Speak to our team now +44 (0)1737 821590

Implementing Cisco Network Security

A 5 day
HANDS ON
training course
  • Home
  • /
  • CCNA security

CCNA security training course description

A course that focuses on the design, implementation and monitoring of a comprehensive security policy, using Cisco IOS security features and technologies. All IOS examples and hands on experience is done using the IOS CLI. IPS is covered at the theoretical level from the perspective of FirePower technologies. Site-to-Site VPN configuration is covered on both IOS and the Cisco ASA . Modern malware examples are provided, cryptographic techniques use stronger hashing and encryption algorithms, and current versions of IOS, Cisco ASA and Cisco AnyConnect are highlighted.

Key outcomes from this course

By the end of the course delegates will be able to:
  • Configure AAA on Cisco IOS devices.
  • Secure the control plane, the management and control planes of network devices.
  • Implement layer 2 security
  • Configure Cisco ASA management access, NAT, access control and service policies.
  • Implement a remote access VPN.

CCNA security training course details

Who will benefit:
Those wishing to gain an understanding of Cisco Security on the network or those looking to obtain the CCNA for Security Certification.
Prerequisites:
Introduction to Data communications & networking
Duration:
5 days

Training approach

This structured course uses Instructor Led Training to provide the best possible learning experience. Small class sizes ensure students benefit from our engaging and interactive style of teaching with delegates encouraged to ask questions throughout the course. Quizzes follow each major section allowing checking of learning. Hands on sessions are used throughout to allow delegates to consolidate their new skills.

Overall rating:

Customer reviews


"An excellent course."
A. M. Babcock
"Everything was very well explained."
B. G. Brighton and Hove City Counsil

CCNA security training course contents

Security Concepts
Threatscape
Threat Defense Technologies
Security Policy and Basic Security Architectures
Cryptographic Technologies

Secure Network Devices
Implementing AAA
Management Protocols and Systems
Securing the Control Plane

Layer 2 Security
Securing Layer 2 Infrastructure
Securing Layer 2 Protocols

Firewall
Firewall Technologies
Introducing the Cisco ASA v9.2
Cisco ASA Access Control and Service Policies
Cisco IOS Zone Based Firewall

VPN
IPsec Technologies
Site-to-Site VPN
Client Based Remote Access VPN
Clientless Remote Access VPN

Advanced Topics
Intrusion Detection and Protection
Endpoint Protection
Content Security
Advanced Network Security Architectures

Labs
Challenge Lab 1: Configure AAA and Secure Remote Administration.
Challenge Lab 2: Configure Secure Network Management Protocols.
Challenge Lab 3: Configure Secure EIGRP Routing.
Challenge Lab 4: Configure Secure Layer 2 Infrastructure.
Challenge Lab 5: Configure DHCP Snooping and STP Protection.
Challenge Lab 6: Configure Interfaces and NAT on the Cisco ASA.
Challenge Lab 7: Configure Network Access Control with the Cisco ASA.
Challenge Lab 8: Configure Site-to-Site VPN on IOS.
Challenge Lab 9: Configure AnyConnect Remote Access VPN on ASA.
Challenge Lab 10: Configure Clientless SSL VPN on the ASA.

Why Choose Us

SNT trainers score an average of over 90% on the three main areas of:
  • Ability to teach
  • Technical knowledge
  • Answering questions
“Excellently presented by a very knowledgeable and enthusiastic trainer.” P.D. General Dynamics

We limit our maximum class size to 8 delegates; often we have less than this. This ensures optimal interactivity between delegates and instructor.
"Excellent course. The small class size was a great benefit…" M.B. IBM

We write our own courses; courseware does not just consist of slides and our slides are diagrams not bullet point text. A typical chapter provides clearly defined objectives with a chapter overview, slides with text underneath, a quiz at the end to check the learning of the students. Hands on exercises are at the end and are used to reinforce the theory.

See Dates & Prices for this course

To enquire about this course

To reserve this course online