The CCNA Security curriculum emphasizes core security technologies, the installation, troubleshooting and monitoring of network devices to maintain integrity, confidentiality and availability of data and devices, and competency in the technologies that Cisco uses in its security structure.

Common Security Threats

  • Describe common security threats

Security and Cisco Routers

  • Implement Security on Cisco routers
  • Describe IPv4 to IPv6 transition

    • Reasons for IPv6
    • Understanding IPv6 addressing
    • Assigning IPv6 addresses
    • Routing considerations for IPv6

    AAA on Cisco Devices

    • Implement authentication, authorization, and accounting (AAA)
    • AAA using CCP on routers
    • AAA using CLI on routers and switches
    • AAA on ASA
    • Describe TACACS+
    • Describe RADIUS

    Describe AAA

    • Authentication
    • Authorization
    • Accounting
    • Verify AAA functionality

    IOS ACLs

    • Describe standard, extended, and named IP IOS ACLs to filter packets

    Describe considerations when building ACLs

    • Sequencing of ACEs
    • Modification of ACEs

    Implement IP ACLs to mitigate threats in a network

    • Filter IP traffic
    • SNMP
    • DDoS attacks
    • CLI
    • CCP
    • IP ACLs to prevent IP spoofing
    • VACLs

    Secure Network Management and Reporting

    • Describe secure network management

    Implement secure network management

    • SSH
    • syslog
    • SNMP
    • NTP
    • SCP
    • CLI
    • CCP
    • SSL

    SiCommon Layer 2 Attacks

    • Describe Layer 2 security using Cisco switches

    Describe VLAN Security

    • Voice VLAN
    • PVLAN
    • VLAN hopping
    • Native VLAN

    Implement VLANs and trunking

    • VLAN definition
    • Grouping functions into VLANs
    • Considering traffic source to destination paths
    • Trunking
    • Native VLAN
    • VLAN trunking protocols
    • Inter-VLAN routing

    Implement Spanning Tree

    • Potential issues with redundant switch topologies
    • STP operations
    • Resolving issues with STP

    Cisco Firewall Technologies

    • Describe operational strengths and weaknesses of the different firewall technologies

    Describe stateful firewalls

    • Operations
    • Function of the state table

    Describe the types of NAT used in firewall technologies

    • Static
    • Dynamic
    • PAT

    Implement Zone Based Firewall using CCP

    • Zone to zone
    • Self zone

    Implement the Cisco Adaptive Security Appliance (ASA)

    • NAT
    • ACL
    • Default MPF
    • Cisco ASA sec level

    Implement NAT and PAT

    Cisco IPS

    • Describe IPS deployment considerations
    • Describe IPS technologies
    • Configure Cisco IOS IPS using CCP

    VPN Technologies

    • Describe the different methods used in cryptography
    • Describe VPN technologies
    • Describe the building blocks of IPSec
    • Implement an IOS IPSec site-to-site VPN with pre-shared key authentication
    • Implement SSL VPN using ASA device manager
    COMMENCING NEW BATCHES
    ENQUIRY FORM
    FOLLOW US ON
    SUBSCRIBE TO OUR NEWSLETTER

    WE ACCEPT ONLINE PAYMENTS
    PAY ONLINE