CCNA Security

CCNA Security
Brand: Cisco
Product Code: CCNA Security
Availability: In Stock
Price: R810.00

CCNA Security

PS You can change currency to see the price in your country at the top of the screen, just below the search box

 

The CCNA® Security course provides a next step for individuals who want to enhance their CCNA-level skill set and help meet the growing demand for network security professionals. The curriculum provides an introduction to the core security concepts and skills needed for the installation, troubleshooting, and monitoring of network devices to maintain the integrity, confidentiality, and availability of data and devices. CCNA Security includes the following features: Participants develop an in-depth, theoretical understanding of network security principles as well as the tools and configurations available. The course emphasizes the practical application of skills needed to design, implement, and support network security. Hands-on labs help participants develop critical thinking and complex problem-solving skills. Packet Tracer simulation-based learning activities promote the exploration of networking security concepts and allow participants to experiment with network behavior and ask “what if” questions. Innovative assessments provide immediate feedback to support the evaluation of knowledge and acquired skills.
 

Course Outline

Modern Network Security Threats

  • Fundamental Principles of a Secure Network
  • Worms, Viruses and Trojan Horses
  • Attack Methodologies

Securing Network Devices

  • Securing Device Access and Files
  • Privilege Levels and Role-Based CLI
  • Monitoring Devices
  • Using Automated Features

Authentication, Authorization and Accounting (AAA)

  • Purpose of AAA
  • Configuring Local AAA
  • Configure Server-Based AAA

Implementing Firewall Technologies

  • Access Control Lists
  • Firewall Technologies
  • Context-Based Access Control
  • Zone-Based Policy Firewall

Implementing Intrusion Prevention

  • IPS Technologies
  • Implementing IPS

Securing the Local Area Network

  • Endpoint Security Considerations
  • Layer 2 Security Considerations
  • Wireless, VoIP and SAN Security Considerations
  • Configuring Switch Security
  • SPAN and RSPAN

Cryptography

  • Cryptographic Services
  • Hashes and Digital Signatures
  • Symmetric and Asymmetric Encryption

Implementing Virtual Private Networks

  • VPNs
  • IPSec VPN Components and Operation
  • Implementing Site-to-Site IPSec VPNs
  • Implementing a Remote Access VPN
  • Implementing SSL VPNs

Managing a Secure Network

  • Secure Network Lifecycle
  • Self-Defending Network
  • Building a Comprehensive Security Policy

Write a review

Your Name:


Your Review: Note: HTML is not translated!

Rating: Bad           Good

Enter the code in the box below: