0% found this document useful (0 votes)
632 views3 pages

CCNA Security Syllabus

The document outlines the syllabus for a CCNA Security certification. It covers 89 topics related to network security basics, attacks and mitigation techniques, security devices, firewalls, VPNs, IDS/IPS, encryption, access control, and securing network infrastructure and devices. Labs are included to provide hands-on experience with technologies like AAA, SSH, ACLs, NAT, VLANs, routing authentication, zone-based firewalls, and IPSec site-to-site VPN configuration.

Uploaded by

misraoui
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
632 views3 pages

CCNA Security Syllabus

The document outlines the syllabus for a CCNA Security certification. It covers 89 topics related to network security basics, attacks and mitigation techniques, security devices, firewalls, VPNs, IDS/IPS, encryption, access control, and securing network infrastructure and devices. Labs are included to provide hands-on experience with technologies like AAA, SSH, ACLs, NAT, VLANs, routing authentication, zone-based firewalls, and IPSec site-to-site VPN configuration.

Uploaded by

misraoui
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

CCNA Security Syllabus

1. NETWORK SECURITY - BASICS


2. NETWORK SECURITY ATTACKS & MITIGATION
3. THREAT DEFENSE TECHNOLOGIES & SECURITY DEVICES - OVERVIEW
4. CCNA SECURITY - LAB SETUP
5. CCNP ROUTERS - LAB SETUP
6. HOW TO INSTALL AND USE GNS3
7. How to add Cisco ASA 8.4(2) or ASA 9. J (5) to GNS3
8. NETWORK INFRASTRUCTION PROTECTION - DEVICE PLANES
9. LAB: Securing the Router for Administrative Access
10. SECURE SHELL - SSH
11. LAB: Secure Shell (SSH)
12. RESTRICT TELNET ACCESS
13. LAB : Restricting Telnet Access to the Router to Specified Networks or
Hosts.
14. AAA - OVERVIEW.
15. LAB: AAA AUTHENTICATION USING LOCAL DATABASE
16. AAA using EXTERNAL SERVERS
17. LAB: AAA AUTHENTICATION USING TACACS+
18. AAA - AUTHORIZATION
19. LAB : USER ACCOUNTS AND PRIVILEGE LEVELS
20. ROLE BASED ACCESS CONTROL
21. LAB : ROLE BASED ACCESS CONTROL (VIEWS)
22. NETWORK & DEVICE LOGGING
23. LOGGING ON CISCO ROUTERS.
24. NETWORK TIME PROTOCOL
25. LAB :NETWORK TIME PROTOCOL
26. SIMPLE NETWORK MANAGEMENT PROTOCOL
27. CONTROL PLANE SECURITY
28. LAB RIPv2 AUTHENTICATION
29. L A B : EIGRP AUTHENTICATION
30. LAB : OSPF AUTHENTICATION (Interface level)
31. CONTROL PLANE POLICING
32. LAB : CONTROL PLANE POLICING
33. FIREWALLS - OVERVIEW
34. CISCO ASA FIREWALL
35. MANAGING CISCO ASA FIREWALL
36. LAB: Basic ASA Configuration
37. LAB: ASA BASIC INTERFACE CONFIGURATIONS.
38. ASA - ROUTING
39. ASA -Static & Default Routing
40. LAB: ASA Routing using RIPv2
41. LAB: ASA Routing using EIGRP
42. LAB: ASA Routing - OSPF
43. LAB: Redistribution
44. ASA - ACCESS CONTROL LIST
45. LAB: ASA Security policies & ACL :
46. ACL OBJECTGROUP
47. LAB: ACL & object groups
48. LAB: Remote Access of ASA
49. NETWORK ADDRESS TRANSLATION
50. LAB: NAT (Dynamic NAT / PAT)
51. LAB: Dynamic NAT/PAT combination:
52. LAB: Static NAT:
53. LAB: STATIC PAT:
54. IOS ZONE BASED POLICY FIREWALL
55. LAB: ZONE BASED FIREWALL
56. LAYER 2 SECURITY
57. VLAN HOPPING ATTACKS (NATIVE VLAN , DTP CONCEPTS)
58. LAB: VERIFYING DTP
59. CISCO DISCOVERY PROTOCOL
60. LAB: VERIFY CDP
61. SPANNING-TREE PORTFAST
62. LAB: STP PORT FAST:
63. BPDU GUARD & BPDU FILTER
64. LAB: BPDU Guard:
65. LAB: BPDU filter (interface level)
66. LAB : ROOT GUARD
67. MAC FLOODING & MAC SPOOFING ATTACKS- PORT SECURITY
68. LAB : PORT-SECURITY.
69. DHCP SPOOFING - DHCP SNOOPING
70. LAB : DHCP Snooping :
71. ARP SPOOFING - DYNAMIC ARP INSPECTION
72. LAB : Dynamic ARP inspection:
73. PROTECTED PORTS - PRIVATE VLAN EDGE
74. PRIVATE VLAN
75. LAB: PRIVATE VLAN
76. CRYPTOGRAPHY - CONCEPTS
77. WHAT ARE HASHING ALGORITHMS ?
78. WHAT ARE ENCRYPTION ALGORIHTMS ?
79. CRYPATANALYSIS - OVERVIEW.
80. PUBLIC KEY INFRASTRUCTURE
81. VPN - INTRODUCTION
82. IPSEC - OVERVIEW .
83. IPSEC VPN -CONFIGURATION - PHASES
84. LAB : IPsec Site-Site VPN
85. REMOTE ACCESS VPN
86. WHAT IS SSL/TLS ?
87. IDENTITY MANAGEMENT - DEVICE ACCESS -
88. INTRUSION PREVENTION SYSTEM - IPS
89. CONTENT SECURITY - WSA , ESA OVERVIEW

You might also like