A Quick Glance

  • black-arrow

    Secure Your Network and Devices with Cisco Technologies

  • black-arrow

    Understand Firewall and VPN Technologies

  • black-arrow

    Learn to Detect and Protect Your Network from Intruders

  • black-arrow

    Learn about Advanced network security architecture

The CCNA Security Training delivers the candidates with essential skills to secure Cisco networks. It confirms with the skills required by a delegate to develop a security set-up. This includes recognising risks and exposures to networks, and decrease any security threats. The CCNA Security has the necessary content that familiarizes the candidate with security technologies. The curriculum also helps to maintain data and device integrity, confidentiality, and availability. It also helps the delegates to acquire competency in the technologies Cisco uses in its security structure.

Who should take this course

The target audience for this CCNA Security Training course includes candidates who wish to make a career in network security. They include  support engineers, network security specialists or administrators. This is one of the significant courses in their path to achieving success.

 

More

Prerequisites

The candidates who wish to take this course must fulfill the following criteria:

  • Posses a  CCENT Certification or t possess ICND1  v3.0 Certification.
  • Also, an experience of 2 years is recommended (but not a prerequisite) by Cisco before appearing for the exam.

 This training includes two courses ICND1 and Applying Cisco IOS Networking Security. In case the candidate has already taken the ICND1 certification, they can  continue with  Implementing Cisco IOS Networking Security.

More

What Will You Learn

  • Grow a comprehensive network security policy to counter threats against information security
  • Bootstrap the Cisco ASA Firewall for use in a production network
  • Configure the Cisco ASA Firewall for remote access to a Secure Sockets Layer (SSL) VPN
  • Set up a Cisco IOS zone-based firewall (ZBF) to perform basic security operations on a network
  • Configure site-to-site VPNs using Cisco IOS features
  • Configure security features on IOS switches to mitigate various Layer 2 and Layer 3 attacks
  • Configure routers with Cisco IOS software security features, including administration and reporting functions
  • Typical network security concepts
  • Secure routeing and switching infrastructure
  • Deploy basic authentication, authorization, and accounting services
  • Implement basic firewalling services
  • Implement necessary site-to-site and remote access VPN services
  • Advanced security services such as intrusion protection, content security and identity management
  • How a network can be compromised using freely available tools
  • Implement line passwords, and enable passwords and secrets
  • Examine authentication, authorization, and accounting (AAA) concepts and features using the local database as well as Cisco Secure ACS 5.2
  • Configure packet filtering on the perimeter router
More

What's included

  Course Overview

The candidates lay their basis for doing the CCNA Security Training by choosing for the ICND1 ver 3.0 course. During this course, candidates learn how to install, configure, operate, and confirm a basic IPv4 and IPv6 network. Delegates also learn to  configure a LAN switch, and an IP router. They also learn to  manage network devices, and identifying primary security threats. This course can also be followed or even substituted by CCENT (Cisco Certified Entry Network Technician). The course delivers knowledge and skills necessary to install, configure, and operate  networks. CCENT is the first step toward achieving CCNA certifications that lead to various paths. These paths  enable the delegates to work with medium-size enterprise branch networks with more complex connections.

Exam:

  • Exam Type: Objective
  • Duration: 90 minutes
  • Pass %age: 45
  • Closed or Open Book Exam
More

  Course Content

Secure Cisco routers using the SDM Security Audit feature

  • Use the One-Step Lockdown feature in SDM to secure a Cisco router · Secure administrative access to Cisco routers by setting strong encrypted passwords, exec-timeout, login failure
  • rate and using IOS login enhancements
  • Secure administrative access to Cisco routers by configuring multiple privilege levels
  • Describe the security threats facing modern network infrastructures
  • Describe and list mitigation methods for common network attacks
  • Describe and list mitigation methods for Worm, Virus, and Trojan Horse attacks
  • Describe the Cisco Self Defending Network architecture Secure Cisco routers
  • Secure administrative access to Cisco routers by configuring role-based CLI
    • Secure the Cisco IOS image and configuration file CCNA (SECURITY)

Implement AAA on Cisco routers using local router database and external ACS

  • Explain the functions and importance of AAA
  • Describe the features of TACACS+ and RADIUS AAA protocols
    • Configure AAA authentication
    • Configure AAA authorization
    • Configure AAA accounting

Implement the Cisco IOS IPS feature set using SDM

  • Define network based vs. host-based intrusion detection and prevention
  • Explain IPS technologies, attack responses, and monitoring options
  • Enable and verify Cisco IOS IPS operations using SDM

Implement site-to-site VPNs on Cisco Routers using SDM

  • Explain the different methods used in cryptography
  • Explain IKE protocol functionality and phases
  • Describe the building blocks of IPSec and the security functions it provides
  • Configure and verify an IPSec site-to-site VPN with pre-shared key authentication using SDM

Mitigate threats to Cisco routers and networks using ACLs

  • Explain the functionality of standard, extended, and named IP ACLs used by routers to filter packets
  • Configure and verify IP ACLs to mitigate given threats (filter IP traffic destined for Telnet, SNMP, and DDoS attacks) in a network using CLI
  • Configure IP ACLs to prevent IP address spoofing using CLI
  • Discuss the caveats to be considered when building ACLs

Implement secure network management and reporting

  • Use CLI and SDM to configure SSH on Cisco routers to enable secured management access
  • Use CLI and SDM to configure Cisco routers to send Syslog messages to a Syslog server CCNA Security

Mitigate common Layer 2 attacks

  • Describe how to prevent layer 2 attacks by configuring basic Catalyst switch security features

Implement the Cisco IOS firewall feature set using SDM

  • Describe the operational strengths and weaknesses of the different firewall technologies ·
  • Explain stateful firewall operations and the function of the state table
  • Implement Zone-Based Firewall using SDM
More


CCNA Security Training Enquiry

 

Enquire Now


----- OR -------

Reach us at +44 1344 961530 or info@pentagonit.co.uk for more information.

About Worcester

Worcester is one the main city in Worcestershire, United Kingdom, which is 31 miles (approx 50 km) south-west of Birmingham and 27 miles (approx 43 km) north of Gloucester. The population of Worcester is 100,000 approximately. The River Severn at the city’s western part, which is ignored by the Worcester Cathedral in 12th-century .

The well-known Battle of Worcester was the concluding battle of the English Civil War, In which army of Oliver defeated King Charles I's Cavaliers. It is known as the home of Royal Worcester Porcelain, composer Edward Elgar, Lea & Perrins, the University of Worcester and makers of traditional Worcestershire sauce.

History of Worcester

The trade route past of this city which at final stage formed as part of the Roman Ryknild Street from the times of Neolithic. The position commanded a ford over the River Severn  and was fortified by the Britons in 400 BC. 

Geography

Famous suburbs in Worcester are Blackpole, Barbourne Cherry Orchard, Claines,  Ronkswood, Red Hill, St Peter the Great, Warndon, Tolladine, Northwick, Diglis,  and Warndon Villages (which was main housing development in UK when this area was being built in the late 1980s and get completed in the very early 1990s).

Economy

The city of Worcester, situated on River Severn and with transport links to Birmingham and other different parts of the Midlands through the vast canal network, became a significant centre for many light industries. The last part Victorian period had witnessed the growth of iron founders, like  Hardy & Padmore, McKenzie & Holland and Heenan & Froude.

Glove industry

Glove making was one of the flourishing industries of Worcester. Worcester's Gloves industry peaked from 1790 to 1820 when 150 companies employed about 30 thousand people. At this point of time, approximately 50 percent of the Glove Manufacturers of UK were located in Worcestershire.            

Landmarks

The most well-known landmark in Worcester is Anglican Cathedral. Before the English Reformation, the current building known as Worcester Priory is officially named as The Cathedral Church of Christ and the Blessed Virgin Mary. Construction began in 1084 while its crypt dates from the 10th century. The chapter house is only circular one in the country while the cathedral also has the difference of having the tomb of King John.

More