0% found this document useful (0 votes)
95 views

CCNA Security

This document outlines the topics covered in the CCNA Security certification course, which lasts 1 month. It covers securing Cisco routers and networks from common attacks like viruses, worms, and denial of service attacks. Specific skills include implementing AAA, ACLs, firewalls, IPS, and site-to-site VPNs on Cisco routers using both CLI and SDM to configure security features and monitor routers. The goal is to mitigate threats, implement secure access management, and harden network infrastructure security.

Uploaded by

giriraj
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
95 views

CCNA Security

This document outlines the topics covered in the CCNA Security certification course, which lasts 1 month. It covers securing Cisco routers and networks from common attacks like viruses, worms, and denial of service attacks. Specific skills include implementing AAA, ACLs, firewalls, IPS, and site-to-site VPNs on Cisco routers using both CLI and SDM to configure security features and monitor routers. The goal is to mitigate threats, implement secure access management, and harden network infrastructure security.

Uploaded by

giriraj
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

CCNA Security

(Cisco Certi ed Network Associate)


Duration: 1 Months
Describe the security threats facing modern  Discuss the caveats to be considered when
network infrastructures building ACLs
 Describe and list mitigation methods for
common network attacks Implement secure network management and
 Describe and list mitigation methods for reporting
Worm, Virus, and Trojan Horse attacks  Use CLI and SDM to con gure SSH on Cisco
 Describe the Cisco Self Defending Network routers to enable secured management access
architecture  Use CLI and SDM to con gure Cisco routers
to send Syslog messages to a Syslog server
Secure Cisco routers
 Secure Cisco routers using the SDM Security Mitigate common Layer 2 attacks
Audit feature  Describe how to prevent layer 2 attacks by
 Use the One-Step Lockdown feature in SDM con guring basic Catalyst switch security
to secure a Cisco router
 Secure administrative access to Cisco routers by features
setting strong encrypted passwords, exec
 timeout, login failure rate and using IOS login Implement the Cisco IOS rewall feature set
enhancements using SDM
 Secure administrative access to Cisco routers by  Describe the operational strengths and
con guring multiple privilege levels weaknesses of the di erent rewall technologies
 Secure administrative access to Cisco routers by  Explain stateful rewall operations and the
con guring role based CLI
 Secure the Cisco IOS image and con guration function of the state table
le  Implement Zone Based Firewall using SDM

Implement AAA on Cisco routers using local Implement the Cisco IOS IPS feature set using
router database and external ACS SDM
 Explain the functions and importance of AAA  De ne network based vs. host based intrusion
 Describe the features of TACACS+ and
detection and prevention
RADIUS AAA protocols
 Explain IPS technologies, attack responses, and
 Con gure AAA authentication
 Con gure AAA authorization monitoring options
 Con gure AAA accounting  Enable and verify Cisco IOS IPS operations
using SDM
Mitigate threats to Cisco routers and networks
using ACLs Implement site-to-site VPNs on Cisco Routers
 Explain the functionality of standard, extended,  Explain the di erent methods used in
and named IP ACLs used by routers to
cryptography
 lter packets
 Con gure and verify IP ACLs to mitigate  Explain IKE protocol functionality and phases
given threats ( lter IP tra c destined for  Describe the building blocks of IPSec and the
 Telnet, SNMP, and DDoS attacks) in a security functions it provides
network using CLI  Con gure and verify an IPSec site-to-site VPN
 Con gure IP ACLs to prevent IP address with pre-shared key authentication using SDM
spoo ng using CLI

NETCRAFTZ
Craft Your Future With The Experts

You might also like