
Certificazione CCNA Security
PANORAMICA

Esame 210-260 IINS;
La certificazione Cisco CCNA Security Esame 210-260 è la verticalizzazione in ambito security della certificazione Cisco Cisco CCNA.
Tale certificazione attesta le abilità nell’ implementazione di soluzioni di sicurezza per assicurare integrità , confidenzialità e continuità del servizio.
Questa certificazione è ritenuta dalla National Security Agency Americana (NSA) in linea con lo standard Formativo Internazionale CNSS 4011 al quale tutti i professionisti della sicurezza si rifanno per operare all’ interno di strutture Governative.
Per conseguire la Certificazione Cisco CCNA Security è necessario sostenere con successo il seguente esame:
Esame 210-260 IINS;

CORSI PROPEDEUTICI
Affrontare un esame di certificazione richiede una preparazione specifica.
Per questa certificazione consigliamo:
Corso CCNA Security
SVOLGIMENTO E DURATA
Esame 210-260 IINS Durata 120 minuti 60-70 quesiti;
Negli esami sono presenti quesiti formulati in lingua inglese in forme differenti: Risposta Multipla; completamento di testo, collegamenti concettuali Drag and Drop; vere e proprie simulazioni laboratoriali.
PREREQUISITI
I candidati dovranno essere in possesso della Certificazione Cisco CCNA.
ARGOMENTI D’ESAME
Esame 210-260 IINS
Security Concepts
Common security principles
Describe confidentiality, integrity, availability (CIA)
Describe SIEM technology
Identify common security terms
Identify common network security zones
Common security threats
Identify common network attacks
Describe social engineering
Identify malware
Classify the vectors of data loss/exfiltration
Cryptography concepts
Describe key exchange
Describe hash algorithm
Compare and contrast symmetric and asymmetric encryption
Describe digital signatures, certificates, and PKI
Describe network topologies
Campus area network (CAN)
Cloud, wide area network (WAN)
Data center
Small office/home office (SOHO)
Network security for a virtual environment
Secure Access
Secure management
Compare in-band and out-of band
Configure secure network management
Configure and verify secure access through SNMP v3 using an ACL
Configure and verify security for NTP
Use SCP for file transfer
AAA concepts
Describe RADIUS and TACACS+ technologies
Configure administrative access on a Cisco router using TACACS+
Verify connectivity on a Cisco router to a TACACS+ server
Explain the integration of Active Directory with AAA
Describe authentication and authorization using ACS and ISE
802.1X authentication
Identify the functions 802.1X components
BYOD
Describe the BYOD architecture framework
Describe the function of mobile device management (MDM)
VPN
VPN concepts
Describe IPsec protocols and delivery modes (IKE, ESP, AH, tunnel mode, transport mode)
Describe hairpinning, split tunneling, always-on, NAT traversal
Remote access VPN
Implement basic clientless SSL VPN using ASDM
Verify clientless connection
Implement basic AnyConnect SSL VPN using ASDM
Verify AnyConnect connection
Identify endpoint posture assessment
Site-to-site VPN
Implement an IPsec site-to-site VPN with pre-shared key authentication on Cisco routers and ASA firewalls
Verify an IPsec site-to-site VPN
Secure Routing and Switching
Security on Cisco routers
Configure multiple privilege levels
Configure Cisco IOS role-based CLI access
Implement Cisco IOS resilient configuration
Securing routing protocols
Implement routing update authentication on OSPF
Securing the control plane
Explain the function of control plane policing
Common Layer 2 attacks
Describe STP attacks
Describe ARP spoofing
Describe MAC spoofing
Describe CAM table (MAC address table) overflows
Describe CDP/LLDP reconnaissance
Describe VLAN hopping
Describe DHCP spoofing
Mitigation procedures
Implement DHCP snooping
Implement Dynamic ARP Inspection
Implement port security
Describe BPDU guard, root guard, loop guard
Verify mitigation procedures
VLAN security
Describe the security implications of a PVLAN
Describe the security implications of a native VLAN
Cisco Firewall Technologies
Describe operational strengths and weaknesses of the different firewall technologies
Proxy firewalls
Application firewall
Personal firewall
Compare stateful vs. stateless firewalls
Operations
Function of the state table
Implement NAT on Cisco ASA 9.x
Static
Dynamic
PAT
Policy NAT
Verify NAT operations
Implement zone-based firewall
Zone to zone
Self zone
Firewall features on the Cisco Adaptive Security Appliance (ASA) 9.x
Configure ASA access management
Configure security access policies
Configure Cisco ASA interface security levels
Configure default Cisco Modular Policy Framework (MPF)
Describe modes of deployment (routed firewall, transparent firewall)
Describe methods of implementing high availability
Describe security contexts
Describe firewall services
IPS
Describe IPS deployment considerations
Network-based IPS vs. host-based IPS
Modes of deployment (inline, promiscuous – SPAN, tap)
Placement (positioning of the IPS within the network)
False positives, false negatives, true positives, true negatives
Describe IPS technologies
Rules/signatures
Detection/signature engines
Trigger actions/responses (drop, reset, block, alert, monitor/log, shun)
Blacklist (static and dynamic)
Content and Endpoint Security
Describe mitigation technology for email-based threats
SPAM filtering, anti-malware filtering, DLP, blacklisting, email encryption
Describe mitigation technology for web-based threats
Local and cloud-based web proxies
Blacklisting, URL filtering, malware scanning, URL categorization, web application filtering, TLS/SSL decryption
Describe mitigation technology for endpoint threats
Anti-virus/anti-malware
Personal firewall/HIPS
Hardware/software encryption of local data
VIDEO DI APPROFONDIMENTO
Laboratorio H24
La nostra community
Le Testimonianze