A Quick Glance

  • black-arrow

    Secure Your Network and Devices with Cisco Technologies

  • black-arrow

    Understand Firewall and VPN Technologies

  • black-arrow

    Learn to Detect and Protect Your Network from Intruders

  • black-arrow

    Learn about Advanced network security architecture

The CCNA Security Training delivers the candidates with essential skills to secure Cisco networks. It confirms with the skills required by a delegate to develop a security set-up. This includes recognising risks and exposures to networks, and decrease any security threats. The CCNA Security has the necessary content that familiarizes the candidate with security technologies. The curriculum also helps to maintain data and device integrity, confidentiality, and availability. It also helps the delegates to acquire competency in the technologies Cisco uses in its security structure.

Who should take this course

The target audience for this CCNA Security Training course includes candidates who wish to make a career in network security. They include  support engineers, network security specialists or administrators. This is one of the significant courses in their path to achieving success.

 

More

Prerequisites

The candidates who wish to take this course must fulfill the following criteria:

  • Posses a  CCENT Certification or t possess ICND1  v3.0 Certification.
  • Also, an experience of 2 years is recommended (but not a prerequisite) by Cisco before appearing for the exam.

 This training includes two courses ICND1 and Applying Cisco IOS Networking Security. In case the candidate has already taken the ICND1 certification, they can  continue with  Implementing Cisco IOS Networking Security.

More

What Will You Learn

  • Grow a comprehensive network security policy to counter threats against information security
  • Bootstrap the Cisco ASA Firewall for use in a production network
  • Configure the Cisco ASA Firewall for remote access to a Secure Sockets Layer (SSL) VPN
  • Set up a Cisco IOS zone-based firewall (ZBF) to perform basic security operations on a network
  • Configure site-to-site VPNs using Cisco IOS features
  • Configure security features on IOS switches to mitigate various Layer 2 and Layer 3 attacks
  • Configure routers with Cisco IOS software security features, including administration and reporting functions
  • Typical network security concepts
  • Secure routeing and switching infrastructure
  • Deploy basic authentication, authorization, and accounting services
  • Implement basic firewalling services
  • Implement necessary site-to-site and remote access VPN services
  • Advanced security services such as intrusion protection, content security and identity management
  • How a network can be compromised using freely available tools
  • Implement line passwords, and enable passwords and secrets
  • Examine authentication, authorization, and accounting (AAA) concepts and features using the local database as well as Cisco Secure ACS 5.2
  • Configure packet filtering on the perimeter router
More

What's included

  Course Overview

The candidates lay their basis for doing the CCNA Security Training by choosing for the ICND1 ver 3.0 course. During this course, candidates learn how to install, configure, operate, and confirm a basic IPv4 and IPv6 network. Delegates also learn to  configure a LAN switch, and an IP router. They also learn to  manage network devices, and identifying primary security threats. This course can also be followed or even substituted by CCENT (Cisco Certified Entry Network Technician). The course delivers knowledge and skills necessary to install, configure, and operate  networks. CCENT is the first step toward achieving CCNA certifications that lead to various paths. These paths  enable the delegates to work with medium-size enterprise branch networks with more complex connections.

Exam:

  • Exam Type: Objective
  • Duration: 90 minutes
  • Pass %age: 45
  • Closed or Open Book Exam
More

  Course Content

Secure Cisco routers using the SDM Security Audit feature

  • Use the One-Step Lockdown feature in SDM to secure a Cisco router · Secure administrative access to Cisco routers by setting strong encrypted passwords, exec-timeout, login failure
  • rate and using IOS login enhancements
  • Secure administrative access to Cisco routers by configuring multiple privilege levels
  • Describe the security threats facing modern network infrastructures
  • Describe and list mitigation methods for common network attacks
  • Describe and list mitigation methods for Worm, Virus, and Trojan Horse attacks
  • Describe the Cisco Self Defending Network architecture Secure Cisco routers
  • Secure administrative access to Cisco routers by configuring role-based CLI
    • Secure the Cisco IOS image and configuration file CCNA (SECURITY)

Implement AAA on Cisco routers using local router database and external ACS

  • Explain the functions and importance of AAA
  • Describe the features of TACACS+ and RADIUS AAA protocols
    • Configure AAA authentication
    • Configure AAA authorization
    • Configure AAA accounting

Implement the Cisco IOS IPS feature set using SDM

  • Define network based vs. host-based intrusion detection and prevention
  • Explain IPS technologies, attack responses, and monitoring options
  • Enable and verify Cisco IOS IPS operations using SDM

Implement site-to-site VPNs on Cisco Routers using SDM

  • Explain the different methods used in cryptography
  • Explain IKE protocol functionality and phases
  • Describe the building blocks of IPSec and the security functions it provides
  • Configure and verify an IPSec site-to-site VPN with pre-shared key authentication using SDM

Mitigate threats to Cisco routers and networks using ACLs

  • Explain the functionality of standard, extended, and named IP ACLs used by routers to filter packets
  • Configure and verify IP ACLs to mitigate given threats (filter IP traffic destined for Telnet, SNMP, and DDoS attacks) in a network using CLI
  • Configure IP ACLs to prevent IP address spoofing using CLI
  • Discuss the caveats to be considered when building ACLs

Implement secure network management and reporting

  • Use CLI and SDM to configure SSH on Cisco routers to enable secured management access
  • Use CLI and SDM to configure Cisco routers to send Syslog messages to a Syslog server CCNA Security

Mitigate common Layer 2 attacks

  • Describe how to prevent layer 2 attacks by configuring basic Catalyst switch security features

Implement the Cisco IOS firewall feature set using SDM

  • Describe the operational strengths and weaknesses of the different firewall technologies ·
  • Explain stateful firewall operations and the function of the state table
  • Implement Zone-Based Firewall using SDM
More


CCNA Security Training Enquiry

 

Enquire Now


----- OR -------

Reach us at +44 1344 961530 or info@pentagonit.co.uk for more information.

About Burton Upon Trent

Burton upon Trent is a town on the stream Trent in East Staffordshire. It was having a populance of 72,299 in 2011. Burton is well known for preparing beer. The town previously produced around Burton Abbey. Burton Bridge was also the site of two fights, in 1322 when Edward II overwhelmed the rebel Earl of Lancaster and 1643 when royalists apprehended the town during the First English Civil War. William Lord Paget and his descendants were responsible for dispersal of the manor house within the grounds of abbey and facilitating the delay of the River Trent Navigation to Burton. Burton developed as a busy market town by the early modern period.

Government:

Burton is the managerial centre for the area of East Staffordshire and forms part of the Burton electorate. The local Member of Assembly is the Traditional Party's Andrew Griffiths, who has indicated the Burton electorate since May 2010. The Traditionalists detached the seat from Labor in the 2010 general election with an 8.7% swing.

In 1978 it was combined as a municipal borough. The combined area was divided between the counties of Staffordshire and Derbyshire - the Local Government Act 1888 combined the total of the area in Staffordshire, including the former Derbyshire parishes of Stapenhill and Winshill. It developed a county borough in 1901, having touched the 50,000 population obligatory.

It never significantly exceeded the population of 50,000, and at a population of 50,201 in the 1971 survey was the smallest county area in England after Canterbury. The Local Government Commission for England optional in the 1960s that it be relegated to a non-county borough within Staffordshire, but this was not applied.

Geography:

It is nearly 109 miles north-west of London, approx. 30 miles to northeast of Birmingham, which is  the UK's second largest city and about 23 miles east of the county town Stafford. It is located at the eastern part of the county of Staffordshire; it's an against the course of the River Trent creating part of the county boundary. 

Demography:

The total population of town is  43,784 in the 2001 Survey. Winshill and Stapenhill were treated distinctly and together had a additional population of 21,985. According to the 2001 survey, 71% of the town's population classify themselves as Christian, 12% as a nonbeliever or doubting and 8.5% Muslim. In the 2011 census shows that the population of the town is 72,299.

More