CCNA Security 2.0 Scope and Sequence



Similar documents
CCNA Security v1.0 Scope and Sequence

CCNA Security v1.0 Scope and Sequence

CISCO IOS NETWORK SECURITY (IINS)

Implementing Cisco IOS Network Security v2.0 (IINS)

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline

IINS Implementing Cisco Network Security 3.0 (IINS)

Implementing Cisco IOS Network Security

Cisco Certified Security Professional (CCSP)

CCNA Cisco Associate- Level Certifications

Cisco Security Certifications

Cisco Certified Security Professional (CCSP) 50 Cragwood Rd, Suite 350 South Plainfield, NJ 07080

ICT Infrastructure & Network Management

Securing Networks with Cisco Routers and Switches 1.0 (SECURE)

Tim Bovles WILEY. Wiley Publishing, Inc.

TABLE OF CONTENTS NETWORK SECURITY 2...1

The IINS acronym to this exam will remain but the title will change slightly, removing IOS from the title, making the new title

SNRS. Securing Networks with Cisco Routers and Switches. Length 5 days. Format Lecture/lab

CCNA Security. IINS v2.0 Implementing Cisco IOS Network Security ( )

TABLE OF CONTENTS NETWORK SECURITY 1...1

Latest IT Exam Questions & Answers

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0

Computer Network Engineering

Cisco Certified Network Expert (CCNE)

Computer Network Engineering

CCNP: Implementing Secure Converged Wide-area Networks

Montgomery County Community College Non-Credit Programs Winter/Spring 2016 TECHNOLOGY PROGRAMS

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD SEGURIDAD EN REDES. NIVEL I. VERSION 2.0

Implementing Cisco Secure Mobility

Implementing Cisco Secure AccessSolutions Exam

How To Pass A Credit Course At Florida State College At Jacksonville

Deploying Cisco ASA VPN Solutions

SSECMGT: CManaging Enterprise Security with Cisco Security Manager v4.x

Security Threats VPNs and IPSec AAA and Security Servers PIX and IOS Router Firewalls. Intrusion Detection Systems

Configuration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Cisco Firewall. Overview

VPN_2: Deploying Cisco ASA VPN Solutions

Managing Enterprise Security with Cisco Security Manager

Interconnecting Cisco Networking Devices: Accelerated (CCNAX) 2.0(80 Hs) 1-Interconnecting Cisco Networking Devices Part 1 (40 Hs)

Implementing Core Cisco ASA Security (SASAC)

Cisco ASA. Administrators

A Preliminary Evaluation of the new Cisco Network Security Course

ICAB5238B Build a highly secure firewall

Configuring IPsec VPN with a FortiGate and a Cisco ASA

Implementing Cisco IOS Network Security

Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College

Managing Enterprise Security with Cisco Security Manager

IT Networking and Security

Securing Networks with PIX and ASA

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Lab Developing ACLs to Implement Firewall Rule Sets

Scenario: Remote-Access VPN Configuration

Chapter 1 The Principles of Auditing 1

Lab Organizing CCENT Objectives by OSI Layer

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College

ESUMS HIGH SCHOOL. Computer Network & Engineering (CNE) Syllabus

Cisco Router and Security Device Manager (SDM)

Cisco Network Specialist CCNA

NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus

CCIE Exam Certification CCIE Routing and Switching Exam Certification Guide dec-2009

June 16, To Whom It May Concern:

Securing Cisco Network Devices (SND)

CCNP V 6.0 Scope and Sequence

INTERCONNECTING CISCO NETWORK DEVICES PART 1 V2.0 (ICND 1)

Configuring a Site-to-Site VPN Tunnel Between Cisco RV320 Gigabit Dual WAN VPN Router and Cisco (1900/2900/3900) Series Integrated Services Router

Network Access Security. Lesson 10

Cisco Which VPN Solution is Right for You?

How To Learn Cisco Cisco Ios And Cisco Vlan

(d-5273) CCIE Security v3.0 Written Exam Topics

Allegany College of Maryland. 239 Cisco Networking 2 * Offered Fall semester and

PCI Compliance for Branch Offices: Using Router-Based Security to Protect Cardholder Data

To participate in the hands-on labs in this class, you need to bring a laptop computer with the following:

Implementing Cisco Intrusion Prevention System 7.0 (IPS)

Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0

- Introduction to PIX/ASA Firewalls -

Associate in Science Degree in Computer Network Systems Engineering

Cisco Certified Network Associate - Design

Bachelor of Information Technology (Network Security)

Site to Site Virtual Private Networks (VPNs):

AC : INNOVATIVE NETWORK SECURITY COURSE DEVELOPMENT

Inquire about our programs at Worcester Technical High School!

FIREWALLS & CBAC. philip.heimer@hh.se

Cisco Certified Network Associate (CCNA) Cisco Certified Network Associate (CCNA)

Cisco Advanced Services for Network Security

"Charting the Course...

Cisco CCNP Implementing Secure Converged Wide Area Networks (ISCW)

Cisco Certification Skills Matrix

A Model Design of Network Security for Private and Public Data Transmission

NETWORK SECURITY (W/LAB) Course Syllabus

APPLICATION FOR BOARD APPROVAL. Of Locally Developed Course. Cisco CCNA Certification 11/12

Interconnecting Cisco Network Devices 1 Course, Class Outline

Lecture 17 - Network Security

CCNA Security Portable Command Guide

Configuration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Sonicwall Firewall.

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

Case Study for Layer 3 Authentication and Encryption

information security and its Describe what drives the need for information security.

How To Pass The Information And Network Security Certificate

PCISS-1. Job Description: Key Responsibilities: I. Perform troubleshooting& support:

Transcription:

CCNA Security 2.0 Scope and Sequence Last Updated August 26, 2015 Target Audience The Cisco CCNA Security course is designed for Cisco Networking Academy students seeking career-oriented, entry-level security specialist skills. Target students include individuals enrolled in technology degree programs at institutions of higher education and IT professionals who want to enhance their core routing and switching skills. CCNA Security provides a next step for CCENT or CCNA Routing and Switching students who want to expand their skill set to prepare for a career in network security. Prerequisites CCNA Security students should have the following skills and knowledge: CCENT-level networking concepts and skills Basic PC and Internet navigation skills Target Certifications The CCNA Security curriculum prepares students for the Implementing Cisco Network Security (IINS) certification exam (210-260), leading to the CCNA Security certification. Curriculum Description CCNA Security equips students with the knowledge and skills needed to prepare for entry-level security specialist careers. This course is a hands-on, career-oriented e-learning solution that emphasizes practical experience. It is a blended curriculum with both online and classroom learning. CCNA Security aims to develop an in-depth understanding of network security principles as well as the tools and configurations required to secure a network. Various types of hands-on labs provide practical experience, including procedural and troubleshooting labs, skills integration challenges, and model building. All hands-on labs in the course can be completed on actual physical equipment or in conjunction with the NDG NETLAB solution. Most chapters include Packet Tracer-based skills integration challenges that are cumulative throughout the course. Curriculum Objectives CCNA Security helps students develop the skills needed for entry-level network security career opportunities and prepare for the CCNA Security certification. It provides a theoretically rich, hands-on introduction to network security, in a logical sequence driven by technologies. The goals of CCNA Security are as follows: Provide an in-depth, theoretical understanding of network security Provide students with the knowledge and skills necessary to design and support network security 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 5

Provide an experience-oriented course that employs industry-relevant instructional approaches to prepare students for entry-level jobs in the industry Enable students to have significant hands-on interaction with IT equipment to prepare them for certification exams and career opportunities Upon completion of the CCNA Security course, students will be able to perform the following tasks: Explain network threats, mitigation techniques, and the basics of securing a network Secure administrative access on Cisco routers Secure administrative access with AAA Implement firewall technologies to secure the network perimeter Configure IPS to mitigate attacks on the network Describe LAN security considerations and implement endpoint and Layer 2 security features Describe methods for implementing data confidentiality and integrity Implement secure virtual private networks Implement an ASA firewall configuration using the CLI Implement an ASA firewall configuration and VPNs using ASDM Test network security and create a technical security policy Minimum System Requirements CCNA Security curriculum requirements: 1 Student PC per student Lab bundle requirements for CCNA Security: Detailed equipment information, including descriptions and part numbers, is available on Cisco Netspace on the Equipment Information page. Please refer to that document for the latest information, which includes specifications for the following minimum equipment required: 3 Cisco routers, 2 with the Security Technology Package License 3 Two-Port Serial WAN Interface Cards 3 Cisco switches 1 Cisco Adaptive Security Appliance (ASA) Assorted Ethernet and Serial cables and hubs 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 5

The equipment should be set up in the following configuration: 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 5

CCNA Security Outline This course teaches students the skills needed to obtain entry-level security specialist jobs. It provides a hands-on introduction to network security. Instructors are encouraged to provide outside-the-classroom learning experiences. Chapter Outline Table 1. Chapter Outline Chapter /Section Chapter 1. Modern Network Security Threats Goals/Objectives Explain network threats, mitigation techniques, and the basics of securing a network 1.1 Securing Networks Explain network security 1.2 Network Threats Describe various types of threats and attacks 1.3 Mitigating Threats Explain tools and procedures to mitigate the effects of malware and common network attacks. Chapter 2. Securing Network Devices Secure administrative access on Cisco routers 2.1 Securing Device Access Configure secure administrative access 2.2 Assigning Administrative Roles Configure command authorization using privilege levels and role-based CLI 2.3 Monitoring and Managing Devices Implement the secure management and monitoring of network devices. 2.4 Using Automated Security Features Use automated features to enable security on IOS-based routers. Chapter 3. Authentication, Authorization and Secure administrative access with AAA Accounting 3.1 Purpose of AAA Explain how AAA is used to secure a network. 3.2 Local AAA Authentication Implement AAA authentication that validates users against a local database. 3.3 Server-Based AAA Explain server-based AAA authentication and its communication protocols. 3.4 Server-Based AAA Authentication Implement server-based AAA authentication using TACACS+ and RADIUS protocols. 3.5 Server-Based AAA Authorization and Configure server-based AAA authorization and accounting Accounting Chapter 4. Implementing Firewall Technologies Implement firewall technologies to secure the network perimeter 4.1 Access Control Lists Implement access control lists (ACLs) to filter traffic and mitigate network attacks on a network. 4.2 Firewall Technologies Configure a classic firewall to mitigate network attacks. 4.3 Zone-Based Policy Firewalls Implement Zone-Based Policy Firewall using CLI. Chapter 5. Implementing Intrusion Prevention Configure IPS to mitigate attacks on the network 5.1 IPS Technologies Explain how network-based IPS is used to help secure a network. 5.2 IPS Signatures Explain how signatures are used to detect malicious network traffic. 5.3 Implement IPS Configure Cisco IOS IPS operations using CLI. 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 5

Chapter /Section Chapter 6. Securing the Local Area Network Goals/Objectives Describe LAN security considerations and implement endpoint and Layer 2 security features 6.1 Endpoint Security Explain endpoint vulnerabilities and protection methods. 6.2 Layer 2 Security Considerations Implement Layer 2 security features. Chapter 7. Cryptographic Systems Describe methods for implementing data confidentiality and integrity 7.1 Cryptographic Services Explain how the types of encryption, hashes, and digital signatures work together to provide confidentiality, integrity, and authentication. 7.2 Basic Integrity and Authenticity Explain how cryptographic hashes are used to ensure data integrity and authentication. 7.3 Confidentiality Explain how encryption algorithms are used to ensure data confidentiality. 7.4 Public Key Cryptography Explain how a public key infrastructure is used to ensure data confidentiality and provide authentication. Chapter 8. Implementing Virtual Private Networks Implement secure virtual private networks 8.1 VPNs Explain the purpose of VPNs. 8.2 IPsec VPN Components and Operation Explain how IPsec VPNs operate. 8.3 Implementing Site-to-Site IPsec VPNs with CLI Configure a site-to-site IPsec VPN, with pre-shared key authentication, using CLI. Chapter 9. Implementing the Cisco Adaptive Implement an ASA firewall configuration using the CLI Security Appliance 9.1 Introduction to the ASA Explain how the ASA operates as an advanced stateful firewall. 9.2 ASA Firewall Configuration Implement an ASA firewall configuration. Chapter 10. Advanced Cisco Adaptive Security Implement an ASA firewall configuration and VPNs using ASDM Appliance 10.1 ASA Security Device Manager Implement an ASA firewall configuration. 10.2 ASA VPN Configuration Configure remote-access VPNs on an ASA. Chapter 11. Managing a Secure Network Test network security and create a technical security policy 11.1 Network Security Testing Explain the various techniques and tools used for network security testing. 11.2 Developing a Comprehensive Security Policy Explain how to develop a comprehensive security policy. 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 5