Cisco Certified Network Associate Security (CCNA Security) validates associate-level knowledge and skills required to secure Cisco networks. With a CCNA Security certification, a network professional demonstrates the skills required to develop a security infrastructure, recognize threats and vulnerabilities to networks, and mitigate security threats. The CCNA Security curriculum emphasizes core security technologies;?the installation, troubleshooting and monitoring of network devices to maintain integrity, confidentiality and availability of data and devices, and competency in the technologies that Cisco uses in its security structure.
Module 1: Introduction
1.1 Introduction
Module 2: Network Security Basics I
2.1 Network Security Basics- Part1
2.2 Network Security Basics- Part2
2.3 Network Security Basics- Part3
Module 3: Network Security Basics II
3.1 Network Security Basics – Part 1
3.2 Network Security Basics – Part 2
3.3 Network Security Basics – Part 3
3.4 Network Security Basics – Part 4
3.5 Network Security Basics – Part 5
3.6 Network Security Basics – Part 6
Module 4: Securing Network Devices I
4.1 Securing Network Devices- Part1
4.2 Securing Network Devices- Part2
4.3 Securing Network Devices- Part3
Module 5: Securing Network Devices Lab I
5.1 Securing Network Devices Lab – Part 1
5.2 Securing Network Devices Lab – Part 2
Module 6: IOS Enhancement Lab
6.1 IOS Enhancement Lab
Module 7: Securing Network Devices II
7.1 Securing Network Devices – Part 1
7.2 Securing Network Devices – Part 2
7.2 Securing Network Devices – Part 3
Module 8: Securing Network Devices Lab II
8.1 Securing Network Devices Lab
Module 9: Using CCP To Configure SNMP Lab
9.1 Using CCP To Configure SNMP Lab
Module 10: Say Hello To AAA
10.1 Say Hello To AAA – Part 1
10.2 Say Hello To AAA – Part 2
Module 11: Local AAA
11.1 ?? ?Local AAA
Module 12: Configuring Local AAA With CCP
12.1 Configuring Local AAA With CCP
Module 13: Firewall Basics Using ACLs
13.1 Firewall Basics Using ACLs – Part 1
13.2 Firewall Basics Using ACLs – Part 2
13.3 Firewall Basics Using ACLs – Part 3
13.4 Firewall Basics Using ACLs – Part 4
Module 14: Intro Firewall
14.1 Intro Firewall- Part 1
14.2 Intro Firewall- Part 2
14.3 Intro Firewall- Part 3
14.4 Intro Firewall- Part 4
Module 15: Content Based Access Control Firewall
15.1 Content Based Access Control Firewall
Module 16: Zoned Based Firewalls
16.1 Zoned Based Firewalls
Module 17: Zoned Based Firewalls Lab
17.1 Zoned Based Firewalls Lab
Module 18: Configuring Advanced Firewall With CCP
18.1 Configuring Advanced Firewall With CCP
Module 19: Securing The LAN
19.1 Securing The L A N- Part1
19.2 Securing The L A N- Part2
19.3 Securing The L A N- Part3
19.4 Securing The L A N- Part4
19.5 Securing The L A N- Part5
19.6 Securing The L A N- Part6
19.7 Securing The L A N- Part7
19.8 Securing The L A N- Part8
19.9 Securing The L A N- Part9
Module 20: Welcome to Cryto
20.1 Welcome To Cryto – Part 1
20.2 Welcome To Cryto – Part 2
20.3 Welcome To Cryto – Part 3
Module 21: VPN
21.1 VPN – Part 1
21.2 VPN – Part 2
21.3 VPN – Part 3
21.4 VPN – Part 4
21.5 VPN – Part 5
21.6 VPN – Part 6
21.7 VPN – Part 7
Module 22: Remote Access VPNS
22.1 Remote Access VPNS
Module 23: VPN Lab
23.1 VPN Lab – Part 1
23.2 VPN Lab – Part 2
Module 24: Managing A Secure NetworkModule 25: Outro
24.1 Managing A Secure Network – Part 1
24.2 Managing A Secure Network – Part 2
24.3 Managing A Secure Network – Part 3
Module 25: Outro
25.1 Outro
Reviews
There are no reviews yet.