CCNA Security (Cisco Certified Network Associate Security)
This course is meant for aspiring Cisco Network Security professionals who would like to build careers in Network Security with the World’s leading Network vendor. If anyone is searching for smart understanding of Security fundamentals & depend on much, RNT’s LEAP methodology helps reach your Career.
RNT’s CCNA Security course in Chennai enables participants with the skills required to develop a Cisco Network Security Infrastructure, recognize and address Network Threats and Vulnerabilities and mitigate such risks. The CCNA Security Training helps Troubleshoot and monitor Cisco Switches & Routers, maintain integrity, confidentiality and availability of data and devices. The course also helps participants understand the basics of CISCO ASA Firewall & builds a firm foundation for the Professional level CCNP Security certification.
Job Role After Completing CCNA Security Training Course:
Cisco CCNA Security Training Provide Job As a Security Specialists, Security Administrators and Network Security Support Engineers.
CCNA Routing and Switching Course Covers:
CCNA Security Training Syllabus:
Module I: Common Security Threats
Module II: Security and Cisco Routers
Module III: AAA on Cisco Devices
Module IV: IOS ACLs
Module V: Common Layer 2 Attacks
Module VI: Cisco Firewall Technologies
Module VII: Cisco IPS
Module VIII: VPN Technologies
The Course Including Lectures, Discussions, Exercises And Labs that Gives Students The Hands-On Experience That Need To Configure And Maintain Cisco Devices In The Real World.
Course Duration:
Regular Batch: 45 days
Weekend Batch (Sat & Sun): 15 weekends
Fast Track Batch: 22 days
Course Goals
- Explain network threats, mitigation techniques, and the basics of securing a network
- Secure administrative access on Cisco routers
- Secure administrative access with AAA
- Implement firewall technologies to secure the network perimeter
- Describe LAN security considerations and implement endpoint and Layer 2 security features
- Describe methods for implementing data confidentiality and integrity
- Implement secure virtual private networks
- Given the security needs of an enterprise, create and implement a comprehensive security policy