HAZYNETWORK
CCNA/CCNP/ASA/AWS/PYTHON/SDWAN/Automation
CISCO CCNA Security – Course outline
About the course
This course allows learners to understand common security concepts, and
deploy basic security techniques utilizing a variety of popular security appliances
within a "real-life" network infrastructure. It focuses on security principles and
technologies, using Cisco security products to provide hands-on examples.
Syllabus : CISCO CCNA SECURITY
Requirements?
Skills and knowledge equivalent to those learned in CCNA Routing &
Switching knowledge
Working knowledge of the Windows operating system
Working knowledge of Cisco IOS networking and concepts
What skills will you learn?
Describe common network security concepts
Secure routing and switching infrastructure
Deploy basic authentication, authorization and accounting services
(AAA)
Deploy basic firewalling services (ASA & IOS Based)
Deploy basic site-to-site and remote access VPN services (IPSec & SSL)
Describe the use of more advanced security services such as intrusion
protection, content security and identity management.
Training duration and materials
Once you will enroll you will get below materials
Weekdays and Weekend batches are available
Training duration : 35 to 40 hours
Training mode : Online
Live recorded session - 40 hours
Lab workbook
Interview questions
Official Cisco book
Everything will be shared in Google drive
You can access it lifetime
Call or Whatsapp: +91 7259459745 (INDIA) | +1 (902) 919-7413 (CANADA)
Mail : [email protected] Website: www.hazynetwork.com/
You tube channel: https://www.youtube.com/channel/UCSIt8Wocol4RhUy4EVp2pfg/videos
SYLLABUS BLUEPRINT
1. NETWORK SECURITY - BASICS
2. NETWORK SECURITY ATTACKS & MITIGATION
3. THREAT DEFENSE TECHNOLOGIES & SECURITY DEVICES - OVERVIEW
4. CCNA SECURITY - LAB SETUP
TABLE OF CONTENTS
5. CCNP ROUTERS - LAB SETUP
6. HOW TO INSTALL AND USE GNS3
7. How to add Cisco ASA 8.4(2) or ASA 9. J (5) to GNS3
8. NETWORK INFRASTRUCTION PROTECTION - DEVICE PLANES
9. LAB: Securing the Router for Administrative Access
10. SECURE SHELL - SSH
11. LAB: Secure Shell (SSH)
12. RESTRICT TELNET ACCESS
13. LAB : Restricting Telnet Access to the Router to Specified Networks or Hosts.
14. AAA - OVERVIEW.
15. LAB: AAA AUTHENTICATION USING LOCAL DATABASE
16. AAA using EXTERNAL SERVERS
17. LAB: AAA AUTHENTICATION USING TACACS+
18. AAA - AUTHORIZATION
19. LAB : USER ACCOUNTS AND PRIVILEGE LEVELS
20. ROLE BASED ACCESS CONTROL
21. LAB : ROLE BASED ACCESS CONTROL (VIEWS)
22. NETWORK & DEVICE LOGGING
23. LOGGING ON CISCO ROUTERS.
24. NETWORK TIME PROTOCOL
25. LAB :NETWORK TIME PROTOCOL
26. SIMPLE NETWORK MANAGEMENT PROTOCOL
27. CONTROL PLANE SECURITY
28. LAB RIPv2 AUTHENTICATION
29. L A B : EIGRP AUTHENTICATION
30. LAB : OSPF AUTHENTICATION (Interface level)
31. CONTROL PLANE POLICING
32. LAB : CONTROL PLANE POLICING
33. FIREWALLS - OVERVIEW
34. CISCO ASA FIREWALL
35. MANAGING CISCO ASA FIREWALL
36. LAB: Basic ASA Configuration
37. LAB: ASA BASIC INTERFACE CONFIGURATIONS.
38. ASA - ROUTING
39. ASA -Static & Default Routing
Call or Whatsapp: +91 7259459745 (INDIA) | +1 (902) 919-7413 (CANADA)
Mail : [email protected] Website: www.hazynetwork.com/
You tube channel: https://www.youtube.com/channel/UCSIt8Wocol4RhUy4EVp2pfg/videos
40. LAB: ASA Routing using RIPv2
41. LAB: ASA Routing using EIGRP
42. LAB: ASA Routing - OSPF
43. LAB: Redistribution
44. ASA - ACCESS CONTROL LIST
45. LAB: ASA Security policies & ACL :
TABLE OF CONTENTS
46. ACL OBJECTGROUP
47. LAB: ACL & object groups
48. LAB: Remote Access of ASA
49. NETWORK ADDRESS TRANSLATION
50. LAB: NAT (Dynamic NAT / PAT)
51. LAB: Dynamic NAT/PAT combination:
52. LAB: Static NAT:
53. LAB: STATIC PAT:
54. IOS ZONE BASED POLICY FIREWALL
55. LAB: ZONE BASED FIREWALL
56. LAYER 2 SECURITY
57. VLAN HOPPING ATTACKS (NATIVE VLAN , DTP CONCEPTS)
58. LAB: VERIFYING DTP
59. CISCO DISCOVERY PROTOCOL
60. LAB: VERIFY CDP
61. SPANNING-TREE PORTFAST
62. LAB: STP PORT FAST:
63. BPDU GUARD & BPDU FILTER
64. LAB: BPDU Guard:
65. LAB: BPDU filter (interface level)
66. LAB : ROOT GUARD
67. MAC FLOODING & MAC SPOOFING ATTACKS- PORT SECURITY
68. LAB : PORT-SECURITY.
69. DHCP SPOOFING - DHCP SNOOPING
70. LAB : DHCP Snooping :
71. ARP SPOOFING - DYNAMIC ARP INSPECTION
72. LAB : Dynamic ARP inspection:
73. PROTECTED PORTS - PRIVATE VLAN EDGE
74. PRIVATE VLAN
75. LAB: PRIVATE VLAN
76. CRYPTOGRAPHY - CONCEPTS
77. WHAT ARE HASHING ALGORITHMS ?
78. WHAT ARE ENCRYPTION ALGORIHTMS ?
79. CRYPATANALYSIS - OVERVIEW.
80. PUBLIC KEY INFRASTRUCTURE
81. VPN - INTRODUCTION
82. IPSEC - OVERVIEW .
83. IPSEC VPN -CONFIGURATION - PHASES
Call or Whatsapp: +91 7259459745 (INDIA) | +1 (902) 919-7413 (CANADA)
Mail : [email protected] Website: www.hazynetwork.com/
You tube channel: https://www.youtube.com/channel/UCSIt8Wocol4RhUy4EVp2pfg/videos
84. LAB : IPsec Site-Site VPN
85. REMOTE ACCESS VPN
86. WHAT IS SSL/TLS ?
87. IDENTITY MANAGEMENT - DEVICE ACCESS -
88. INTRUSION PREVENTION SYSTEM - IPS
TABLE OF CONTENTS
89. CONTENT SECURITY - WSA , ESA OVERVIEW
Call or Whatsapp: +91 7259459745 (INDIA) | +1 (902) 919-7413 (CANADA)
Mail : [email protected] Website: www.hazynetwork.com/
You tube channel: https://www.youtube.com/channel/UCSIt8Wocol4RhUy4EVp2pfg/videos