CCNA Security Courses | CCNA Security Training Institute

For Any Enquiry Call Our Toll Free #   1800-123-321-5 or WhatsApp us on  +91-95130-72227


Hours of live, interactive sessions


Lab Exercises


Hands-on Projects

Why should you learn CCNA Security ?

Computer networking and infrastructure management has become an integral part of almost all organisations. Despite the fact that companies and organizations have an array of computers and communication tools at their disposal, to a certain degree, they tend to be separate. This sets them back significantly as the accuracy and speed of data-flow and transactions play a vital role in an organization’s success. To overcome such obstacles that limit the efficiency of infrastructure Networking jobs are in great demand with companies and various government agencies looking to upgrade their IT infrastructure. Major companies like Cognizant and Infosys are big recruiters for network management, and with services like Universal Identification becoming more relevant over the past few years, there is an increase in demand for professionals who can manage networks in the public sector as well. Management, networking becomes a crucial element in an enterprise’s day-to-day operations.

Already know which course to sign up for?

Explore a wide range of courses offered in a blended learning environment and find the course you want to enroll for.

View Courses

Not sure which course is ideal for you?

Speak to an expert and explore what the industry is looking for, and identify which course will help you with your career.

Call Us

Learning Outcomes

  • Design and configure systems specific to business needs
  • Design security at various levels and provide required support specific to security aspects
  • Hands on knowledge of Security design and configuration
  • Ensure security enhancement of system as per business needs
  • Provide expert technical support for security-related aspects

CCNA Security @ IIHT

IIHT’s CCNA Security course is specifically designed to address the challenges faced while implementing and maintaining networks and provide effective solutions to secure the networks from breaches. This course provides Learners with the required foundation to understand the importance of good network security and the various techniques to protect the system from threats. The hands-on, practical skills that Learners get during the program helps them to design and provide a high-level security implementation and troubleshooting skills.

What you learn in CCNA Security

  • Internetworking Basics
  • Internetworking Models
  • The Layered Approach
  • Advantages of Reference Models
  • The OSI Reference Model
  • The Application Layer
  • The Presentation Layer
  • The Session Layer
  • The Transport Layer
  • The Network Layer
  • The Data Link Layer
  • The Physical Layer

• Ethernet Networks in Review
• Collision Domain
• Broadcast Domain
• Half- and Full-Duplex Ethernet
• Ethernet at the Data Link Layer
• Ethernet at the Physical Layer
• Ethernet Cabling
• Straight-Through Cable
• Crossover Cable
• Rolled Cable
• Fiber Optic
• Data Encapsulation
• The Cisco Three-Layer Hierarchical Model
• The Core Layer
• The Distribution Layer
• The Access Layer”

• Ethernet Networks in Review
• Collision Domain
• Broadcast Domain
• Half- and Full-Duplex Ethernet
• Ethernet at the Data Link Layer
• Ethernet at the Physical Layer
• Ethernet Cabling
• Straight-Through Cable
• Crossover Cable
• Rolled Cable
• Fiber Optic
• Data Encapsulation
• The Cisco Three-Layer Hierarchical Model
• The Core Layer
• The Distribution Layer
• The Access Layer”

“• Introducing TCP/IP
• A Brief History of TCP/IP
• TCP/IP and the DoD Model
• The Process/Application Layer Protocols
• The Host-to-Host or Transport Layer Protocols
• The Internet Layer Protocols
• IP Addressing
• IP Terminology
• The Hierarchical IP Addressing Scheme
• Private IP Addresses (RFC 1918)
• IPv4 Address Types
• Layer 2 Broadcasts
• Layer 3 Broadcasts
• Unicast Address
• Multicast Address”

“• Subnetting Basics
• How to Create Subnets
• Subnet Masks
• Classless Inter-Domain Routing (CIDR)
• IP Subnet-Zero
• Subnetting Class C Addresses
• Subnetting Class B Addresses
• Subnetting Class A Addresses”

“• Variable Length Subnet Masks (VLSMs)
• VLSM Design
• Implementing VLSM Networks
• Summarization
• Troubleshooting IP Addressing
• Determining IP Address Problems”

“• The IOS User Interface
• Cisco IOS
• Connecting to a Cisco IOS Device
• Bringing Up a Switch
• Command-Line Interface (CLI)
• Entering the CLI
• Overview of Router Modes
• CLI Prompts
• Editing and Help Features
• Administrative Configurations
• Hostnames
• Banners”

“• Setting Passwords
• Encrypting Your Passwords
• Descriptions
• Router and Switch Interfaces
• Bringing Up an Interface
• Viewing, Saving, and Erasing Configurations
• Deleting the Configuration and Reloading the Device
• Verifying Your Configuration”

“• The Internal Components of a Cisco Router and Switch
• The Router and Switch Boot Sequence
• Backing Up and Restoring the Cisco Configuration
• Backing Up the Cisco Configuration
• Restoring the Cisco Configuration
• Erasing the Configuration
• Configuring DHCP
• DHCP Relay
• Verifying DHCP on Cisco IOS”

“• Syslog
• Configuring and Verifying Syslog
• Network Time Protocol (NTP)
• Exploring Connected Devices Using CDP and LLDP
• Getting CDP Timers and Holdtime Information
• Gathering Neighbor Information
• Documenting a Network Topology Using CDP
• Using Telnet
• Telnetting into Multiple Devices Simultaneously
• Checking Telnet Connections
• Checking Telnet Users

• Resolving Hostnames
• Building a Host Table
• Using DNS to Resolve Names
• Checking Network Connectivity and Troubleshooting
• Using the ping Command
• Using the traceroute Command
• Debugging
• Using the show processes Command

“• Managing the Configuration Register
• Understanding the Configuration Register Bits
• Checking the Current Configuration Register Value
• Boot System Commands
• Recovering Passwords
• Backing Up and Restoring the Cisco IOS
• Verifying Flash Memory
• Backing Up the Cisco IOS
• Restoring or Upgrading the Cisco Router IOS
• Using the Cisco IOS File System (Cisco IFS)
• Licensing
• Right-To-Use Licenses (Evaluation Licenses)
• Backing Up and Uninstalling the License

• Routing Basics
• The IP Routing Process
• The Cisco Router Internal Process
• Testing Your IP Routing Understanding
• Configuring IP Routing
• Static Routing
• Default Routing
• Dynamic Routing
“• Routing Protocol Basics
• Routing Information Protocol (RIP) and RIPv2
• Configuring RIP Routing
• Holding Down RIP Propagations

• EIGRP Features and Operations
• Neighbor Discovery
• Reliable Transport Protocol (RTP)
• Diffusing Update Algorithm (DUAL)
• Route Discovery and Maintenance
• Configuring EIGRP
• VLSM Support and Summarization
• Controlling EIGRP Traffic
• Split Horizon
• Verifying and Troubleshooting EIGRP

• Open Shortest Path First (OSPF) Basics
• OSPF Terminology
• OSPF Operation
• Configuring OSPF
• Enabling OSPF
• Configuring OSPF Areas
• Configuring OSPF
• OSPF and Loopback Interfaces
• Configuring Loopback Interfaces

• Verifying OSPF Configuration
• The show ip ospf Command
• The show ip ospf database Command
• The show ip ospf interface Command
• The show ip ospf neighbor Command
• The show ip protocols Command

• OSPF Scalability
• Categories of Multi-area Components
• Adjacency Requirements
• OSPF Router Roles
• Link-State Advertisements
• OSPF Hello Protocol
• Neighbor States
• Basic Multi-area Configuration
• Verifying and Troubleshooting Multi-area OSPF Networks
• The show ip ospf Command
• The show ip ospf interface Command
• The show ip protocols Command
• The show ip route Command
• The show ip ospf database Command
• Troubleshooting OSPF Scenario
• Simple Troubleshooting OSPF
• OSPFv3
• Verifying OSPFv3

• Perimeter, Firewall, and Internal Routers
• Introduction to Access Lists
• Mitigating Security Issues with ACLs
• Standard Access Lists
• Wildcard Masking
• Controlling VTY (Telnet/SSH) Access
• Extended Access Lists
• Named ACLs
• Monitoring Access Lists

• When Do We Use NAT?
• Types of Network Address Translation
• NAT Names
• How NAT Works
• Static NAT Configuration
• Dynamic NAT Configuration
• PAT (Overloading) Configuration
• Simple Verification of NAT
• Testing and Troubleshooting NAT

• When Do We Use NAT?
• Types of Network Address Translation
• NAT Names
• How NAT Works
• Static NAT Configuration
• Dynamic NAT Configuration
• PAT (Overloading) Configuration
• Simple Verification of NAT
• Testing and Troubleshooting NAT

• Why Do We Need IPv6?
• The Benefits and Uses of IPv6
• IPv6 Addressing and Expressions
• Shortened Expression
• Address Types
• Special Addresses
• How IPv6 Works in an Internetwork
• Manual Address Assignment
• Stateless Autoconfiguration (eui-64)
• DHCPv6 (Stateful)
• IPv6 Header
• ICMPv6
• IPv6 Routing Protocols
• Static Routing with IPv6
• Configuring IPv6
• Configuring Routing

• Switching Services
• Three Switch Functions at Layer 2
• Port Security
• Configuring Catalyst Switches
• Catalyst Switch Configuration
• Verifying Cisco Catalyst Switches

• VLAN Basics
• Broadcast Control
• Security
• Flexibility and Scalability
• Identifying VLANs
• Frame Tagging
• VLAN Identification Methods
• Routing between VLANs
• Configuring VLANs
• Assigning Switch Ports to VLANs
• Configuring Trunk Ports
• Configuring Inter-VLAN Routing”

• VLAN Review
• Assigning Switch Ports to VLANs
• Configuring Trunk Ports
• VLAN Trunking Protocol (VTP)
• VTP Modes of Operation
• VTP Pruning
• Configuring VTP
• Troubleshooting VTP
• Spanning Tree Protocol (STP)
• Spanning-Tree Terms
• Spanning-Tree Operations
• Types of Spanning-tree Protocols
• Common Spanning Tree
• Per-VLAN Spanning Tree+
• Modifying and Verifying the Bridge ID
• Spanning-Tree Failure Consequences
• PortFast and BPDU Guard
• BPDU Guard
• EtherChannel
• Configuring and Verifying Port Channels

• Troubleshooting IP Network Connectivity
• Using IP SLA for Troubleshooting
• Using SPAN for Troubleshooting
• Configuring and Verifying Extended Access Lists
• Troubleshooting IPv6 Network Connectivity
• ICMPv6
• Troubleshooting IPv6 Extended Access Lists
• Troubleshooting VLAN Connectivity
• VLAN Troubleshooting
• Trunk Troubleshooting

• Mitigating Threats at the Access Layer
• External Authentication Options
• Management Information Base (MIB)
• Configuring SNMP
• Client Redundancy Issues
• Introducing First Hop Redundancy Protocols (FHRPs)
• Hot Standby Router Protocol (HSRP)”
“• Virtual MAC Address
• HSRP Timers
• Group Roles
• Configuring and Verifying HSRP

“• Introduction to Wide Area Networks
• WAN Topology Options
• Defining WAN Terms
• WAN Connection Bandwidth
• WAN Connection Types
• WAN Support
• Cisco Intelligent WAN (IWAN)
• Cabling the Serial Wide Area Network
• Serial Transmission
• DTE and DCE”
“• High-Level Data-Link Control (HDLC) Protocol
• Point-to-Point Protocol (PPP)
• Link Control Protocol (LCP) Configuration Options
• PPP Session Establishment
• PPP Authentication Methods
• Configuring PPP on Cisco Routers
• Configuring PPP Authentication
• Verifying and Troubleshooting Serial Links
• Multilink PPP (MLP)
• PPP Client (PPPoE)
• Configuring a PPPoE Client”
“• Virtual Private Networks
• Benefits of VPNs
• Enterprise- and Provider-Managed VPNs
• Introduction to Cisco IOS IPsec
• IPsec Transforms
• GRE Tunnels
• GRE over IPsec
• Configuring GRE Tunnels
• Verifying GRP Tunnels”
“• Single-Homed EBGP
• Protocol Comparison and Overview
• Configuring and Verifying EBGP
• Verifying EBGP

What do you gain from IIHT’s Blended Learning ?

IIHT’s learning model is integrated with the latest Learning trends to ensure that the audience remains engaged and their overall learning experience is flexible, convenience and productive. What more? We provide you a unique and engaging content on a user friendly and immersive learning platform that helps you to not only attend the training sessions, but watch Learning videos, read Learning Materials, interact with fellow students, write to the faculty members, practice labs, 24x7 support from a single window that makes learning effective. The assignments and assessments designed as part of the course ensures you develop right capability to prove your worth in your existing job or with prospective employer. Our state of the art learning system helps you to connect with fellow learners who are mostly working professionals that helps you to learn through collaboration and knowledge sharing.

Key concepts will be explained by Online / Live Instructor led sessions, where syllabus material will be presented and the subject matter will be illustrated with demonstrations and examples. Tutorials and/or labs and/or group discussions (including online forums) focused on projects and problem solving will help one practice in the application of theory and procedures, allow exploration of concepts with mentors and other fellow students. You get regular feedback on your progress and understanding; assignments, as described in Overview of Assessment (below), requiring an integrated understanding of the subject matter; and private study, working through the course as presented in classes and learning materials, and gaining practice at solving conceptual and technical problems.You get access to informative Learning videos from Global Experts that helps you to get larger perspective from real time perspective that you would not get in any other Live session.


There are no pre-requisites for CCNA Security. It, however, is advised that one complete their CCNA R&S Certification before taking up CCNA Security.

All your classes will be recorded and made available through the learning management system. You can view these videos later at your convenience.

Yes! IIHT offers an exclusive placement portal for all learners who meet certain criteria. The requirements for availing placement assistance will be notified in advanced, giving you ample time to work towards it.

You can register for the course of your choice directly from our website or head to your closest IIHT centre. You can also speak to the learning consultants, who will guide you through the process.

You can pay online. We accept net banking, UPI and most credit and debit cards. Our payment gateway also offers an EMI option if you would like to pay in instalments.

To initiate a refund you may write to us at and a representative will get in touch with you soon.

When you sign up for a course, you are eligible for a discount on your next course. The discount percentage will increase with every consecutive signup.  The objective of this program is to ensure that learners have an incentive to learn more without having to worry about spending too much. And hey, it is also to show you how much we treasure your association!

Related Courses