A Quick Glance

  • black-arrow

    Secure Your Network and Devices with Cisco Technologies

  • black-arrow

    Understand Firewall and VPN Technologies

  • black-arrow

    Learn to Detect and Protect Your Network from Intruders

  • black-arrow

    Learn about Advanced network security architecture

The CCNA Security Training delivers the candidates with essential skills to secure Cisco networks. It confirms with the skills required by a delegate to develop a security set-up. This includes recognising risks and exposures to networks, and decrease any security threats. The CCNA Security has the necessary content that familiarizes the candidate with security technologies. The curriculum also helps to maintain data and device integrity, confidentiality, and availability. It also helps the delegates to acquire competency in the technologies Cisco uses in its security structure.

Who should take this course

The target audience for this CCNA Security Training course includes candidates who wish to make a career in network security. They include  support engineers, network security specialists or administrators. This is one of the significant courses in their path to achieving success.

 

More

Prerequisites

The candidates who wish to take this course must fulfill the following criteria:

  • Posses a  CCENT Certification or t possess ICND1  v3.0 Certification.
  • Also, an experience of 2 years is recommended (but not a prerequisite) by Cisco before appearing for the exam.

 This training includes two courses ICND1 and Applying Cisco IOS Networking Security. In case the candidate has already taken the ICND1 certification, they can  continue with  Implementing Cisco IOS Networking Security.

More

What Will You Learn

  • Grow a comprehensive network security policy to counter threats against information security
  • Bootstrap the Cisco ASA Firewall for use in a production network
  • Configure the Cisco ASA Firewall for remote access to a Secure Sockets Layer (SSL) VPN
  • Set up a Cisco IOS zone-based firewall (ZBF) to perform basic security operations on a network
  • Configure site-to-site VPNs using Cisco IOS features
  • Configure security features on IOS switches to mitigate various Layer 2 and Layer 3 attacks
  • Configure routers with Cisco IOS software security features, including administration and reporting functions
  • Typical network security concepts
  • Secure routeing and switching infrastructure
  • Deploy basic authentication, authorization, and accounting services
  • Implement basic firewalling services
  • Implement necessary site-to-site and remote access VPN services
  • Advanced security services such as intrusion protection, content security and identity management
  • How a network can be compromised using freely available tools
  • Implement line passwords, and enable passwords and secrets
  • Examine authentication, authorization, and accounting (AAA) concepts and features using the local database as well as Cisco Secure ACS 5.2
  • Configure packet filtering on the perimeter router
More

What's included

  Course Overview

The candidates lay their basis for doing the CCNA Security Training by choosing for the ICND1 ver 3.0 course. During this course, candidates learn how to install, configure, operate, and confirm a basic IPv4 and IPv6 network. Delegates also learn to  configure a LAN switch, and an IP router. They also learn to  manage network devices, and identifying primary security threats. This course can also be followed or even substituted by CCENT (Cisco Certified Entry Network Technician). The course delivers knowledge and skills necessary to install, configure, and operate  networks. CCENT is the first step toward achieving CCNA certifications that lead to various paths. These paths  enable the delegates to work with medium-size enterprise branch networks with more complex connections.

Exam:

  • Exam Type: Objective
  • Duration: 90 minutes
  • Pass %age: 45
  • Closed or Open Book Exam
More

  Course Content

Secure Cisco routers using the SDM Security Audit feature

  • Use the One-Step Lockdown feature in SDM to secure a Cisco router · Secure administrative access to Cisco routers by setting strong encrypted passwords, exec-timeout, login failure
  • rate and using IOS login enhancements
  • Secure administrative access to Cisco routers by configuring multiple privilege levels
  • Describe the security threats facing modern network infrastructures
  • Describe and list mitigation methods for common network attacks
  • Describe and list mitigation methods for Worm, Virus, and Trojan Horse attacks
  • Describe the Cisco Self Defending Network architecture Secure Cisco routers
  • Secure administrative access to Cisco routers by configuring role-based CLI
    • Secure the Cisco IOS image and configuration file CCNA (SECURITY)

Implement AAA on Cisco routers using local router database and external ACS

  • Explain the functions and importance of AAA
  • Describe the features of TACACS+ and RADIUS AAA protocols
    • Configure AAA authentication
    • Configure AAA authorization
    • Configure AAA accounting

Implement the Cisco IOS IPS feature set using SDM

  • Define network based vs. host-based intrusion detection and prevention
  • Explain IPS technologies, attack responses, and monitoring options
  • Enable and verify Cisco IOS IPS operations using SDM

Implement site-to-site VPNs on Cisco Routers using SDM

  • Explain the different methods used in cryptography
  • Explain IKE protocol functionality and phases
  • Describe the building blocks of IPSec and the security functions it provides
  • Configure and verify an IPSec site-to-site VPN with pre-shared key authentication using SDM

Mitigate threats to Cisco routers and networks using ACLs

  • Explain the functionality of standard, extended, and named IP ACLs used by routers to filter packets
  • Configure and verify IP ACLs to mitigate given threats (filter IP traffic destined for Telnet, SNMP, and DDoS attacks) in a network using CLI
  • Configure IP ACLs to prevent IP address spoofing using CLI
  • Discuss the caveats to be considered when building ACLs

Implement secure network management and reporting

  • Use CLI and SDM to configure SSH on Cisco routers to enable secured management access
  • Use CLI and SDM to configure Cisco routers to send Syslog messages to a Syslog server CCNA Security

Mitigate common Layer 2 attacks

  • Describe how to prevent layer 2 attacks by configuring basic Catalyst switch security features

Implement the Cisco IOS firewall feature set using SDM

  • Describe the operational strengths and weaknesses of the different firewall technologies ·
  • Explain stateful firewall operations and the function of the state table
  • Implement Zone-Based Firewall using SDM
More


CCNA Security Training Enquiry

 

Enquire Now


----- OR -------

Reach us at +44 1344 961530 or info@pentagonit.co.uk for more information.

About Warwick

Warwick is the region urban of Warwickshire, England. The town dishonesties upon the River Avon, 11 miles (18 km) south of Coventry and fair west of Lamington Spa and Whitnash with which it is touched. At the 2011 United Kingdom review, it had a populace of 31,345.

There was human action at Warwick as early as the Neolithic period, and continuous occupancy since the 6th century. It was a Saxon burh in the 9th century, Warwick Castle was recognised in 1068 as part of the Norman conquest of England. Warwick School rights to be the eldest boys' school in the country. The earldom of Warwick was formed in 1088, and the early restrained the town in the feudal period and constructed city walls, of which Eastgate and Westgate endure. The castle industrial into a stone stronghold and then a country house and is today a general tourist attraction.

Governance:

Population growth has led to Warwick flattering combined to its larger neighbouring town Lamington Spa with which its procedures a small city. The two cities are now along with Kenilworth and Whitnash. These are managed as part of Warwick District. Warwickshire County Council leftovers based in Warwick itself.

Warwick is signified in Parliament as part of the Warwick and Leamington electorate. It has been detained by the Conservative Party since the 2010 general election; since then, Chris White has been the constituency's Member of Assembly. From the 1945 general election until 1997 the electorate elected a Traditional MP. In 1997 a Labour MP was chosen and retained the seat until 2010 when White was chosen.

 

Geography:

Antiquarian William Dugdale wrote in the 17th century that Warwick was stand up upon a rocky climb from every side, and in a dry and fertile soil, consuming rich and pleasant fields on the south part and woodland on the north. Two issues have pretentious Warwick's constructed environment: the Great Fire of 1694 and the lack of industrialisation. The fire demolished much of the town, and the next transformation was mainly in one style. In the 19th century, when other cities were fast rising during the Industrial Rebellion, Warwick did not know the same development. Part of the reason Warwick did not grow as a centre of the industry was that the town did not lie on significant roads and the River Avon was not manoeuvrable as far as Warwick.

Culture:

Warwick crowds annual centenaries reaching from the Spoken Word to Classical and Modern Music to a Folk Festival and a Victorian Evening, detained in late November or early December. St. Mary's Church crowds a series of Early Music performances, and the Bridge House Theatre hosts the Music-in-Round performances. Warwick Chamber of Trade assistances to endorse the town for companies, inhabitants and traders. The city is also well-known for Warwick Castle, the building of which instigated in 1068. The city centre is also recognised for its significant building and covers a combination of Tudor and 17th-century buildings. In topical years several high-profile national and international businesses have set up large office developments in and around Warwick, notably National Grid plc. And IBM.

More