Cisco Security Course

Cisco CCNA Security Courses in South Africa

 

About this Course
Cisco Certified Network Associate Security (CCNA Security) validates associate-level knowledge and skills required to secure Cisco networks. With a CCNA Security certification, a network professional demonstrates the skills required to develop a security infrastructure, recognize threats and vulnerabilities to networks, and mitigate security threats. The CCNA Security curriculum emphasizes core security technologies, the installation, troubleshooting and monitoring of network devices to maintain integrity, confidentiality and availability of data and devices, and competency in the technologies that Cisco uses in its security structure. 2KO International delivers computer courses from beginner level to advanced, and is also a leading supplier of of online IT training courses, enabling 2KO students the opportunity to study courses online world-wide, to ensure the best training possible
.

Included in your course fees
Tuition fees
Breakfast and lunch on course days
Teas and coffees
Attendance certificate

About this Course
Cisco Certified Network Associate Security (CCNA Security) validates associate-level knowledge and skills required to secure Cisco networks. With a CCNA Security certification, a network professional demonstrates the skills required to develop a security infrastructure, recognize threats and vulnerabilities to networks, and mitigate security threats. The CCNA Security curriculum emphasizes core security technologies, the installation, troubleshooting and monitoring of network devices to maintain integrity, confidentiality and availability of data and devices, and competency in the technologies that Cisco uses in its security structure.

Included in your course fees
Tuition fees
Breakfast and lunch on course days
Teas and coffees
Attendance certificate

Course Contents
Common Security Threats
Describe common security threats

Security and Cisco Routers
Implement security on Cisco routers
Describe securing the control, data, and management plane
Describe Cisco Security Manager
Describe IPv4 to IPv6 transition

AAA on Cisco Devices
Implement AAA (authentication, authorization, and accounting)
Describe TACACS+
Describe RADIUS
Describe AAA
Verify AAA functionality

IOS ACLs
Describe standard, extended, and named IP IOS access
control lists (ACLs) to filter packets
Describe considerations when building ACLs
Implement IP ACLs to mitigate threats in a network

Secure Network Management and Reporting
Describe secure network management
Implement secure network management

Common Layer 2 Attacks
Describe Layer 2 security using Cisco switches
Describe VLAN security
Implement VLANs and trunking
Implement spanning tree

Cisco Firewall Technologies
Describe operational strengths and weaknesses of the different firewall technologies
Describe stateful firewalls
Describe the types of NAT used in firewall technologies
Implement zone-based policy firewall using CCP
Implement the Cisco Adaptive Security Appliance (ASA)
Implement Network Address Translation (NAT) and Port Address Translation (PAT)

Cisco IPS
Describe Cisco Intrusion Prevention System (IPS) deployment considerations
Describe IPS technologies
Configure Cisco IOS IPS using CCP

VPN Technologies
Describe the different methods used in cryptography
Describe VPN technologies
Describe the building blocks of IPSec
Implement an IOS IPSec site-to-site VPN with pre-shared key authentication
Verify VPN operations

Implement Secure Sockets Layer (SSL) VPN using ASA device manager