Cisco Certified Network Associate(ccna) Security Engineer

CCNA Security Part 1

  • Describe and list mitigation methods for common network attacks
  • Describe and list mitigation methods for Worm, Virus, and Trojan Horse attacks
  • Describe the Cisco Self Defending Network architecture
  • Describe and list mitigation methods for common network attacks
  • Describe and list mitigation methods for Worm, Virus, and Trojan Horse attacks
  • Describe the Cisco Self Defending Network architecture
  • Identify the appropriate media, cables, ports, and connectors to connect Cisco network devices to other network devices and hosts in a LAN
  • Secure Cisco routers using the SDM Security Audit feature
  • Use the One-Step Lockdown feature in SDM to secure a Cisco router
  • Secure administrative access to Cisco routers by setting strong encrypted passwords, exec timeout, login failure rate and using IOS login enhancements
  • Secure administrative access to Cisco routers by configuring multiple privilege levels
  • Secure administrative access to Cisco routers by configuring role based CLI
  • Secure the Cisco IOS image and configuration file
  • Secure Cisco routers using the SDM Security Audit feature
  • Use the One-Step Lockdown feature in SDM to secure a Cisco router

Tentative Class Start

29th October, 2018

Available Seat

10 / 16

Enroll now

WHO CAN JOIN

This course is intended for those who have a good knowledge in basic Computer.

TRAINING VENUE

Xubisoft Ltd.

House-19, Road-04, Sector -04, Uttara, Dhaka-1230.

MEET THE INSTRUCTOR

SYED TANVIR AHMAD

CCNA Security Part1

  • Describe and list mitigation methods for common network attacks
  • Describe and list mitigation methods for Worm, Virus, and Trojan Horse attacks
  • Describe the Cisco Self Defending Network architecture
  • Describe and list mitigation methods for common network attacks
  • Describe and list mitigation methods for Worm, Virus, and Trojan Horse attacks
  • Describe the Cisco Self Defending Network architecture
  • Identify the appropriate media, cables, ports, and connectors to connect Cisco network devices to other network devices and hosts in a LAN
  • Secure Cisco routers using the SDM Security Audit feature
  • Use the One-Step Lockdown feature in SDM to secure a Cisco router
  • Secure administrative access to Cisco routers by setting strong encrypted passwords, exec timeout, login failure rate and using IOS login enhancements
  • Secure administrative access to Cisco routers by configuring multiple privilege levels
  • Secure administrative access to Cisco routers by configuring role based CLI
  • Secure the Cisco IOS image and configuration file
  • Secure Cisco routers using the SDM Security Audit feature
  • Use the One-Step Lockdown feature in SDM to secure a Cisco router

Tentative Class Start

29th October, 2018

Available Seat

10 / 16

Enroll now

WHO CAN JOIN

This course is intended for those who have a good knowledge in basic Computer.

TRAINING VENUE

Xubisoft Ltd.

House-19, Road-04, Sector -04, Uttara, Dhaka-1230.

MEET THE INSTRUCTOR

SYED TANVIR AHMAD

CCNA Security Part2

  • Secure administrative access to Cisco routers by setting strong encrypted passwords, exec timeout, login failure rate and using IOS login enhancements
  • Secure administrative access to Cisco routers by configuring multiple privilege levels
  • Secure administrative access to Cisco routers by configuring role based CLI
  • Secure the Cisco IOS image and configuration file
  • Explain the functions and importance of AAA
  • Describe the features of TACACS+ and RADIUS AAA protocols
  • Configure AAA authentication
  • Configure AAA authorization
  • Configure AAA accounting
  • Explain the functions and importance of AAA
  • Describe the features of TACACS+ and RADIUS AAA protocols
  • Configure AAA authentication
  • Configure AAA authorization
  • Configure AAA accounting
  • Explain the functionality of standard, extended, and named IP ACLs used by routers to filter packets Configure and verify IP ACLs to mitigate given threats (filter IP traffic destined for Telnet, SNMP, and DDoS attacks) in a network using CLI

Tentative Class Start

29th October, 2018

Available Seat

10 / 16

Enroll now

WHO CAN JOIN

This course is intended for those who have a good knowledge in basic Computer.

TRAINING VENUE

Xubisoft Ltd.

House-19, Road-04, Sector -04, Uttara, Dhaka-1230.

MEET THE INSTRUCTOR

SYED TANVIR AHMAD

CCNA Security Part 2

  • Secure administrative access to Cisco routers by setting strong encrypted passwords, exec timeout, login failure rate and using IOS login enhancements
  • Secure administrative access to Cisco routers by configuring multiple privilege levels
  • Secure administrative access to Cisco routers by configuring role based CLI
  • Secure the Cisco IOS image and configuration file
  • Explain the functions and importance of AAA
  • Describe the features of TACACS+ and RADIUS AAA protocols
  • Configure AAA authentication
  • Configure AAA authorization
  • Configure AAA accounting
  • Explain the functions and importance of AAA
  • Describe the features of TACACS+ and RADIUS AAA protocols
  • Configure AAA authentication
  • Configure AAA authorization
  • Configure AAA accounting
  • Explain the functionality of standard, extended, and named IP ACLs used by routers to filter packets Configure and verify IP ACLs to mitigate given threats (filter IP traffic destined for Telnet, SNMP, and DDoS attacks) in a network using CLI

Tentative Class Start

29th October, 2018

Available Seat

10 / 16

Enroll now

WHO CAN JOIN

This course is intended for those who have a good knowledge in basic Computer.

TRAINING VENUE

Xubisoft Ltd.

House-19, Road-04, Sector -04, Uttara, Dhaka-1230.

MEET THE INSTRUCTOR

SYED TANVIR AHMAD

CCNA Security Part 3

  • Configure IP ACLs to prevent IP address spoofing using CLI
  • Explain the functionality of standard, extended, and named IP ACLs used by routers to filter packets Configure and verify IP ACLs to mitigate given threats (filter IP traffic destined for Telnet, SNMP, and DDoS attacks) in a network using CLI
  • Configure IP ACLs to prevent IP address spoofing using CLI
  • Discuss the caveats to be considered when building ACLs
  • Implement secure network management and reporting
  • Use CLI and SDM to configure SSH on Cisco routers to enable secured management access
  • Use CLI and SDM to configure Cisco routers to send Syslog messages to a Syslog server
  • Describe how to prevent layer 2 attacks by configuring basic Catalyst switch security features
  • Describe the operational strengths and weaknesses of the different firewall technologies
  • Explain stateful firewall operations and the function of the state table
  • Implement Zone Based Firewall using SDM
  • Describe the operational strengths and weaknesses of the different firewall technologies
  • Explain stateful firewall operations and the function of the state table Implement Zone Based Firewall using SDM
  • Describe the operational strengths and weaknesses of the different firewall technologies

Tentative Class Start

29th October, 2018

Available Seat

10 / 16

Enroll now

WHO CAN JOIN

This course is intended for those who have a good knowledge in basic Computer.

TRAINING VENUE

Xubisoft Ltd.

House-19, Road-04, Sector -04, Uttara, Dhaka-1230.

MEET THE INSTRUCTOR

SYED TANVIR AHMAD

CCNA Security Part 3

  • Configure IP ACLs to prevent IP address spoofing using CLI
  • Explain the functionality of standard, extended, and named IP ACLs used by routers to filter packets Configure and verify IP ACLs to mitigate given threats (filter IP traffic destined for Telnet, SNMP, and DDoS attacks) in a network using CLI
  • Configure IP ACLs to prevent IP address spoofing using CLI
  • Discuss the caveats to be considered when building ACLs
  • Implement secure network management and reporting
  • Use CLI and SDM to configure SSH on Cisco routers to enable secured management access
  • Use CLI and SDM to configure Cisco routers to send Syslog messages to a Syslog server
  • Describe how to prevent layer 2 attacks by configuring basic Catalyst switch security features
  • Describe the operational strengths and weaknesses of the different firewall technologies
  • Explain stateful firewall operations and the function of the state table
  • Implement Zone Based Firewall using SDM
  • Describe the operational strengths and weaknesses of the different firewall technologies
  • Explain stateful firewall operations and the function of the state table Implement Zone Based Firewall using SDM
  • Describe the operational strengths and weaknesses of the different firewall technologies

Tentative Class Start

29th October, 2018

Available Seat

10 / 16

Enroll now

WHO CAN JOIN

This course is intended for those who have a good knowledge in basic Computer.

TRAINING VENUE

Xubisoft Ltd.

House-19, Road-04, Sector -04, Uttara, Dhaka-1230.

MEET THE INSTRUCTOR

SYED TANVIR AHMAD

CCNA Security Part 4

  • Explain stateful firewall operations and the function of the state table Implement Zone Based Firewall using SDM
  • Define network based vs. host based intrusion detection and prevention
  • Explain IPS technologies, attack responses, and monitoring options
  • Enable and verify Cisco IOS IPS operations using SDM
  • Enable and verify Cisco IOS IPS operations using SDM
  • Define network based vs. host based intrusion detection and prevention
  • Explain IPS technologies, attack responses, and monitoring options
  • Enable and verify Cisco IOS IPS operations using SDM
  • Define network based vs. host based intrusion detection and prevention
  • Explain IPS technologies, attack responses, and monitoring options
  • Enable and verify Cisco IOS IPS operations using SDM
  • Explain the different methods used in cryptography
  • Explain IKE protocol functionality and phases
  • Describe the building blocks of IPSec and the security functions it provides
  • Configure and verify an IPSec site-to-site VPN with pre-shared key authentication using SDM

Tentative Class Start

29th October, 2018

Available Seat

10 / 16

Enroll now

WHO CAN JOIN

This course is intended for those who have a good knowledge in basic Computer.

TRAINING VENUE

Xubisoft Ltd.

House-19, Road-04, Sector -04, Uttara, Dhaka-1230.

MEET THE INSTRUCTOR

SYED TANVIR AHMAD

CCNA Security Part 4

  • About HTML5
  • Writing basic tags
  • Formatting content
  • Displaying images
  • Using nav, article, and div elements
  • Creating lists
  • Working with Forms
  • Controlling styling (fonts, colors, and more)
  • Using the Canvas, Audio, Flash file, and video tag
  • Table Operation
  • Linking to pages and downloadable content
  • Create & Displaying web Forms
  • Working with multiple formats
  • Creating Canvas, Audio, Flash file, and videos
  • Page Layout

Tentative Class Start

29th October, 2018

Available Seat

10 / 16

Enroll now

WHO CAN JOIN

This course is intended for those who have a good knowledge in basic Computer.

TRAINING VENUE

Xubisoft Ltd.

House-19, Road-04, Sector -04, Uttara, Dhaka-1230.

MEET THE INSTRUCTOR

SYED TANVIR AHMAD

CCNA Security Part 5

  • Explain the different methods used in cryptography
  • Explain IKE protocol functionality and phases
  • Describe the building blocks of IPSec and the security functions it provides
  • Configure and verify an IPSec site-to-site VPN with pre-shared key authentication using SDM
  • Explain the different methods used in cryptography
  • Explain IKE protocol functionality and phases
  • Describe the building blocks of IPSec and the security functions it provides
  • Configure and verify an IPSec site-to-site VPN with pre-shared key authentication using SDM
  • Explain the different methods used in cryptography
  • Explain IKE protocol functionality and phases
  • Describe the building blocks of IPSec and the security functions it provides
  • Configure and verify an IPSec site-to-site VPN with pre-shared key authentication using SDM
  • Assessment (Written, & Presentation)

Tentative Class Start

29th October, 2018

Available Seat

10 / 16

Enroll now

WHO CAN JOIN

This course is intended for those who have a good knowledge in basic Computer.

TRAINING VENUE

Xubisoft Ltd.

House-19, Road-04, Sector -04, Uttara, Dhaka-1230.

MEET THE INSTRUCTOR

SYED TANVIR AHMAD

CCNA Security Part 5

  • Explain the different methods used in cryptography
  • Explain IKE protocol functionality and phases
  • Describe the building blocks of IPSec and the security functions it provides
  • Configure and verify an IPSec site-to-site VPN with pre-shared key authentication using SDM
  • Explain the different methods used in cryptography
  • Explain IKE protocol functionality and phases
  • Describe the building blocks of IPSec and the security functions it provides
  • Configure and verify an IPSec site-to-site VPN with pre-shared key authentication using SDM
  • Explain the different methods used in cryptography
  • Explain IKE protocol functionality and phases
  • Describe the building blocks of IPSec and the security functions it provides
  • Configure and verify an IPSec site-to-site VPN with pre-shared key authentication using SDM
  • Assessment (Written, & Presentation)

Tentative Class Start

29th October, 2018

Available Seat

10 / 16

Enroll now

WHO CAN JOIN

This course is intended for those who have a good knowledge in basic Computer.

TRAINING VENUE

Xubisoft Ltd.

House-19, Road-04, Sector -04, Uttara, Dhaka-1230.

MEET THE INSTRUCTOR

SYED TANVIR AHMAD

Course Duration

Total

36 Class

Per Class

3 Hours

Skill Required

Basic Computer

Weekly Class

3 Days

Trainer

Fahad Hasan