CCNA Training

CCNA TrainingThe Cisco Certified Network Associate (CCNA) credential is the premium certification for professionals who design and develop custom business solutions with Cisco routers and switches. Cisco Certifications focus on both routing and switching, as well as WAN switching solutions in network design and network support, providing you with flexible options for career development. One may advance to CCIE status by first achieving Associate certification in these tracks.

As Enterprises migrate toward controller-based architectures, the role and skills required of a core network engineer are evolving and more vital than ever. To prepare for this network transition, the CCNA Routing and Switching certification will not only prepare you with the knowledge of foundational technologies but ensure you stay relevant with skill sets needed for the adoption of next-generation technologies.

Who Needs to Attend CCNA Training

Individuals seeking CCNA certification will find this Training the quickest way to meet the requirements of the CCNA exam. Earning your Cisco Certified Network Associate (CCNA) is the starting point of many successful and rewarding IT careers. It says to the world – and more importantly, to potential employers – that you have the proven ability to install, configure, operate, and troubleshoot medium‐sized routing and switching networks.

CCNA Security helps you learn to secure your computer network and network infrastructure devices to prevent unauthorized access, data theft, network misuse, and data modification. The growing number of cyber-attacks has created amazing employment opportunities for those with in-demand skills.

Network Security Concepts

  • Security Principles
  • Security Threats
  • Cryptography concepts

Secure Network Access and Management 

  • In-band Management and Out-of-band Management
  • Secured Access through SNMP v3 using an ACL
  • Security for NTP
  • Using SCP for file transfer
  • AAA concepts – RADIUS and TACACS+ technologies
  • 802.1X authentication
  • BYOD architecture framework
  • Mobile Device Management (MDM)

VPN Technologies

  • IPsec protocols and delivery modes (IKE, ESP, AH, tunnel mode, transport mode)
  • Hair pinning, Split tunneling, always-on, NAT traversal
  • Clientless SSL VPN using ASDM
  • Basic AnyConnect SSL VPN using ASDM
  • IPsec site-to-site VPN on Cisco routers and ASA firewalls

Secure Routing and Switching

  • Security on Cisco routers
  • Securing routing protocols
  • Securing the control plane
  • Common Layer 2 attacks
  • STP attacks
  • ARP spoofing
  • MAC spoofing
  • CAM table (MAC address table) overflows
  • CDP/LLDP reconnaissance
  • VLAN Hopping
  • DHCP spoofing
  • Mitigation procedures
  • DHCP snooping
  • Dynamic ARP Inspection
  • port security
  • BPDU guard, root guard, loop guard
  • VLAN security

Cisco Firewall Technologies

  • Operational Strengths and Weaknesses of the different firewall technologies
  • Proxy firewalls, Application Firewall, Personal Firewall, Stateful, and Stateless firewalls
  • NAT on Cisco ASA
  • Zone-based firewall (Zone to zone, Self-zone)
  • Cisco Adaptive Security Appliance (ASA)


  • IPS deployment considerations (Network-based IPS vs. host-based IPS)
  • Modes of deployment (inline, promiscuous – SPAN, tap)
  • IPS technologies – Rules/signatures, Detection/signature engines, Trigger actions/responses, Blacklist (static and dynamic)

Content and Endpoint Security

  • Mitigation Technology for E-mail-based threats
  • Mitigation technology for web-based threats
  • Mitigation technology for endpoint threats – (Anti-virus/anti-malware, Personal firewall/HIPS, Hardware/software encryption of local data)

In today’s world, we are getting more and more dependent on computers and computer networks. Whether it is a matter of money transfers between banks or you talk about telecommunication, electrical power distribution, health and medical fields, nuclear power plants, space research, and satellites – Data is the most precious factor of today’s businesses. Top business organizations spend billions of dollars every year to secure their computer networks and to keep their business data safe.

View our student’s reviews here

escort malatya escort bursa escort antalya escort konya mersin escort
oyunlar film torrent indir cin filmleri izle full film izle HD film izle mobil film film izle hint filmleri seyret HD film izle