C-ID Descriptor
Network Security – CCNA-Security
Descriptor Details
-
Network Security – CCNA-Security
-
Not Identified
-
167
-
Not Identified
-
Not Identified
-
3
-
Not Identified
-
Uploaded: Problem accessing file: template_755.doc
This course equips students with the knowledge and skills needed to prepare for entry-level security specialist careers. This course is a hands-on, career-oriented e-learning solution that emphasizes practical experience. It is a blended curriculum with both online and classroom learning. Students will develop an in-depth understanding of network security principles as well as the tools and configurations required to secure a network. CCNA Security helps students develop the skills needed for entry-level network security career opportunities and prepare for the CCNA Security certification.
None
None
ITIS 150 - Computer Network Fundamentals
ITIS 151 – Routing and Switching Essentials
ITIS 160 – Introduction to Information Systems Security
- Modern Network Security Threats
- Securing Networks - Explain network security.
- Network Threats - Describe various types of threats and attacks.
- Mitigating Threats - Explain tools and procedures to mitigate the effects of malware and common network attacks.
- Securing Network Devices
- Securing Device Access - Configure secure administrative access.
- Assigning Administrative Roles - Configure command authorization using privilege levels and role-based Command Line Interface (CLI).
- Monitoring and Managing Devices - Implement the secure management and monitoring of network devices.
- Using Automated Security Features - Use automated features to enable security on IOS-based routers.
- Authentication, Authorization and Accounting (AAA)
- Purpose of AAA - Explain how AAA is used to secure a network.
- Local AAA Authentication - Implement AAA authentication that validates users against a local database.
- Server-Based AAA - Explain server-based AAA authentication and its communication protocols.
- Server-Based AAA Authentication - Implement server-based AAA authentication using TACACS+ and RADIUS protocols.
- Server-Based AAA Authorization and Accounting - Configure server-based AAA authorization and accounting.
- Implementing Firewall Technologies
- Access Control Lists - Implement Access Control Lists (ACLs) to filter traffic and mitigate network attacks on a network.
- Firewall Technologies - Configure a classic firewall to mitigate network attacks.
- Zone-Based Policy Firewall - Implement Zone-Based Policy Firewall using CLI.
- Implementing Intrusion Prevention (IPS)
- IPS Technologies - Explain how network-based IPS is used to help secure a network.
- IPS Signatures - Explain how signatures are used to detect malicious network traffic.
- Implementing IPS - Configure Cisco IOS IPS operations using CLI.
- Securing the Local Area Network
- Endpoint Security - Explain endpoint vulnerabilities and protection methods.
- Layer 2 Security Considerations - Implement Layer 2 security features.
- Cryptography
- Cryptographic Services - Explain how the types of encryption, hashes, and digital signatures work together to provide confidentiality, integrity, and authentication.
- Basic Integrity and Authenticity - Explain how cryptographic hashes are used to ensure data integrity and authentication.
- Confidentiality - Explain how encryption algorithms are used to ensure data confidentiality.
- Public Key Cryptography - Explain how a public key infrastructure is used to ensure data confidentiality and provide authentication.
- Implementing Virtual Private Networks (VPNs)
- VPNs - Explain the purpose of VPNs.
- Internet Protocol Security (IPsec) VPN Components and Operation - Explain how IPsec VPNs operate.
- Implementing Site-to-Site IPSec VPNs with CLI - Configure a site-to-site IPsec VPN, with pre-shared key authentication, using CLI.
- Implementing the Cisco Adaptive Security Appliance (ASA)
- Introduction to the ASA - Explain how the ASA operates as an advanced stateful firewall.
- ASA Firewall Configuration - Implement an ASA firewall configuration.
- ASA VPN Configuration - Implement an ASA VPN configuration.
- Advanced Cisco Adaptive Security Appliance
- ASA Security Device Manager (ASDM) - Implement an ASA firewall configuration and VPNs using ASDM.
- ASA VPN Configuration - Configure remote-access VPNs on an ASA.
- Managing a Secure Network
- Network Security Testing - Explain the various techniques and tools used for network security testing.
- Developing a Comprehensive Security Policy - Explain how to develop a comprehensive security policy.
At the conclusion of this course, the student should be able to:
- Explain network threats, mitigation techniques, and the basics of securing a network.
- Secure administrative access on Cisco routers.
- Secure administrative access with AAA.
- Implement firewall technologies to secure the network perimeter.
- Configure IPS to mitigate attacks on the network.
- Describe LAN security considerations and implement endpoint and Layer 2 security features.
- Describe methods for implementing data confidentiality and integrity.
- Implement secure virtual private networks.
- Implement an ASA firewall configuration using the CLI.
- Implement an ASA firewall configuration and VPNs using ASDM.
- Test network security and create a technical security policy.
Evaluation will include hands-on projects and a combination of examinations, presentations, discussions, or problem-solving assignments.
- CCNA Security Course Booklet Version 2.0, Cisco Network Academy, Cisco Press
- Gargano, P., 31 Days Before Your CCNA Security Exam (Digital Study Guide), Cisco Press
-
No
-
Not Identified
-
Not Identified
-
Not Identified
-
Not Identified
-
Not Identified
Delete Descriptor?
Are you sure you want to delete this descriptor?
Deleted descriptors cannot be restored.