Home CCNA Security v2.0

CCNA Security v2.0

CCNA Security version 2.0 aligning with the newly released Cisco Network Security (IINS) certification exam (210-260). CCNA Routing and Switching topics: Network Topologies and Securing Routing Protocol were added to the course allowing for a smooth transition from the CCENT level directly into CCNA Security. Other new topics introducing Cisco Identify Service Engine (ISE), 802.1x and BYOD, Cloud and virtualization, Cisco Cloud Web Security and Cisco Advanced Malware Protection. Existing content is updated to reflect new security risks, standards and technologies, integration of the new technologies into Cisco Adaptive Security Appliance (ASA), IPS (next-generation IPS), Firewall (next-generation FW), VPNs, End-point Security, and additional practice assessments.

Chapter 9: Implementing the Cisco Adaptive Security Appliance

Chapter Outline: 9.0 Introduction 9.1 Introduction to the ASA 9.2 ASA Firewall Configuration 9.3 Summary Section 9.1: Introduction to the ASA Upon completion of this section, you should be able...

Chapter 8: Implementing Virtual Private Networks

Chapter Outline: 8.0 Introduction 8.1 VPNs 8.2 IPsec VPN Components and Operations 8.3 Implementing Site-to-Site IPsec VPNs with CLI 8.4 Summary Section 8.1: VPNs Upon completion of this section, you should...

Chapter 7: Cryptographic Systems

Chapter Outline: 7.0 Introduction 7.1 Cryptographic Services 7.2 Basic Integrity and Authenticity 7.3 Confidentiality 7.4 Public Key Cryptography 7.5 Summary Section 7.1: Cryptographic Services Upon completion of this section, you should be...

Chapter 6: Securing the Local Area Network

Chapter Outline: 6.0 Introduction 6.1 Endpoint Security 6.2 Layer 2 Security Threats 6.3 Summary Section 6.1: Endpoint Security Upon completion of this section, you should be able to: Describe endpoint...

Chapter 5: Implementing Intrusion Prevention

Chapter Outline: 5.0 Introduction 5.1 IPS Technologies 5.2 IPS Signatures 5.3 Implement IPS 5.4 Summary Section 5.1: IPS Technologies Upon completion of this section, you should be able to: Explain zero-day...

Chapter 4: Implementing Firewall Technologies

Chapter Outline: 4.0 Introduction 4.1 Access Control Lists 4.2 Firewall Technologies 4.3 Zone-Based Policy Firewalls 4.4 Summary Section 4.1: Access Control List Upon completion of this section, you should be able...

Chapter 2: Securing Network Devices

Chapter Outline: 2.0 Introduction 2.1 Securing Device Access 2.2 Assigning Administrative Roles 2.3 Monitoring and Managing Devices 2.4 Using Automated Security Features 2.5 Securing the Control Plane 2.6 Summary Section 2.1: Securing...

Chapter 1: Modern Network Security Threats

Chapter Outline: 1.0 Introduction 1.1 Securing Networks 1.2 Network Threats 1.3 Mitigating Threats 1.4 Summary Section 1.1: Securing Networks Upon completion of this section, you should be able to: Describe the...
Question 3 Final Exam v2.0

CCNA Security v2.0 Final Exam Answers 2017 (100%)

1. Which security implementation will provide control plane protection for a network device? encryption for remote access connections AAA for authenticating management access routing protocol authentication* NTP for...
CCNA Security Chapter 9 Exam Answer v2 008

CCNA Security v2.0 Practice Final Exam Answers 2017 (100%)

What is the function of the Hashed Message Authentication Code (HMAC) algorithm in setting up an IPsec VPN? authenticates the IPsec peers guarantees message integrity* protects IPsec...
CCNA Security Chapter 11 Exam v2 Q001

CCNA Security v2.0 Chapter 11 Exam Answers 2017 (100%)

What is the purpose of a security awareness campaign? to teach skills so employees can perform security tasks to focus the attention of...
CCNA Security Chapter 10 Exam Answer v2 001

CCNA Security v2.0 Chapter 10 Exam Answers 2017 (100%)

Which minimum configuration is required on most ASAs before ASDM can be used? SSH a dedicated Layer 3 management interface* a logical VLAN...