CCNA & CCNA Security Bundle


Build and secure a cutting edge network using Cisco technologies and the CCNA Security bundle.

Report Abuse


Build and secure a cutting edge network using Cisco technologies and the CCNA Security bundle. Designed for network managers and engineers responsible for implementing network security for small and medium businesses, this course teaches the fundamentals of IP technology implementations, before showing delegates how to boost security.

With its focus on network security, this course is best suited to:

  • Network managers who want to improve their understanding of security protocols and provisions.
  • Network engineers tasked with implementing and configuring security provisions.
  • Engineers working with Cisco equipment who want to formalise their training and obtain a vendor-approved qualification.
  • IT professionals who want to cross-train into a network security role.

The CCNA Security bundle is the best way for the administrators of Cisco networks to learn how to design, implement and manage a secure network they work towards the gold standard CCNA certification.

After covering networking fundamentals, engineers will move onto learning the techniques required to secure Cisco hardware and networks. From router lockdown to Access Control Lists (ACLs), through to IOS Firewall setup, students will learn how to protect data and network resources from intruders.

Key Learning Points

As a three part bundle of courses, the Implementing Cisco IOS Network Security module will prove to be of greatest interest to network security professionals. Using a combination of instructor-led videos, self-study materials and practical exercises that students can practice in their own test labs, this course will help delegates understand:

  • How to use the Cisco Router SDM security audit feature to identify unauthorised network resource usage.
  • Securing routers to prevent hackers from gaining access to key network resources.
  • The Authentication, Authorisation and Accounting philosophy – key to implementing Cisco-approved security solutions that work.
  • Using Access Control Lists to limit network access, mitigate threats and minimise attack surfaces.
  • The use of stateful firewalls to identify and block low level hacking attempts automatically.
  • Securing inter-site VPNs and data transfer using SDM on Cisco routers.

To help give context to the security modules, students will also study parts 1 and 2 of the CCNA Interconnecting Cisco Networking Devices modules – key to achieving the CCNA qualification. These courses take students through the fundamentals of IP technology, and how to configure and deploy Cisco routers and switches in a corporate network.

Advantages of this course (CCNA Security Bundle)

Network security managers and engineers will find the CCNA Security Bundle invaluable for improving their skills and making them more effective at work. These new skills will allow them to:

  • Design, configure and deploy a secure network that meets the changing needs of a business without exposing data to unnecessary risk.
  • Segment and secure network traffic to deliver an exceptional user experience and to prevent data and systems from being hacked or lost.
  • Build inter-site links and implement firewalls and VPN security to protect data as it travels between sites.
  • Use the advanced features of Cisco IOS to further improve security and performance of network resources.

Upon completion of the CCNA Security bundle, students will be ready to sit (and pass) their Cisco CCNA exams. They will also find that their vendor-specific skillset greatly improves employment prospects in the network security sector.

Cisco CCNA 100-105 ICND1 Interconnecting Cisco Network Devices Part 1
  • Networking Fundamentals
  • Basic Ethernet LAN Implementation
  • Designing Ethernet LANS
  • Understanding IPv4
  • Working With Cisco Routers
  • IPv4 Design And Troubleshooting
  • IPv4 Services
  • Implementing IPv6
Cisco CCNA 200-105 ICND2: Interconnecting Cisco Networking Devices Part 2
  • Configuring Ethernet LANs
  • Configuring IPv4 Routing Protocols
  • Wide Area Networks
  • IPv4 Services
  • IPv4 Routing And Troubleshooting
  • IPv6 Routing
  • Cloud Based Networking
640-554 – Implementing Cisco IOS Network Security – IINS
  • Introduction
Network Security Basics 1
  • Network Security Basics 1- Part1
  • Network Security Basics 1- Part2
  • Network Security Basics 1- Part3
Network Security Basics 2
  • Network Security Basics 2- Part1
  • Network Security Basics 2- Part2
  • Network Security Basics 2- Part3
  • Network Security Basics 2- Part4
  • Network Security Basics 2- Part5
  • Network Security Basics 2- Part6
Securing Network Devices 1
  • Securing Network Devices 1- Part1
  • Securing Network Devices 1- Part2
  • Securing Network Devices 1- Part3
Securing Network Devices Lab 1
  • Securing Network Devices Lab 1- Part1
  • Securing Network Devices Lab 1- Part2
IOS Enhancement Labs
  • IOS Enhancement Labs
Securing Network Devices 2
  • Securing Network Devices 2- Part1
  • Securing Network Devices 2- Part2
  • Securing Network Devices 2- Part3
Securing Network Devices Lab 2
  • Securing Network Devices Lab
Using CCP To Configure SNMP Lab
  • Using CCP To Configure SNMP Lab
Say Hello To AAA
  • Say Hello To AAA- Part1
  • Say Hello To AAA- Part2
Local AAA
  • Local AAA
Configuring Local AAA with CCP
  • Configuring Local AAA with CCP
Firewall basics Using ACLs
  • Firewall basics Using ACLs- Part1
  • Firewall basics Using ACLs- Part2
  • Firewall basics Using ACLs- Part3
  • Firewall basics Using ACLs- Part4
Intro Firewall
  • Intro Firewall- Part1
  • Intro Firewall- Part2
  • Intro Firewall- Part3
  • Intro Firewall- Part4
Content Based Access Control Firewall
  • Content Based Access Control Firewall
Zoned Based Firewalls
  • Zoned Based Firewalls
Zoned Based Firewalls Lab
  • Zoned Based Firewalls Lab
Configuring Advanced Firewall With CCP
  • Configuring Advanced Firewall With CCP
Securing The LAN
  • Securing The LAN- Part1
  • Securing The LAN- Part2
  • Securing The LAN- Part3
  • Securing The LAN- Part4
  • Securing The LAN- Part5
  • Securing The LAN- Part6
  • Securing The LAN- Part7
  • Securing The LAN- Part8
  • Securing The LAN- Part9
Welcome To Crypto
  • Welcome To Crypto- Part1
  • Welcome To Crypto- Part2
  • Welcome To Crypto- Part3
  • VPN- Part1
  • VPN- Part2
  • VPN- Part3
  • VPN- Part4
  • VPN- Part5
  • VPN- Part6
  • VPN- Part7
Remote Access VPNS
  • Remote Access VPNS
Managing A Secure Network
  • Managing A Secure Network- Part1
  • Managing A Secure Network- Part2
  • Managing A Secure Network- Part3

Additional information

Exams Included


Course Type

Online Course

Expiry Date After Purchase

1 year

Device Processor

1 gigahertz (GHz)

RAM Required

1 GB

Operating System

iOS, Windows 10, Windows 7, Windows 8


Google Chrome, Internet Explorer 8 or above, Mozilla Firefox, Safari 6 or above


Android, iPad, iPhone, Mac, Windows


There are no reviews yet.

Only logged in customers who have purchased this product may leave a review.

Vendor Information

  • Store Name: Otutu Online Store
  • Vendor: Otutu Online Store
  • No ratings found yet!

We want you to be satisfied, so all eligible courses purchased on Vogate can be refunded within 14 days. For whatever reason, if you are unhappy with a course, you can request a refund, provided the request meets the guidelines in our refund policy.

Certain restrictions may apply and some purchases may only be eligible for credit refunds. For more information regarding our refund policy, please see below.

How to submit a refund request

If you’re looking for instructions on how to submit a refund request, please visit our support and help section

Our 14-day policy

While our 14-day refund policy is to allow customers to learn risk free, we must also protect our vendors from fraud and provide them a reasonable payment schedule. Payments are sent to vendor after 30 days, so we will not process refund requests received after 14 days of purchase.

Additional reasons for denied refunds

We reserve the right, in our sole discretion, to limit or deny refund requests in cases where we believe there is refund abuse, including but not limited to the following:

  • A significant portion of the course has been consumed or downloaded by a customer before the refund was requested.
  • Multiple refunds have been requested by a customer for the same course or other courses
  • Excessive refunds have been requested by a customer.
  • Users who have their account reported, banned or course access disabled due to a violation of our Terms or Trust & Safety Guidelines. 
  • We do not grant refunds for any subscription services.

These refund restrictions will be enforced to the extent permitted by applicable law. 

Product Enquiry

You may also like…