CCNA – Training & Certifications- Cisco

CCNA is one of the valid qualifications for people who intend to work in computer networks or information technology with Cisco devices. With a CCNA (Cisco Certified Network Associate) degree, you can easily work in reputable companies and enjoy a relatively good income. CCNA Security training, which is more related to computer networks, is important for people who plan to work as network engineers worldwide.

The CCNA Security certificate is a credential that shows employers that a holder is a person familiar with network security. The CCNA Security course covers seven core topics: Secure Access, VPN, IPS, and more. Most CCNA Security training courses are offered in the course, which is an authoritative source for these courses. In the following, we are going to take a look at all the headings.

Chapters of the CCNA Security training course

For each CCNA course, Cisco sets goals that the participant will achieve after completing the course. At the end of the CCNA Security course, you will also gain enough mastery in the following areas to work as a company network technician.

  • How to configure IPS to reduce the effect of attacks on networks
  • Establishing admin access security in Cisco routers
  • Getting to know the basics of establishing a network’s security, security threats, and methods of reducing malicious attacks
  • How to establish admin access security with authentication, authorization, and auditing (AAA)
  • Getting to know the methods of implementing confidentiality and data integrity
  • Familiarity with local network security considerations and endpoint implementation
  • Getting to know the implementation of a virtual private network or VPN

Examining security concepts in CCNA Security training

To create a secure computer network, you must first understand the network’s basic concepts and then address its security category. Specifically, an interconnected system of computers and peripheral devices such as printers, scanners, etc., is called a computer network. The task of this mutual communication is nothing but to facilitate the sharing of information; Computers can provide such an advantage to users in two ways, wired and wireless.

One of the main network concepts that are very important for the CCNA Security exam is knowing the classification of computer networks based on different factors:

  • Geographical scope
  • Internal communication
  • Management
  • architecture

1. Types of networks in terms of geographic scope

Any computer network can be geographically classified into one of the following five categories:

  • A network that is established between Bluetooth devices and their distance is not more than a few meters
  • A network that can include devices in a commercial/residential building
  • A network that can cover the level of a city
  • A network that can connect several cities or provinces
  • A network that can connect the whole world

2. Types of communication between networks

Different network components can have logical, physical, or both connections differently. Interconnection occurs in several ways that are very important to know for the CCNA Security exam:

  • Each device can connect to any other network device and form the fabric of the network
  • All devices can be connected to a single interface but not graphically connected. Devices in this type of communication form a bus structure
  • Each system (device) can be connected to its right or left counterparts to form a linear structure.
  • All devices can be connected to a single device and form a star structure
  • All network devices can be connected using the above methods and form a hybrid structure

3. Types of network architecture

Two types of client-server and peer-to-peer form computer network architecture:

  • Client-server architecture: One or two network components can act as a server in this architecture, so the rest of the systems are considered server clients. Clients must request the server to answer their requests. Hence, the server will process the incoming requests and send them the final response
  • Peer-to-peer architecture: When two systems or devices are connected at the same level, they are called peers.
  • Hybrid architecture: When a network is created by combining the two types of architecture, it is called a hybrid architecture network.

4. Computer network applications

Another topic that is very important in CCNA Security training is getting to know the benefits and applications of computer networks, which you will learn about in the following:

  • Sharing resources such as printers, scanners, etc. (hardware resources)
  • Information and data exchange using email and FTP
  • Information exchange through the web and the Internet
  • Creating interaction with other users (clients) through dynamic web pages
  • The possibility of using IP-based telephones (VoIP)
  • The possibility of parallel calculations
  • Ability to send instant messages
  • The possibility of creating a video conference

Getting to know the concept of a virtual private network

Another important topic in the CCNA Security exam and certification is getting to know the concept of a virtual private network. VPN, derived from the term Virtual Private Network, creates a virtual private network between users – in a specific space. For example, a VPN is used to connect the systems of a company with multiple branches around the world.

Using the Internet as a global company network is unsuitable for speed and security. On the other hand, addresses used in the company’s internal network are not valid on the Internet and cannot be passed through routers.

ISDN and OC3 networks are the next options, which are expensive and not cost-effective due to their need for extensive infrastructure. That’s why most companies with many branches worldwide use VPN as a shortcut. A virtual private network (VPN) creates another private network within the WAN, providing greater speed and security to the user.

Private networks or VPNs have various uses at the network level, some of which are:

  • The possibility of connecting to the company’s internal private network remotely and using its software and hardware resources
  • The possibility of connecting to services that only serve a certain geographical area
  • the possibility of increasing the level of security to public branches; Like internet connections in hotels

Network security threats

Another topic that is discussed in the CCNA Security course is the identification of current security threats in the network, which includes three main pillars:

  • Potential attackers have various objectives ranging from simple sabotage to terrorist and political. In CCNA Security training, topics such as types of attackers and hackers are discussed in detail.
  • Various methods of attack: Familiarity with a wide variety of methods of attackers to tamper with network information will help the network technician to stop them before the hacker act. Among these methods are the discovery method, social engineering, increasing the level of access, bypassing authentication using the Back Door method, code execution, man-in-the-middle attack, botnet attack, etc…
  • Attack axes: The attack vector is the path the hacker uses to access the target system. Hackers steal people’s information, data, and capital from these well-known attack axes

secure access; The second important topic of CCNA Security training

Secure access includes security management, AAA concepts, and 802.1X authentication.

The word AAA is made from the names of three terms, Authentication, Authorization, and Accounting, which mean authentication, qualification, and audit, respectively. Authentication is a method to identify users using an ID and password, the communication between the two (user and network) is encrypted. Authentication is implemented based on the idea that each user has unique data that differentiates them from others.

But authentication provides the necessary permission to access network resources and determines whether the user has the authority to issue certain commands or not. Authentication is one of the processes of implementing policies, which means how much a user is allowed to use the resources and services of a network and to what level he can influence the network.

Auditing or accounting is done by recording statistics and consumption information. The audit is implemented to control eligibility, calculate the cost of received services, analyze trends, the amount of resource consumption, etc., to determine the amount of capacity, and it includes the following:

  • The time the user has been active in the network
  • Services to which access is granted
  • The amount of data exchanged during a session

How to secure routing and switching

After topics such as VPN and secure access, secure routing and switching is one ofarehe the most important topics of preparation for the CCNA Security exam, which themselves become several branches:

  • Creating security in Cisco routers
  • Creating security in routing protocols
  • Creating security in the Control Plane
  • Familiarity with common layer two attacks
  • Getting to know the instructions for reducing the effect
  • Getting to know how to create security in virtual local networks or VLANs

1. Creating security in routing protocols

Among Internet protocols, Telnet and HTTP are two very insecure protocols because the information is transmitted in plain text. On the other hand, SSH and HTTPS are considered secure protocols that transfer information encrypted and use port numbers 22 and 443, respectively. In the CCNA Security training course, zero to one hundred of these topics will be taught in a completely practical and scientific way.

2. Familiarity with layer two attacks

In the introduction to common attacks of the second layer of CCNA Security training, first of all, the methods of preventing and preventing attacks are discussed:

  • Disabling the source IP route: This directive does not allow the hacker to examine the route that a partakes in to reach its destination.
  • Disabling Finger Services: This method prevents the hacker from knowing who is logged into the network.
  • IP Disabling: This method makes it impossible for a hacker to query a TCP port for identification. But if the IP identification service is active, the router type, model, and iOS version can be identified. Hackers use this information to design their attacks on the router
  • Disable.CDP: CDP (Certification in Data Processing) gives the user the iOS version, model, and a number of the device, which can be used to design possible attacks on the router.

3. Understanding the concept of IP address spoofing and attacking it

IP address spoofing (ID Address Spoofing) is an interesting way to replace the sender’s IP address with the IP address of another device. They use IP spoofing to gain unauthorized access to network devices; So, so a hacker illegally falsifies the identity of a device by manipulating the IP packet.
4. Familiarity with the methods of a hacker’s attack on a computer as part of the CCNA Security training

In the section on getting to know hacking methods, some important types of attacks are examined from the point of view of the CCNA Security exam.

  • Man-in-the-middle attack
  • Denial of Service attack
  • Impersonation attack
  • Reconnaissance attack
  • STP attack

5. Man-in-the-middle attack

To begin with, let us say that it is very difficult to identify and defend against a man-in-the-middle attack; this type of attack generally has no effect on the infected computers at both ends of the connection. This attack is related to controlling the communication equipment between two systems. For example, a malicious router that provides free Internet to the public can run a man-in-the-middle attack.

As the name of this type of attack (Man in the Middle) states, the attacker places himself between the two parties of the communication, and this type of attack has been prevalent even before the advent of computers. For example, suppose you send a message to your friend through one of the virtual networks, if a ha. If it gets in the way of your communication with your friend, he can steal your information without you knowing. Consider the same issue in postal communication, if the and ifman does not perform his duty well, all your letters will be eavesdeavesdrop read the following link for a comprehensive and more detailed understanding of the concept of man-in-the e-middle attack:

6. Man-in-the-middle attack solutions in CCNA Security course

Another topic taught in the CCNA Security course is the defense against such attacks. These types of attacks clearly show that one of the communication channels has been compromised. To detect a man-in-the-middle attack, the network server must use the encrypted version of the HTTPS protocol. To identify these types of attacks, take the following points seriously.

7. Security warnings

Security certificate warnings indicate that there is a serious problem in the network, and when the security certificate specifications do not match the server, it means that you are exchanging data with a phishing server or a victim of a man-in-the-middle attack. . Security warnings should be taken more seriously when it comes to sensitive information such as email and online banking, otherwi. Otherwisecan easily steal your vital information.

8. HTTPS check

When you enter a site and are about to enter information such as email or online banking operations, be sure the address bar and make sureensure website uses HTTPS encryption. Also, using EFF’s HTTPS Everywhere plugin will help you identify sites that don’t use this protocol.

9. Smart use of public Wi-Fi

When you are connected to public Wi-Fi networks, never use their Internet for online banking or exchange sensitive information. If you also see an error message on the device’s screen, do not ignore it in any way and disconnect your Wi-Fi connection immediately.

10. Use of antivirus

Up-to-date antivirus software and other basic internet security methods can go a long way in protecting against man-in-the-middle attacks that require malware to run on your system. But using antivirus alone cannot do anything, to solve this problem, it is better to always make sure that it is updated.
Familiarity with Cisco firewall technology in the CCNA Security training course

In the CCNA Security course firewall training section, a wide range of firewall technologies are discussed that will meet all your needs. NAT and DMZ are two types of firewall implementation technologies that are specifically addressed in the CCNA Security course.