Configuring Local AAA
3.3 Configure Server-Based AAA
4 Implementing Firewall Technologies
4.1 Access Control Lists
4.2 Firewall Technologies
4.3 Context-Based Access Control
4.4 Zone-Based Policy Firewall
5 Implementing Intrusion Prevention
5.1 IPS Technologies
5.2 Implementing IPS
6 Securing the Local Area Network
6.1 Endpoint Security Considerations
6.2 Layer 2 Security Considerations
6.3 Wireless, VoIP and SAN Security Considerations
6.4 Configuring Switch Security
6.5 SPAN and RSPAN
7 Cryptography
7.1 Cryptographic Services
7.2 Hashes and Digital Signatures
7.3 Symmetric and Asymmetric Encryption
8 Implementing Virtual Private Networks
8.1 VPNs
8.2 IPSec VPN Components and Operation
8.3 Implementing Site-to-Site IPSec VPNs
8.4 Implementing a Remote Access VPN
8.5 Implementing SSL VPNs
9 Managing a Secure Network
9.1 Secure Network Lifecycle
9.2 Self-Defending Network
9.3 Building a Comprehensive Security Policy

Course Goals

  • Explain network threats, mitigation techniques, and the basics of securing a network
  • Secure administrative access on Cisco routers
  • Secure administrative access with AAA
  • Implement firewall technologies to secure the network perimeter
  • Configure IPS to mitigate attacks on the network
  • Describe LAN security considerations and implement endpoint and Layer 2 security features
  • Describe methods for implementing data confidentiality and integrity
  • Implement secure virtual private networks
  • Given the security needs of an enterprise, create and implement a comprehensive security policy
  • Implement firewall technologies using the ASA to secure the network perimeter

For more information about CCNA Programs please visit the Cisco CCNA Security certification