CCNA Security training in Jalandhar

Cisco Certified Network Associate Security (CCNA Security) validates associate-level information and skillsneeded to secure Cisco networks. With a CCNA Security certification, a network skilled demonstrates the abilities needed to develop a security infrastructure, acknowledge threats and vulnerabilities to networks, and mitigate security threats. The CCNA Security syllabus emphasizes core security technologies, the installation, troubleshooting and watching of network devices to keep up integrity, confidentiality andhandiness of knowledge and devices, and ability within the technologies that Cisco uses in its security structure.

ccna secure  CCNA SECURITY ccna secure


Detail Syllabus


Describe the security threats facing modern network infrastructures

Describe & list mitigation methods for common network attacks

Describe & list mitigation methods for Worm, Virus, & Trojan Horse attacks

Describe the Cisco Self Defending Network Architecture


Secure Cisco Routers

Secure Cisco routers using the SDM Security Audit feature

Use the One-Step Lockdown feature in SDM to secure a Cisco router


Secure administrative access to Cisco Routers by configuring multiple privilege levels

Secure administrative access to Cisco Routers through CLI

Secure Cisco IOS image & configuration file


Implement AAA on Cisco Routers using local Router database & external ACS

Explain functions & importance of AAA

Configure AAA authentication

Describe features of TACACS+ & RADIUS AAA protocols

Configure AAA authorization & accounting


Implement the Cisco IOS firewall feature set using SDM

Describe operational strengths & weaknesses of the different firewall technologies

Explain stateful firewall operations & function of the state table

Implement Zone Based Firewall using SDM


Implement site-to-site VPNs on Cisco Routers using SDM

Explain different methods used in cryptography

Describe building blocks of IPSec & security functions

Configure & verify an IPSec site-to-site VPN using SDM

Explain IKE protocol functionality & phases