Cisco CCNA Associate & Cybersecurity Associate Training Boot Camp

This dual certification boot camp helps you build your knowledge of networking and provides hands-on experience installing, configuring, and operating network devices — all while preparing you to earn the Cisco CCNA Associate and Cybersecurity Associate certifications.

Prepare for the CCNA and Cisco Certified CyberOps Associate Exams

Get hands-on experience as you build your knowledge of networking and network security. This seven-day, online boot camp, powered by Infosec, an industry leader in cybersecurity training, will teach you the ins and outs of installing, configuring, and operating network devices based on Cisco best practices while preparing you to earn two in-demand Cisco certifications.

What You Can Expect

  • Online, immersive format
  • 7 days of live, expert-led training
  • Learn in a cohort of peers
  • Limited seats per session

 

How You Will Benefit

  • Learn from industry experts: Instructors have 10+ years of industry training experience and are professionals with active roles in the industry.
  • Earn your CCNA Associate & CyberOps Associate: Get everything you need to get certified, including unlimited practice exam attempts and both certification exam vouchers.
  • Extended access: Review boot camp materials and replay daily video lessons for 90 days after your completion date.
  • Infosec Skills subscription: Advance your skills with a 90-day subscription to hundreds of additional on-demand courses and hands-on labs.

Day 1 - Cisco CCNA (200-301)

  • Network Fundamentals
    • Role and function of network components
    • Characteristics of network topology architectures
    • Compare and contrast network topologies
    • Physical interface and cabling types
    • Interface and cable issues (collisions, errors, mismatch duplex, and/or speed)
    • TCP and UDP
    • Configuring and verifying IPv4 addressing and subnetting
    • The need for private IPv4 addressing
    • Configuring and verifying IPv6 addressing and prefix
    • IPv6 address types
    • Verifying IP parameters for client OS (Windows, macOS, Linux)
    • Wireless principles
    • Virtualization fundamentals (virtual machines)
    • Switching concepts

 

Day 2

  • Network Access
    • Configuring and verifying VLANs (normal range) spanning multiple switches
    • Configuring and verifying interswitch connectivity
    • Configuring and verifying Layer 2 discovery protocols (Cisco Discovery Protocol and LLDP)
    • Configuring and verifying (Layer 2/Layer 3) EtherChannel (LACP)
    • The need for and basic operations of Rapid PVST+ Spanning Tree Protocol
    • Cisco Wireless Architectures and AP modes
    • Physical infrastructure connections of WLAN
    • Components (AP, WLC, access/trunk ports, and LAG)
    • AP and WLC management access connections (Telnet, SSH, HTTP, HTTPS, console and TACACS+/RADIUS)
    • Configuring the components of a wireless LAN access for client connectivity using GUI only such as WLAN creation, security settings, QoS profiles and advanced WLAN settings

 

Day 3

  • IP Connectivity
    • Components of routing table
    • Determining how a router makes a forwarding decision by default
    • Configuring and verifying IPv4 and IPv6 static routing
    • Configuring and verifying single area OSPFv2
    • The purpose of first hop redundancy protocol

 

Day 4

  • IP Services
    • Configuring and verifying inside source NAT using static and pools
    • Configuring and verifying NTP operating in a client and server mode
    • Role of DHCP and DNS within the network
    • Function of SNMP in network operations
    • Use of syslog features including facilities and levels
    • Configuring and verifying DHCP client and relay
    • Understanding the forwarding per-hop behavior (PHB) for QoS such as classification, marking, queuing, congestion, policing, shaping
    • Configuring network devices for remote access using SSH
    • Capabilities and function of TFTP/FTP in the network
  • Security Fundamentals
    • Key security concepts (threats, vulnerabilities, exploits and mitigation techniques)
    • Security program elements (user awareness, training, and physical access control)
    • Configuring device access control using local passwords
    • Security password policies elements: management, complexity, and password alternatives (multifactor authentication, certificates, and biometrics)
    • Remote access and site-to-site VPNs
    • Configuring and verifying access control lists
    • Configuring Layer 2 security features (DHCP snooping, dynamic ARP inspection and port security)
    • Authentication, authorization, and accounting
    • Wireless security protocols (WPA, WPA2 and WPA3)
    • Configuring WLAN using WPA2 PSK using the GUI

 

Day 5

  • Automation and Programmability
    • How automation impacts network management
    • Traditional networks vs. controller-based networking
    • Controller-based and software defined architectures (overlay, underlay and fabric)
    • Traditional campus device management vs. Cisco DNA Center enabled device management
    • Characteristics of REST-based APIs (CRUD, HTTP verbs and data encoding)
    • Capabilities of configuration management mechanisms Puppet, Chef and Ansible
    • Interpreting JSON encoded data

 

Day 6 - Cisco Certified Cybersecurity Associate (200-201)

  • Security Concepts
    • Describe the CIA triad
    • Compare security deployments
    • Describe security terms
    • Compare security concepts
    • Describe the principles of the defense-in-depth strategy
    • Compare access control models
    • Describe terms as defined in CVSS
    • Identify the challenges of data visibility (network, host, and cloud) in detection
    • Identify potential data loss from provided traffic profiles
    • Interpret the 5-tuple approach to isolate a compromised host in a grouped set of logs
    • Compare rule-based detection vs. behavioral and statistical detection
  • Security Monitoring
    • Compare attack surface and vulnerability
    • Identify the types of data provided by these technologies
    • Describe the impact of these technologies on data visibility
    • Describe the uses of these data types in security monitoring
    • Describe network attacks, such as protocol based, denial of service, distributed denial of service and man-in-the-middle
    • Describe web application attacks, such as SQL injection, command injections and crosssite scripting
    • Describe social engineering attacks
    • Describe endpoint-based attacks, such as buffer overflows, command and control (C2), malware and ransomware
    • Describe evasion and obfuscation techniques, such as tunneling, encryption and proxies
    • Describe the impact of certificates on security (includes PKI, public/private crossing the network, asymmetric/symmetric)
    • Identify the certificate components in a given scenario
    • Cipher-suite
  • Host-Based Analysis
    • Describe the functionality of these endpoint technologies in regard to security monitoring
    • Identify components of an operating system (such as Windows and Linux) in a given scenario
    • Describe the role of attribution in an investigation
    • Identify type of evidence used based on provided logs
    • Compare tampered and untampered disk image
    • Interpret operating system, application, or command line logs to identify an event
    • Interpret the output report of a malware analysis tool (such as a detonation chamber or sandbox)

 

Day 7

  • Network Intrusion Analysis
    • UMap the provided events to source technologies
    • Compare impact and no impact
    • Compare deep packet inspection with packet filtering and stateful firewall operation
    • Compare inline traffic interrogation and taps or traffic monitoring
    • Compare the characteristics of data obtained from taps or traffic monitoring and transactional data (NetFlow) in the analysis of network traffic
    • Extract files from a TCP stream when given a PCAP file and Wireshark
    • Identify key elements in an intrusion from a given PCAP file
    • Interpret the fields in protocol headers as related to intrusion analysis
    • Interpret common artifact elements from an event to identify an alert
    • Interpret basic regular expressions
  • Security Policies and Procedures
    • Describe management concepts
    • Describe the elements in an incident response plan as stated in NIST.SP800-61
    • Apply the incident handling process (such as NIST.SP800-61) to an event
    • Map elements to these steps of analysis based on the NIST.SP800-61
    • Map the organization stakeholders against the NIST IR categories (CMMC, NIST.SP800-61)
    • Describe concepts as documented in NIST.SP800-86
    • Identify these elements used for network profiling
    • Identify these elements used for server profiling
    • Identify protected data in a network
    • Classify intrusion events into categories as defined by security models, such as Cyber Kill Chain
    • Model and Diamond Model of Intrusion
    • Describe the relationship of SOC metrics to scope analysis (time to detect, time to contain, time to respond, time to control)

Hardware Requirements:

  • This course can be taken on either a PC, Mac, or Chromebook.
  • A microphone.
  • Speakers.
  • A webcam.

 

Software Requirements:

  • PC: Windows 7 or later.
  • Mac: macOS 10.7 or later.
  • Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
  • Microsoft Word Online.
  • Adobe Acrobat Reader.
  • Zoom.
  • Software must be installed and fully operational before the course begins.

 

Other:

Email capabilities and access to a personal email account.

Instructional Material Requirements:

The instructional materials required for this course are included in enrollment and will be available online.

You also have the option to purchase a physical copy of the text for an additional fee of $100.

  • Cisco Cyber Ops Assoc CRPOPS 200-201 Official Cert Guide

 

Prerequisites:

Prior to attending the CCNA Associate and Cybersecurity Associate Training Boot Camp, you should be familiar with networking topics such as TCP/IP, IP configuration, peer-to-peer networking, subnetting, building a routing table, and other network protocols, standards, and architecture.

This boot camp is designed for current IT professionals, including network engineers and administrators, systems engineers and administrators, IT managers/directors, or anyone interested in building their network knowledge and skills.

Boot camps are led by instructors that have years of industry experience and are recognized as subject matter experts.

What kind of salary can I expect with a Cisco CCNA Certification?
According to ZipRecruiter, the average CCNA salary is $89,491 (as of December 2022), with top earners making $130,000 or more annually. This is nearly 38% higher than the median salary in the United States of $55,640, according to the U.S. Bureau of Labor Statistics (BLS). Your salary will vary based on your location and whether you also hold a bachelor's or associate degree, as well as your job role and experience.

What salary can I expect in cyber operations?
According to PayScale, Cisco Cyber Ops Associate certification holders can expect to earn an average salary of $82,778. The salary you will make is based on your local, your job position, and whether you have other certifications and degrees.

What kinds of jobs can I get with Cisco CCNA?
By becoming CCNA certified, you will validate your critical job skills and knowledge and prove to employers that you can install and configure routers and switches for their entire organization as well as troubleshoot any network issues.

As a CCNA-certified professional, you may hold the following job titles: Network Engineer, Network Administrator, Information Technology Manager, Systems Engineer, Software Engineer, Network Security Engineer, Cyber Security Analyst, Security Engineer, and Information Security Analyst.

What jobs can I get with Cybersecurity?
There are many jobs you can get when it comes to cyber operations, and the average annual salaries of these positions vary. With certification, you can work as a:

  • Senior Network Engineer - $110,234 (Glassdoor)
  • Information Security Engineer - $98,703 (Glassdoor)
  • Cybersecurity Engineer - $92,797 (Glassdoor)
  • Security Engineer - $92,109 (Glassdoor)
  • Cyber Security Analyst - $82,690 (Glassdoor)
  • Network Security Engineer - $99,424 (Glassdoor)
  • Information Security Analyst - $83,103 (Glassdoor)

 

Please note the salaries listed are averages as of December 2022. This number may vary by the state you live in.

What is a CCNA Certification?
The CCNA, Cisco Certified Network Associate, is considered an entry-level certification in the information technology field issued by the networking hardware company Cisco. Preparing for and completing the exam will provide hands-on experience with installing, configuring, and operating network devices and proves that you have a foundational knowledge of networking.

What score do I need to pass?
There are between 40 and 60 questions on the CCNA 200-301 exam. In order to achieve a CCNA passing score, you will need to score a minimum of 82% on the CCNA 200-301 exam.

What is the value of earning the CCNA certification?
The CCNA certification is one of the most highly recognized and respected IT certifications in the computer network industry worldwide. This certification validates your ability to install, secure, operate, and troubleshoot issues within enterprise networks in the real world. When deciding if the CCNA is worth it for you, you will need to do research in your specific location.

How long is the CCNA certification good for after you pass the test? What are the renewal requirements?
The CCNA certification has a three-year recertification requirement. Once you become certified, you will need to complete your CCNA renewal by earning continuing education, taking exams, or a combination of both prior to the end of the three-year period.

Does this course prepare you for a certification?
Yes, you will be prepared for the Cisco CCNA and Cisco Cybersecurity certification exams.

When can I start this course?
You can register for the boot camp whenever you are ready. Our team will help you select the session that will best fit your needs.

How long does it take to complete this course?
The boot camp is 7 days in length. You will have 3 months from the completion of the boot camp to access all boot camp materials.

What kind of support will I receive?
The boot camp instructor will be available during the session to answer any questions. You will also have access to the Infosec Skills platform where you will be able to create support requests, as needed.

What happens when I complete the course?
Upon successful completion of your boot camp session, you will be awarded a certificate of completion from Infosec and the school or organization that you registered through.

Am I guaranteed a job?
ed2go courses will help you gain the skills and knowledge you need to take the next step in your career and stand out to potential employers. However, you should always research the job market in your area before enrolling.

Can I get financial assistance?
ed2go courses are non-credit, so they do not qualify for federal aid, FAFSA, and Pell Grant. In some states, vocational rehab or workforce development boards may provide funding to take our courses. Additionally, you may qualify for financial assistance if you meet certain requirements. Learn more about financial assistance.

How can I get more information about this course?
If you have questions that are not answered on our website, representatives are available via LIVE chat. You can also call us at 1-877-221-5151 during regular business hours to have your questions promptly answered. If you are visiting us during non-business hours, please send us a question using the "Contact Us."