SlideShare a Scribd company logo
1 of 20
CCNA SECURITY
EVENING
SEMINAR
Deniz Kaya
New Horizons Bulgaria
Situation: Global IT Talent Gap
Challenge
EvolutionoftheNetwork
Time
Voice Transport
Telecommuting / VPN
Wireless
Web 2.0 Apps
Unified Communications
IP Video, TelePresence
Enhanced Security
Switching
Routing
Storage
Role of the Network Grows
Knowledge
Gap
Converged Solutions
 50% of Security is
secure routers.
 35% of Voice is
router-embedded.
 Wireless is 15%
and growing
annually.
3.12 M Gap by 2012
In all markets, especially emerging markets, training and
certification for specialized skills are in demand
•80% of surveyed companies worldwide expect dedicated
security role with 5 years (currently 46%)
•69% expect dedicated voice role (40%)
•66% expect dedicated wireless job role (36%)
Forrester Consulting Findings…
Cisco Learning Partner COURSE:
Implementing Cisco Unified Wireless
Networking Essentials (IUWNE)
EXAM: IUWNE 640-721
CCNA Wireless
Cisco Learning Partner COURSE:
Implementing Cisco IOS Network
Security (IINS)
EXAM: IINS 640-453
CCNA Security
CCNA Concentrations: One Pre-Requisite
Three Pathways to Success…
Cisco Learning Partner COURSE:
Implementing Cisco IOS Unified
Communications (IIUC)
EXAM: IIUC 640-460
CCNA Voice
Requirements: Hold active CCNA Certification (640-802 CCNA comp exam or 640-
822 ICND1 and 640-816 ICND2 exams) and pass the corresponding CCNA
Concentration exams
CCNA Security
• Verifies an individual’s skills in the
following roles:
– Network Security Specialists
– Security Administrators
– Network Security Support
Engineers
• Enables installation, troubleshooting
and monitoring of Cisco Security
devices/technologies.
• Ability to administer security policies
and identify risks in networks
• Serves as prerequisite for CCSP
Certification
• Employers hiring individuals can feel
confident their staff has the skills
needed to install, troubleshoot and
monitor Cisco security technologies.
CCNA Security Overview
• In-depth network security education
• Comprehensive understanding of network security concepts
• Hands-on knowledge and skills, emphasizing practical experience
• For entry-level job roles in network security
• Installation, troubleshooting and monitoring of network devices to
maintain integrity, confidentiality and availability of data and devices
• Prepares students for CCNA Security certification (IINS 640-553 exam)
Benefits for Students
CCNA Security helps students:
• Gain an introduction to core security technologies
• Learn how to develop security policies and mitigate risks
• Acquire the skills needed to develop a security infrastructure
• Recognize vulnerabilities to networks
• Mitigate potential security threats
• Prepare for the CCNA Security certification exam
• Start or build a career in networking security
• Differentiate themselves in the market with specialized skills and
expertise to achieve success
Security Certifications
SND
Cisco Certified Security
Professional (CCSP) Certification
(as originally designed)
CCNA
Certification
(SND is Moved to CCNA Security)
SNRS
SNPA
IPS
Elective Exam
SNAF
IPS
SNRS
CCSP Certification
(Revised in 2009)
Professional-level Associate-level
Elective Exam
IINS exam
(640-553)
CCNA Security Course
CCNA certification is a
pre-requisite for CCNA
Security certification
CCNA Security
Certification
CCNA Security Target Audience
• Career starters seeking career-oriented, entry-level security
specialist skills
• Working IT professionals looking to expand their core routing and
switching skills to change or enhance their career
• Students in technical degree programs at institutions of higher
education (colleges, universities, technical schools)
What is in the course?
• Describe the security threats facing modern network infrastructures
• Secure Cisco routers
• Implement AAA on Cisco routers using local router database and external ACS
• Mitigate threats to Cisco routers and networks using ACLs
• Implement secure network management and reporting
• Mitigate common Layer 2 attacks
• Implement the Cisco IOS firewall feature set using SDM
• Implement the Cisco IOS IPS feature set using SDM
• Implement site-to-site VPNs on Cisco Routers using SDM
Describe the security threats facing modern
network infrastructures
• Describe and list
mitigation methods for
common network
attacks
• Describe and list
mitigation methods for
Worm, Virus, and Trojan
Horse attacks
• Describe the Cisco Self
Defending Network
architecture
Secure Cisco routers
• Secure Cisco routers using the SDM
Security Audit feature
• Use the One-Step Lockdown feature
in SDM to secure a Cisco router
• Secure administrative access to Cisco
routers by setting strong encrypted
passwords, exec timeout, login failure
rate and using IOS login
enhancements
• Secure administrative access to Cisco
routers by configuring multiple
privilege levels
• Secure administrative access to Cisco
routers by configuring role based CLI
• Secure the Cisco IOS image and
configuration file
No, too simple….
Implement AAA on Cisco routers using local
router database and external ACS
• Explain the functions and
importance of AAA
• Describe the features of
TACACS+ and RADIUS AAA
protocols
• Configure AAA authentication
• Configure AAA authorization
• Configure AAA accounting
Mitigate threats to Cisco routers
and networks using ACLs
• Explain the functionality of
standard, extended, and
named IP ACLs used by
routers to filter packets
• Configure and verify IP ACLs
to mitigate given threats
(filter IP traffic destined for
Telnet, SNMP, and DDoS
attacks) in a network using
CLI
• Configure IP ACLs to prevent
IP address spoofing using CLI
• Discuss the caveats to be
considered when building
ACLs
Implement secure network
management and reporting
• Use CLI and SDM to configure
SSH on Cisco routers to enable
secured management access
• Use CLI and SDM to configure
Cisco routers to send Syslog
messages to a Syslog server
Mitigate common Layer 2 attacks
• Describe how to
prevent layer 2
attacks by configuring
basic Catalyst switch
security features
Implement the Cisco IOS firewall
feature set using SDM
• Describe the
operational strengths
and weaknesses of
the different firewall
technologies
• Explain stateful
firewall operations
and the function of
the state table
• Implement Zone
Based Firewall using
SDM
Implement the Cisco IOS IPS feature
set using SDM
• Define network based vs. host
based intrusion detection and
prevention
• Explain IPS technologies,
attack responses, and
monitoring options
• Enable and verify Cisco IOS
IPS operations using SDM
Implement site-to-site VPNs on
Cisco Routers using SDM
• Explain the different
methods used in
cryptography
• Explain IKE protocol
functionality and phases
• Describe the building
blocks of IPSec and the
security functions it
provides
• Configure and verify an
IPSec site-to-site VPN with
pre-shared key
authentication using SDM
Q and A

More Related Content

What's hot

CCNA Security - Chapter 2
CCNA Security - Chapter 2CCNA Security - Chapter 2
CCNA Security - Chapter 2Irsandi Hasan
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overviewali raza
 
CCNA Security 011- implementing ios-based ips
CCNA Security 011- implementing ios-based ipsCCNA Security 011- implementing ios-based ips
CCNA Security 011- implementing ios-based ipsAhmed Habib
 
Chapter 2 overview
Chapter 2 overviewChapter 2 overview
Chapter 2 overviewali raza
 
CCNA RS_ITN - Chapter 9
CCNA RS_ITN - Chapter 9CCNA RS_ITN - Chapter 9
CCNA RS_ITN - Chapter 9Irsandi Hasan
 
CCNA Security 010-configuring cisco asa
CCNA Security 010-configuring cisco asaCCNA Security 010-configuring cisco asa
CCNA Security 010-configuring cisco asaAhmed Habib
 
CCNA Security - Chapter 6
CCNA Security - Chapter 6CCNA Security - Chapter 6
CCNA Security - Chapter 6Irsandi Hasan
 
Exploration_Routing_Chapter_7
Exploration_Routing_Chapter_7Exploration_Routing_Chapter_7
Exploration_Routing_Chapter_7dinuk123
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11Waqas Ahmed Nawaz
 
CCNA4 Verson6 Chapter8
CCNA4 Verson6 Chapter8CCNA4 Verson6 Chapter8
CCNA4 Verson6 Chapter8Chaing Ravuth
 
CCNA Security - Chapter 9
CCNA Security - Chapter 9CCNA Security - Chapter 9
CCNA Security - Chapter 9Irsandi Hasan
 
Routing and switching essentials companion guide
Routing and switching essentials companion guideRouting and switching essentials companion guide
Routing and switching essentials companion guideSiddhartha Rajbhatt
 
CCNA 1 Routing and Switching v5.0 Chapter 5
CCNA 1 Routing and Switching v5.0 Chapter 5CCNA 1 Routing and Switching v5.0 Chapter 5
CCNA 1 Routing and Switching v5.0 Chapter 5Nil Menon
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 8
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 8CCNA (R & S) Module 01 - Introduction to Networks - Chapter 8
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 8Waqas Ahmed Nawaz
 
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site ConnectivityCCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site ConnectivityVuz Dở Hơi
 
Cisco CCNA Security 210-260 Practice Exam
Cisco CCNA Security 210-260 Practice ExamCisco CCNA Security 210-260 Practice Exam
Cisco CCNA Security 210-260 Practice ExamJysmeen
 

What's hot (20)

CCNA Security - Chapter 2
CCNA Security - Chapter 2CCNA Security - Chapter 2
CCNA Security - Chapter 2
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overview
 
CCNA Security 011- implementing ios-based ips
CCNA Security 011- implementing ios-based ipsCCNA Security 011- implementing ios-based ips
CCNA Security 011- implementing ios-based ips
 
Chapter 2 overview
Chapter 2 overviewChapter 2 overview
Chapter 2 overview
 
Ccna4
Ccna4Ccna4
Ccna4
 
CCNA RS_ITN - Chapter 9
CCNA RS_ITN - Chapter 9CCNA RS_ITN - Chapter 9
CCNA RS_ITN - Chapter 9
 
CCNA Security 010-configuring cisco asa
CCNA Security 010-configuring cisco asaCCNA Security 010-configuring cisco asa
CCNA Security 010-configuring cisco asa
 
CCNA Security - Chapter 6
CCNA Security - Chapter 6CCNA Security - Chapter 6
CCNA Security - Chapter 6
 
Difference between CCNA and CCNP
Difference between CCNA and CCNPDifference between CCNA and CCNP
Difference between CCNA and CCNP
 
Exploration_Routing_Chapter_7
Exploration_Routing_Chapter_7Exploration_Routing_Chapter_7
Exploration_Routing_Chapter_7
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
 
CCNA4 Verson6 Chapter8
CCNA4 Verson6 Chapter8CCNA4 Verson6 Chapter8
CCNA4 Verson6 Chapter8
 
CCNA Security - Chapter 9
CCNA Security - Chapter 9CCNA Security - Chapter 9
CCNA Security - Chapter 9
 
Routing and switching essentials companion guide
Routing and switching essentials companion guideRouting and switching essentials companion guide
Routing and switching essentials companion guide
 
CCNA 1 Routing and Switching v5.0 Chapter 5
CCNA 1 Routing and Switching v5.0 Chapter 5CCNA 1 Routing and Switching v5.0 Chapter 5
CCNA 1 Routing and Switching v5.0 Chapter 5
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 8
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 8CCNA (R & S) Module 01 - Introduction to Networks - Chapter 8
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 8
 
Brkcrt 1160 c3-rev2
Brkcrt 1160 c3-rev2Brkcrt 1160 c3-rev2
Brkcrt 1160 c3-rev2
 
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site ConnectivityCCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
 
Cisco CCNA Security 210-260 Practice Exam
Cisco CCNA Security 210-260 Practice ExamCisco CCNA Security 210-260 Practice Exam
Cisco CCNA Security 210-260 Practice Exam
 
CCNP Security-VPN
CCNP Security-VPNCCNP Security-VPN
CCNP Security-VPN
 

Similar to Ccna security

Cisco Ccna Certification
Cisco Ccna CertificationCisco Ccna Certification
Cisco Ccna Certificationdkaya
 
Cisco Certifications - A Complete Description of Entry Level to Architect Level
Cisco Certifications -  A Complete Description of Entry Level to Architect LevelCisco Certifications -  A Complete Description of Entry Level to Architect Level
Cisco Certifications - A Complete Description of Entry Level to Architect LevelNetwork Bulls
 
CCNA
CCNACCNA
CCNAniict
 
Ccna sec
Ccna secCcna sec
Ccna secshg4916
 
Top Cisco Courses offered by Network Kings
Top Cisco Courses offered by Network KingsTop Cisco Courses offered by Network Kings
Top Cisco Courses offered by Network KingsNetwork Kings
 
CCNA Introducing
CCNA IntroducingCCNA Introducing
CCNA IntroducingTIB Academy
 
ccnp-enterprise-core-networking-encor-product-overview.pptx
ccnp-enterprise-core-networking-encor-product-overview.pptxccnp-enterprise-core-networking-encor-product-overview.pptx
ccnp-enterprise-core-networking-encor-product-overview.pptxssuserff1f40
 
CCNA certification.pptx
CCNA certification.pptxCCNA certification.pptx
CCNA certification.pptxirfanakram32
 
TYPES OF Cisco Certified Network Associate certifications
TYPES OF Cisco Certified Network Associate certificationsTYPES OF Cisco Certified Network Associate certifications
TYPES OF Cisco Certified Network Associate certificationsarjunnegi34
 
Best CCNA Training Institute in Noida.pptx
Best CCNA Training Institute in Noida.pptxBest CCNA Training Institute in Noida.pptx
Best CCNA Training Institute in Noida.pptxAPTRON Solutions Noida
 
Cisco Certifications and Career Opportunities with Average Salary
Cisco Certifications and Career Opportunities with Average SalaryCisco Certifications and Career Opportunities with Average Salary
Cisco Certifications and Career Opportunities with Average SalaryUninets Consulting
 

Similar to Ccna security (20)

Ccna security
Ccna security Ccna security
Ccna security
 
Ccna security
Ccna security Ccna security
Ccna security
 
Ccna security
Ccna security Ccna security
Ccna security
 
Cisco Ccna Certification
Cisco Ccna CertificationCisco Ccna Certification
Cisco Ccna Certification
 
Cisco Certifications - A Complete Description of Entry Level to Architect Level
Cisco Certifications -  A Complete Description of Entry Level to Architect LevelCisco Certifications -  A Complete Description of Entry Level to Architect Level
Cisco Certifications - A Complete Description of Entry Level to Architect Level
 
Cisco Routing and Switching vs Cisco Security
Cisco Routing and Switching vs Cisco SecurityCisco Routing and Switching vs Cisco Security
Cisco Routing and Switching vs Cisco Security
 
CCNA
CCNACCNA
CCNA
 
Ccna sec
Ccna secCcna sec
Ccna sec
 
CCNA Course in Noida. pptx
CCNA Course in Noida.               pptxCCNA Course in Noida.               pptx
CCNA Course in Noida. pptx
 
Top Cisco Courses offered by Network Kings
Top Cisco Courses offered by Network KingsTop Cisco Courses offered by Network Kings
Top Cisco Courses offered by Network Kings
 
CCNA Introducing
CCNA IntroducingCCNA Introducing
CCNA Introducing
 
Cisco CCNP Data Center
Cisco CCNP Data CenterCisco CCNP Data Center
Cisco CCNP Data Center
 
CiscoLetter
CiscoLetterCiscoLetter
CiscoLetter
 
ccnp-enterprise-core-networking-encor-product-overview.pptx
ccnp-enterprise-core-networking-encor-product-overview.pptxccnp-enterprise-core-networking-encor-product-overview.pptx
ccnp-enterprise-core-networking-encor-product-overview.pptx
 
CCNA certification.pptx
CCNA certification.pptxCCNA certification.pptx
CCNA certification.pptx
 
TYPES OF Cisco Certified Network Associate certifications
TYPES OF Cisco Certified Network Associate certificationsTYPES OF Cisco Certified Network Associate certifications
TYPES OF Cisco Certified Network Associate certifications
 
manthan_resume
manthan_resumemanthan_resume
manthan_resume
 
KIRAN UPDATED CV
KIRAN UPDATED CVKIRAN UPDATED CV
KIRAN UPDATED CV
 
Best CCNA Training Institute in Noida.pptx
Best CCNA Training Institute in Noida.pptxBest CCNA Training Institute in Noida.pptx
Best CCNA Training Institute in Noida.pptx
 
Cisco Certifications and Career Opportunities with Average Salary
Cisco Certifications and Career Opportunities with Average SalaryCisco Certifications and Career Opportunities with Average Salary
Cisco Certifications and Career Opportunities with Average Salary
 

More from dkaya

Mitigating worm attacks
Mitigating worm attacksMitigating worm attacks
Mitigating worm attacksdkaya
 
Hacking Cisco Networks and Countermeasures
Hacking Cisco Networks and CountermeasuresHacking Cisco Networks and Countermeasures
Hacking Cisco Networks and Countermeasuresdkaya
 
Sniffing SSL Traffic
Sniffing SSL TrafficSniffing SSL Traffic
Sniffing SSL Trafficdkaya
 
Intrusion Discovery on Windows
Intrusion Discovery on WindowsIntrusion Discovery on Windows
Intrusion Discovery on Windowsdkaya
 
Implementing Cisco AAA
Implementing Cisco AAAImplementing Cisco AAA
Implementing Cisco AAAdkaya
 
Cisco Switch Security
Cisco Switch SecurityCisco Switch Security
Cisco Switch Securitydkaya
 
Mitigating Layer2 Attacks
Mitigating Layer2 AttacksMitigating Layer2 Attacks
Mitigating Layer2 Attacksdkaya
 
Microsoft Days 09 Windows 2008 Security
Microsoft Days 09 Windows 2008 SecurityMicrosoft Days 09 Windows 2008 Security
Microsoft Days 09 Windows 2008 Securitydkaya
 
Ironport Data Loss Prevention
Ironport Data Loss PreventionIronport Data Loss Prevention
Ironport Data Loss Preventiondkaya
 
Implementing 802.1x Authentication
Implementing 802.1x AuthenticationImplementing 802.1x Authentication
Implementing 802.1x Authenticationdkaya
 

More from dkaya (10)

Mitigating worm attacks
Mitigating worm attacksMitigating worm attacks
Mitigating worm attacks
 
Hacking Cisco Networks and Countermeasures
Hacking Cisco Networks and CountermeasuresHacking Cisco Networks and Countermeasures
Hacking Cisco Networks and Countermeasures
 
Sniffing SSL Traffic
Sniffing SSL TrafficSniffing SSL Traffic
Sniffing SSL Traffic
 
Intrusion Discovery on Windows
Intrusion Discovery on WindowsIntrusion Discovery on Windows
Intrusion Discovery on Windows
 
Implementing Cisco AAA
Implementing Cisco AAAImplementing Cisco AAA
Implementing Cisco AAA
 
Cisco Switch Security
Cisco Switch SecurityCisco Switch Security
Cisco Switch Security
 
Mitigating Layer2 Attacks
Mitigating Layer2 AttacksMitigating Layer2 Attacks
Mitigating Layer2 Attacks
 
Microsoft Days 09 Windows 2008 Security
Microsoft Days 09 Windows 2008 SecurityMicrosoft Days 09 Windows 2008 Security
Microsoft Days 09 Windows 2008 Security
 
Ironport Data Loss Prevention
Ironport Data Loss PreventionIronport Data Loss Prevention
Ironport Data Loss Prevention
 
Implementing 802.1x Authentication
Implementing 802.1x AuthenticationImplementing 802.1x Authentication
Implementing 802.1x Authentication
 

Recently uploaded

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 

Recently uploaded (20)

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 

Ccna security

  • 2. Situation: Global IT Talent Gap Challenge EvolutionoftheNetwork Time Voice Transport Telecommuting / VPN Wireless Web 2.0 Apps Unified Communications IP Video, TelePresence Enhanced Security Switching Routing Storage Role of the Network Grows Knowledge Gap Converged Solutions  50% of Security is secure routers.  35% of Voice is router-embedded.  Wireless is 15% and growing annually. 3.12 M Gap by 2012
  • 3. In all markets, especially emerging markets, training and certification for specialized skills are in demand •80% of surveyed companies worldwide expect dedicated security role with 5 years (currently 46%) •69% expect dedicated voice role (40%) •66% expect dedicated wireless job role (36%) Forrester Consulting Findings…
  • 4. Cisco Learning Partner COURSE: Implementing Cisco Unified Wireless Networking Essentials (IUWNE) EXAM: IUWNE 640-721 CCNA Wireless Cisco Learning Partner COURSE: Implementing Cisco IOS Network Security (IINS) EXAM: IINS 640-453 CCNA Security CCNA Concentrations: One Pre-Requisite Three Pathways to Success… Cisco Learning Partner COURSE: Implementing Cisco IOS Unified Communications (IIUC) EXAM: IIUC 640-460 CCNA Voice Requirements: Hold active CCNA Certification (640-802 CCNA comp exam or 640- 822 ICND1 and 640-816 ICND2 exams) and pass the corresponding CCNA Concentration exams
  • 5. CCNA Security • Verifies an individual’s skills in the following roles: – Network Security Specialists – Security Administrators – Network Security Support Engineers • Enables installation, troubleshooting and monitoring of Cisco Security devices/technologies. • Ability to administer security policies and identify risks in networks • Serves as prerequisite for CCSP Certification • Employers hiring individuals can feel confident their staff has the skills needed to install, troubleshoot and monitor Cisco security technologies.
  • 6. CCNA Security Overview • In-depth network security education • Comprehensive understanding of network security concepts • Hands-on knowledge and skills, emphasizing practical experience • For entry-level job roles in network security • Installation, troubleshooting and monitoring of network devices to maintain integrity, confidentiality and availability of data and devices • Prepares students for CCNA Security certification (IINS 640-553 exam)
  • 7. Benefits for Students CCNA Security helps students: • Gain an introduction to core security technologies • Learn how to develop security policies and mitigate risks • Acquire the skills needed to develop a security infrastructure • Recognize vulnerabilities to networks • Mitigate potential security threats • Prepare for the CCNA Security certification exam • Start or build a career in networking security • Differentiate themselves in the market with specialized skills and expertise to achieve success
  • 8. Security Certifications SND Cisco Certified Security Professional (CCSP) Certification (as originally designed) CCNA Certification (SND is Moved to CCNA Security) SNRS SNPA IPS Elective Exam SNAF IPS SNRS CCSP Certification (Revised in 2009) Professional-level Associate-level Elective Exam IINS exam (640-553) CCNA Security Course CCNA certification is a pre-requisite for CCNA Security certification CCNA Security Certification
  • 9. CCNA Security Target Audience • Career starters seeking career-oriented, entry-level security specialist skills • Working IT professionals looking to expand their core routing and switching skills to change or enhance their career • Students in technical degree programs at institutions of higher education (colleges, universities, technical schools)
  • 10. What is in the course? • Describe the security threats facing modern network infrastructures • Secure Cisco routers • Implement AAA on Cisco routers using local router database and external ACS • Mitigate threats to Cisco routers and networks using ACLs • Implement secure network management and reporting • Mitigate common Layer 2 attacks • Implement the Cisco IOS firewall feature set using SDM • Implement the Cisco IOS IPS feature set using SDM • Implement site-to-site VPNs on Cisco Routers using SDM
  • 11. Describe the security threats facing modern network infrastructures • Describe and list mitigation methods for common network attacks • Describe and list mitigation methods for Worm, Virus, and Trojan Horse attacks • Describe the Cisco Self Defending Network architecture
  • 12. Secure Cisco routers • Secure Cisco routers using the SDM Security Audit feature • Use the One-Step Lockdown feature in SDM to secure a Cisco router • Secure administrative access to Cisco routers by setting strong encrypted passwords, exec timeout, login failure rate and using IOS login enhancements • Secure administrative access to Cisco routers by configuring multiple privilege levels • Secure administrative access to Cisco routers by configuring role based CLI • Secure the Cisco IOS image and configuration file No, too simple….
  • 13. Implement AAA on Cisco routers using local router database and external ACS • Explain the functions and importance of AAA • Describe the features of TACACS+ and RADIUS AAA protocols • Configure AAA authentication • Configure AAA authorization • Configure AAA accounting
  • 14. Mitigate threats to Cisco routers and networks using ACLs • Explain the functionality of standard, extended, and named IP ACLs used by routers to filter packets • Configure and verify IP ACLs to mitigate given threats (filter IP traffic destined for Telnet, SNMP, and DDoS attacks) in a network using CLI • Configure IP ACLs to prevent IP address spoofing using CLI • Discuss the caveats to be considered when building ACLs
  • 15. Implement secure network management and reporting • Use CLI and SDM to configure SSH on Cisco routers to enable secured management access • Use CLI and SDM to configure Cisco routers to send Syslog messages to a Syslog server
  • 16. Mitigate common Layer 2 attacks • Describe how to prevent layer 2 attacks by configuring basic Catalyst switch security features
  • 17. Implement the Cisco IOS firewall feature set using SDM • Describe the operational strengths and weaknesses of the different firewall technologies • Explain stateful firewall operations and the function of the state table • Implement Zone Based Firewall using SDM
  • 18. Implement the Cisco IOS IPS feature set using SDM • Define network based vs. host based intrusion detection and prevention • Explain IPS technologies, attack responses, and monitoring options • Enable and verify Cisco IOS IPS operations using SDM
  • 19. Implement site-to-site VPNs on Cisco Routers using SDM • Explain the different methods used in cryptography • Explain IKE protocol functionality and phases • Describe the building blocks of IPSec and the security functions it provides • Configure and verify an IPSec site-to-site VPN with pre-shared key authentication using SDM

Editor's Notes

  1. More than any other area, Security and risk management skills are some of the most highly sought across the network and demand is growing. Recent CompTia study found 73% of IT professionals in mature countries identified security, data privacy, firewalls as most important skill but only 57% said their employees were proficient I these skills. 76% of IT profs. In developing countries identified security as most important, with 57% saying their professionals were proficient.Holders with be able to recognize threats and vulnerabilities to networks and mitigate security threats.For career starters, career switchers, career enhancers. Starters can build on foundation of R&S and specialize, R&S professionals can switch or broaden to new specialties.Those with vendor neutral certifications or knowledge in Symantec/checkpoint can expand to training on latest Cisco security technologies Cisco,More effective and successful in their job role—employers can now hire or add associate level skills in their security organizations to handle operating and monitoring tasks.Trained on the latest Cisco security technologies Will serve as pre-requisite for CCSP, for first year CCNA +SND will be accepted