Cisco Certified Network Associate Security (CCNA Security)

60 Hours / 12 Months / Self-Paced
Retail Cost: $2,395.00

Course Overview:

CCNA Security Certification meets the needs of IT professionals who are responsible for network security. It confirms an individual's skills for job roles such as Network Security Specialists, Security Administrators, and Network Security Support Engineers. This certification validates skills including installation, troubleshooting and monitoring of network devices to maintain integrity, confidentiality and availability of data and devices and develops competency in the technologies that Cisco uses in its security structure.

It is highly recommended that you complete the CCNA certification exam prior to starting this course.

This course includes FREE access for 12 months to a cloud based lab platform to assist students develop the practical information technology (IT) skills necessary to succeed in high in demand IT jobs.  This cloud based lab solution uses real equipment that enables our students to execute each practical task in a safe environment that is accessible from anywhere without needing to buy their own hardware or risk damage to their own system.

Along with providing the necessary hardware in a virtual environment, students gain access to high quality practical exercises that cover many of the exam topics they will encounter on their certifying exams.

Course Outline:

Lesson 1: Introduction
Lesson 2: Networking Security Concepts
  • Understanding Network and Information Security Basics
  • Recognizing Current Network Threats
  • Applying Fundamental Security Principles to Network Design
  • Review All the Key Topics
Lesson 3: Common Security Threats
  • Network Security Threat Landscape
  • Distributed Denial-of-Service Attacks
  • Social Engineering Methods
  • Malware Identification Tools
  • Data Loss and Exfiltration Methods
  • Summary
  • Review All the Key Topics
Lesson 4: Implementing AAA in Cisco IOS
  • Cisco Secure ACS, RADIUS, and TACACS
  • Configuring Routers to Interoperate with an ACS Server
  • Configuring the ACS Server to Interoperate with a Router
  • Verifying and Troubleshooting Router-to-ACS Server Interactions
  • Review All the Key Topics
  • Command Reference to Check Your Memory
  • Lesson 5: Bring Your Own Device (BYOD)
  • Foundation Topics
  • Bring Your Own Device Fundamentals
  • BYOD Architecture Framework
  • Mobile Device Management
  • Exam Preparation Tasks
  • Review All the Key Topics
Lesson 6: Fundamentals of VPN Technology and Cryptography
  • Understanding VPNs and Why We Use Them
  • Cryptography Basic Components
  • Public Key Infrastructure
  • Putting the Pieces of PKI to Work
  • Review All the Key Topics
  • Command Reference to Check Your Memory
Lesson 7: Fundamentals of IP Security
  • IPsec Concepts, Components, and Operations
  • Configuring and Verifying IPsec
  • Review All the Key Topics
  • Command Reference to Check Your Memory
Lesson 8: Implementing IPsec Site-to-Site VPNs
  • Planning and Preparing an IPsec Site-to-Site VPN
  • Implementing and Verifying an IPsec Site-to-Site VPN in Cisco IOS Devices
  • Implementing and Verifying an IPsec Site-to-Site VPN in Cisco ASA
  • Review All the Key Topics
  • Command Reference to Check Your Memory
Lesson 9: Implementing SSL VPNs Using Cisco ASA
  • Functions and Use of SSL for VPNs
  • Configuring Clientless SSL VPNs on ASA
  • Using the Cisco AnyConnect Secure Mobility Client
  • Troubleshooting SSL VPN
  • Review All the Key Topics
Lesson 10: Securing Layer 2 Technologies
  • VLAN and Trunking Fundamentals
  • Spanning-Tree Fundamentals
  • Common Layer 2 Threats and How to Mitigate Them
  • CDP and LLDP
  • DHCP Snooping
  • Dynamic ARP Inspection
  • Review All the Key Topics
  • Command Reference to Check Your Memory
Lesson 11: Network Foundation Protection
  • Using Network Foundation Protection to Secure Networks
  • Understanding the Management Plane
  • Understanding the Control Plane
  • Understanding the Data Plane
  • Review All the Key Topics
Lesson 12: Securing the Management Plane on Cisco IOS Devices
  • Securing Management Traffic
  • Implementing Security Measures to Protect the Management Plane
  • Review All the Key Topics
  • Command Reference to Check Your Memory
Lesson 13: Securing the Data Plane in IPv6
  • Understanding and Configuring IPv6
  • Configuring IPv6 Routing
  • Developing a Security Plan for IPv6
  • Review All the Key Topics
  • Command Reference to Check Your Memory
Lesson 14: Securing Routing Protocols and the Control Plane
  • Foundation Topics
  • Securing the Control Plane
  • Control Plane Policing
  • Securing Routing Protocols
  • Exam Preparation Tasks
  • Review All the Key Topics
Lesson 15: Understanding Firewall Fundamentals
  • Firewall Concepts and Technologies
  • Using Network Address Translation
  • Creating and Deploying Firewalls
  • Review All the Key Topics
Lesson 16: Implementing Cisco IOS Zone-Based Firewalls
  • Cisco IOS Zone-Based Firewalls
  • Configuring and Verifying Cisco IOS Zone-Based Firewalls
  • Review All the Key Topics
  • Command Reference to Check Your Memory
Lesson 17: Configuring Basic Firewall Policies on Cisco ASA
  • The ASA Appliance Family and Features
  • ASA Firewall Fundamentals
  • Configuring the ASA
  • Review All the Key Topics
  • Command Reference to Check Your Memory
Lesson 18: Cisco IDS/IPS Fundamentals
  • IPS Versus IDS
  • Identifying Malicious Traffic on the Network
  • Managing Signatures
  • Monitoring and Managing Alarms and Alerts
  • Cisco Next-Generation IPS Solutions
  • Review All the Key Topics
Lesson 19: Mitigation Technologies for E-mail-Based and Web-Based Threats
  • Mitigation Technology for E-mail-Based Threats
  • Mitigation Technology for Web-Based Threats
  • Cisco Content Security Management Appliance
  • Review All the Key Topics
  • Command Reference to Check Your Memory
Lesson 20: Mitigation Technologies for Endpoint Threats
  • Antivirus and Antimalware Solutions
  • Personal Firewalls and Host Intrusion Prevention Systems
  • Advanced Malware Protection for Endpoints
  • Hardware and Software Encryption of Endpoint Data
  • Review All the Key Topics
Lesson 21: Final Preparation
  • The Cisco Learning Network
  • Lesson-Ending Review Tools
  • Recall the Facts
  • Practice Configurations
  • Using the Exam Engine

Certification(s):

Upon successful completion of this course, students will be prepared to sit for the Cisco 210-260 IINS: Implementing Cisco Network Security certification exam.


System Requirements:

Internet Connectivity Requirements:
  • Cable and DSL internet connections are recommended.

Hardware Requirements:
  • Minimum Pentium 400 Mhz CPU or G3 Macintosh. 1 GHz or greater CPU recommended.
  • 256MB RAM minimum. 1 GB RAM recommended.
  • 800x600 video resolution minimum. 1025x768 recommended.
  • Speakers/Headphones to listen to Dialogue steaming audio sessions.
  • A microphone to speak in Dialogue streaming audio sessions.
Operating System Requirements:
  • Windows Vista, 7, 8, 8.1, 9, 10
  • Mac OSX 10 or higher.
  • OpenSUSE Linux 9.2 or higher.
Web Browser Requirements:
  • Google Chrome is recommended.
  • Firefox 13.x or greater.
  • Internet Explorer 6.x or greater.
  • Safari 3.2.2 or greater.
Software Requirements:
  • Adobe Flash Player 6 or greater.
  • Oracle Java 7 or greater.
  • Adobe Reader 7 or greater.
Web Browser Settings:
  • Accept Cookies
  • Disable Pop-up Blocker.


**Outlines are subject to change, as courses and materials are updated.**