/CCNA Security - for Teachers

IoC Partner

Provided by: Open University

Course Area: All areas

Course Type: Continuous Professional Development

Start date: Anytime

Subjects: Cryptography, Cyber Security, Information Technology, Networks, Networks and Security

Accredited by: Cisco

Price: Free

Delivery Method: Online

Course overview

CCNA Security equips teachers with the knowledge and skills needed to prepare for entry-level security specialist careers. This course is a hands-on, career-oriented e-learning solution that emphasizes practical experience. It is a blended curriculum with both online and classroom learning. CCNA Security aims to develop an in-depth understanding of network security principles as well as the tools and configurations required to secure a network. Various types of hands-on labs provide practical experience, including procedural and troubleshooting labs, skills integration challenges, and model building. All hands-on labs in the course can be completed on actual physical equipment or in conjunction with the NDG NETLAB+ solution. Most chapters include Packet Tracer-based skills integration challenges that are cumulative throughout the course.

Who is this course for

CCNA Security helps teachers develop the skills needed for entry-level network security career opportunities and prepare for the CCNA Security certification. It provides a theoretically rich, hands-on introduction to network security, in a logical sequence driven by technologies. The goals of CCNA Security are as follows:

  1. Provide an in-depth, theoretical understanding of network security
  2. Provide students with the knowledge and skills necessary to design and support network security
  3. Provide an experience-oriented course that employs industry-relevant instructional approaches to prepare students for entry-level jobs in the industry

Enable students to have significant hands-on interaction with IT equipment to prepare them for certification exams and career opportunities Upon completion of the CCNA Security course, students will be able to perform the following tasks:

  1. Explain network threats, mitigation techniques, and the basics of securing a network
  2. Secure administrative access on Cisco routers
  3. Secure administrative access with AAA
  4. Implement firewall technologies to secure the network perimeter
  5. Configure IPS to mitigate attacks on the network
  6. Describe LAN security considerations and implement endpoint and Layer 2 security features
  7. Describe methods for implementing data confidentiality and integrity
  8. Implement secure virtual private networks
  9. Implement an ASA firewall configuration using the CLI
  10. Implement an ASA firewall configuration and VPNs using ASDM
  11. Test network security and create a technical security policy

What will I learn

Chapter 1. Modern Network Security Threats

Explain network threats, mitigation techniques, and the basics of securing a network 1.1 Securing Networks Explain network security 1.2 Network Threats Describe various types of threats and attacks 1.3 Mitigating Threats Explain tools and procedures to mitigate the effects of malware and common network attacks.

 

Chapter 2. Securing Network Devices

Secure administrative access on Cisco routers 2.1 Securing Device Access Configure secure administrative access 2.2 Assigning Administrative Roles Configure command authorization using privilege levels and role-based CLI 2.3 Monitoring and Managing Devices Implement the secure management and monitoring of network devices. 2.4 Using Automated Security Features Use automated features to enable security on IOS-based routers.

 

Chapter 3. Authentication, Authorization and Accounting

Secure administrative access with AAA 3.1 Purpose of AAA Explain how AAA is used to secure a network. 3.2 Local AAA Authentication Implement AAA authentication that validates users against a local database. 3.3 Server-Based AAA Explain server-based AAA authentication and its communication protocols. 3.4 Server-Based AAA Authentication Implement server-based AAA authentication using TACACS+ and RADIUS protocols. 3.5 Server-Based AAA Authorization and Accounting Configure server-based AAA authorization and accounting

 

Chapter 4. Implementing Firewall Technologies

Implement firewall technologies to secure the network perimeter 4.1 Access Control Lists Implement access control lists (ACLs) to filter traffic and mitigate network attacks on a network. 4.2 Firewall Technologies Configure a classic firewall to mitigate network attacks. 4.3 Zone-Based Policy Firewalls Implement Zone-Based Policy Firewall using CLI.

 

Chapter 5. Implementing Intrusion Prevention

Configure IPS to mitigate attacks on the network 5.1 IPS Technologies Explain how network-based IPS is used to help secure a network. 5.2 IPS Signatures Explain how signatures are used to detect malicious network traffic. 5.3 Implement IPS Configure Cisco IOS IPS operations using CLI.

 

Chapter 6. Securing the Local Area Network

Describe LAN security considerations and implement endpoint and Layer 2 security features 6.1 Endpoint Security Explain endpoint vulnerabilities and protection methods. 6.2 Layer 2 Security Considerations Implement Layer 2 security features.

 

Chapter 7. Cryptographic Systems

Describe methods for implementing data confidentiality and integrity 7.1 Cryptographic Services Explain how the types of encryption, hashes, and digital signatures work together to provide confidentiality, integrity, and authentication. 7.2 Basic Integrity and Authenticity Explain how cryptographic hashes are used to ensure data integrity and authentication. 7.3 Confidentiality Explain how encryption algorithms are used to ensure data confidentiality. 7.4 Public Key Cryptography Explain how a public key infrastructure is used to ensure data confidentiality and provide authentication.

 

Chapter 8. Implementing Virtual Private Networks

Implement secure virtual private networks 8.1 VPNs Explain the purpose of VPNs. 8.2 IPsec VPN Components and Operation Explain how IPsec VPNs operate. 8.3 Implementing Site-to-Site IPsec VPNs with CLI Configure a site-to-site IPsec VPN, with pre-shared key authentication, using CLI.

 

Chapter 9. Implementing the Cisco Adaptive Security Appliance

Implement an ASA firewall configuration using the CLI 9.1 Introduction to the ASA Explain how the ASA operates as an advanced stateful firewall. 9.2 ASA Firewall Configuration Implement an ASA firewall configuration.

 

Chapter 10. Advanced Cisco Adaptive Security Appliance

Implement an ASA firewall configuration and VPNs using ASDM 10.1 ASA Security Device Manager Implement an ASA firewall configuration. 10.2 ASA VPN Configuration Configure remote-access VPNs on an ASA.

 

Chapter 11. Managing a Secure Network

Test network security and create a technical security policy 11.1 Network Security Testing Explain the various techniques and tools used for network security testing. 11.2 Developing a Comprehensive Security Policy Explain how to develop a comprehensive security policy.

 

Visit this course

</Keep in touch>