CCNA Security (210-260)



Disclaimer: Tech-Act is an independent training services provider. Any use of third party trademarks, brand names, products and services is only referential.Tech-Act disclaims any sponsorship, affiliation or endorsement of or by any third parties. Tech-Act is an authorized training partner only where explicitly stated and as listed here.



REQUEST INFORMATION

IT Certification Training Courses
mta certification
microsoft technology associate certification
mcsa certification

CCNA Security (210-260)


About This Course

Cisco Certified Network Associate Security (CCNA Security) certification training validates your skills and expertise required for securing Cisco networks. A CCNA Security certification enables a networking professional demonstrate the proficiency needed to build security infrastructure, curb security threats and identify vulnerabilities and threats to a network.

The coursework for CCNA Security certification focuses on key security technologies, troubleshooting, monitoring and installation of network devices and maintain availability, confidentiality and integrity of devices and data.

Simply put, CCNA security certification training will enable a professional build security infrastructures using Cisco devices and embrace knowledge to monitor and install network devices and identify security threats.


Who Should Attend This Course

CCNA Security certification is a boon for the following people:

  • Network engineers
  • Network security experts
  • Network security support engineers
  • Network security administrators

Why This Course

Cisco Certified Network Associate Security (CCNA Security) certification training validates your skills and expertise required for securing Cisco networks. A CCNA Security certification enables a networking professional demonstrate the proficiency needed to build security infrastructure, curb security threats and identify vulnerabilities and threats to a network.

Prominent benefits of CCNA Security certification are as follows:

  • In great demand. Yes, the demand for skilled networking and security experts is at an all time high, since lot of businesses are seeking to secure their data due to the increasing cybersecurity menace and threats.
  • Progressing career prospects
  • Higher pay
  • Validates your skills and knowledge as networking expert
  • Globally accepted and recognized

Course Objectives

CCNA Security’s coursework is designed to help you understand network security principles, configurations and tools.

  • Understanding security vulnerabilities and threats
  • Securing access to networking devices
  • Implementing AAA on networks
  • Using ACLs to prevent potential network threats
  • Ensuring secure network reporting and management
  • Managing Layer 2 network attacks
  • Implementing Cisco IOS firewall
  • Executing site-to-site VPNs
  • Ensuring security policies

Course Prerequisites

A valid CCNA Routing & Switching, CCENT or CCIE certification is all you need to get going for CCNA Security training.


Course Benefits


Prominent benefits of CCNA Security certification are as follows:

  • In great demand. Yes, the demand for skilled networking and security experts is at an all time high, since lot of businesses are seeking to secure their data due to the increasing cybersecurity menace and threats.
  • Progressing career prospects
  • Higher pay
  • Validates your skills and knowledge as networking expert
  • Globally accepted and recognized

Curriculum


Security Concepts

Overview

This section gives the overview for CCNA Security. It covers the topics like who is the intended audience, what the scope, and what are some specific topics that will be addressed.

Understand Common Security Principles

This section discusses fundamental security concepts. It covers the concepts like the CIA triad, security information management (SIM), security event management (SEM) as well as a blending of the two through security information and event management (SIEM). It also explains the concepts like assets, vulnerabilities, threats, risks and more.

Identify Common Security Threats

This section introduces to some common security threats to be able to identify them as they are encountered. It explores common attack types and motivations like financial gain, general disruption, and revenge. At the end it discusses the different Distributed Denial of Service(DDoS) attacks like Direct, Reflected, and Amplified.

Understand Basic Crypto Concepts

This section walks through the basics of cryptography concepts. It covers both symmetric and asymmetric encryption , Public Key Infrastructure(PKI), and Certificates. It also define hashing and describe how it’s used and how it’s different than encryption.

Secure Access

Secure Management Access

This section takes a look at securely managing access to Cisco equipment. It explains the difference between In-Band and Out-of-Band management.It also shows how to create and use a strong password. It demonstrate setting logins and passwords on the Console, AUX, and VTY of a Cisco router.

Implement AAA Security

This section introduces you to the service(s) known as Authentication, Authorization, and Accounting, or more simply AAA. It shows the difference between RADIUS and TACACS as an AAA solution in a Cisco network.

Describe 802.1x Authentication

This section describes and demonstrate the 802.1x authentication abilities at OSI Layer 2 to prevent unauthorized devices from gaining access to the network. It shows Authentication process and identify the 802.1x functions and components for the Supplicant, the Authenticator, and the Authentication Server.

Understand BYOD Management

This section walks through the basic concepts and considerations when implementing a Bring Your Own Device(BYOD) environment. It discusses BYOD fundamentals and describe the benefit of using Cisco’s on-premise and cloud-based Mobile Device Manager.

VPN

Describe VPN Concepts

This section introduces Virtual Private Networks(VPN). It covers wide range of VPN concepts and technologies including the purpose of VPNs, what types of encryptions are typically used (IPsec/SSL/MPLS), Remote Access vs. Site-to-Site, and VPN benefits. It also explains IPsec protocols and delivery modes.

Implement Remote Access VPN

This section explores remote access Virtual Private Networks(VPN). It demonstrates how to implement a basic Clientless SSL VPN using ASDM. It also explains how to create a VPN connection using the Cisco VPN client software called AnyConnect.

Implement Site-to-Site VPN

This section demonstrate how to implement a Site-to-Site VPN connection. It explains the purposes and concepts for the use of a Site-to-Site VPN. It also shows how to configure the Cisco devices to create the Site-to-Site split-tunnel.

Secure Routing and Switching

Secure Cisco Router Operations

This section explores setting up secure access to a Cisco router. It covers setting up access by configuring multiple privilege levels as well as reviewing role-based access. It shows how to implement an resilient IOS configuration and how to recover from an accidental deletion using the backups.

Describe Layer 2 Attacks

This section describes some of the common OSI Layer 2 attacks. It explains about L2 attacks like attacks against Spanning-Tree, ARP spoofing, MAC spoofing, CAM Table overflow attacks, CDP/LLDP reconnaissance, VLAN hopping, and DHCP spoofing.

Configure Layer 2 Security

This section takes through the mitigation procedures and techniques against layer 2 attacks. It shows how to implement DHCP Snooping and Dynamic ARP Inspection to guard against DHCP starvation and Rogue DHCP attacks. It also covers how to implement Port Security to control what end device have access to a switch and how to implement BPDU Guard, Root Guard, and Loop Guard.

Describe VLAN Security

This section discusses how to implement VLAN security in a Cisco environment. It demonstrates the use of Private VLANs to further segment and isolate a network. It shows the security implications of using a Native VLAN and operations of the Native VLAN.

Cisco Firewall Technologies

Describe Firewall Technologies

This section describe the operational strengths and weaknesses of the different firewall technologies. Different Firewalls covered include Proxy firewalls, Application firewalls, and Personal firewalls. It also delve into stateful vs. stateless firewalls.

Implement NAT on Cisco ASA 9x

This section demonstrate how to implement Network Address Translation(NAT) on a Cisco ASA 9.x. It explores the common types of NAT which includes Static NAT, Dynamic NAT, and Port Address Translation.It also explains the complex Policy NAT configuration.

Implement Zone-Based Firewalls

This section explain and demonstrate how to implement Zone-Based Firewalls. When there is a need to implement a stateful firewall, but don’t have the budget for an ASA, your current Cisco Router might be able to take on the job through implementing the Zone-Based firewall feature.

Configure ASA Management

This section walks through the basic initial setup for a Cisco ASA. It demonstrate configuring access Management with proper interface policies. It shows the set up of VLANs, DHCP, and routing to connect to the network.

IPS

Describe IPS Deployment Considerations

This section covers the basic knowledge of Intrusion Prevention Systems(IPS). It covers what exactly an IPS is and how it integrates into your network. It discusses the different modes of IPSs as well as placement in the network.

Content and Endpoint Security

Content and Endpoint Security

This section dive into the world of endpoint security. It explains mitigation technology for email based and web based threats. It also covers blacklisting, URL filtering, malware scanning, TLS decryption, anti-malware/antivirus software, personal firewalls, and encryption.

Schedule & Fees


Online Instructor Led CCNA Security (210-260) Certification Training


Please contact us for more information on course fees and upcoming batch schedule.

Course FAQ


Why Tech-Act for CCNA Security?

Tech-Act knows the increasing importance of security in today’s IT landscape and also is aware of the talent shortage to tackle the same. This is the reason we employ well-qualified and certified for all our courses and CCNA Security course is no exception. Moreover, we are an accredited learning center for CompTIA and EC Council. It is also a Pearson Vue authorized learning center. Eureka! Candidates get to pick the pace of training.

What are the key benefits of CCNA Security?

 

Prominent benefits of CCNA Security certification are as follows:

  • In great demand. Yes, the demand for skilled networking and security experts is at an all time high, since lot of businesses are seeking to secure their data due to the increasing cybersecurity menace and threats.
  • Progressing career prospects
  • Higher pay
  • Validates your skills and knowledge as networking expert
  • Globally accepted and recognized

Do you have certified trainers?

Yes, Tech-Act’s trainers are certified with sufficient industry experience.

What is the eligibility criteria to enroll for CCNA Security?

A valid CCNA Routing & Switching, CCENT or CCIE certification is all you need to get going for CCNA Security training.

Testimonials



0

Your Cart

REQUEST INFORMATION