CCNA Security

Hours: 60 / Access Length: 12 Months / Delivery: Open, Mentor Supported
Retail Price: $2,395.00

Course Overview:

The Cisco 100-105, 200-105, 200-125, 210-260, 300-101, 300-115, and 300-135 certification exams have expired. 

We are working to get the new courses available for CCNA by the end of Q1 2020 and CCNP by the end of Q2 2020.   

We will contact students that still have an active enrollment to discuss their options to upgrade on a case by case basis once the new courses are released.

 

CCNA Security Certification meets the needs of IT professionals who are responsible for network security. It confirms an individual's skills for job roles such as Network Security Specialists, Security Administrators, and Network Security Support Engineers. This certification validates skills including installation, troubleshooting and monitoring of network devices to maintain integrity, confidentiality and availability of data and devices and develops competency in the technologies that Cisco uses in its security structure.

It is highly recommended that you complete the CCNA certification exam prior to starting this course.

This course includes FREE access for 12 months to a cloud based lab platform to assist students develop the practical information technology (IT) skills necessary to succeed in high in demand IT jobs.  This cloud based lab solution uses real equipment that enables our students to execute each practical task in a safe environment that is accessible from anywhere without needing to buy their own hardware or risk damage to their own system.

Along with providing the necessary hardware in a virtual environment, students gain access to high quality practical exercises that cover many of the exam topics they will encounter on their certifying exams.

Upon successful completion of this course, students will be prepared to sit for the Cisco 210-260 IINS: Implementing Cisco Network Security certification exam.

Course Outline:

Lesson 1: Introduction
Lesson 2: Networking Security Concepts
  • Understanding Network and Information Security Basics
  • Recognizing Current Network Threats
  • Applying Fundamental Security Principles to Network Design
  • Review All the Key Topics
Lesson 3: Common Security Threats
  • Network Security Threat Landscape
  • Distributed Denial-of-Service Attacks
  • Social Engineering Methods
  • Malware Identification Tools
  • Data Loss and Exfiltration Methods
  • Summary
  • Review All the Key Topics
Lesson 4: Implementing AAA in Cisco IOS
  • Cisco Secure ACS, RADIUS, and TACACS
  • Configuring Routers to Interoperate with an ACS Server
  • Configuring the ACS Server to Interoperate with a Router
  • Verifying and Troubleshooting Router-to-ACS Server Interactions
  • Review All the Key Topics
  • Command Reference to Check Your Memory
  • Lesson 5: Bring Your Own Device (BYOD)
  • Foundation Topics
  • Bring Your Own Device Fundamentals
  • BYOD Architecture Framework
  • Mobile Device Management
  • Exam Preparation Tasks
  • Review All the Key Topics
Lesson 6: Fundamentals of VPN Technology and Cryptography
  • Understanding VPNs and Why We Use Them
  • Cryptography Basic Components
  • Public Key Infrastructure
  • Putting the Pieces of PKI to Work
  • Review All the Key Topics
  • Command Reference to Check Your Memory
Lesson 7: Fundamentals of IP Security
  • IPsec Concepts, Components, and Operations
  • Configuring and Verifying IPsec
  • Review All the Key Topics
  • Command Reference to Check Your Memory
Lesson 8: Implementing IPsec Site-to-Site VPNs
  • Planning and Preparing an IPsec Site-to-Site VPN
  • Implementing and Verifying an IPsec Site-to-Site VPN in Cisco IOS Devices
  • Implementing and Verifying an IPsec Site-to-Site VPN in Cisco ASA
  • Review All the Key Topics
  • Command Reference to Check Your Memory
Lesson 9: Implementing SSL VPNs Using Cisco ASA
  • Functions and Use of SSL for VPNs
  • Configuring Clientless SSL VPNs on ASA
  • Using the Cisco AnyConnect Secure Mobility Client
  • Troubleshooting SSL VPN
  • Review All the Key Topics
Lesson 10: Securing Layer 2 Technologies
  • VLAN and Trunking Fundamentals
  • Spanning-Tree Fundamentals
  • Common Layer 2 Threats and How to Mitigate Them
  • CDP and LLDP
  • DHCP Snooping
  • Dynamic ARP Inspection
  • Review All the Key Topics
  • Command Reference to Check Your Memory
Lesson 11: Network Foundation Protection
  • Using Network Foundation Protection to Secure Networks
  • Understanding the Management Plane
  • Understanding the Control Plane
  • Understanding the Data Plane
  • Review All the Key Topics
Lesson 12: Securing the Management Plane on Cisco IOS Devices
  • Securing Management Traffic
  • Implementing Security Measures to Protect the Management Plane
  • Review All the Key Topics
  • Command Reference to Check Your Memory
Lesson 13: Securing the Data Plane in IPv6
  • Understanding and Configuring IPv6
  • Configuring IPv6 Routing
  • Developing a Security Plan for IPv6
  • Review All the Key Topics
  • Command Reference to Check Your Memory
Lesson 14: Securing Routing Protocols and the Control Plane
  • Foundation Topics
  • Securing the Control Plane
  • Control Plane Policing
  • Securing Routing Protocols
  • Exam Preparation Tasks
  • Review All the Key Topics
Lesson 15: Understanding Firewall Fundamentals
  • Firewall Concepts and Technologies
  • Using Network Address Translation
  • Creating and Deploying Firewalls
  • Review All the Key Topics
Lesson 16: Implementing Cisco IOS Zone-Based Firewalls
  • Cisco IOS Zone-Based Firewalls
  • Configuring and Verifying Cisco IOS Zone-Based Firewalls
  • Review All the Key Topics
  • Command Reference to Check Your Memory
Lesson 17: Configuring Basic Firewall Policies on Cisco ASA
  • The ASA Appliance Family and Features
  • ASA Firewall Fundamentals
  • Configuring the ASA
  • Review All the Key Topics
  • Command Reference to Check Your Memory
Lesson 18: Cisco IDS/IPS Fundamentals
  • IPS Versus IDS
  • Identifying Malicious Traffic on the Network
  • Managing Signatures
  • Monitoring and Managing Alarms and Alerts
  • Cisco Next-Generation IPS Solutions
  • Review All the Key Topics
Lesson 19: Mitigation Technologies for E-mail-Based and Web-Based Threats
  • Mitigation Technology for E-mail-Based Threats
  • Mitigation Technology for Web-Based Threats
  • Cisco Content Security Management Appliance
  • Review All the Key Topics
  • Command Reference to Check Your Memory
Lesson 20: Mitigation Technologies for Endpoint Threats
  • Antivirus and Antimalware Solutions
  • Personal Firewalls and Host Intrusion Prevention Systems
  • Advanced Malware Protection for Endpoints
  • Hardware and Software Encryption of Endpoint Data
  • Review All the Key Topics
Lesson 21: Final Preparation
  • The Cisco Learning Network
  • Lesson-Ending Review Tools
  • Recall the Facts
  • Practice Configurations
  • Using the Exam Engine

Certification(s):

Upon successful completion of this course, students will be prepared to sit for the Cisco 210-260 IINS: Implementing Cisco Network Security certification exam.


System Requirements:

System Requirements:

Internet Connectivity Requirements:
  • Cable and DSL internet connections are recommended for the best experience.
Hardware Requirements:
  • CPU: 1 GHz or higher
  • RAM: 2 GB or higher
  • Resolution: 1280 x 720 or higher
  • Speakers / Headphones
  • Microphone (Webinar / Live Online sessions)
Operating System Requirements:
  • Microsoft Windows 7 or 10 (Home, Pro)
  • Mac OSX 10 or higher.
  • Latest Chrome OS
  • Latest Linux Distributions

NOTE: While we understand that our courses can be viewed on Android and iPhone devices, we do not recommend the use of these devices for our courses. The size of these devices do not provide a good learning environment for students taking online or live online based courses.

Web Browser Requirements:
  • Latest Google Chrome is recommended for the best experience.
  • Latest Mozilla FireFox
  • Latest Microsoft Edge
  • Latest Apple Safari
Basic Software Requirements (These are recommendations of software to use):
  • Office suite software (Microsoft Office, OpenOffice, or LibreOffice)
  • PDF reader program (Adobe Reader, FoxIt)
  • Courses may require other software that is denoted in the above course outline.


** The course outlines displayed on this website are subject to change at any time without prior notice. **