Hover Box Element

Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

CCNA Security

Course Structure

The CCNA® Security course provides a next step for individuals who want to enhance their CCNA-level skill set and help meet the growing demand for network security professionals. The curriculum provides an introduction to the core security concepts and skills needed for the installation, troubleshooting, and monitoring of network devices to maintain the integrity, confidentiality, and availability of data and devices. CCNA Security includes the following features:

Course Outline

Table 1. CCNA Security Outline

Chapter CCNA Security
1 Modern Network Security Threats
1.1 Fundamental Principles of a Secure Network
1.2 Worms, Viruses and Trojan Horses
1.3 Attack Methodologies
2 Securing Network Devices
2.1 Securing Device Access and Files
2.2 Privilege Levels and Role-Based CLI
2.3 Monitoring Devices
2.4 Using Automated Features
3 Authentication, Authorization and Accounting (AAA)
3.1 Purpose of AAA
3.2 Configuring Local AAA
3.3 Configure Server-Based AAA
4 Implementing Firewall Technologies
4.1 Access Control Lists
4.2 Firewall Technologies
4.3 Context-Based Access Control
4.4 Zone-Based Policy Firewall
5 Implementing Intrusion Prevention
5.1 IPS Technologies
5.2 Implementing IPS
6 Securing the Local Area Network
6.1 Endpoint Security Considerations
6.2 Layer 2 Security Considerations
6.3 Wireless, VoIP and SAN Security Considerations
6.4 Configuring Switch Security
6.5 SPAN and RSPAN
7 Cryptography
7.1 Cryptographic Services
7.2 Hashes and Digital Signatures
7.3 Symmetric and Asymmetric Encryption
8 Implementing Virtual Private Networks
8.1 VPNs
8.2 IPSec VPN Components and Operation
8.3 Implementing Site-to-Site IPSec VPNs
8.4 Implementing a Remote Access VPN
8.5 Implementing SSL VPNs
9 Managing a Secure Network
9.1 Secure Network Lifecycle
9.2 Self-Defending Network
9.3 Building a Comprehensive Security Policy

Course Goals

  • Explain network threats, mitigation techniques, and the basics of securing a network
  • Secure administrative access on Cisco routers
  • Secure administrative access with AAA
  • Implement firewall technologies to secure the network perimeter
  • Configure IPS to mitigate attacks on the network
  • Describe LAN security considerations and implement endpoint and Layer 2 security features
  • Describe methods for implementing data confidentiality and integrity
  • Implement secure virtual private networks
  • Given the security needs of an enterprise, create and implement a comprehensive security policy
  • Implement firewall technologies using the ASA to secure the network perimeter

* For more information about CCNA Programs please visit the Cisco CCNA Security certification