PACE NONCREDIT COURSE:
Cisco CCNA Associate & CyberOps Associate Training Boot Camp
Areas of Study
Course Type
Overview
| Duration: 7 Days
This innovative seven-day boot camp is designed specifically for network engineers and administrators requiring full knowledge of Cisco router and switch configuration. You will gain hands-on experience by completing a series of labs in our Networking Cyber Range. The labs provide practical experience in a networking and switching environment and prepare you for the simulation-based questions you will find on the CCNA 200-301 exam.
In addition to gaining in-depth knowledge about network access, IP connectivity, IP services, and automation and programmability for Cisco networks, you will learn about the hottest area of networking: network security. Our expert instructors first prepare you to pass the CCNA exam. After passing that exam, you will then train directly on the Cisco Certified CyberOps Associate curricula — all in one sitting.
You will receive an exam voucher for the Cisco CCNA and the Cisco CyberOps certification exams with your enrollment.
Our Certification Success Program, paired with our provided prep materials, boot camp sessions, and post-work, is designed to ease any concerns you may have when taking the certification exam. If your first attempt is unsuccessful, this program provides peace of mind that you may be eligible to take the certification exam a second time (if needed) at no additional fee.
*To qualify for a second certification exam voucher, students must:
- Attend at least 85% of each day of class
- Score a 90% or higher on their final practice exam
- Take the first exam within 90 days of class completion
- Upload your exam failure notice from your first exam attempt
Curriculum
- Day 1 – Cisco CCNA (200-301)
- Network Fundamentals
- Role and function of network components
- Characteristics of network topology architectures
- Compare and contrast network topologies
- Physical interface and cabling types
- Interface and cable issues (collisions, errors, mismatch duplex, and/or speed)
- TCP and UDP
- Configuring and verifying IPv4 addressing and subnetting
- The need for private IPv4 addressing
- Configuring and verifying IPv6 addressing and prefix
- IPv6 address types
- Verifying IP parameters for client OS (Windows, macOS, Linux)
- Wireless principles
- Virtualization fundamentals (virtual machines)
- Switching concepts
- Network Fundamentals
- Day 2
- Network Access
- Configuring and verifying VLANs (normal range) spanning multiple switches
- Configuring and verifying interswitch connectivity
- Configuring and verifying Layer 2 discovery protocols (Cisco Discovery Protocol and LLDP)
- Configuring and verifying (Layer 2/Layer 3) EtherChannel (LACP)
- The need for and basic operations of Rapid PVST+ Spanning Tree Protocol
- Cisco Wireless Architectures and AP modes
- Physical infrastructure connections of WLAN
- Components (AP, WLC, access/trunk ports, and LAG)
- AP and WLC management access connections (Telnet, SSH, HTTP, HTTPS, console and TACACS+/RADIUS)
- Configuring the components of a wireless LAN access for client connectivity using GUI only such as WLAN creation, security settings, QoS profiles and advanced WLAN settings
- Network Access
- Day 3
- IP Connectivity
- Components of routing table
- Determining how a router makes a forwarding decision by default
- Configuring and verifying IPv4 and IPv6 static routing
- Configuring and verifying single area OSPFv2
- The purpose of first hop redundancy protocol
- IP Connectivity
- Day 4
- IP Services
- Configuring and verifying inside source NAT using static and pools
- Configuring and verifying NTP operating in a client and server mode
- Role of DHCP and DNS within the network
- Function of SNMP in network operations
- Use of syslog features including facilities and levels
- Configuring and verifying DHCP client and relay
- Understanding the forwarding per-hop behavior (PHB) for QoS such as classification, marking, queuing, congestion, policing, shaping
- Configuring network devices for remote access using SSH
- Capabilities and function of TFTP/FTP in the network
- Security Fundamentals
- Key security concepts (threats, vulnerabilities, exploits and mitigation techniques)
- Security program elements (user awareness, training, and physical access control)
- Configuring device access control using local passwords
- Security password policies elements: management, complexity, and password alternatives (multifactor authentication, certificates, and biometrics)
- Remote access and site-to-site VPNs
- Configuring and verifying access control lists
- Configuring Layer 2 security features (DHCP snooping, dynamic ARP inspection and port security)
- Authentication, authorization, and accounting
- Wireless security protocols (WPA, WPA2 and WPA3)
- Configuring WLAN using WPA2 PSK using the GUI
- IP Services
- Day 5
- Automation and Programmability
- How automation impacts network management
- Traditional networks vs. controller-based networking
- Controller-based and software defined architectures (overlay, underlay and fabric)
- Traditional campus device management vs. Cisco DNA Center enabled device management
- Characteristics of REST-based APIs (CRUD, HTTP verbs and data encoding)
- Capabilities of configuration management mechanisms Puppet, Chef and Ansible
- Interpreting JSON encoded data
- Automation and Programmability
- Day 6 – Cisco Certified CyberOps Associate (200-201)
- Security Concepts
- Describe the CIA triad
- Compare security deployments
- Describe security terms
- Compare security concepts
- Describe the principles of the defense-in-depth strategy
- Compare access control models
- Describe terms as defined in CVSS
- Identify the challenges of data visibility (network, host, and cloud) in detection
- Identify potential data loss from provided traffic profiles
- Interpret the 5-tuple approach to isolate a compromised host in a grouped set of logs
- Compare rule-based detection vs. behavioral and statistical detection
- Security Monitoring
- Compare attack surface and vulnerability
- Identify the types of data provided by these technologies
- Describe the impact of these technologies on data visibility
- Describe the uses of these data types in security monitoring
- Describe network attacks, such as protocol based, denial of service, distributed denial of service and man-in-the-middle
- Describe web application attacks, such as SQL injection, command injections and crosssite scripting
- Describe social engineering attacks
- Describe endpoint-based attacks, such as buffer overflows, command and control (C2), malware and ransomware
- Describe evasion and obfuscation techniques, such as tunneling, encryption and proxies
- Describe the impact of certificates on security (includes PKI, public/private crossing the network, asymmetric/symmetric)
- Identify the certificate components in a given scenario
- Cipher-suite
- Host-Based Analysis
- Describe the functionality of these endpoint technologies in regard to security monitoring
- Identify components of an operating system (such as Windows and Linux) in a given scenario
- Describe the role of attribution in an investigation
- Identify type of evidence used based on provided logs
- Compare tampered and untampered disk image
- Interpret operating system, application, or command line logs to identify an event
- Interpret the output report of a malware analysis tool (such as a detonation chamber or sandbox)
- Security Concepts
- Day 7
- Network Intrusion Analysis
- UMap the provided events to source technologies
- Compare impact and no impact
- Compare deep packet inspection with packet filtering and stateful firewall operation
- Compare inline traffic interrogation and taps or traffic monitoring
- Compare the characteristics of data obtained from taps or traffic monitoring and transactional data (NetFlow) in the analysis of network traffic
- Extract files from a TCP stream when given a PCAP file and Wireshark
- Identify key elements in an intrusion from a given PCAP file
- Interpret the fields in protocol headers as related to intrusion analysis
- Interpret common artifact elements from an event to identify an alert
- Interpret basic regular expressions
- Security Policies and Procedures
- Describe management concepts
- Describe the elements in an incident response plan as stated in NIST.SP800-61
- Apply the incident handling process (such as NIST.SP800-61) to an event
- Map elements to these steps of analysis based on the NIST.SP800-61
- Map the organization stakeholders against the NIST IR categories (CMMC, NIST.SP800-61)
- Describe concepts as documented in NIST.SP800-86
- Identify these elements used for network profiling
- Identify these elements used for server profiling
- Identify protected data in a network
- Classify intrusion events into categories as defined by security models, such as Cyber Kill Chain
- Model and Diamond Model of Intrusion
- Describe the relationship of SOC metrics to scope analysis (time to detect, time to contain, time to respond, time to control)
- Network Intrusion Analysis
Course Requirements
Requirements: Hardware Requirements: Software Requirements: Other: Instructional Material Requirements: The instructional materials required for this course are included in enrollment and will be available online. You also have the option to purchase a physical copy of the text for an additional fee of $100.