• Skip to primary navigation
  • Skip to content
  • Skip to footer
 AREA RISERVATA
 800-177596
 CHI SIAMO
 CONTATTACI
 AREA RISERVATA
 CONTATTACI
 800-177596
Vega Training

Vega Training

Formazione Certificata Ovunque

  • Corsi
  • Categorie Corsi
  • Certificazioni
  • Accreditamenti
  • Calendario
  • Blog

Certificazione CCNA Security

Cisco CCNA Security, Cisco CCNA Cyber OPS, Cisco CCNP Security

Certificazione CCNA Security

Panoramica | Svolgimento e Durata | Pre-Requisiti
Argomenti D’esame   |  Video  |  Corsi Propedeutici

Panoramica   Svolgimento e Durata
Pre-Requisiti
Argomenti D’esame    Video
Corsi Propedeutici

PANORAMICA

Certificazione e Corso CCNA Security

Esame 210-260 IINS;

La certificazione Cisco CCNA Security Esame 210-260 è la verticalizzazione  in ambito security della certificazione Cisco Cisco CCNA.
Tale certificazione attesta le abilità nell’ implementazione di soluzioni di sicurezza per assicurare integrità ,  confidenzialità e continuità del servizio.
Questa certificazione è ritenuta dalla National Security Agency Americana (NSA)  in linea con lo standard Formativo Internazionale CNSS 4011 al quale tutti i professionisti della sicurezza si rifanno per operare all’ interno di strutture Governative.

Per conseguire la Certificazione Cisco CCNA Security è necessario sostenere con successo il seguente esame:
Esame 210-260 IINS;

Corsi propedeutici alla certificazione

CORSI PROPEDEUTICI
Affrontare un esame di certificazione richiede una preparazione specifica.
Per questa certificazione consigliamo:

Corso CCNA Security

 SVOLGIMENTO E DURATA

Esame 210-260 IINS Durata 120 minuti  60-70 quesiti;

Negli esami sono presenti quesiti formulati in lingua inglese in forme differenti: Risposta Multipla; completamento di testo, collegamenti concettuali Drag and Drop; vere e proprie simulazioni laboratoriali.

 PREREQUISITI

I candidati dovranno essere in possesso della Certificazione Cisco CCNA.

ARGOMENTI D’ESAME

Esame 210-260 IINS

Security Concepts
Common security principles
Describe confidentiality, integrity, availability (CIA)
Describe SIEM technology
Identify common security terms
Identify common network security zones
Common security threats
Identify common network attacks
Describe social engineering
Identify malware
Classify the vectors of data loss/exfiltration
Cryptography concepts
Describe key exchange
Describe hash algorithm
Compare and contrast symmetric and asymmetric encryption
Describe digital signatures, certificates, and PKI
Describe network topologies
Campus area network (CAN)
Cloud, wide area network (WAN)
Data center
Small office/home office (SOHO)
Network security for a virtual environment
Secure Access
Secure management
Compare in-band and out-of band
Configure secure network management
Configure and verify secure access through SNMP v3 using an ACL
Configure and verify security for NTP
Use SCP for file transfer
AAA concepts
Describe RADIUS and TACACS+ technologies
Configure administrative access on a Cisco router using TACACS+
Verify connectivity on a Cisco router to a TACACS+ server
Explain the integration of Active Directory with AAA
Describe authentication and authorization using ACS and ISE
802.1X authentication
Identify the functions 802.1X components
BYOD
Describe the BYOD architecture framework
Describe the function of mobile device management (MDM)
VPN
VPN concepts
Describe IPsec protocols and delivery modes (IKE, ESP, AH, tunnel mode, transport mode)
Describe hairpinning, split tunneling, always-on, NAT traversal
Remote access VPN
Implement basic clientless SSL VPN using ASDM
Verify clientless connection
Implement basic AnyConnect SSL VPN using ASDM
Verify AnyConnect connection
Identify endpoint posture assessment
Site-to-site VPN
Implement an IPsec site-to-site VPN with pre-shared key authentication on Cisco routers and ASA firewalls
Verify an IPsec site-to-site VPN
Secure Routing and Switching
Security on Cisco routers
Configure multiple privilege levels
Configure Cisco IOS role-based CLI access
Implement Cisco IOS resilient configuration
Securing routing protocols
Implement routing update authentication on OSPF
Securing the control plane
Explain the function of control plane policing
Common Layer 2 attacks
Describe STP attacks
Describe ARP spoofing
Describe MAC spoofing
Describe CAM table (MAC address table) overflows
Describe CDP/LLDP reconnaissance
Describe VLAN hopping
Describe DHCP spoofing
Mitigation procedures
Implement DHCP snooping
Implement Dynamic ARP Inspection
Implement port security
Describe BPDU guard, root guard, loop guard
Verify mitigation procedures
VLAN security
Describe the security implications of a PVLAN
Describe the security implications of a native VLAN
Cisco Firewall Technologies
Describe operational strengths and weaknesses of the different firewall technologies
Proxy firewalls
Application firewall
Personal firewall
Compare stateful vs. stateless firewalls
Operations
Function of the state table
Implement NAT on Cisco ASA 9.x
Static
Dynamic
PAT
Policy NAT
Verify NAT operations
Implement zone-based firewall
Zone to zone
Self zone
Firewall features on the Cisco Adaptive Security Appliance (ASA) 9.x
Configure ASA access management
Configure security access policies
Configure Cisco ASA interface security levels
Configure default Cisco Modular Policy Framework (MPF)
Describe modes of deployment (routed firewall, transparent firewall)
Describe methods of implementing high availability
Describe security contexts
Describe firewall services
IPS
Describe IPS deployment considerations
Network-based IPS vs. host-based IPS
Modes of deployment (inline, promiscuous – SPAN, tap)
Placement (positioning of the IPS within the network)
False positives, false negatives, true positives, true negatives
Describe IPS technologies
Rules/signatures
Detection/signature engines
Trigger actions/responses (drop, reset, block, alert, monitor/log, shun)
Blacklist (static and dynamic)
Content and Endpoint Security
Describe mitigation technology for email-based threats
SPAM filtering, anti-malware filtering, DLP, blacklisting, email encryption
Describe mitigation technology for web-based threats
Local and cloud-based web proxies
Blacklisting, URL filtering, malware scanning, URL categorization, web application filtering, TLS/SSL decryption
Describe mitigation technology for endpoint threats
Anti-virus/anti-malware
Personal firewall/HIPS
Hardware/software encryption of local data

VIDEO DI APPROFONDIMENTO

Laboratorio H24

La nostra community

Le Testimonianze

 CORSI PROPEDEUTICI

Corso Cisco CCNA Security;

CONTATTACI
UN NOSTRO CONSULENTE
TECNICO

Servizio attivo dal lunedì al giovedì 09.00-13.00 e 15.00-19.00 e Il venerdì dalle 09.00-13.00.

FORMAZIONE A DISTANZA

APPROFONDISCI

FORMAZIONE AZIENDALE

APPROFONDISCI

LABORATORIO LAVORO

APPROFONDISCI

LABORATORIO REMOTO

APPROFONDISCI

RICHIEDI CONSULENZA

APPROFONDISCI
ALTRE CERTIFICAZIONI
Diventa Partner Cisco
Certificazione Cisco CCNA
Certificazione DevNet Associate
Certificazione CCNA Security
Certificazione CCNA Cyber Ops
Certificazione CCNA Data Center
Certificazione CCNA Wireless
Certificazione CCNA SP
Certificazione CCNA Collaboration
Certificazione CCNA Cloud
Certificazione CCNA Industrial
Certificazione CCDA
Certificazione CCNP R&S
Certificazione CCNP Enterprise
Certificazione CCNP Security
Certificazione CCNP Data Center
Certificazione CCNP Wireless
Certificazione CCNP SP
Certificazione CCNP Collaboration
Certificazione CCNP Cloud
Certificazione CCDP
Altre Certificazioni

Footer

CHI SIAMO


Staff
Referenze Aziendali
Casi di successo
Partner e convenzioni
About Vega Training

DIRITTI E PRIVACY


Privacy
Cookie
Certificazione ISO
Contatti

QUICK LINKS


Corsi
Marketplace
Blog
Categorie Corsi
Articoli Tecnici

CONTATTI



Dall’estero: +39 02 87168254
contatti@vegatraining.eu

Vega Training® - FSV Srl - Piva: 01985170743 - Copyright 2019