Site icon DED9

CCNA – Training & Certifications – Cisco

CCNA is one of the valid qualifications for people who intend to work in computer networks or information technology with Cisco devices. With a CCNA (Cisco Certified Network Associate) degree, you can easily work in reputable companies and enjoy a relatively good income. CCNA Security training, which is more related to computer networks, is important for people who plan to work as network engineers worldwide.

The CCNA Security certificate is a credential that shows employers that a holder is a person familiar with network security. The CCNA Security course covers seven core topics: Secure Access, VPN, IPS, and more. Most CCNA Security training courses are offered in the course, which is an authoritative source for these courses. In the following, we are going to take a look at all the headings.

Chapters of the CCNA Security training course

For each CCNA course, Cisco sets goals that the participant will achieve after completing the course. At the end of the CCNA Security course, you will also gain enough mastery in the following areas to work as a company network technician.

Examining security concepts in CCNA Security training

To create a secure computer network, you must first understand the network’s basic concepts and then address its security category. Specifically, an interconnected system of computers and peripheral devices such as printers, scanners, etc., is called a computer network. The task of this mutual communication is nothing but to facilitate the sharing of information; Computers can provide such an advantage to users in two ways, wired and wireless.

One of the main network concepts that are very important for the CCNA Security exam is knowing the classification of computer networks based on different factors:

1. Types of networks in terms of geographic scope

Any computer network can be geographically classified into one of the following five categories:

2. Types of communication between networks

Different network components can have logical, physical, or both connections differently. Interconnection occurs in several ways that are very important to know for the CCNA Security exam:

3. Types of network architecture

Two types of client-server and peer-to-peer form computer network architecture:

4. Computer network applications

Another topic that is very important in CCNA Security training is getting to know the benefits and applications of computer networks, which you will learn about in the following:

Getting to know the concept of a virtual private network

Another important topic in the CCNA Security exam and certification is getting to know the concept of a virtual private network. VPN, derived from the term Virtual Private Network, creates a virtual private network between users – in a specific space. For example, a VPN is used to connect the systems of a company with multiple branches around the world.

Using the Internet as a global company network is unsuitable for speed and security. On the other hand, addresses used in the company’s internal network are not valid on the Internet and cannot be passed through routers.

ISDN and OC3 networks are the next options, which are expensive and not cost-effective due to their need for extensive infrastructure. That’s why most companies with many branches worldwide use VPN as a shortcut. A virtual private network (VPN) creates another private network within the WAN, providing greater speed and security to the user.

Private networks or VPNs have various uses at the network level, some of which are:

Network security threats

Another topic that is discussed in the CCNA Security course is the identification of current security threats in the network, which includes three main pillars:

secure access; The second important topic of CCNA Security training

Secure access includes security management, AAA concepts, and 802.1X authentication.

The word AAA is made from the names of three terms, Authentication, Authorization, and Accounting, which mean authentication, qualification, and audit, respectively. Authentication is a method to identify users using an ID and password, the communication between the two (user and network) is encrypted. Authentication is implemented based on the idea that each user has unique data that differentiates them from others.

But authentication provides the necessary permission to access network resources and determines whether the user has the authority to issue certain commands or not. Authentication is one of the processes of implementing policies, which means how much a user is allowed to use the resources and services of a network and to what level he can influence the network.

Auditing or accounting is done by recording statistics and consumption information. The audit is implemented to control eligibility, calculate the cost of received services, analyze trends, the amount of resource consumption, etc., to determine the amount of capacity, and it includes the following:

How to secure routing and switching

After topics such as VPN and secure access, secure routing and switching is one ofarehe the most important topics of preparation for the CCNA Security exam, which themselves become several branches:

1. Creating security in routing protocols

Among Internet protocols, Telnet and HTTP are two very insecure protocols because the information is transmitted in plain text. On the other hand, SSH and HTTPS are considered secure protocols that transfer information encrypted and use port numbers 22 and 443, respectively. In the CCNA Security training course, zero to one hundred of these topics will be taught in a completely practical and scientific way.

2. Familiarity with layer two attacks

In the introduction to common attacks of the second layer of CCNA Security training, first of all, the methods of preventing and preventing attacks are discussed:

3. Understanding the concept of IP address spoofing and attacking it

IP address spoofing (ID Address Spoofing) is an interesting way to replace the sender’s IP address with the IP address of another device. They use IP spoofing to gain unauthorized access to network devices; So, so a hacker illegally falsifies the identity of a device by manipulating the IP packet.
4. Familiarity with the methods of a hacker’s attack on a computer as part of the CCNA Security training

In the section on getting to know hacking methods, some important types of attacks are examined from the point of view of the CCNA Security exam.

5. Man-in-the-middle attack

To begin with, let us say that it is very difficult to identify and defend against a man-in-the-middle attack; this type of attack generally has no effect on the infected computers at both ends of the connection. This attack is related to controlling the communication equipment between two systems. For example, a malicious router that provides free Internet to the public can run a man-in-the-middle attack.

As the name of this type of attack (Man in the Middle) states, the attacker places himself between the two parties of the communication, and this type of attack has been prevalent even before the advent of computers. For example, suppose you send a message to your friend through one of the virtual networks, if a ha. If it gets in the way of your communication with your friend, he can steal your information without you knowing. Consider the same issue in postal communication, if the and ifman does not perform his duty well, all your letters will be eavesdeavesdrop read the following link for a comprehensive and more detailed understanding of the concept of man-in-the e-middle attack:

6. Man-in-the-middle attack solutions in CCNA Security course

Another topic taught in the CCNA Security course is the defense against such attacks. These types of attacks clearly show that one of the communication channels has been compromised. To detect a man-in-the-middle attack, the network server must use the encrypted version of the HTTPS protocol. To identify these types of attacks, take the following points seriously.

7. Security warnings

Security certificate warnings indicate that there is a serious problem in the network, and when the security certificate specifications do not match the server, it means that you are exchanging data with a phishing server or a victim of a man-in-the-middle attack. . Security warnings should be taken more seriously when it comes to sensitive information such as email and online banking, otherwi. Otherwisecan easily steal your vital information.

8. HTTPS check

When you enter a site and are about to enter information such as email or online banking operations, be sure the address bar and make sureensure website uses HTTPS encryption. Also, using EFF’s HTTPS Everywhere plugin will help you identify sites that don’t use this protocol.

9. Smart use of public Wi-Fi

When you are connected to public Wi-Fi networks, never use their Internet for online banking or exchange sensitive information. If you also see an error message on the device’s screen, do not ignore it in any way and disconnect your Wi-Fi connection immediately.

10. Use of antivirus

Up-to-date antivirus software and other basic internet security methods can go a long way in protecting against man-in-the-middle attacks that require malware to run on your system. But using antivirus alone cannot do anything, to solve this problem, it is better to always make sure that it is updated.
Familiarity with Cisco firewall technology in the CCNA Security training course

In the CCNA Security course firewall training section, a wide range of firewall technologies are discussed that will meet all your needs. NAT and DMZ are two types of firewall implementation technologies that are specifically addressed in the CCNA Security course.

 

Exit mobile version