|
Course Name |
Cisco 210-260: CCNA Security |
Contact Hours: 50 |
|
Course Description |
Cisco Certified Network Associate Security (CCNA Security) validates associate-level knowledge and skills required to secure Cisco networks. With a CCNA Security certification, a network professional demonstrates the skills required to develop a security infrastructure, recognize threats and vulnerabilities to networks, and mitigate security threats. This course with 11 chapters emphasizes core security technologies, the installation, troubleshooting and monitoring of network devices to maintain integrity, confidentiality and availability of data and devices, and competency in the technologies that Cisco uses in its security structure. Topics for the course include Secure Access, Cisco ASA, Firewalls, IPS/IDS, VPNs and Secure Routing and Switch. Join thousands of other IT Professionals, achieve your goals and get started today working towards you CCNA Security certification!
Please note: Course of study may be completed earlier than indicated and students retain access for one year from the date of enrollment.
|
|
Outcome |
Every objective in the CCNA Security exam
Fundamentals of Network Security
Virtual Private Networks (VPNs)
Content and Endpoint Security
Cisco Firewall Technologies and Intrusion Prevention System Technologies
Secure Routing and Switching
Secure Access
|
|
Assessment |
Visual Demonstrations & Multimedia Presentations - Our courseware includes instructor-led demonstrations and visual presentations that allow students to develop their skills based on real world scenarios explained by the instructor. We always focus on real world scenarios and skill-set development.
|
|
Required Book(s) |
All training is delivered online; no additional purchase required. |
|
Outline |
Module 1: Network Review
Course Introduction
Network Review Part 1
Network Review Part 2
Network Review Part 3
Network Review Part 4
Module 2: Terminology and Fundamentals
Terminology and Fundamentals Part 1
Terminology and Fundamentals Part 2
Terminology and Fundamentals Part 3
Terminology and Fundamentals Part 4
Terminology and Fundamentals Part 5
Terminology and Fundamentals Part 6
Terminology and Fundamentals Part 7
Module 3: PKI and Cryptography
PKI and Cryptography Part 1
PKI and Cryptography Part 2
Module 4: AAA
AAA Part 1
AAA Part 2
AAA Part 3
Module 5: Bring Your Own Device
Bring Your Own Device Part 1
Bring Your Own Device Part 2
Bring Your Own Device Part 3
Module 6: Secure Access
Secure Access Part 1
Secure Access Part 2
Secure Access Part 3
Secure Access Demo
Module 7: VPNs
VPN Concepts Part 1
VPN Concepts Part 2
Remote Access VPNs Part 1
Remote Access VPNs Part 2
Site To Site VPNs
Module 8: Secure Routing and Switching
Secure Routing and Switching Part 1
Secure Routing and Switching Part 2
Secure Routing and Switching Demo 1
Secure Routing and Switching Demo 2
Layer 2 Attacks Part 1
Layer 2 Attacks Part 2
Layer 2 Attacks Part 3
Mitigation Part 1
Mitigation Part 2
Module 9: Firewalls
Firewall Technologies Part 1
Firewall Technologies Part 2
Implementing NAT Part 1
Implementing NAT Part 2
Zone-Based Firewall
Firewall Features On the ASA Part 1
Firewall Features On the ASA Part 2
Firewall Features On the ASA Part 3
Module 10: Intrusion Protection System (IPS)
Intrusion Protection System Part 1
Intrusion Protection System Part 2
Module 11: Content and Endpoint Security
Content and Endpoint Security Part 1
Content and Endpoint Security Part 2
Course Conclusion
|
|
|
|