“Cisco CCNA Cyber Security Associate” (Online/ Offline)
27th March 2026 Register Now
** Admission Going on “Cisco CCNA Cyber Security Associate” (Online/ Offline)
** EXAM: 200-201 CCNA CYBERSECURITY
**Registration Link : https://forms.gle/gEcxc86j1dvMThSW9
=========================================
১. ১০০% লার্নিং এবং ভেন্ডর এক্সাম পাশ
২. ভেন্ডর এক্সাম-এ বিশাল ডিসকাউন্ট
৩. কোর্স Completion সার্টিফিকেট সরাসরি CISCO প্রদান করবে
৪. সকল কোর্স ম্যাটেরিয়ালস সরাসরি CISCO থেকে পাওয়া যাবে ।
৫ . আসন সংখ্যা খুবই সীমিত
** Class Schedule: Friday: 4:30 pm - 7:30 pm & Saturday: 7:00 pm - 9:00 pm (online/offline)
** 27th March 2026,Friday **
--------------------------------------------
Contact with us: 01966677734, 01711452688
Location: 965 (8th & 9th Floor), East Shewrapara, Mirpur, Dhaka-1216.
Trainer: Alamgir Khan Sir (The best Cyber Security & Cisco CyberOps Trainer in Bangladesh)
Topics
1. Security Concepts (20%)
- Fundamentals: Understanding the CIA triad (Confidentiality, Integrity, Availability).
- Access Control: Comparing models such as Discretionary (DAC), Mandatory (MAC), Role-based (RBAC), and Attribute-based (ABAC).
- Risk Management: Differentiating between risk, threats, vulnerabilities, and exploits; understanding risk scoring and weighting.
- Terminology: Mastery of terms like Threat Intelligence (TI), Threat Hunting, Malware Analysis, and DevSecOps.
2. Security Monitoring (25%)
- Data Types: Identifying data from technologies like TCP dump, NetFlow, Next-Gen Firewalls (NGFW), and Email/Web content filtering.
- Attack Identification: Describing network attacks (DDoS, MITM), web application attacks (SQL injection, XSS), and social engineering.
- Visibility: Analyzing the impact of NAT/PAT, tunneling, and encryption on network data visibility.
- Cryptography: Understanding the impact of PKI, certificates, and symmetric/asymmetric encryption on security.
3. Host-Based Analysis (20%)
- Endpoint Technology: Functionality of host-based intrusion detection (HIDS), antimalware, and host-based firewalls using rules and AI-based detection.
- Operating Systems: Identifying components of Windows and Linux relevant to security.
- Forensics Foundations: The role of attribution, indicators of compromise (IoC) vs. indicators of attack (IoA), and the chain of custody.
4. Network Intrusion Analysis (20%)
- Event Mapping: Mapping security events to source technologies like IDS/IPS, Firewalls, and Proxy logs.
- Traffic Analysis: Comparing deep packet inspection (DPI) with stateful packet filtering; interpreting PCAP files using Wireshark to extract files or identify intrusion elements.
- Protocol Headers: Interpreting fields in headers for Ethernet, IPv4/IPv6, TCP/UDP, ICMP, DNS, and HTTP/HTTPS.
5. Security Policies and Procedures (15%)
- Management Concepts: Understanding asset, configuration, patch, and vulnerability management.
- Incident Response: Applying the NIST SP800-61 framework (Preparation, Detection/Analysis, Containment/Eradication, Post-incident activity).
- Evidence Collection: Principles from NIST SP800-86 regarding data integrity and volatile data collection.
- Frameworks: Classifying events using the Cyber Kill Chain and Diamond Model of Intrusion.
Trainers

Md Alamgir Khan
CEO-AT Computer Solution Limited
CCNA, CCNP, CCIE (W), RHCSA, HP-UX, MCSE
Duration
** Duration: 3 Months
** Class Schedule: Friday: 4:30 pm - 7:30 pm & Saturday: 7:00 pm - 9:00 pm (online/offline)
** 27th MArch 2026,Friday **


