Config Router

  • Google Sheets
  • CCNA Online training
    • CCNA
  • CISCO Lab Guides
    • CCNA Security Lab Manual With Solutions
    • CCNP Route Lab Manual with Solutions
    • CCNP Switch Lab Manual with Solutions
  • Juniper
  • Linux
  • DevOps Tutorials
  • Python Array
You are here: Home / CCNA Security Study Notes

CCNA Security Study Notes

CCNA Security Study Notes

Part I: Network Security Architecture

CHAPTER 1: Network Insecurity

  • Exploring Network Security Basics and the Need for Network Security
  • Exploring the Taxonomy of Network Attacks

CHAPTER 2: Building a Secure Network Using Security Controls

  • Defining Operations Security Needs
  • Establishing a Comprehensive Network Security Policy
  • Examining Cisco’s Model of the Self-Defending Network

Part II: Perimeter Security

CHAPTER 3: Security at the Network Perimeter

  • Cisco lOS Security Features
  • Securing Administrative Access to Cisco Routers
  • Introducing Cisco SDM
  • Configuring Local Database AAA on a Cisco Router
  • Configuring External AAA on a Cisco Router Using Cisco Secure ACS

CHAPTER 4: Implementing Secure Management and Hardening the Router

  • Planning for Secure Management and Reporting
  • Using Cisco SDM and CLI Tools to Lock Down the Router

Part III: Augmenting Depth of Defense

CHAPTER 5: Using Cisco lOS Firewalls to Implement a Network Security Policy

  • Examining and Defining Firewall Technologies
  • Creating Static Packet Filters with ACLs
  • Cisco Zone-Based Policy Firewall Fundamentals

CHAPTER 6: Introducing Cryptographic Services

  • Cryptology Overview
  • Exploring Symmetric Key Encryption
  • Exploring Cryptographic Hashing Algorithms and Digital Signatures
  • Exploring Asymmetric Key Encryption and Public Key Infrastructure

CHAPTER 7: Virtual Private Networks with IPsec

  • Overview of VPN Technology
  • Conceptualizing a Site-toSite IPsec VPN
  • ImplementinQ IPsec on a Site-toSite VPN Usina the CLI
  • Implementing IPsec on a Site-to-Site VPN Using Cisco SDM

CHAPTER 8: Network Security Using Cisco lOS IPS

  • Exploring IPS Technologies
  • Implementing Cisco lOS IPS

Part IV: Security Inside the Perimeter

CHAPTER 9: Introduction to Endpoint, SAN, and Voice Security

  • Introducing Endnpoint Security
  • Exploring SAN Security
  • Exploring Voice Security

CHAPTER 10: Protecting Switch Infrastructure

  • VLAN Hopping Attacks
  • STP Manipulation Attack
  • CAM Table Overflow Attacky
  • Miscellaneous Switch Security Features

 

Recent Posts

  • How do I give user access to Jenkins?
  • What is docker volume command?
  • What is the date format in Unix?
  • What is the difference between ARG and ENV Docker?
  • What is rsync command Linux?
  • How to Add Music to Snapchat 2021 Android? | How to Search, Add, Share Songs on Snapchat Story?
  • How to Enable Snapchat Notifications for Android & iPhone? | Steps to Turn on Snapchat Bitmoji Notification
  • Easy Methods to Fix Snapchat Camera Not Working Black Screen Issue | Reasons & Troubleshooting Tips to Solve Snapchat Camera Problems
  • Detailed Procedure for How to Update Snapchat on iOS 14 for Free
  • What is Snapchat Spotlight Feature? How to Make a Spotlight on Snapchat?
  • Snapchat Hack Tutorial 2021: Can I hack a Snapchat Account without them knowing?

Copyright © 2025 · News Pro Theme on Genesis Framework · WordPress · Log in