+91-9910111641 +91-9871481152 +91-01204310416 info@ncpnetwork.com

CCNA (R & S)+Security Syllabus
.

No prerequisites exam


Exam Description:
.

Details:
Weekadays Classes 2hr/day (Syllabus Complete aprox. 60 Days)
Weekaend Classes 2hr/Sat-Sun (Syllabus Complete aprox. 60 Days )

CCNA (R & S)+Security Syllabus
Syllabus

Course

IP Addressing

  • Version of IP Address
  • Characteristics of IPV4
  • Classification of IPv4
  • Public & Private IP
  • Default Mask
  • Network bits & Host bits
  • ANDing Process
  • Binary to Decimal & Decimal to Binary
  • Network ID, Broadcast ID & Valid IP
  • No. of Network ID’s & Valid IP in Class A, B, C
  • Subnetting of Class A,B,C

-

Router Basic & Static Routing

  • General port diagram of Cisco routers
  • Cable & Connections
  • Connectivity diagram of Cisco Routers with Network devices
  • Routed & Routing Protocols,
  • Types of Routing
  • Basic Routing Concept
  • Static Route & Default Route
  • LM, AD & Metric
  • Configure, Verify and Troubleshoot
  • Lab : Basic Configuration
  • Lab : Static Route
  • Lab : Default Route

-

OSPF (Open Shortest Path First)

  • OSPF Introduction
  • OSPF Implementation
  • Concept of PID
  • Concept of AREA
  • Wildcard Mask
  • Loopback Interface
  • Hello Timer & Dead Timer
  • Types of Network
  • Concept of ABR & ASBR
  • OSPF AD & Metric
  • OSPF Neighbor Adjacency
  • Type of OSPF Tables
  • OSPF Multicast Address
  • Configure , verify and troubleshoot
  • - Lab: OSPF

-

EIGRP ( Enhanced Interior Getaway Routing Protocol)

  • EIGRP Introduction
  • EIGRP Implementation
  • Concept of ASN
  • Wildcard Mask
  • Auto and no auto-summary
  • Hello and Hold Timer
  • Types of Network
  • Route Codes
  • Eigrp AD & Metric
  • EIGRP Neighbor Adjacency
  • Type of EIGRP tables
  • EIGRP Multicast Address
  • Configure , verify and troubleshoot
  • - Lab: EIGRP

-

RIP (Routing Information Protocol)

  • RIP Implementation
  • Auto & no auto-summary
  • Route Code
  • RIP AD & Metric
  • RIP Multicast Address
  • RIP Timers, Update, Invalid, Flush
  • Loop avoidance Techniques
  • Configure , verify and troubleshoot
  • - Lab: RIPv1 & RIPv2

-

BGP ( Border Gateway Protocol)

  • BGP Introduction
  • BGP Neighbor & Network Implementation
  • Types of ASN (public and private)
  • Type of BGP Tables
  • Type of BGP Neighbor
  • Neighbor Adjacency components
  • When to use BGP
  • Configure, Verify and Troubleshoot
  • - Lab: IBGP
  • - Lab: EBGP

-

L2 Switch

  • HUB, Bridge, Switch & Router
  • Collision Domain & Broadcast Domain
  • Mac Table or Bridge Table,
  • Flooding, Forwarding, filtering
  • VLAN formation and membership
  • Access & Trunk link
  • Requirement of Trunk
  • Trunking Protocols
  • VTP & its need
  • VTP Modes
  • SVI
  • Inter-vlan Routing
  • STP Introduction
  • Configure, Verify and Troubleshoot
  • - Lab: Vlan formation
  • - Lab: Vlan membership
  • - Lab: Trunk formation
  • - Lab: Inter-vlan routing (Router on stick)
  • - Lab: Inter-vlan routing (SVI)
  • - Lab: STP

-

IPV6 Introduction

  • Intro of IPv6
  • Binary to hexa decimal
  • Network bits and host bits
  • Site prefix
  • Subnet ID
  • Link local, site local and unicast global address
  • Ipv6 routing protocol
  • Use of ipv6 in different field.
  • Configure, Verify and Troubleshoot
  • - IPv6 static and default

-

HOW TO MANAGE CISCO DEVICES

  • Describe, Configure and Verify
  • CDP
  • Host Resolving
  • BACKUP & UPGRADATION OF RAM & IOS
  • Password Recovery Process

-

OSI and TCP/IP Model

  • Introduction
  • Application
  • Presentation
  • Session
  • Transport
  • Network
  • Data link
  • Physical
  • PDU
  • Data encapsulation
  • Data De-encapsulation
  • Compare TCP & UDP
  • Compare OSI & TCP/IP
  • Protocol & Prot No.

-

CIA Model

  • Confidentiality
  • integrity
  • Availability

-

Introduction of Network Security Terms

  • 1. Network Security Terms--ASSET-Vulnerability- Counter Measure
  • 2. Data security & Traffic Classification

-

Layer 3 Security--Types of ACL

  • Describe, Configure and Verify
  • Access Control List Intro & Implantation Rules
  • Numbered & Named Standard ACL
  • Numbered & Named Extended ACL
  • Routing Protocols & ACL
  • Time-Based Access Control List
  • Remote Access Security - (Time-based)
  • Monitoring SYN-Attack with Attacker IP & MAC Address

-

Layer 3 Security- User Based

  • Describe, Configure and Verify
  • Telnet is not Secure
  • Secure Remote Session with SSH--(telnet vs ssh)
  • Auto Command User Security
  • Users Privilege Level Security

-

SECURING ROUTING PROTOCOLS

  • Describe, Configure and Verify
  • Secure RIPv2 updates- RIP AUTHENTICATION
  • Secure OSPF Updates- OSPFv2 AUTHENTICATION
  • Secure EIGRP Updates- EIGRP AUTHENTICATION
  • Secure BGP Updates - BGP AUTHENTICATION
  • PPP Authentication

-

Types of NAT on Cisco Router

  • Describe, Configure and Verify
  • NAT & its Advantages
  • Types of NAT
  • Range of Private Ip address
  • NAT Interface commands (INSIDE & OUTSIDE)
  • STATIC NAT
  • DYNAMIC NAT
  • PAT

-

Management Plane Protection

  • Describe, Configure and Verify
  • Syslog Server & Syslog Messages
  • Configure & verify Syslog Server Message
  • AAA Security
  • SNMP & Its Components
  • SNMP version 1 Messages
  • SNMP version 2c
  • NTP Server -Client –Authentation
  • Parser View

-

CONTROL PLANE Protection -CCP & CPPr

  • Describe, Configure and Verify
  • ICMP Rate Limit with CoPP--Control Plane policy
  • Block TELNET to the CPU Via Control-Plane host(CPPr)

-

LAYER 2 SECURITY

  • Describe, Configure and Verify
  • DHCP on CISCO Router
  • DHCP Packets OR DORA Process
  • Man-In-The-Middle Attack via Rogue DHCP Server
  • Mitigate DHCP Attack via DHCP Snooping
  • Switchport Security with Protected Mode
  • Port-Security with MAC Address
  • VACL--VLAN Access Control List
  • Port mirroring or SPAN
  • Protect Switch Topology with BPDUGUARD
  • Dynamic ARP Inspection
  • IP Source Guard
  • Strong Control
  • CDP and LLDP

-

VPN SECURITY

  • Describe, Configure and Verify
  • Basic Fundamental of VPN & IPSEC
  • Types of VPN Model
  • Classification of VPN
  • VPN Terminology in Overlay model -GRE
  • Introduction of GRE & Configuration of Single
  • Site -To- Site VPN -IPSEC
  • IPSec over GRE

-

CISCO ADAPTIVE SECURITY APPLIANCE

  • Describe, Configure and Verify
  • What is Firewall
  • Types of Firewall
  • Types of Table in ASA Firewall
  • State Table & its Components for TCP & UDP
  • TCP Pointer or TCP Flag
  • Security Algorithm Rules
  • Firewall Security Levels
  • Firewall Logical Names
  • Inbound & Outbound Connnection
  • How Cisco ASA works
  • Basic Configuration of ASA
  • ASA Default behaviour
  • How to Telnet ASA from Inside & DMZ
  • Configuring Static & Default Route on ASA
  • Object Group & Its Type
  • Configure Network Object Group
  • Configure Static NAT
  • Configure Dynamic NAT
  • Configure Dynamic PAT

-

...