Network Security
This course allows learners to understand common security concepts, and deploy basic security techniques utilizing a variety of popular security appliances within a “real-life” network infrastructure. It focuses on security principles and technologies, using Cisco security products to provide hands-on examples. It is the first step for individuals wishing to obtain their CCNP Security certification
Course Details
-
🕒 Schedule: Twice a week, evenings only
-
⏱️ Duration: 45 hours over 9 weeks
-
💶 Price: €300
-
👨🏫 Format: Instructor-led, hands-on training
-
📦 Includes: Practical exercises, course materials, and expert feedback
Course Requirements
-
📈 Level: Intermediate
-
🧠 Prerequisites: Basic knowledge of Microsoft Excel is required
-
👨🎓 Recommended for: Students or professionals with prior experience in data entry and spreadsheets.
About the course
This course allows learners to understand common security concepts, and deploy basic security techniques utilizing a variety of popular security appliances within a “real-life” network infrastructure. It focuses on security principles and technologies, using Cisco security products to provide hands-on examples. It is the first step for individuals wishing to obtain their CCNP Security certification.In this course you will learn how to maintain integrity, confidentiality, and availability of data and devices.After completing the CCNA Security training you will acquire skills to help you have a better understanding of the security threats and learn how to take preventive steps to stop such threats.
Introduction to Network Security Principles Network Security fundamentals
- Attack Methodologies
- Operations Security
- Cisco Self-Defending Networks
Perimeter Security Administrative Access to Cisco
- Routers Cisco SDM
- AAA on a Cisco Router Using the
- Local Database and on Secure ACS Secure Management/Reporting
- Locking Down the Router
Network Security Using Cisco IOS Firewalls Firewall Technologies
- Static Packet Filters Using ACLs
- Cisco IOS Zone-Based Policy
- Firewall
Site-to-Site VPNs Cryptographic Services
- Symmetric Encryption
- Examining Cryptographic Hashes and Digital Signatures Asymmetric Encryption and PKI
- IPsec Fundamentals
- Site-to-Site IPsec VPN
- IPsec on a Site-to-Site VPN Using
- Cisco SDM
Network Security Using Cisco IOS IPS IPS Technologies IOS IPS
- Using Cisco SDM
LAN, SAN, Voice, and Endpoint Security Overview Endpoint Security
- SAN Security
- Voice Security
- Layer 2 Attacks
Outcomes
Collecting data from different sources like MS Excel, databases etc, cleaning, transforming, modeling and visualizing the data on inteligent dashboards.
Prepare for a career as a Data Scientist
- Receive professional-level training from CollegeToCareer instructors.
- Demonstrate your proficiency in portfolio-ready projects
- Earn an employer-recognized certificate.
Ready to get started?
Get in touch, or create an account