CCNA Security Course Overview
The CCNA® Security course provides a next step for individuals who want to enhance their CCNA-level skill set and help meet the growing demand for network security professionals. The curriculum provides an introduction to the core security concepts and skills needed for the installation, troubleshooting, and monitoring of network devices to maintain the integrity, confidentiality, and availability of data and devices. CCNA Security includes the following features:
Participants develop an in-depth, theoretical understanding of network security principles as well as the tools and configurations available.
The course emphasizes the practical application of skills needed to design, implement, and support network security.
Hands-on labs help participants develop critical thinking and complex problem-solving skills.
Packet Tracer simulation-based learning activities promote the exploration of networking security concepts and allow participants to experiment with network behavior and ask “what if” questions.
Innovative assessments provide immediate feedback to support the evaluation of knowledge and acquired skills.
Table 1. CCNA Security Outline
|1||Modern Network Security Threats|
|1.1||Fundamental Principles of a Secure Network|
|1.2||Worms, Viruses and Trojan Horses|
|2||Securing Network Devices|
|2.1||Securing Device Access and Files|
|2.2||Privilege Levels and Role-Based CLI|
|2.4||Using Automated Features|
|3||Authentication, Authorization and Accounting (AAA)|
|3.1||Purpose of AAA|
|3.2||Configuring Local AAA|
|3.3||Configure Server-Based AAA|
|4||Implementing Firewall Technologies|
|4.1||Access Control Lists|
|4.3||Context-Based Access Control|
|4.4||Zone-Based Policy Firewall|
|5||Implementing Intrusion Prevention|
|6||Securing the Local Area Network|
|6.1||Endpoint Security Considerations|
|6.2||Layer 2 Security Considerations|
|6.3||Wireless, VoIP and SAN Security Considerations|
|6.4||Configuring Switch Security|
|6.5||SPAN and RSPAN|
|7.2||Hashes and Digital Signatures|
|7.3||Symmetric and Asymmetric Encryption|
|8||Implementing Virtual Private Networks|
|8.2||IPSec VPN Components and Operation|
|8.3||Implementing Site-to-Site IPSec VPNs|
|8.4||Implementing a Remote Access VPN|
|8.5||Implementing SSL VPNs|
|9||Managing a Secure Network|
|9.1||Secure Network Lifecycle|
|9.3||Building a Comprehensive Security Policy|
- Explain network threats, mitigation techniques, and the basics of securing a network
- Secure administrative access on Cisco routers
- Secure administrative access with AAA
- Implement firewall technologies to secure the network perimeter
- Configure IPS to mitigate attacks on the network
- Describe LAN security considerations and implement endpoint and Layer 2 security features
- Describe methods for implementing data confidentiality and integrity
- Implement secure virtual private networks
- Given the security needs of an enterprise, create and implement a comprehensive security policy
- Implement firewall technologies using the ASA to secure the network perimeter
* For more information about CCNA Programs please visit the Cisco CCNA Security certification
Cancellations and Substitutions
- Refunds for cancellations made within three weeks of the course start date will be issued, less a $100 cancellation fee. No refunds will be issued after that time.
- If you cannot attend but would like your registration fee applied to a future offering of this course, please contact firstname.lastname@example.org. A $75 administrative fee will apply.
- If you cannot attend but would like to transfer your registration to someone else, please contact email@example.com. A $25 administrative fee will apply.