CCNA Security Certification
Overview
Achieving Cisco CCNA Security knowledge provided by Netlabs ITS confirms that you have the associate-level knowledge and skills required to secure Cisco networks.It validates that you have the skills to develop a security infrastructure, recognize threats and vulnerabilities to networks, and mitigate security threats.
The CCNA Security curriculum emphasizes core security technologies, including installing, troubleshooting, and monitoring network devices to maintain data and device integrity, confidentiality, and availability, along with competency in the technologies Cisco uses in its security structure.
Threats: Mitigating Network Attacks
- Goals, Integrity & Availability of Network Security
- Self-Defending Networks
- Network Attacks
- Types of Attacks
- Access Attacks
- Worms, Virus & Trojan Horse Attacks
- Application Layer Attacks
- Tools
- Summary
Securing Cisco Routers
- Cisco Router SDM – Security Audit Feature
- One-Step Lockdown Feature in SDM
- Secure Administrative Access to Cisco Routers
- Multiple Privilege Levels and Role-Based CLI
- Securing Cisco IOS Images, Config Files & Implementation
- Summary
Implementing AAA
- Functions and Features of AAA
- RADIUS
- TACACS+
- Setting Up ACS
- Configuring AAA Throughout the Entire Network
- AAA Accounting
- Summary
Mitigate Threats Using Access Control Lists
- Types of ACLs
- Threat Mitigation Using ACLs
- Summary
Switch Security: Mitigate Common Layer2 Attacks
- Switch Attack Categories
- Private VLANs
- VLAN Hopping, Trunk Exploitation & STP Misuse
- Implementing IP and DHCP Spoof Prevention & ARP Inspection
- Summary
Cisco IOS Firewall Features using SDM
- Firewall Technologies
- Stateful Firewalls
- Cisco IOS Firewall
- Set Up a Firewall on Routers
- Summary
Implementing the Cisco IOS IPS Feature Set Using the SDM
- IDS and IPS Systems
- Network Based, Host Based IPS & Signature Categories
- Cisco IOS IPS
- IPS Policies Wizard & SDM IPS Edit Menu Demonstration
- Summary
Implementing Site-To-Site VPNs on Cisco Routers Using SDM
- Cryptography Methods
- IKE Protocol
- Building Blocks of IPSec
- Advantages of IPSec VPNs
- Message Authentication and Integrity Check
- Differences Between Symmetric and Asymmetric Encryption
- PKI
- 5 Steps of IPSec
- VPN
- Summary