A Quick Glance

  • black-arrow

    Secure Your Network and Devices with Cisco Technologies

  • black-arrow

    Understand Firewall and VPN Technologies

  • black-arrow

    Learn to Detect and Protect Your Network from Intruders

  • black-arrow

    Learn about Advanced network security architecture

The CCNA Security Training delivers the candidates with essential skills to secure Cisco networks. It confirms with the skills required by a delegate to develop a security set-up. This includes recognising risks and exposures to networks, and decrease any security threats. The CCNA Security has the necessary content that familiarizes the candidate with security technologies. The curriculum also helps to maintain data and device integrity, confidentiality, and availability. It also helps the delegates to acquire competency in the technologies Cisco uses in its security structure.

Who should take this course

The target audience for this CCNA Security Training course includes candidates who wish to make a career in network security. They include  support engineers, network security specialists or administrators. This is one of the significant courses in their path to achieving success.

 

More

Prerequisites

The candidates who wish to take this course must fulfill the following criteria:

  • Posses a  CCENT Certification or t possess ICND1  v3.0 Certification.
  • Also, an experience of 2 years is recommended (but not a prerequisite) by Cisco before appearing for the exam.

 This training includes two courses ICND1 and Applying Cisco IOS Networking Security. In case the candidate has already taken the ICND1 certification, they can  continue with  Implementing Cisco IOS Networking Security.

More

What Will You Learn

  • Grow a comprehensive network security policy to counter threats against information security
  • Bootstrap the Cisco ASA Firewall for use in a production network
  • Configure the Cisco ASA Firewall for remote access to a Secure Sockets Layer (SSL) VPN
  • Set up a Cisco IOS zone-based firewall (ZBF) to perform basic security operations on a network
  • Configure site-to-site VPNs using Cisco IOS features
  • Configure security features on IOS switches to mitigate various Layer 2 and Layer 3 attacks
  • Configure routers with Cisco IOS software security features, including administration and reporting functions
  • Typical network security concepts
  • Secure routeing and switching infrastructure
  • Deploy basic authentication, authorization, and accounting services
  • Implement basic firewalling services
  • Implement necessary site-to-site and remote access VPN services
  • Advanced security services such as intrusion protection, content security and identity management
  • How a network can be compromised using freely available tools
  • Implement line passwords, and enable passwords and secrets
  • Examine authentication, authorization, and accounting (AAA) concepts and features using the local database as well as Cisco Secure ACS 5.2
  • Configure packet filtering on the perimeter router
More

What's included

  Course Overview

The candidates lay their basis for doing the CCNA Security Training by choosing for the ICND1 ver 3.0 course. During this course, candidates learn how to install, configure, operate, and confirm a basic IPv4 and IPv6 network. Delegates also learn to  configure a LAN switch, and an IP router. They also learn to  manage network devices, and identifying primary security threats. This course can also be followed or even substituted by CCENT (Cisco Certified Entry Network Technician). The course delivers knowledge and skills necessary to install, configure, and operate  networks. CCENT is the first step toward achieving CCNA certifications that lead to various paths. These paths  enable the delegates to work with medium-size enterprise branch networks with more complex connections.

Exam:

  • Exam Type: Objective
  • Duration: 90 minutes
  • Pass %age: 45
  • Closed or Open Book Exam
More

  Course Content

Secure Cisco routers using the SDM Security Audit feature

  • Use the One-Step Lockdown feature in SDM to secure a Cisco router · Secure administrative access to Cisco routers by setting strong encrypted passwords, exec-timeout, login failure
  • rate and using IOS login enhancements
  • Secure administrative access to Cisco routers by configuring multiple privilege levels
  • Describe the security threats facing modern network infrastructures
  • Describe and list mitigation methods for common network attacks
  • Describe and list mitigation methods for Worm, Virus, and Trojan Horse attacks
  • Describe the Cisco Self Defending Network architecture Secure Cisco routers
  • Secure administrative access to Cisco routers by configuring role-based CLI
    • Secure the Cisco IOS image and configuration file CCNA (SECURITY)

Implement AAA on Cisco routers using local router database and external ACS

  • Explain the functions and importance of AAA
  • Describe the features of TACACS+ and RADIUS AAA protocols
    • Configure AAA authentication
    • Configure AAA authorization
    • Configure AAA accounting

Implement the Cisco IOS IPS feature set using SDM

  • Define network based vs. host-based intrusion detection and prevention
  • Explain IPS technologies, attack responses, and monitoring options
  • Enable and verify Cisco IOS IPS operations using SDM

Implement site-to-site VPNs on Cisco Routers using SDM

  • Explain the different methods used in cryptography
  • Explain IKE protocol functionality and phases
  • Describe the building blocks of IPSec and the security functions it provides
  • Configure and verify an IPSec site-to-site VPN with pre-shared key authentication using SDM

Mitigate threats to Cisco routers and networks using ACLs

  • Explain the functionality of standard, extended, and named IP ACLs used by routers to filter packets
  • Configure and verify IP ACLs to mitigate given threats (filter IP traffic destined for Telnet, SNMP, and DDoS attacks) in a network using CLI
  • Configure IP ACLs to prevent IP address spoofing using CLI
  • Discuss the caveats to be considered when building ACLs

Implement secure network management and reporting

  • Use CLI and SDM to configure SSH on Cisco routers to enable secured management access
  • Use CLI and SDM to configure Cisco routers to send Syslog messages to a Syslog server CCNA Security

Mitigate common Layer 2 attacks

  • Describe how to prevent layer 2 attacks by configuring basic Catalyst switch security features

Implement the Cisco IOS firewall feature set using SDM

  • Describe the operational strengths and weaknesses of the different firewall technologies ·
  • Explain stateful firewall operations and the function of the state table
  • Implement Zone-Based Firewall using SDM
More


CCNA Security Training Enquiry

 

Enquire Now


----- OR -------

Reach us at +44 1344 961530 or info@pentagonit.co.uk for more information.

About Teesside

Teesside is the name given to the group of towns in the northeast part of England around the urban centre of Middlesbrough that is also made up of the towns of  Stockton-on-Tees,  Billingham, Redcar, Thornaby and surrounding settlements near the River Tees. Local government district also having same name between 1968 to 1974 the County Borough of Teesside.

Teesside is still an vital centre for heavy industry, also the number of people employed has dropped. Traditional industries, primarily steelmaking (British Steel) and chemical manufacture (Imperial Chemical Industries (ICI)), have been replaced to a large extent by science development high technology activities, and service sector roles.

Local government                 

The County Borough of Teesside was absorbed into the larger non-metropolitan county of Cleveland along with the towns of Guisborough and Hartlepool  in 1979. The Teesside region was divided between the boroughs of  Middlesbrough, Langbaurgh,  and Stockton-on-Tees, with the wards of Billingham East & West, Stockton South, North End, Hartburn, Mile House, Norton, Grangefield,  Ormesby, Thornaby East & West going to Stockton, the wards of Coatham, Eston Grange, Kirkleatham, Redcar and South Bank going to Langbaurgh and the rest going to Middlesbrough.

The River Tees and Teesport           

Teesport is based on the River Tees and is currently the UK’s third largest port, and also it is included in the ten biggest ports of Western Europe. This port can handle over 56 million tonnes of goods annually which are linked with the chemical, steel processing industries and local petrochemical. The port is an vital part of logistical infrastructure for the NEPIC cluster of companies.

More