0% found this document useful (0 votes)
94 views

Syllabus - CCNA Security

This document outlines a Cisco CCNA Security course that teaches common security concepts and allows students to deploy basic security techniques using Cisco appliances. The course focuses on security principles, technologies, and hands-on examples using Cisco products. It requires equivalent knowledge to a CCNA Routing and Switching certification and covers skills like securing network infrastructure, implementing authentication, authorization and accounting, firewall configuration, VPN services, and more advanced topics. The training materials include online sessions, labs, books, and lifetime access to files shared online.

Uploaded by

Azaj Ikbal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
94 views

Syllabus - CCNA Security

This document outlines a Cisco CCNA Security course that teaches common security concepts and allows students to deploy basic security techniques using Cisco appliances. The course focuses on security principles, technologies, and hands-on examples using Cisco products. It requires equivalent knowledge to a CCNA Routing and Switching certification and covers skills like securing network infrastructure, implementing authentication, authorization and accounting, firewall configuration, VPN services, and more advanced topics. The training materials include online sessions, labs, books, and lifetime access to files shared online.

Uploaded by

Azaj Ikbal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

HAZYNETWORK

CCNA/CCNP/ASA/AWS/PYTHON/SDWAN/Automation

CISCO CCNA Security – Course outline

About the course


This course allows learners to understand common security concepts, and
deploy basic security techniques utilizing a variety of popular security appliances
within a "real-life" network infrastructure. It focuses on security principles and
technologies, using Cisco security products to provide hands-on examples.
Syllabus : CISCO CCNA SECURITY

Requirements?
 Skills and knowledge equivalent to those learned in CCNA Routing &
 Switching knowledge
 Working knowledge of the Windows operating system
 Working knowledge of Cisco IOS networking and concepts

What skills will you learn?


 Describe common network security concepts
 Secure routing and switching infrastructure
 Deploy basic authentication, authorization and accounting services
(AAA)
 Deploy basic firewalling services (ASA & IOS Based)
 Deploy basic site-to-site and remote access VPN services (IPSec & SSL)
 Describe the use of more advanced security services such as intrusion
protection, content security and identity management.

Training duration and materials


Once you will enroll you will get below materials
 Weekdays and Weekend batches are available
 Training duration : 35 to 40 hours
 Training mode : Online
 Live recorded session - 40 hours
 Lab workbook
 Interview questions
 Official Cisco book
 Everything will be shared in Google drive
 You can access it lifetime

Call or Whatsapp: +91 7259459745 (INDIA) | +1 (902) 919-7413 (CANADA)

Mail : info@hazynetwork.com Website: www.hazynetwork.com/

You tube channel: https://www.youtube.com/channel/UCSIt8Wocol4RhUy4EVp2pfg/videos


SYLLABUS BLUEPRINT
1. NETWORK SECURITY - BASICS
2. NETWORK SECURITY ATTACKS & MITIGATION
3. THREAT DEFENSE TECHNOLOGIES & SECURITY DEVICES - OVERVIEW
4. CCNA SECURITY - LAB SETUP
TABLE OF CONTENTS
5. CCNP ROUTERS - LAB SETUP
6. HOW TO INSTALL AND USE GNS3
7. How to add Cisco ASA 8.4(2) or ASA 9. J (5) to GNS3
8. NETWORK INFRASTRUCTION PROTECTION - DEVICE PLANES
9. LAB: Securing the Router for Administrative Access
10. SECURE SHELL - SSH
11. LAB: Secure Shell (SSH)
12. RESTRICT TELNET ACCESS
13. LAB : Restricting Telnet Access to the Router to Specified Networks or Hosts.
14. AAA - OVERVIEW.
15. LAB: AAA AUTHENTICATION USING LOCAL DATABASE
16. AAA using EXTERNAL SERVERS
17. LAB: AAA AUTHENTICATION USING TACACS+
18. AAA - AUTHORIZATION
19. LAB : USER ACCOUNTS AND PRIVILEGE LEVELS
20. ROLE BASED ACCESS CONTROL
21. LAB : ROLE BASED ACCESS CONTROL (VIEWS)
22. NETWORK & DEVICE LOGGING
23. LOGGING ON CISCO ROUTERS.
24. NETWORK TIME PROTOCOL
25. LAB :NETWORK TIME PROTOCOL
26. SIMPLE NETWORK MANAGEMENT PROTOCOL
27. CONTROL PLANE SECURITY
28. LAB RIPv2 AUTHENTICATION
29. L A B : EIGRP AUTHENTICATION
30. LAB : OSPF AUTHENTICATION (Interface level)
31. CONTROL PLANE POLICING
32. LAB : CONTROL PLANE POLICING
33. FIREWALLS - OVERVIEW
34. CISCO ASA FIREWALL
35. MANAGING CISCO ASA FIREWALL
36. LAB: Basic ASA Configuration
37. LAB: ASA BASIC INTERFACE CONFIGURATIONS.
38. ASA - ROUTING
39. ASA -Static & Default Routing

Call or Whatsapp: +91 7259459745 (INDIA) | +1 (902) 919-7413 (CANADA)

Mail : info@hazynetwork.com Website: www.hazynetwork.com/

You tube channel: https://www.youtube.com/channel/UCSIt8Wocol4RhUy4EVp2pfg/videos


40. LAB: ASA Routing using RIPv2
41. LAB: ASA Routing using EIGRP
42. LAB: ASA Routing - OSPF
43. LAB: Redistribution
44. ASA - ACCESS CONTROL LIST
45. LAB: ASA Security policies & ACL :
TABLE OF CONTENTS
46. ACL OBJECTGROUP
47. LAB: ACL & object groups
48. LAB: Remote Access of ASA
49. NETWORK ADDRESS TRANSLATION
50. LAB: NAT (Dynamic NAT / PAT)
51. LAB: Dynamic NAT/PAT combination:
52. LAB: Static NAT:
53. LAB: STATIC PAT:
54. IOS ZONE BASED POLICY FIREWALL
55. LAB: ZONE BASED FIREWALL
56. LAYER 2 SECURITY
57. VLAN HOPPING ATTACKS (NATIVE VLAN , DTP CONCEPTS)
58. LAB: VERIFYING DTP
59. CISCO DISCOVERY PROTOCOL
60. LAB: VERIFY CDP
61. SPANNING-TREE PORTFAST
62. LAB: STP PORT FAST:
63. BPDU GUARD & BPDU FILTER
64. LAB: BPDU Guard:
65. LAB: BPDU filter (interface level)
66. LAB : ROOT GUARD
67. MAC FLOODING & MAC SPOOFING ATTACKS- PORT SECURITY
68. LAB : PORT-SECURITY.
69. DHCP SPOOFING - DHCP SNOOPING
70. LAB : DHCP Snooping :
71. ARP SPOOFING - DYNAMIC ARP INSPECTION
72. LAB : Dynamic ARP inspection:
73. PROTECTED PORTS - PRIVATE VLAN EDGE
74. PRIVATE VLAN
75. LAB: PRIVATE VLAN
76. CRYPTOGRAPHY - CONCEPTS
77. WHAT ARE HASHING ALGORITHMS ?
78. WHAT ARE ENCRYPTION ALGORIHTMS ?
79. CRYPATANALYSIS - OVERVIEW.
80. PUBLIC KEY INFRASTRUCTURE
81. VPN - INTRODUCTION
82. IPSEC - OVERVIEW .
83. IPSEC VPN -CONFIGURATION - PHASES

Call or Whatsapp: +91 7259459745 (INDIA) | +1 (902) 919-7413 (CANADA)

Mail : info@hazynetwork.com Website: www.hazynetwork.com/

You tube channel: https://www.youtube.com/channel/UCSIt8Wocol4RhUy4EVp2pfg/videos


84. LAB : IPsec Site-Site VPN
85. REMOTE ACCESS VPN
86. WHAT IS SSL/TLS ?
87. IDENTITY MANAGEMENT - DEVICE ACCESS -
88. INTRUSION PREVENTION SYSTEM - IPS
TABLE OF CONTENTS
89. CONTENT SECURITY - WSA , ESA OVERVIEW

Call or Whatsapp: +91 7259459745 (INDIA) | +1 (902) 919-7413 (CANADA)

Mail : info@hazynetwork.com Website: www.hazynetwork.com/

You tube channel: https://www.youtube.com/channel/UCSIt8Wocol4RhUy4EVp2pfg/videos

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy