A Quick Glance

  • black-arrow

    Secure Your Network and Devices with Cisco Technologies

  • black-arrow

    Understand Firewall and VPN Technologies

  • black-arrow

    Learn to Detect and Protect Your Network from Intruders

  • black-arrow

    Learn about Advanced network security architecture

The CCNA Security Training delivers the candidates with essential skills to secure Cisco networks. It confirms with the skills required by a delegate to develop a security set-up. This includes recognising risks and exposures to networks, and decrease any security threats. The CCNA Security has the necessary content that familiarizes the candidate with security technologies. The curriculum also helps to maintain data and device integrity, confidentiality, and availability. It also helps the delegates to acquire competency in the technologies Cisco uses in its security structure.

Who should take this course

The target audience for this CCNA Security Training course includes candidates who wish to make a career in network security. They include  support engineers, network security specialists or administrators. This is one of the significant courses in their path to achieving success.

 

More

Prerequisites

The candidates who wish to take this course must fulfill the following criteria:

  • Posses a  CCENT Certification or t possess ICND1  v3.0 Certification.
  • Also, an experience of 2 years is recommended (but not a prerequisite) by Cisco before appearing for the exam.

 This training includes two courses ICND1 and Applying Cisco IOS Networking Security. In case the candidate has already taken the ICND1 certification, they can  continue with  Implementing Cisco IOS Networking Security.

More

What Will You Learn

  • Grow a comprehensive network security policy to counter threats against information security
  • Bootstrap the Cisco ASA Firewall for use in a production network
  • Configure the Cisco ASA Firewall for remote access to a Secure Sockets Layer (SSL) VPN
  • Set up a Cisco IOS zone-based firewall (ZBF) to perform basic security operations on a network
  • Configure site-to-site VPNs using Cisco IOS features
  • Configure security features on IOS switches to mitigate various Layer 2 and Layer 3 attacks
  • Configure routers with Cisco IOS software security features, including administration and reporting functions
  • Typical network security concepts
  • Secure routeing and switching infrastructure
  • Deploy basic authentication, authorization, and accounting services
  • Implement basic firewalling services
  • Implement necessary site-to-site and remote access VPN services
  • Advanced security services such as intrusion protection, content security and identity management
  • How a network can be compromised using freely available tools
  • Implement line passwords, and enable passwords and secrets
  • Examine authentication, authorization, and accounting (AAA) concepts and features using the local database as well as Cisco Secure ACS 5.2
  • Configure packet filtering on the perimeter router
More

What's included

  Course Overview

The candidates lay their basis for doing the CCNA Security Training by choosing for the ICND1 ver 3.0 course. During this course, candidates learn how to install, configure, operate, and confirm a basic IPv4 and IPv6 network. Delegates also learn to  configure a LAN switch, and an IP router. They also learn to  manage network devices, and identifying primary security threats. This course can also be followed or even substituted by CCENT (Cisco Certified Entry Network Technician). The course delivers knowledge and skills necessary to install, configure, and operate  networks. CCENT is the first step toward achieving CCNA certifications that lead to various paths. These paths  enable the delegates to work with medium-size enterprise branch networks with more complex connections.

Exam:

  • Exam Type: Objective
  • Duration: 90 minutes
  • Pass %age: 45
  • Closed or Open Book Exam
More

  Course Content

Secure Cisco routers using the SDM Security Audit feature

  • Use the One-Step Lockdown feature in SDM to secure a Cisco router · Secure administrative access to Cisco routers by setting strong encrypted passwords, exec-timeout, login failure
  • rate and using IOS login enhancements
  • Secure administrative access to Cisco routers by configuring multiple privilege levels
  • Describe the security threats facing modern network infrastructures
  • Describe and list mitigation methods for common network attacks
  • Describe and list mitigation methods for Worm, Virus, and Trojan Horse attacks
  • Describe the Cisco Self Defending Network architecture Secure Cisco routers
  • Secure administrative access to Cisco routers by configuring role-based CLI
    • Secure the Cisco IOS image and configuration file CCNA (SECURITY)

Implement AAA on Cisco routers using local router database and external ACS

  • Explain the functions and importance of AAA
  • Describe the features of TACACS+ and RADIUS AAA protocols
    • Configure AAA authentication
    • Configure AAA authorization
    • Configure AAA accounting

Implement the Cisco IOS IPS feature set using SDM

  • Define network based vs. host-based intrusion detection and prevention
  • Explain IPS technologies, attack responses, and monitoring options
  • Enable and verify Cisco IOS IPS operations using SDM

Implement site-to-site VPNs on Cisco Routers using SDM

  • Explain the different methods used in cryptography
  • Explain IKE protocol functionality and phases
  • Describe the building blocks of IPSec and the security functions it provides
  • Configure and verify an IPSec site-to-site VPN with pre-shared key authentication using SDM

Mitigate threats to Cisco routers and networks using ACLs

  • Explain the functionality of standard, extended, and named IP ACLs used by routers to filter packets
  • Configure and verify IP ACLs to mitigate given threats (filter IP traffic destined for Telnet, SNMP, and DDoS attacks) in a network using CLI
  • Configure IP ACLs to prevent IP address spoofing using CLI
  • Discuss the caveats to be considered when building ACLs

Implement secure network management and reporting

  • Use CLI and SDM to configure SSH on Cisco routers to enable secured management access
  • Use CLI and SDM to configure Cisco routers to send Syslog messages to a Syslog server CCNA Security

Mitigate common Layer 2 attacks

  • Describe how to prevent layer 2 attacks by configuring basic Catalyst switch security features

Implement the Cisco IOS firewall feature set using SDM

  • Describe the operational strengths and weaknesses of the different firewall technologies ·
  • Explain stateful firewall operations and the function of the state table
  • Implement Zone-Based Firewall using SDM
More


CCNA Security Training Enquiry

 

Enquire Now


----- OR -------

Reach us at +44 1344 961530 or info@pentagonit.co.uk for more information.

About Heathrow

Heathrow

Heathrow is a major international airport located in London, United Kingdom. It is the third busiest airport in the world after Dubai and Hong Kong International. It is also the busiest airport in Europe by passenger traffic. It is the sixth busiest airport in the world due to the total passenger traffic. It handled around 75.7 million passengers in 2016.

Heathrow is located 23 km west of Central London. It has two parallel east-west runways along with four operation terminals that cover 12.27 sq km. Heathrow Airport Holdings own and operate this airport. Heathrow Airport Holdings is itself owned by FGP Topco Limited which is an international consortium.  FGP Topco Limited also includes Qatar Holding LLC, Government of Singapore Investment Corporation, China Investment Corporation and Universities Superannuation Scheme (USS). For Virgin Atlantic and British Airways, Heathrow is a primary operating base.

In 2012 September, UK government created Airports Commission which is an independent commission headed by Sir Howard Davies. It examines options for enhancing the capacity of UK airports. In 2015 July, Commission backed the third runway at Heathrow, and the government approved it in October 2016 as the third track.

History

Even after the success of Terminal 5 designed by Richard Rogers, it seemed that airport is losing its lustre. Flyers looked at regular building work because Heathrow operated at full capacity. Just a small problem was enough to seize whole Heathrow machine. Airport suffered indignity because they were not able to remove snow off runways and it halted.

Later terminals one and two being replaced with Swish New Hub for five airlines of Star Alliance. Heathrow is still a major airport in the world with 180 routes. Than any other British Airport, Heathrow has many more exciting destinations. Heathrow Airport offers a journey to incredible lands and also reuniting long lost loved ones with their loved ones. Heathrow will forever be an icon of modernity. Heathrow also shows modern Britain’s successes and failures.

Other facilities

Head office of Heathrow Airport is located in Compass Centre established by Heathrow’s Northern Runway. World Business Centre Heathrow comprises of two buildings; one is World Business Centre Houses, Heathrow Airport and Scandinavian Airlines. The head office of British Airways was located in Heathrow Airport at Speedbird House. In the North of the airfield, Northern Perimeter Road is present. Along with it, Heathrow’s Car rental agencies are located and also a bath road that runs parallel to it but outside the campus of the airport. It is given the nickname ‘ The Strip’ by local due to its continuous line of airport hotels.

More