Cisco Certified Network Associate (CCNA) - Security
1 Network Security and Secure Connectivity
1-1 Introduction to Network Security
1-1 1 Definition and Importance of Network Security
1-1 2 Threats and Vulnerabilities in Networks
1-1 3 Security Policies and Compliance
1-2 Secure Network Design
1-2 1 Network Segmentation and Zoning
1-2 2 Secure Network Topologies
1-2 3 Designing Secure Network Architectures
1-3 Secure Connectivity
1-3 1 VPN Technologies (IPsec, SSLTLS, GRE)
1-3 2 Remote Access Security
1-3 3 Site-to-Site and Remote Access VPNs
2 Secure Access
2-1 AAA (Authentication, Authorization, and Accounting)
2-1 1 AAA Protocols (RADIUS, TACACS+)
2-1 2 Implementing AAA in Network Devices
2-1 3 Role-Based Access Control (RBAC)
2-2 Identity Management
2-2 1 User Authentication Methods (Passwords, Tokens, Biometrics)
2-2 2 Single Sign-On (SSO) and Federated Identity
2-2 3 Identity Federation and Directory Services
2-3 Access Control Lists (ACLs)
2-3 1 Standard and Extended ACLs
2-3 2 Applying ACLs to Network Devices
2-3 3 ACL Best Practices and Troubleshooting
3 Secure Routing and Switching
3-1 Secure Routing Protocols
3-1 1 OSPF and EIGRP Security
3-1 2 BGP Security (MD5, TCP MD5 Signature Option)
3-1 3 Secure Routing Protocol Configuration
3-2 Secure Switching
3-2 1 Switch Security Features (Port Security, DHCP Snooping)
3-2 2 Implementing Secure VLANs
3-2 3 Switch Security Best Practices
3-3 Network Address Translation (NAT) Security
3-3 1 NAT Types and Security Considerations
3-3 2 Configuring Secure NAT on Routers
3-3 3 NAT and Firewall Integration
4 Secure Wireless Networks
4-1 Wireless Security Protocols
4-1 1 WPA2 and WPA3 Security
4-1 2 RADIUS Integration with Wireless Networks
4-1 3 Wireless Encryption (TKIP, CCMP)
4-2 Secure Wireless Deployment
4-2 1 Wireless Network Design Considerations
4-2 2 Implementing Secure Wireless Access Points
4-2 3 Wireless Intrusion Detection and Prevention Systems (WIDSWIPS)
4-3 Wireless Threats and Mitigation
4-3 1 Common Wireless Attacks (Rogue AP, Evil Twin)
4-3 2 Mitigating Wireless Threats
4-3 3 Wireless Security Best Practices
5 Network Threat Defense
5-1 Intrusion Detection and Prevention Systems (IDSIPS)
5-1 1 IDSIPS Technologies and Architectures
5-1 2 Signature-Based and Anomaly-Based Detection
5-1 3 Implementing and Managing IDSIPS
5-2 Firewalls and Network Security
5-2 1 Firewall Types (Stateful, Stateless, Next-Generation)
5-2 2 Firewall Policies and Rules
5-2 3 Configuring and Managing Firewalls
5-3 Network Access Control (NAC)
5-3 1 NAC Architectures and Protocols
5-3 2 Implementing NAC Solutions
5-3 3 NAC Best Practices and Troubleshooting
6 Secure Network Management and Monitoring
6-1 Network Management Protocols
6-1 1 SNMP Security (v1, v2c, v3)
6-1 2 Secure Network Management Practices
6-1 3 Implementing Secure SNMP
6-2 Network Monitoring and Logging
6-2 1 Network Monitoring Tools and Techniques
6-2 2 Log Management and Analysis
6-2 3 Monitoring and Logging Best Practices
6-3 Network Device Hardening
6-3 1 Device Hardening Techniques
6-3 2 Secure Device Configuration
6-3 3 Device Hardening Best Practices
7 Cryptography and VPNs
7-1 Cryptographic Concepts
7-1 1 Symmetric and Asymmetric Encryption
7-1 2 Hashing and Digital Signatures
7-1 3 Public Key Infrastructure (PKI)
7-2 VPN Technologies
7-2 1 IPsec VPN Architecture
7-2 2 SSLTLS VPNs
7-2 3 VPN Deployment and Management
7-3 Secure Communication Protocols
7-3 1 Secure Email (SMIME, PGP)
7-3 2 Secure Web Protocols (HTTPS, SSLTLS)
7-3 3 Secure Communication Best Practices
8 Security Incident Response and Management
8-1 Incident Response Planning
8-1 1 Incident Response Process (IRP)
8-1 2 Incident Handling and Containment
8-1 3 Incident Response Best Practices
8-2 Forensics and Evidence Collection
8-2 1 Network Forensics Techniques
8-2 2 Evidence Collection and Preservation
8-2 3 Forensics Best Practices
8-3 Disaster Recovery and Business Continuity
8-3 1 Disaster Recovery Planning (DRP)
8-3 2 Business Continuity Planning (BCP)
8-3 3 Disaster Recovery and BCP Best Practices
2.2 Identity Management

2.2 Identity Management

Key Concepts

Identity

Identity refers to the unique characteristics that define a user, device, or system within a network. These characteristics can include usernames, passwords, biometric data, and digital certificates. Identity management ensures that each entity within the network is uniquely identifiable and can be accurately authenticated.

Example: In a corporate network, each employee is assigned a unique username and password. This identity is used to authenticate the employee when they log into the network.

Authentication

Authentication is the process of verifying the identity of a user, device, or system. It ensures that the entity trying to access the network is who or what it claims to be. Common methods of authentication include passwords, multi-factor authentication (MFA), and digital certificates.

Example: When logging into a secure website, the user is asked to enter a username and password. Additionally, they might be required to enter a one-time code sent to their mobile device to complete the authentication process.

Authorization

Authorization determines what actions an authenticated user or system is allowed to perform. It defines the permissions and privileges associated with a user's role. Proper authorization ensures that users can only access the resources and perform the actions they are permitted to.

Example: In a university network, a professor may have full access to all academic resources, while a student may only have access to their own coursework and specific academic materials. This is controlled through authorization policies.

Single Sign-On (SSO)

Single Sign-On (SSO) is an authentication process that allows a user to log in once and gain access to multiple applications without being prompted to log in again. SSO simplifies the user experience and reduces the need for multiple credentials.

Example: A company implements SSO for its employees. When an employee logs into their workstation, they are automatically authenticated for all company applications, such as email, intranet, and HR systems, without needing to log in separately for each one.

Federated Identity

Federated Identity is a method of linking a user's identity across multiple separate identity management systems. It allows users to use a single set of credentials to access resources in different domains or organizations. Federated identity is often used in business-to-business (B2B) and business-to-consumer (B2C) scenarios.

Example: A customer logs into an online shopping platform using their social media credentials. The shopping platform trusts the authentication provided by the social media site, allowing the customer to access the shopping platform without creating a new account.

Conclusion

Identity Management is crucial for ensuring secure and efficient access to network resources. By understanding and implementing concepts such as identity, authentication, authorization, Single Sign-On, and federated identity, organizations can create a robust and user-friendly access management system.