Cisco CCNA Associate & CyberOps Associate Training Boot Camp with dual certification
Infosec’s authorized CCNA Associate and CyberOps Associate Training Boot Camp helps you build your knowledge of networking and provides hands-on experience installing, configuring and operating network devices — all while preparing you to earn two Cisco certifications.
Earn your CCNA Associate & CyberOps Associate, guaranteed!
- Seven days of live, expert instruction
- Exam Pass Guarantee
- Exam voucher
- Unlimited practice exam attempts
- 100% Satisfaction Guarantee
- Free annual Infosec Skills subscription ($599 value!)
- 1-year access to all boot camp video replays and materials
- Onsite proctoring of exam
- Pre-study learning path
- Knowledge Transfer Guarantee
Dual certification
After completing this boot camp, you will be certified with the following Cisco certifications:
- CCNA Associate certification: The CCNA Associate certification serves as the foundation for all the other certifications in the new Cisco certification program.
- Cisco Certified CyberOps Associate certification: Cisco Certified CyberOps Associates are prepared to work as a part of a Security Operations Center (SOC) team to detect and respond to network security threats.
Hands-on labs
Hundreds of exercises in over 30 hands-on labs prepare you for the most difficult part of the CCNA Associate and CyberOps Associate exams, the simulation questions. You’ll build your networking skills and gain real-world experience you can carry over to your next job or project.
Training overview
This innovative seven-day boot camp is designed specifically for network engineers and administrators requiring full knowledge of Cisco router and switch configuration. You’ll gain hands-on experience by completing a series of labs in our Networking Cyber Range. The labs provide practical experience in a networking and switching environment and prepare you for the simulation-based questions you’ll find on the CCNA Associate exam.
In addition to gaining the in-depth knowledge about network access, IP connectivity, IP services, and automation and programmability for Cisco networks, you will learn about the hottest area of networking: network security. Our expert instructors first prepare you to pass the CCNA Associate exam. After passing that exam, you will then train directly on the Cisco Certified CyberOps Associate curricula — all in one sitting.
What you'll learn
Upon the completion of this boot camp, you will know how to:
- Make appropriate decisions concerning implementation of hardware and configuration, based on ISR routers and switches running the Cisco iOS
- Proficiently administer Cisco routers
- Install, configure and maintain dependable, functional networks
- Properly identify protocols involving Cisco networking devices
- Troubleshoot general network and security issues
- Successfully operate routers and switched LAN networks
- Follow enterprise network design principles
- Understand routing protocols design considerations (OSPF and EIGRP)
Go beyond the CCNA
After successfully passing the CCNA Associate exam, you will continue your study to prepare for the Cisco Certified CyberOps Associate by learning:
- Security concepts
- Security monitoring
- Host-based analysis
- Network intrusion analysis
- Security policies and procedures
Prerequisites
Prior to attending the CCNA Dual Certification Boot Camp, you should be familiar with networking topics such as TCP/IP, IP configuration, peer-to-peer networking, subnetting, building a routing table and other network protocols, standards and architecture.
Who should attend
- Network engineers
- Network administrators
- Systems administrators
- System engineers
- IT managers/directors
- Anyone looking to improve their network skills
Everything you need to earn your CCNA Associate & CyberOps Associate certifications
- Seven days of live, expert instruction
- Exam Pass Guarantee
- Exam voucher
- Unlimited practice exam attempts
- 100% Satisfaction Guarantee
- Free annual Infosec Skills subscription ($599 value!)
- 1-year access to all boot camp video replays and materials
- Onsite proctoring of exam
- Pre-study learning path
- Knowledge Transfer Guarantee
Exam Pass Guarantee
We guarantee you’ll pass your exam on the first attempt. Learn more.
CCNA & CyberOps training schedule
Infosec’s CCNA and CyberOps materials are always up to date and synchronized with the latest Cisco exam objectives. Our industry-leading curriculum and expert instructors have led to the highest pass rates in the industry. More than 93% of Infosec students pass their certification exams on their first attempt.
- Before your boot camp
-
Start learning now. You’ll get immediate access to all the content in Infosec Skills, including an in-depth CCNA and CyberOps prep course, the moment you enroll. Prepare for your live boot camp, uncover your knowledge gaps and maximize your training experience.
-
- During your boot camp
-
CCNA (200-301)
Network fundamentals
- Role and function of network components
- Routers
- L2 and L3 switches
- Next-generation firewalls and IPS
- Access points
- Controllers (Cisco DNA Center and WLC)
- Endpoints
- Servers
- Characteristics of network topology architectures
- 2 tier
- 3 tier
- Spine-leaf
- WAN
- Small office/home office (SOHO)
- On-premises and cloud
- Compare and contrast network topologies
- Physical interface and cabling types
- Single-mode fiber, multimode fiber, copper
- Connections (Ethernet shared media and point-to-point)
- Concepts of PoE
- Interface and cable issues (collisions, errors, mismatch duplex, and/or speed)
- TCP and UDP
- Configuring and verifying IPv4 addressing and subnetting
- The need for private IPv4 addressing
- Configuring and verifying IPv6 addressing and prefix
- IPv6 address types
- Global unicast
- Unique local
- Link local
- Anycast
- Multicast
- Modified EUI 64
- Verifying IP parameters for client OS (Windows, Mac OS, Linux)
- Wireless principles
- Nonoverlapping Wi-Fi channels
- SSID
- RF
- Encryption
- Virtualization fundamentals (virtual machines)
- Switching concepts
- MAC learning and aging
- Frame switching
- Frame flooding
- MAC address table
Network access
- Configuring and verifying VLANs (normal range) spanning multiple switches
- Access ports (data and voice)
- Default VLAN
- Connectivity
- Configuring and verifying interswitch connectivity
- Trunk ports
- 802.1Q
- Native VLAN
- Configuring and verifying Layer 2 discovery protocols (Cisco Discovery Protocol and LLDP)
- Configuring and verifying (Layer 2/Layer 3) EtherChannel (LACP)
- The need for and basic operations of Rapid PVST+ Spanning Tree Protocol
- Root port, root bridge (primary/secondary), and other port names
- Port states (forwarding/blocking)
- PortFast benefits
- Cisco Wireless Architectures and AP modes
- Physical infrastructure connections of WLAN components (AP, WLC, access/trunk ports, and LAG)
- AP and WLC management access connections (Telnet, SSH, HTTP, HTTPS, console and TACACS+/RADIUS)
- Configuring the components of a wireless LAN access for client connectivity using GUI only such as WLAN creation, security settings, QoS profiles and advanced WLAN settings
IP connectivity
- Components of routing table
- Routing protocol code
- Prefix
- Network mask
- Next hop
- Administrative distance
- Metric
- Gateway of last resort
- Determining how a router makes a forwarding decision by default
- Longest match
- Administrative distance
- Routing protocol metric
- Configuring and verifying IPv4 and IPv6 static routing
- Default route
- Network route
- Host route
- Floating static
- Configuring and verifying single area OSPFv2
- Neighbor adjacencies
- Point-to-point
- Broadcast (DR/BDR selection)
- Router ID
- The purpose of first hop redundancy protocol
IP services
- Configuring and verifying inside source NAT using static and pools
- Configuring and verifying NTP operating in a client and server mode
- Role of DHCP and DNS within the network Function of SNMP in network operations
- Use of syslog features including facilities and levels
- Configuring and verifying DHCP client and relay
- Understanding the forwarding per-hop behavior (PHB) for QoS such as classification, marking, queuing, congestion, policing, shaping
- Configuring network devices for remote access using SSH
- Capabilities and function of TFTP/FTP in the network
Security fundamentals
- Key security concepts (threats, vulnerabilities, exploits and mitigation techniques)
- Security program elements (user awareness, training and physical access control)
- Configuring device access control using local passwords
- Security password policies elements: management, complexity and password alternatives (multifactor authentication, certificates and biometrics)
- Remote access and site-to-site VPNs
- Configuring and verifying access control lists
- Configuring Layer 2 security features (DHCP snooping, dynamic ARP inspection and port security)
- Authentication, authorization and accounting
- Wireless security protocols (WPA, WPA2 and WPA3)
- Configuring WLAN using WPA2 PSK using the GUI
Automation and programmability
- How automation impacts network management
- Traditional networks vs. controller-based networking
- Controller-based and software defined architectures (overlay, underlay and fabric)
- Separation of control plane and data plane
- North-bound and south-bound APIs
- Traditional campus device management vs. Cisco DNA Center enabled device management
- Characteristics of REST-based APIs (CRUD, HTTP verbs and data encoding)
- Capabilities of configuration management mechanisms Puppet, Chef and Ansible
- Interpreting JSON encoded data
Cisco Certified CyberOps Associate (200-201)
Security concepts
- Describe the CIA triad
- Compare security deployments
- Network, endpoint and application security systems
- Agentless and agent-based protections
- Legacy antivirus and antimalware
- SIEM, SOAR and log management
- Describe security terms
- Threat intelligence (TI)
- Threat hunting
- Malware analysis
- Threat actor
- Run book automation (RBA)
- Reverse engineering
- Sliding window anomaly detection
- Principle of least privilege
- Zero trust
- Threat intelligence platform (TIP)
- Compare security concepts
- Risk (risk scoring/risk weighting, risk reduction, risk assessment)
- Threat
- Vulnerability
- Exploit
- Describe the principles of the defense-in-depth strategy
- Compare access control models
- Discretionary access control
- Mandatory access control
- Nondiscretionary access control
- Authentication, authorization, accounting
- Rule-based access control
- Time-based access control
- Role-based access control
- Describe terms as defined in CVSS
- Attack vector
- Attack complexity
- Privileges required
- User interaction
- Scope
- Identify the challenges of data visibility (network, host, and cloud) in detection
- Identify potential data loss from provided traffic profiles
- Interpret the 5-tuple approach to isolate a compromised host in a grouped set of logs
- Compare rule-based detection vs. behavioral and statistical detection
Security monitoring
- Compare attack surface and vulnerability
- Identify the types of data provided by these technologies
- TCP dump
- NetFlow
- Next-gen firewall
- Traditional stateful firewall
- Application visibility and control
- Web content filtering
- Email content filtering
- Describe the impact of these technologies on data visibility
- Access control list
- NAT/PAT
- Tunneling
- TOR
- Encryption
- P2P
- Encapsulation
- Load balancing
- Describe the uses of these data types in security monitoring
- Full packet capture
- Session data
- Transaction data
- Statistical data
- Metadata
- Alert data
- Describe network attacks, such as protocol-based, denial of service, distributed denial of service and man-in-the-middle
- Describe web application attacks, such as SQL injection, command injections and crosssite scripting
- Describe social engineering attacks
- Describe endpoint-based attacks, such as buffer overflows, command and control (C2), malware and ransomware
- Describe evasion and obfuscation techniques, such as tunneling, encryption and proxies
- Describe the impact of certificates on security (includes PKI, public/private crossing the network, asymmetric/symmetric)
- Identify the certificate components in a given scenario
- Cipher-suite
- X.509 certificates
- Key exchange
- Protocol version
- PKCS
Host-based analysis
- Describe the functionality of these endpoint technologies in regard to security monitoring
- Host-based intrusion detection
- Antimalware and antivirus
- Host-based firewall
- Application-level whitelisting/blacklisting
- Systems-based sandboxing (such as Chrome, Java, Adobe Reader)
- Identify components of an operating system (such as Windows and Linux) in a given scenario
- Describe the role of attribution in an investigation
- Assets
- Threat actor
- Indicators of compromise
- Indicators of attack
- Chain of custody
- Identify type of evidence used based on provided logs
- Best evidence
- Corroborative evidence
- Indirect evidence
- Compare tampered and untampered disk image
- Interpret operating system, application, or command line logs to identify an event
- Interpret the output report of a malware analysis tool (such as a detonation chamber or sandbox)
- Hashes
- URLs
- Systems, events and networking
Network intrusion analysis
- Map the provided events to source technologies
- IDS/IPS
- Firewall
- Network application control
- Proxy logs
- Antivirus
- Transaction data (NetFlow)
- Compare impact and no impact for these items
- False positive
- False negative
- True positive
- True negative
- Benign
- Compare deep packet inspection with packet filtering and stateful firewall operation
- Compare inline traffic interrogation and taps or traffic monitoring
- Compare the characteristics of data obtained from taps or traffic monitoring and transactional data (NetFlow) in the analysis of network traffic
- Extract files from a TCP stream when given a PCAP file and Wireshark
- Identify key elements in an intrusion from a given PCAP file
- Source address
- Destination address
- Source port
- Destination port
- Protocols
- Payloads
- Interpret the fields in protocol headers as related to intrusion analysis
- Ethernet frame
- IPv4
- IPv6
- TCP
- UDP
- ICMP
- DNS
- SMTP/POP3/IMAP
- HTTP/HTTPS/HTTP2
- ARP
- Interpret common artifact elements from an event to identify an alert
- IP address (source / destination)
- Client and server port identity
- Process (file or registry)
- System (API calls)
- Hashes
- URI / URL
- Interpret basic regular expressions
Security policies and procedures
- Describe management concepts
- Asset management
- Configuration management
- Mobile device management
- Patch management
- Vulnerability management
- Describe the elements in an incident response plan as stated in NIST.SP800-61
- Apply the incident handling process (such as NIST.SP800-61) to an event
- Map elements to these steps of analysis based on the NIST.SP800-61
- Preparation
- Detection and analysis
- Containment, eradication, and recovery
- Post-incident analysis (lessons learned)
- Map the organization stakeholders against the NIST IR categories (CMMC, NIST.SP800-61)
- Preparation
- Detection and analysis
- Containment, eradication, and recovery
- Post-incident analysis (lessons learned)
- Describe concepts as documented in NIST.SP800-86
- Evidence collection order
- Data integrity
- Data preservation
- Volatile data collection
- Identify these elements used for network profiling
- Total throughput
- Session duration
- Ports used
- Critical asset address space
- Identify these elements used for server profiling
- Listening ports
- Logged in users/service accounts
- Running processes
- Running tasks
- Applications
- Identify protected data in a network
- PII
- PSI
- PHI
- Intellectual property
- Classify intrusion events into categories as defined by security models, such as Cyber Kill Chain Model and Diamond Model of Intrusion
- Describe the relationship of SOC metrics to scope analysis (time to detect, time to contain, time to respond, time to control)
- Role and function of network components
-
- After your boot camp
-
Your boot camp includes a 1-year subscription to Infosec Skills, so you can take additional time to prepare for your exam, get a head start on your next certification goal or start earning CPEs.
-
Free CCNA training resources
Sign up
Enroll in a boot camp
Frequently asked questions
- What’s the value in earning the CCNA certification?
-
The CCNA is one of the most highly regarded entry-level IT certifications on the market today. Earning the CCNA proves to colleagues and employers that you are an educated networking professional that’s able to manage small to medium-sized networks in the real world.
-
- What are the pre-requirements for earning the CCNA?
-
The CCNA exam itself has no prerequisites, and there are no specific degree requirements to hold the certification. However, it is recommended that you have at least two years of real-world networking experience before preparing for the exam. Familiarity with networking basics like routing, switching and TCP/IP protocol will go a long way. Want to get in the discussion about the Cisco certification changes? Check out our TechExams article!
-
- How does the CCNA examination process work?
-
The CCNA exam (200-301) was released in February 2020 and is a 120-minute exam. As Cisco states, “This exam tests a candidate’s knowledge and skills related to network fundamentals, network access, IP connectivity, IP services, security fundamentals and automation and programmability.”
-
- What format are the exam questions? What do I need to score in order to pass?
-
The majority of the questions will be in a multiple choice format. In addition to multiple choice, you will be required to complete both “drag and drop” and simulation questions. As Cisco states, “Passing scores are set by using statistical analysis and are subject to change.”
-
- How do the CCNA simulation questions work? How are they scored?
-
Simulation questions will present you with a scenario that you will then need to investigate and solve. Simulation questions are more intensive, and thus can carry greater weight than the multiple choice or drag and drop questions. Infosec’s boot camp lab environment will prepare you for all of the question types found on the exam.
-
- What career opportunities are available to CCNA boot camp graduates? What’s the job outlook like for CCNA professionals?
-
The CCNA is one of the most highly-regarded certifications in the IT industry, which in recent years has grown at a considerably steady rate. In fact, U.S. Bureau of Labor Statistics predicts that between 2016 and 2026, employment opportunities for computer and information technology professionals are expected to increase by 13%. Becoming certified is a surefire way to stand out in this competitive industry.
-
- What does this CCNA course offer that other certification prep classes do not?
-
Upon successful completion of our training course, you will hold both CCNA and CCNA Cyber Ops certifications. Our boot camp’s lab environment provides unmatched hands-on experience with Cisco-certified materials to prepare you for the CCNA and CCNA Cyber Ops exams, which we also provide you with vouchers for. Lastly, our Exam Pass Guarantee can give you the peace of mind you need in order to study effectively!
-
- How long is the CCNA certification good for after you pass the test? What are the renewal requirements?
-
CCNA certifications are valid for three years after their date of issue, and can be renewed before their expiration date by passing the designated recertification exam(s). Click here for more information on CCNA recertification.
-
- Where does the CCNA stand compared to other educational offerings in the networking field?
-
Other rigorous certification processes, like the MCSE, require that students take seven different exams in order to demonstrate their expertise — whereas the CCNA only requires you to take one exam. While the Network+ certification is also attractive as an entry-level certification, it doesn’t cover the more advanced networking and technology specific concepts that Cisco does in the CCNA. IT and security professionals often cite the CCNA as one of the most valuable certifications they earned.
-
- What are the most difficult topics covered on the CCNA exam?
-
Students typically find the most difficult topic to comprehend on the CCNA exam is WAN Protocols, specifically anything to do with PPP, Frame Relay or ISDN. Brushing up on routing protocols (RIP, IGRP, OSPF, etc.) and access lists (basic and advanced) is also recommended.
-
- What happens if I fail the CCNA exam? Is there a limit to the number of times you can retake it?
-
There is no limit to the amount of times one can take the exam(s). The only protocol Cisco has is that the candidate must wait five calendar days before retaking the exam. While the CCNA has a high first-time fail rate, Infosec boot camp students have a passing rate of 93%!
-
- What job titles are most common for people who hold Cisco’s CCNA certification?
-
Common job titles for CCNA professionals include: network engineer, system administrator, technical support engineer, computer systems analyst and many more.
-
- What are some tips for preparing for the CCNA?
-
Apart from developing good habits of self-study, it is recommended that students gain practical experience related to the fundamentals of routing and switching. Enrolling in a training boot camp like the one offered here is also a proven strategy for success! Click here for more practical tips.
-
- What is the average salary for CCNA professionals?
-
CCNA holders can negotiate higher salaries for themselves and make between $39,195 to $118,830 annually — depending on location, job title, and experience. Click here for more info on CCNA salaries.
-