Course Description | ||||||||||||
CCNA Security is a new Associate Level certification designed to build upon the CCNA certification and as a prerequisite for the CCSP - Cisco Certified Security Professional certification. The Cisco CCNA Security certification validates the knowledge required to install, troubleshoot, and monitor Cisco security network devices. In addition, CCNA Security confirms an individual's skills for job roles such as network security specialist, security administrator, and network security support engineer. Prior to obtaining CCNA Security, an individual must hold and active CCNA certification. | ||||||||||||
Duration | ||||||||||||
5 days | ||||||||||||
Course Objectives | ||||||||||||
Candidates will learn: | ||||||||||||
| ||||||||||||
Target Audience | ||||||||||||
Network Designers, Network Administrators, Network Engineers, Network Managers, Systems Engineers. | ||||||||||||
Pre-requisites | ||||||||||||
| ||||||||||||
Course Outline | ||||||||||||
Module 1: Introduction to Network Security Principles | ||||||||||||
Network Security Fundamentals, Attack Methodologies, Operations Security, Cisco Self-Defending Networks | ||||||||||||
Module 2: Perimeter Security | ||||||||||||
Administrative Access to Cisco Routers, Cisco SDM, AAA on a Cisco Router Using the Local Database and on Secure ACS, Secure Management/Reporting, Locking Down the Router | ||||||||||||
Module 3: Network Security Using Cisco IOS Firewalls | ||||||||||||
Firewall Technologies, Static Packet Filters Using ACLs, Cisco IOS Zone-Based Policy Firewall | ||||||||||||
Module 4: Site-to-Site VPNs | ||||||||||||
Cryptographic Services, Symmetric Encryption, Examining Cryptographic Hashes and Digital Signatures, Asymmetric Encryption and PKI, IPsec Fundamentals, Site-to-Site IPsec VPN, IPsec on a Site-to-Site VPN Using Cisco SDM | ||||||||||||
Module 5: | ||||||||||||
Network Security Using Cisco IOS IPS IPS Technologies, Cisco IOS IPS Using Cisco SDM | ||||||||||||
Module 6: | ||||||||||||
LAN, SAN, Voice, and Endpoint Security Overview Endpoint Security, SAN Security, Voice Security, Layer 2 Attacks |
[2/10/2011 02:45:00 PM
|
]