(Click Category to List Courses)
39 - IT-N Information Technology - Networking
IT-N 302 - CCNA Security
Code | Start Date | Duration | Venue | |
---|---|---|---|---|
IT-N 302 | 21 October 2024 | 5 Days | Istanbul | Registration Form Link |
IT-N 302 | 25 November 2024 | 5 Days | Istanbul | Registration Form Link |
IT-N 302 | 30 December 2024 | 5 Days | Istanbul | Registration Form Link |
Course Description
A CCNA Security certification helps participants develop a security infrastructure using Cisco network devices, acquire skills to install and monitor network devices, and recognize and control threats to the security structure. This CCNA Security course enables them to understand the core security concepts, VPN encryption, understand the secure access management, firewall, intrusion prevention, endpoint security along with email and web security.
Prerequisites: Valid CCENT, CCNA or CCIE certification
Course Objectives
- Understanding threatscape, Security Policies and Basic Architectures
- Securing Layer 2 infrastructure
- Securing Layer 2 protocols and firewall technologies
- Understanding Cisco ASA access control and service policies
- Discovering Cisco IOS zone based firewall
- Exploring IPsec Technologies
- Discussing Site-to-Site VPN
Who Should Attend?
- Network engineers,
- Data/telecoms engineers,
- Telecoms support engineer.
Course Details/Schedule
Day 1
- Security Concepts
- Common security principles
- Common security threats
- Cryptography concepts
- Describe network topologies
- Secure management
- AAA concepts
- 802.1X authentication
- BYOD
Day 2
- VPN concepts
- Remote access VPN
- Site-to-site VPN
Day 3
- Secure Routing and Switching
- Security on Cisco routers
- Securing routing protocols
- Securing the control plane
- Common Layer 2 attacks
- Mitigation procedures
- VLAN security
Day 4
- Cisco Firewall Technologies
- Compare stateful vs. stateless firewalls
- Implementing NAT on Cisco ASA 9.x
- Implementing zone-based firewall
- Firewall features on the Cisco Adaptive Security Appliance (ASA) 9.x
Day 5
- IPS
- Describe IPS deployment considerations
- Describe IPS technologies
- Content and Endpoint Security
- Mitigation technology for email-based threats
- Mitigation technology for web-based threats
- Mitigation technology for endpoint threats