• Course
  • Vendor
  • Guaranteed To Run

In this course, you will learn about the design, implementation & monitoring of a comprehensive security policy using Cisco IOS security features and technologies as examples. You will also learn about security controls of Cisco IOS devices as well as...

  • Course Start Date: 2019-06-03
  • Time: 08:30:00 - 16:30:00
  • Duration: 5 Day(s)
  • Location: Virtual
  • Delivery Methods(s): Virtual Instructor Led

Course Outline

Pre-Requisites

Working knowledge of the Windows operating system Working knowledge of Cisco IOS networking and concepts ICND1 v2.0 - Interconnecting Cisco Networking Devices, Part 1

Lessons

Prepare for the CCNA Security IINS 210-260 exam.

Training Accelerated: Cisco Training Exclusives for Certification Success

Accelerate your Cisco skills and expertise with our Cisco training exclusives for certification success. This course includes six months of free access to:

  • Class recordings so you can review your course any time
  • Unlimited retakes of your course to strengthen your understanding and ensure a strong exam performance
  • An exam voucher so you have everything you need to take the exam
  • Digital courseware for 24/7 access to authorized course materials, including changes and updates

In this course, you will learn about the design, implementation, and monitoring of a comprehensive security policy using Cisco IOS security features and technologies as examples. You will also learn about security controls of Cisco IOS devices as well as a functional introduction to the Cisco Adaptive Security Appliance (ASA). This course enables you to perform basic tasks to secure a network using Cisco IOS security features, which are available through web-based GUIs on the Cisco ASA, and the command-line interface (CLI) on Cisco routers and switches.

Site-to-site virtual private network (VPN) configuration is covered on both the Cisco IOS and the Cisco ASA. Modern malware examples are included in this course as are cryptographic techniques using stronger hashing and encryption algorithms. Current versions of Cisco IOS, Cisco ASA, and Cisco AnyConnect are featured.

What You'll Learn
  • Common network security concepts
  • Secure routing and switching infrastructure
  • Deploy basic authentication, authorization, and accounting services
  • Deploy basic firewalling services
  • Deploy basic site-to-site and remote access VPN services
  • Advanced security services such as intrusion protection, content security and identity management
  • Develop a comprehensive network security policy to counter threats against information security
  • Configure routers with Cisco IOS software security features, including management and reporting functions
  • Bootstrap the Cisco ASA Firewall for use in a production network
  • Configure the Cisco ASA Firewall for remote access to a Secure Sockets Layer (SSL) VPN
  • Configure a Cisco IOS zone-based firewall (ZBF) to perform basic security operations on a network
  • Configure site-to-site VPNs using Cisco IOS features
  • Configure security features on IOS switches to mitigate various Layer 2 and Layer 3 attacks
  • How a network can be compromised using freely available tools
  • Implement line passwords, and enable passwords and secrets
  • Examine authentication, authorization, and accounting (AAA) concepts and features using the local database as well as Cisco Secure ACS 5.2
  • Configure packet filtering on the perimeter router
Who Needs to Attend
  • Network designers
  • Network, systems, and security engineers
  • Network and security managers
Follow-On Courses
  • ICND2 v2.0 - Interconnecting Cisco Networking Devices, Part 2
  • SENSS - Implementing Cisco Edge Network Security Solutions
  • SIMOS - Implementing Cisco Secure Mobility Solutions
  • SISAS - Implementing Cisco Secure Access Solutions
  • SITCS - Implementing Cisco Threat Control Solutions
Certification Programs and Certificate Tracks

This course is part of the following programs or tracks:

  • CCNA Security
Course Outline
1. Security Concepts
  • Threatscape
  • Threat defense technologies
  • Security policy and basic security architectures
  • Cryptographic technologies
2. Secure Network Devices
  • Implementing AAA
  • Management protocols and systems
  • Securing the control plane
3. Layer 2 Security
  • Securing Layer 2 infrastructures
  • Securing Layer 2 protocols
4. Firewall
  • Firewall technologies
  • Introducing the Cisco ASA v9.2
  • Cisco ASA access control and service policies
  • Cisco IOS zone based firewall
5. VPN
  • IPsec technologies
  • Site-to-site VPN
  • Client-based remote access VPN
  • Clientless remote access VPN
6. Advanced Topics
  • Intrusion detection and protection
  • Endpoint protection
  • Content security
  • Advanced network security architectures
Labs
Lab 1: Exploring Cryptographic Technologies
Lab 2: Configure and Verify AAA
Lab 3: Configuration Management Protocols
Lab 4: Securing Routing Protocols
Lab 5: VLAN Security and ACLs on Switches
Lab 6: Port Security and Private VLAN Edge
Lab 7: Securing DHCP, ARP, and STP
Lab 8: Explore Firewall Technologies
Lab 9: Cisco ASA Interfaces and NAT
Lab 10: Access Control Using the Cisco ASA
Lab 11: Exploring Cisco IOS Zone-Based Firewall
Lab 12: Explore IPsec Technologies
Lab 13: IOS-Based Site-to-Site VPN
Lab 1: ASA-Based Site-to-Site VPN
Lab 14: Remote Access VPN: ASA and AnyConnect
Lab 15: Clientless Remote Access VPN
Lab 16: Configure AAA and Secure Remote Administration
Lab 17: Configure Secure Network Management Protocols
Lab 18: Configure Secure EIGRP Routing
Lab 19: Configure Secure Layer 2 Infrastructure
Lab 20: Configure DHCP Snooping and STP Protection
Lab 21: Configure Interfaces and NAT on the Cisco ASA
Lab 22: Configure Network Access Control with the Cisco ASA
Lab 23: Configure Site-to-Site VPN on IOS
Lab 24: Configure AnyConnect Remote Access VPN on ASA
Lab 25: Configure Clientless SSL VPN on the ASA

Cancellation Policy

We require 16 calendar days notice to reschedule or cancel any registration. Failure to provide the required notification will result in 100% charge of the course. If a student does not attend a scheduled course without prior notification it will result in full forfeiture of the funds and no reschedule will be allowed. Within the required notification period, only student substitutions will be permitted. Reschedules are permitted at anytime with 16 or more calendar days notice. Enrollments must be rescheduled within six months of the cancel date or funds on account will be forfeited.

Training Location

Online Classroom
your office

your city, your province
your country   

About Global Knowledge

x

Global Knowledge is the world's leading learning services and professional development solutions provider. We deliver learning solutions to support customers as they adapt to key business transformations and technological advancements that drive the way that organizations around the world differentiate themselves and thrive. Our learning programs, whether designed for a global organization or an individual professional, help businesses close skills gaps and foster an environment of continuous talent development.

Training Provider Rating

This vendor has an overall average rating of 4.39 out of 5 based on 424 reviews.

No comment
No comment
No comment
No comment
No comment
No comment
No comment
No comment
No comment
No comment
No comment
No comment
Wasn’t as advanced as I thought it would be. There was an issue when the day my course was the first time they used a new platfo ... Read more
x

Wasn’t as advanced as I thought it would be. There was an issue when the day my course was the first time they used a new platform.. from adobe to something called zoom; I had to call support line cause it stated our instructor wasn’t present. Thankfully I called cause everyone online was in the adobe virtual classroom waiting for what looked like a teacher who didn’t show up for class (IT didn’t get anything resolved until 10mins after start time). I felt like he was really getting hung up on very basic knowledge for the first half of the course (talking about how to create tabs and drag formulas as an example). I completed files a few times before he was done explaining. There was a scheduled fire drill for them (roughly 30mins)that also cut into our time, which wasn’t deducted from the hour lunch break or the two, fifteen min breaks. I also really wish he touched base more on the automating workbook functions portion which we barely did. I'm happy there were/are those study guides (learning videos) and exams to take on my own time that I hope after I've had the class are still available for me to learn from.

No comment
No comment
No comment
No comment
It was difficult to practice on my PC while trying to watch the presentation online.
No comment
David was excellent!! I am very for having this course!!

Course Reviews

No Reviews Yet