(Click Category to List Courses)

39 - IT-N Information Technology - Networking

IT-N 302 - CCNA Security

Code Start Date Duration Venue
IT-N 302 14 November 2022 5 Days Istanbul Registration Form Link
IT-N 302 12 December 2022 5 Days Istanbul Registration Form Link
Please contact us for fees


Course Description

A CCNA Security certification helps participants develop a security infrastructure using Cisco network devices, acquire skills to install and monitor network devices, and recognize and control threats to the security structure. This CCNA Security course enables them to understand the core security concepts, VPN encryption, understand the secure access management, firewall, intrusion prevention, endpoint security along with email and web security. 

Prerequisites: Valid CCENT, CCNA or CCIE certification

Course Objectives

  • Understanding threatscape, Security Policies and Basic Architectures
  • Securing Layer 2 infrastructure
  • Securing Layer 2 protocols and firewall technologies
  • Understanding Cisco ASA access control and service policies
  • Discovering Cisco IOS zone based firewall
  • Exploring IPsec Technologies
  • Discussing Site-to-Site VPN

Who Should Attend?

  • Network engineers, 
  • Data/telecoms engineers,
  • Telecoms support engineer.

Course Details/Schedule

Day 1

  • Security Concepts
  • Common security principles
  • Common security threats
  • Cryptography concepts
  • Describe network topologies
  • Secure management
  • AAA concepts
  • 802.1X authentication
  • BYOD

Day 2

  • VPN concepts
  • Remote access VPN
  • Site-to-site VPN

Day 3

  • Secure Routing and Switching
  • Security on Cisco routers
  • Securing routing protocols
  • Securing the control plane
  • Common Layer 2 attacks
  • Mitigation procedures
  • VLAN security

Day 4

  • Cisco Firewall Technologies
  • Compare stateful vs. stateless firewalls
  • Implementing NAT on Cisco ASA 9.x
  • Implementing zone-based firewall
  • Firewall features on the Cisco Adaptive Security Appliance (ASA) 9.x

Day 5

  • IPS
  • Describe IPS deployment considerations
  • Describe IPS technologies
  • Content and Endpoint Security
  • Mitigation technology for email-based threats
  • Mitigation technology for web-based threats
  • Mitigation technology for endpoint threats