[ Login ]


NSCOM 205 Cisco CCNA Security • 5 Cr.


Demonstrates the skills required to develop a security infrastructure, recognize threats and vulnerabilities to networks, and mitigate security threats. Emphasizes core security technologies, installation, troubleshooting and monitoring of network devises to maintain integrity, confidentiality and availability of data and devices, and competency in the technologies. Prerequisite: NSCOM 204 with a C or better or current Cisco CCNA or CCNP certification in routing and switching.


After completing this class, students should be able to:

  • Upon completion students will be able to:
  • Describe the evolution of network security.
  • Describe the drivers for network security.
  • Describe the major network security organizations.
  • Describe the domains of network security.
  • Describe network security policies.
  • Describe viruses, worms, and Trojan Horses.
  • Describe how to mitigate threats from viruses, worms, and Trojan Horses.
  • Describe how network attacks are categorized.
  • Describe reconnaissance attacks.
  • Describe access attacks.
  • Describe Denial of Service attacks.
  • Describe how to mitigate network attacks.
  • Secure the physical installation of and the administrative access to Cisco routers based on different network requirements using the CLI and SDM.
  • Configure administrative roles using privilege levels and role-based CLI.
  • Implement the management and reporting features of syslog, SNMP, SSH, and NTP.
  • Examine router configurations with the Security Audit feature of Cisco SDM, and make the router and network more secure by using the auto secure command or the One-Step Lockdown feature of Cisco SDM.
  • Explain the function and operation of the authentication, authorization, and accounting (AAA) protocol.
  • Configure a Cisco router to perform AAA authentication with a local database.
  • Describe how to configure Cisco ACS to support AAA for Cisco IOS routers.
  • Configure server-based AAA.
  • Describe numbered and named, standard and extended IP ACLs.
  • Configure IP ACLs with IOS CLI and SDM.
  • Describe TCP established ACL functionality.
  • Configure ACLs with TCP established.
  • Describe and configure reflexive ACLs.
  • Describe and configure dynamic ACLs.
  • Describe and configure time-based ACLs.
  • Describe attack mitigation with ACLs.
  • Describe the major types of firewalls.
  • Describe and configure CBAC (IOS Stateful Packet Inspection) with CLI.
  • Describe and configure Zone-Based Policy Firewall with CLI and SDM.
  • Describe the underlying IDS and IPS technology that is embedded in the Cisco host- and network-based IDS and IPS solutions.
  • Configure Cisco IOS IPS using CLI and Cisco SDM.
  • Verify Cisco IOS using CLI and Cisco SDM.
  • Describe endpoint security with IronPort.
  • Describe endpoint security with Network Admission Control.
  • Describe endpoint security with Cisco Security Agent.
  • Describe MAC address spoofing attacks, STP manipulation attacks, MAC address overflow attacks, LAN storm attacks, and VLAN attacks.
  • Describe specific mitigation techniques for Layer 2 attacks.
  • Configure port security, BPDU guard, root guard, storm control, SPAN, and RSPAN.
  • Describe wireless, VoIP, and SAN security considerations.
  • Describe wireless, VoIP, and SAN security solutions.
  • Explain how cryptology consists of cryptography (encoding messages) and cryptanalysis (decoding messages) and how these concepts apply to modern day cryptography.
  • Explain how securing communications by various cryptographic methods, including encryption, hashing and digital signatures, ensures confidentiality, integrity, authentication and non-repudiation.
  • Describe the use and purpose of hashes and digital signatures in providing authentication and integrity.
  • Explain how authentication is ensured.
  • Explain how integrity is ensured.
  • Explain how data confidentiality is ensured using symmetric encryption algorithms and pre-shared keys.
  • Explain how data confidentiality is ensured using asymmetric algorithms in a public key infrastructure to provide and guarantee digital certificates.
  • Describe the purpose and types of VPNs and define where to use VPNs in a network.
  • Describe how to configure a GRE VPN tunnel.
  • Describe the fundamental concepts and technologies of VPNs, and terms that IPsec VPNs use.
  • Describe how to configure a site-to-site IPsec VPN.
  • Configure a site-to-site IPsec VPN with PSK authentication using CLI and Cisco SDM.
  • Describe the two common remote network access methods used in enterprise networks.
  • Describe how the Cisco VPN Client is used in an IPsec remote-access VPN.
  • Describe how Secure Socket Layer (SSL) is used in a remote-access VPN.
  • Configure a remote-access IPsec VPN using CLI and Cisco SDM.
  • Describe the principles of secure network design.
  • Describe threat identification and risk analysis.
  • Describe risk management and risk avoidance.
  • Describe the Cisco Self-Defending Network.
  • Describe the Cisco Security Management Suite and the Cisco Integrated Security Portfolio.
  • Describe operations security.
  • Describe network security testing tools and techniques.
  • Describe business continuity and disaster recovery.
  • Describe the system development life cycle concept and its application to a secure network life cycle.
  • Describe the purpose and function of a network security policy.

Footer Navigation

Contact info

Bellevue College
3000 Landerholm Circle SE Bellevue, WA 98007-6484 U.S.A.
Work: (425) 564-1000