Cisco CCNA Associate & CyberOps Associate Training Boot Camp

This innovative seven-day boot camp is designed specifically for network engineers and administrators requiring full knowledge of Cisco router and switch configuration. You will gain hands-on experience by completing a series of labs in our Networking Cyber Range. The labs provide practical experience in a networking and switching environment and prepare you for the simulation-based questions you will find on the CCNA 200-301 exam.

In addition to gaining in-depth knowledge about network access,...

SHARE
7 Days
Open Enrollment
Offered in partnership with your preferred school

George Mason University

Change School
Learning method

for additional information

Cisco CCNA Associate & CyberOps Associate Training Boot Camp

Enroll Now

Course code: LBC104

What you will learn

Cisco CCNA (200-301)

  • Make appropriate decisions concerning the implementation of hardware and configuration based on ISR routers and switches running Cisco IOS
  • Proficiently administer Cisco routers
  • Install, configure and maintain dependable, functional networks
  • Properly identify protocols involving
  • Cisco networking devices
  • Troubleshoot general network and security issues
  • Successfully operate routers and switched LAN networks
  • Follow enterprise network design principles
  • Understand routing protocols design considerations (OSPF and EIGRP)

Cisco CyberOps Associate

  • Security concepts
  • Security monitoring
  • Host-based analysis
  • Network intrusion analysis
  • Security policies and procedures

How you will benefit

  • Increase your earning potential and career opportunities
  • Gain hands-on experience through a series of labs, best practices, and expert instruction
  • Obtain a firm understanding of key concepts that are vital for network engineers and administrators
  • Prepare to earn two in-demand certifications: Cisco CCNA and the Cisco CyberOps certification exams

How the course is taught

  • Live Online, Instructor-Moderated
  • 7 Days to complete Boot Camp
  • 90-day extended access to all boot camp materials
  1. Day 1 - Cisco CCNA (200-301)
    1. Network Fundamentals
      1. Role and function of network components
      2. Characteristics of network topology architectures
      3. Compare and contrast network topologies
      4. Physical interface and cabling types
      5. Interface and cable issues (collisions, errors, mismatch duplex, and/or speed)
      6. TCP and UDP
      7. Configuring and verifying IPv4 addressing and subnetting
      8. The need for private IPv4 addressing
      9. Configuring and verifying IPv6 addressing and prefix
      10. IPv6 address types
      11. Verifying IP parameters for client OS (Windows, macOS, Linux)
      12. Wireless principles
      13. Virtualization fundamentals (virtual machines)
      14. Switching concepts
  2. Day 2
    1. Network Access
      1. Configuring and verifying VLANs (normal range) spanning multiple switches
      2. Configuring and verifying interswitch connectivity
      3. Configuring and verifying Layer 2 discovery protocols (Cisco Discovery Protocol and LLDP)
      4. Configuring and verifying (Layer 2/Layer 3) EtherChannel (LACP)
      5. The need for and basic operations of Rapid PVST+ Spanning Tree Protocol
      6. Cisco Wireless Architectures and AP modes
      7. Physical infrastructure connections of WLAN
      8. Components (AP, WLC, access/trunk ports, and LAG)
      9. AP and WLC management access connections (Telnet, SSH, HTTP, HTTPS, console and TACACS+/RADIUS)
      10. Configuring the components of a wireless LAN access for client connectivity using GUI only such as WLAN creation, security settings, QoS profiles and advanced WLAN settings
  3. Day 3
    1. IP Connectivity
      1. Components of routing table
      2. Determining how a router makes a forwarding decision by default
      3. Configuring and verifying IPv4 and IPv6 static routing
      4. Configuring and verifying single area OSPFv2
      5. The purpose of first hop redundancy protocol
  4. Day 4
    1. IP Services
      1. Configuring and verifying inside source NAT using static and pools
      2. Configuring and verifying NTP operating in a client and server mode
      3. Role of DHCP and DNS within the network
      4. Function of SNMP in network operations
      5. Use of syslog features including facilities and levels
      6. Configuring and verifying DHCP client and relay
      7. Understanding the forwarding per-hop behavior (PHB) for QoS such as classification, marking, queuing, congestion, policing, shaping
      8. Configuring network devices for remote access using SSH
      9. Capabilities and function of TFTP/FTP in the network
    2. Security Fundamentals
      1. Key security concepts (threats, vulnerabilities, exploits and mitigation techniques)
      2. Security program elements (user awareness, training, and physical access control)
      3. Configuring device access control using local passwords
      4. Security password policies elements: management, complexity, and password alternatives (multifactor authentication, certificates, and biometrics)
      5. Remote access and site-to-site VPNs
      6. Configuring and verifying access control lists
      7. Configuring Layer 2 security features (DHCP snooping, dynamic ARP inspection and port security)
      8. Authentication, authorization, and accounting
      9. Wireless security protocols (WPA, WPA2 and WPA3)
      10. Configuring WLAN using WPA2 PSK using the GUI
  5. Day 5
    1. Automation and Programmability
      1. How automation impacts network management
      2. Traditional networks vs. controller-based networking
      3. Controller-based and software defined architectures (overlay, underlay and fabric)
      4. Traditional campus device management vs. Cisco DNA Center enabled device management
      5. Characteristics of REST-based APIs (CRUD, HTTP verbs and data encoding)
      6. Capabilities of configuration management mechanisms Puppet, Chef and Ansible
      7. Interpreting JSON encoded data
  6. Day 6 - Cisco Certified CyberOps Associate (200-201)
    1. Security Concepts
      1. Describe the CIA triad
      2. Compare security deployments
      3. Describe security terms
      4. Compare security concepts
      5. Describe the principles of the defense-in-depth strategy
      6. Compare access control models
      7. Describe terms as defined in CVSS
      8. Identify the challenges of data visibility (network, host, and cloud) in detection
      9. Identify potential data loss from provided traffic profiles
      10. Interpret the 5-tuple approach to isolate a compromised host in a grouped set of logs
      11. Compare rule-based detection vs. behavioral and statistical detection
    2. Security Monitoring
      1. Compare attack surface and vulnerability
      2. Identify the types of data provided by these technologies
      3. Describe the impact of these technologies on data visibility
      4. Describe the uses of these data types in security monitoring
      5. Describe network attacks, such as protocol based, denial of service, distributed denial of service and man-in-the-middle
      6. Describe web application attacks, such as SQL injection, command injections and crosssite scripting
      7. Describe social engineering attacks
      8. Describe endpoint-based attacks, such as buffer overflows, command and control (C2), malware and ransomware
      9. Describe evasion and obfuscation techniques, such as tunneling, encryption and proxies
      10. Describe the impact of certificates on security (includes PKI, public/private crossing the network, asymmetric/symmetric)
      11. Identify the certificate components in a given scenario
      12. Cipher-suite
    3. Host-Based Analysis
      1. Describe the functionality of these endpoint technologies in regard to security monitoring
      2. Identify components of an operating system (such as Windows and Linux) in a given scenario
      3. Describe the role of attribution in an investigation
      4. Identify type of evidence used based on provided logs
      5. Compare tampered and untampered disk image
      6. Interpret operating system, application, or command line logs to identify an event
      7. Interpret the output report of a malware analysis tool (such as a detonation chamber or sandbox)
  7. Day 7
    1. Network Intrusion Analysis
      1. UMap the provided events to source technologies
      2. Compare impact and no impact
      3. Compare deep packet inspection with packet filtering and stateful firewall operation
      4. Compare inline traffic interrogation and taps or traffic monitoring
      5. Compare the characteristics of data obtained from taps or traffic monitoring and transactional data (NetFlow) in the analysis of network traffic
      6. Extract files from a TCP stream when given a PCAP file and Wireshark
      7. Identify key elements in an intrusion from a given PCAP file
      8. Interpret the fields in protocol headers as related to intrusion analysis
      9. Interpret common artifact elements from an event to identify an alert
      10. Interpret basic regular expressions
    2. Security Policies and Procedures
      1. Describe management concepts
      2. Describe the elements in an incident response plan as stated in NIST.SP800-61
      3. Apply the incident handling process (such as NIST.SP800-61) to an event
      4. Map elements to these steps of analysis based on the NIST.SP800-61
      5. Map the organization stakeholders against the NIST IR categories (CMMC, NIST.SP800-61)
      6. Describe concepts as documented in NIST.SP800-86
      7. Identify these elements used for network profiling
      8. Identify these elements used for server profiling
      9. Identify protected data in a network
      10. Classify intrusion events into categories as defined by security models, such as Cyber Kill Chain
      11. Model and Diamond Model of Intrusion
      12. Describe the relationship of SOC metrics to scope analysis (time to detect, time to contain, time to respond, time to control)

Boot camps are led by instructors that have years of industry experience and are recognized as subject matter experts.

Prerequisites:

Prior to attending the CCNA Associate and CyberOps Associate Training Boot Camp, you should be familiar with networking topics such as TCP/IP, IP configuration, peer-to-peer networking, subnetting, building a routing table, and other network protocols, standards, and architecture.

Requirements:

Hardware Requirements:

  • This course can be taken on either a PC, Mac, or Chromebook.
  • A microphone.
  • Speakers.
  • A webcam.

Software Requirements:

  • PC: Windows 7 or later.
  • Mac: macOS 10.7 or later.
  • Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
  • Microsoft Word Online.
  • Adobe Acrobat Reader.
  • Zoom.
  • Software must be installed and fully operational before the course begins.

Other:

  • Email capabilities and access to a personal email account.

Instructional Material Requirements:

The instructional materials required for this course are included in enrollment and will be available online.

You also have the option to purchase a physical copy of the text for an additional fee of $100.

  • Cisco Cyber Ops Assoc CRPOPS 200-201 Official Cert Guide

According to ZipRecruiter, the average CCNA salary is $89,491 (as of December 2022), with top earners making $130,000 or more annually. This is nearly 38% higher than the median salary in the United States of $55,640, according to the U.S. Bureau of Labor Statistics (BLS). Your salary will vary based on your location and whether you also hold a bachelor's or associate degree, as well as your job role and experience.

According to PayScale, Cisco Cyber Ops Associate certification holders can expect to earn an average salary of $82,778. The salary you will make is based on your local, your job position, and whether you have other certifications and degrees.

By becoming CCNA certified, you will validate your critical job skills and knowledge and prove to employers that you can install and configure routers and switches for their entire organization as well as troubleshoot any network issues.

As a CCNA-certified professional, you may hold the following job titles: Network Engineer, Network Administrator, Information Technology Manager, Systems Engineer, Software Engineer, Network Security Engineer, Cyber Security Analyst, Security Engineer, and Information Security Analyst.

There are many jobs you can get when it comes to cyber operations, and the average annual salaries of these positions vary. With certification, you can work as a:

  • Senior Network Engineer - $110,234 (Glassdoor)
  • Information Security Engineer - $98,703 (Glassdoor)
  • Cybersecurity Engineer - $92,797 (Glassdoor)
  • Security Engineer - $92,109 (Glassdoor)
  • Cyber Security Analyst - $82,690 (Glassdoor)
  • Network Security Engineer - $99,424 (Glassdoor)
  • Information Security Analyst - $83,103 (Glassdoor)

Please note the salaries listed are averages as of December 2022. This number may vary by the state you live in.

The CCNA, Cisco Certified Network Associate, is considered an entry-level certification in the information technology field issued by the networking hardware company Cisco. Preparing for and completing the exam will provide hands-on experience with installing, configuring, and operating network devices and proves that you have a foundational knowledge of networking.

There are between 40 and 60 questions on the CCNA 200-301 exam. In order to achieve a CCNA passing score, you will need to score a minimum of 82% on the CCNA 200-301 exam.

The CCNA certification is one of the most highly recognized and respected IT certifications in the computer network industry worldwide. This certification validates your ability to install, secure, operate, and troubleshoot issues within enterprise networks in the real world. When deciding if the CCNA is worth it for you, you will need to do research in your specific location.

The CCNA certification has a three-year recertification requirement. Once you become certified, you will need to complete your CCNA renewal by earning continuing education, taking exams, or a combination of both prior to the end of the three-year period.

Yes, you will be prepared for the Cisco CCNA and Cisco CyberOps certification exams.

You can register for the boot camp whenever you are ready. Our team will help you select the session that will best fit your needs.

The boot camp is 7 days in length. You will have 3 months from the completion of the boot camp to access all boot camp materials.

The boot camp instructor will be available during the session to answer any questions. You will also have access to the Infosec Skills platform where you will be able to create support requests, as needed.

Upon successful completion of your boot camp session, you will be awarded a certificate of completion from Infosec and the school or organization that you registered through.

ed2go courses will help you gain the skills and knowledge you need to take the next step in your career and stand out to potential employers. However, you should always research the job market in your area before enrolling.

ed2go courses are non-credit, so they do not qualify for federal aid, FAFSA, and Pell Grant. In some states, vocational rehab or workforce development boards may provide funding to take our courses. Additionally, you may qualify for financial assistance if you meet certain requirements. Learn more about financial assistance.

If you have questions that are not answered on our website, representatives are available via LIVE chat. You can also call us at 1-877-221-5151 during regular business hours to have your questions promptly answered. If you are visiting us during non-business hours, please send us a question using the "Contact Us."