Cisco CCNA Cyber Ops - Just 7 Days

Why

What do our customers say?

Four reasons why you should sit your CCNA Cyber Ops course with Firebrand Training

Find Out How We Help You To Learn New Skills Quickly

  1. You'll be CCNA Cyber Ops trained and certified faster. Learn more on this 7-day accelerated course. You'll get at least 12 hours a day of quality learning time in a distraction-free environment
  2. Your CCNA Cyber Ops course is all-inclusive. One simple price covers all course materials, exams, accommodation and meals – so you can focus on learning
  3. Pass CCNA Cyber Ops first time or train again for free. Your expert instructor will deliver our unique accelerated learning methods, allowing you to learn faster and be in the best possible position to pass first time. In the unlikely event that you don't, it's covered by your Certification Guarantee
  4. Study CCNA Cyber Ops with an award-winning training provider. We've won the Learning and Performance Institute's "Training Company of the Year" three times. Firebrand is your fastest way to learn, with 68.075 students saving more than one million hours since 2001

Think you are ready for the course? Take a FREE practice test to assess your knowledge!

What

On this 7-day accelerated CCNA Cyber Ops course, you’ll develop the skills to detect cyber security breaches and effectively respond to security incidents.

You’ll be trained by Cisco Certified Trainers who, through our unique Lecture | Lab | Review technique, will take you through key security principles and provide hands-on, practical examples. This technique will help you better retain knowledge and will ensure you are capable of applying your skills to real-life scenarios.

Upon completing this certification you will have:

  • the skills to prepare for more advanced job roles in cyber security operations
  • a basic understanding of Security Operations Centre (SOC) teams including an understanding of the type of metrics used to detect and respond to security incidents
  • an understanding of how to protect your organisation’s information from common attack vectors and endpoint attacks
  • knowledge in security monitoring, including identifying sources and types of data and events.
  • knowledge of how organisations are detecting and responding to cybercrime, cyberespionage, insider threats, advanced persistent threats and regulatory requirements
  • an understanding of security challenges involved with network applications

You'll also be prepared to sit exams 210-250 SECFND: Understanding Cisco Cybersecurity Fundamentals and 210-255 SECOPS: Implementing Cisco Cybersecurity Operations. You'll sit these on-site, during the course, covered by your Certification Guarantee.

This course, which is 35% faster than traditional training, is aimed at Security Operations Center (SOC) Analysts at an associate or beginner level. The certification does require some knowledge of basic cyber security technologies and principles.

Read more ...

Interested? See prices or call 78 79 16 53

Use your Cisco Learning Credits (CLCs)

You may be entitled to free training via Cisco Learning Credits (CLCs). If you’ve bought Cisco hardware or software - check the invoice to see if you have credits waiting to be used! If you’re unsure, get in touch with us.

  • Get certified 35% faster: Be trained and certified in just 7 days, instead of traditional courses which take 11 days. You'll be back at work sooner, using your new skills to defend against cyber attacks.
  • Cisco Official Curriculum: access to the most up-to-date materials Cisco offer giving you the skills and knowledge aligned to the exam.
  • Cisco Certified Trainers: Our Cisco Certified Trainers have years of industry relevant experience that can be used to support and further enhance course material. Meaning you'll develop skills and knowledge that can't be accessed through curriculum alone.
  • Lecture | Lab | Review: This technique, used throughout Firebrand’s courses, makes use of a mixture of theoretical and practical material to help you retain information and develop the skills to apply your knowledge to real-world scenarios.

Read more ...

Interested? See prices or call 78 79 16 53

The first 3 days of this course are designed to teach you fundamental knowledge for the core skills needed in a cybersecurity environment including basic security principles and concepts. The second half of this course will guide students through the principles of working in a Security Operations Centre.

SECFND Exam 210-250: Understanding Cisco Cybersecurity Fundamentals

Module 1: Network Concepts

  • Describe the function of the network layers as specified by the OSI and the TCP/IP  network models
  • Describe the operation of the following
    • IP
    • TCP
    • UDP
    • ICMP
  • Describe the operation of these network services
    • ARP
    • DNS
    • DHCP
  • Describe the basic operation of these network device types
    • Router
    • Switch
    • Hub
    • Bridge
    • Wireless access point (WAP)
    • Wireless LAN controller (WLC)
  • Describe the functions of these network security systems as deployed on the host, network, or the cloud:
    • Firewall
    • Cisco Intrusion Prevention System (IPS)
    • Cisco Advanced Malware Protection (AMP)
    • Web Security Appliance (WSA) / Cisco Cloud Web Security (CWS)
    • Email Security Appliance (ESA) / Cisco Cloud Email Security (CES)
  • Describe IP subnets and communication within an IP subnet and between IP subnets
  • Describe the relationship between VLANs and data visibility
  • Describe the operation of ACLs applied as packet filters on the interfaces of network devices
  • Compare and contrast deep packet inspection with packet filtering and stateful firewall operation
  • Compare and contrast inline traffic interrogation and taps or traffic mirroring
  • Compare and contrast the characteristics of data obtained from taps or traffic mirroring and NetFlow in the analysis of network traffic
  • Identify potential data loss from provided traffic profiles

Module 2: Security Concepts

  • Describe the principles of the defense in depth strategy
  • Compare and contrast these concepts:
    • Risk
    • Threat
    • Vulnerability
    • Exploit
  • Describe these terms:
    • Threat actor
    • Run book automation (RBA)
    • Chain of custody (evidentiary)
    • Reverse engineering
    • Sliding window anomaly detection
    • PII
    • PHI
  • Describe these security terms:
    • Principle of least privilege
    • Risk scoring/risk weighting
    • Risk reduction
    • Risk assessment
  • Compare and contrast these access control models:
    • Discretionary access control
    • Mandatory access control
    • Nondiscretionary access control
  • Compare and contrast these terms:
    • Network and host antivirus
    • Agentless and agent-based protections
    • SIEM and log collection
  • Describe these concepts:
    • Asset management
    • Configuration management
    • Mobile device management
    • Patch management
    • Vulnerability management

Module 3: Cryptography

  • Describe the uses of a hash algorithm
  • Describe the uses of encryption algorithms
  • Compare and contrast symmetric and asymmetric encryption algorithms
  • Describe the processes of digital signature creation and verification
  • Describe the operation of a PKI
  • Describe the security impact of these commonly used hash algorithms:
    • MD5
    • SHA-1
    • SHA-256
    • SHA-512
  • Describe the security impact of these commonly used encryption algorithms and secure communications protocols:
    • DES
    • 3DES
    • AES
    • AES256-CTR
    • RSA
    • DSA
    • SSH
    • SSL/TLS
  • Describe how the success or failure of a cryptographic exchange impacts security investigation
  • Describe these items in regards to SSL/TLS:
    • Cipher-suite
    • 509 certificates
    • Key exchange
    • Protocol version
    • PKCS

Module 4: Host-Based Analysis

  • Define these terms as they pertain to Microsoft Windows
    • Processes
    • Threads
    • Memory allocation
    • Windows Registry
    • WMI
    • Handles
    • Services
  • Define these terms as they pertain to Linux
    • Processes
    • Forks
    • Permissions
    • Symlinks
    • Daemon
  • Describe the functionality of these endpoint technologies in regards to security monitoring
    • Host-based intrusion detection
    • Antimalware and antivirus
    • Host-based firewall
    • Application-level whitelisting/blacklisting
    • Systems-based sandboxing (such as Chrome, Java, Adobe reader)
  • Interpret these operating system log data to identify an event
    • Windows security event logs
    • Unix-based syslog
    • Apache access logs
    • IIS access logs

Module 5: Security Monitoring

  • Identify the types of data provided by these technologies
    • TCP Dump
    • NetFlow
    • Next-Gen firewall
    • Traditional stateful firewall
    • Application visibility and control
    • Web content filtering
    • Email content filtering
  • Describe these types of data used in security monitoring
    • Full packet capture
    • Session data
    • Transaction data
    • Statistical data
    • Extracted content
    • Alert data
  • Describe these concepts as they relate to security monitoring
    • Access control list
    • NAT/PAT
    • Tunneling
    • TOR
    • Encryption
    • P2P
    • Encapsulation
    • Load balancing
  • Describe these NextGen IPS event types
    • Connection event
    • Intrusion event
    • Host or endpoint event
    • Network discovery event
    • NetFlow event
  • Describe the function of these protocols in the context of security monitoring
    • DNS
    • NTP
    • SMTP/POP/IMAP
    • HTTP/HTTPS

Module 6: Attack Methods

  • Compare and contrast an attack surface and vulnerability
  • Describe these network attacks
    • Denial of service
    • Distributed denial of service
    • Man-in-the-middle
  • Describe these web application attacks
    • SQL injection
    • Command injections
    • Cross-site scripting
  • Describe these attacks
    • Social engineering
    • Phishing
    • Evasion methods
  • Describe these endpoint-based attacks
    • Buffer overflows
    • Command and control (C2)
    • Malware
    • Rootkit
    • Port scanning
    • Host profiling
  • Describe these evasion methods
    • Encryption and tunneling
    • Resource exhaustion
    • Traffic fragmentation
    • Protocol-level misinterpretation
    • Traffic substitution and insertion
    • Pivot
  • Define privilege escalation
  • Compare and contrast remote exploit and a local exploit

SECOPS Exam 210-255: Implementing Cisco Cybersecurity Operations

Module 1: Endpoint Threat Analysis and Computer Forensics

  • Interpret the output report of a malware analysis tool such as AMP Threat Grid and Cuckoo Sandbox
  • Describe these terms as they are defined in the CVSS 3.0:
    • Attack vector
    • Attack complexity
    • Privileges required
    • User interaction
    • Scope
  • Describe these terms as they are defined in the CVSS 3.0
    • Confidentiality
    • Integrity
    • Availability
  • Define these items as they pertain to the Microsoft Windows file system
    • FAT32
    • NTFS
    • Alternative data streams
    • MACE
    • EFI
    • Free space
    • Timestamps on a file system
  • Define these terms as they pertain to the Linux file system
    • EXT4
    • Journaling
    • MBR
    • Swap file system
    • MAC
  • Compare and contrast three types of evidence
    • Best evidence
    • Corroborative evidence
    • Indirect evidence
  • Compare and contrast two types of image
    • Altered disk image
    • Unaltered disk image
  • Describe the role of attribution in an investigation
    • Assets
    • Threat actor

Module 2: Network Intrusion Analysis

  • Interpret basic regular expressions
  • Describe the fields in these protocol headers as they relate to intrusion analysis:
    • Ethernet frame
    • IPv4
    • IPv6
    • TCP
    • UDP
    • ICMP
    • HTTP
  • Identify the elements from a NetFlow v5 record from a security event
  • Identify these key elements in an intrusion from a given PCAP file
    • Source address
    • Destination address
    • Source port
    • Destination port
    • Protocols
    • Payloads
  • Extract files from a TCP stream when given a PCAP file and Wireshark
  • Interpret common artifact elements from an event to identify an alert
    • IP address (source / destination)
    • Client and Server Port Identity
    • Process (file or registry)
    • System (API calls)
    • Hashes
    • URI / URL
  • Map the provided events to these source technologies
    • NetFlow
    • IDS / IPS
    • Firewall
    • Network application control
    • Proxy logs
    • Antivirus
  • Compare and contrast impact and no impact for these items
    • False Positive
    • False Negative
    • True Positive
    • True Negative
  • Interpret a provided intrusion event and host profile to calculate the impact flag generated by Firepower Management Center (FMC)

Module 3: Incident Response

  • Describe the elements that should be included in an incident response plan as stated in NIST.SP800-61 r2
  • Map elements to these steps of analysis based on the NIST.SP800-61 r2
    • Preparation
    • Detection and analysis
    • Containment, eradication, and recovery
    • Post-incident analysis (lessons learned)
  • Map the organisation stakeholders against the NIST IR categories (C2M2, SP800-61 r2)
    • Preparation
    • Detection and analysis
    • Containment, eradication, and recovery
    • Post-incident analysis (lessons learned)
  • Describe the goals of the given CSIRT
    • Internal CSIRT
    • National CSIRT
    • Coordination centers
    • Analysis centers
    • Vendor teams
    • Incident response providers (MSSP)
  • Identify these elements used for network profiling
    • Total throughput
    • Session duration
    • Ports used
    • Critical asset address space
  • Identify these elements used for server profiling
    • Listening ports
    • Logged in users/service accounts
    • Running processes
    • Running tasks
    • Applications
  • Map data types to these compliance frameworks
    • PCI
    • HIPPA (Health Insurance Portability and Accountability Act)
    • SOX
  • Identify data elements that must be protected with regards to a specific standard (PCI-DSS)

Module 4: Data and Event Analysis

  • Describe the process of data normalisation
  • Interpret common data values into a universal format
  • Describe 5-tuple correlation
  • Describe the 5-tuple approach to isolate a compromised host in a grouped set of logs
  • Describe the retrospective analysis method to find a malicious file, provided file analysis report
  • Identify potentially compromised hosts within the network based on a threat analysis report containing malicious IP address or domains
  • Map DNS logs and HTTP logs together to find a threat actor
  • Map DNS, HTTP, and threat intelligence data together
  • Identify a correlation rule to distinguish the most significant alert from a given set of events from multiple data sources using the firepower   management console
  • Compare and contrast deterministic and probabilistic analysis

Module 5: Incident Handling

  • Classify intrusion events into these categories as defined in the diamond model of intrusion
    • Reconnaissance
    • Weaponisation
    • Delivery
    • Exploitation
    • Installation
    • Command and control
    • Action on objectives
  • Apply the NIST.SP800-61 r2 incident handling process to an event
  • Define these activities as they relate to incident handling
    • Identification
    • Scoping
    • Containment
    • Remediation
    • Lesson-based hardening
    • Reporting
  • Describe these concepts as they are documented in NIST SP800-86
    • Evidence collection order
    • Data integrity
    • Data preservation
    • Volatile data collection
  • Apply the VERIS schema categories to a given incident

Read more ...

Interested? See prices or call 78 79 16 53

Exam 210-250 SECFND: Understanding Cisco Cyber security Fundamentals

This exam will test your understanding of cyber security’s basic principles, foundational knowledge, and core skills needed to grasp the more advanced associate-level materials in the 210-255 SECFND exam.

  • Questions: 55-60 in total
  • Duration: 90 minutes
  • Available Languages: English

Exam 210-255 SECOPS: Implementing Cisco Cyber security Operations

This exam will test your knowledge and skills needed to successfully handle the tasks, duties, and responsibilities of an associate-level Security Analyst working in a SOC.

  • Questions: 55-60 in total
  • Duration: 90 minutes
  • Available Languages: English

Both exams will be taken on the final day of the course. Passes in both exams are required to achieve certification.

Read more ...

Interested? See prices or call 78 79 16 53

As part of your accelerated course, you'll get the following official Cisco courseware:

  • Understanding Cisco Cybersecurity Fundamentals (SECFND) v1.0
  • Implementing Cisco Cybersecurity Operations (SECOPS) v1.0

Firebrand Training offers top-quality technical education and certification training in an all-inclusive course package specifically designed for the needs and ease of our students. We attend to every detail so our students can focus solely on their studies and certification goals.

Our Accelerated Learning Programmes include:

  • Intensive Hands-on Training Utilising our (Lecture | Lab | Review)TM Delivery
  • Comprehensive Study Materials, Program Courseware and Self-Testing Software including MeasureUp *
  • Fully instructor-led program with 24 hour lab access
  • Examination vouchers **
  • On site testing ***
  • Accommodation, all meals, unlimited beverages, snacks and tea / coffee****
  • Transportation to/from designated local railway stations
  • Examination Passing Policy

Our instructors teach to accommodate every student's learning needs through individualised instruction, hands-on labs, lab partner and group exercises, independent study, self-testing, and question/answer drills.

Firebrand Training has dedicated, well-equipped educational facilities where you will attend instruction and labs and have access to comfortable study and lounging rooms. Our students consistently say our facilities are second-to-none.

Firebrand goes digital

We’re currently migrating from printed to digital courseware. Some courseware is already available in digital, while other books remain in printed form. To find out if this course is digital, call us on 78 79 16 53.

There are several benefits of easy-to-use digital courseware: downloads are immediate, and you’ll always have your courseware available wherever you are. You won’t need to wait for a printed book to be delivered before you start learning – and it’s better for the environment. You can choose to download the courseware to your own device, or borrow one of ours.

Considering a Microsoft course? Always have the most up-to-date Microsoft digital courseware with ‘Fresh Editions’. This gives you access to all versions of digital courseware – you’ll receive updates and revisions of your textbook, at no charge, for the life of that course.

Examination Passing Policy

Should a student complete a Firebrand Training Program without having successfully passed all vendor examinations, the student may re-attend that program for a period of one year.  Students will only be responsible for accommodations and vendor exam fees.

Please note

  • * Not on all courses
  • ** Examination vouchers are not included for the following courses: PMI, GIAC and CISSP CBK Review. Exam vouchers may also not be included for Apprentices and will require a separate purchase by an employer due to Education and Skills Funding Agency guidelines.
  • *** On site testing is not included for our PMI, GIAC, CREST, CSX Practitioner or ITIL Managers and Revision Certification Courses
  • **** Accommodation not included on the CISSP CBK Review Seminar

Read more ...

Interested? See prices or call 78 79 16 53

There are no official prerequisites for this course, but it is recommend that you have previously studied ICND 1 or CompTia SEC+ level.

Are you ready to get certified in record time?

We interview all applicants for the course on their technical background, degrees and certifications held, and general suitability. If you get through this screening process, it means you stand a great chance of passing.

Firebrand Training is an immersive training environment. You must be committed to the course. The above prerequisites are guidelines, but many students with less experience have other background or traits that have enabled their success in accelerated training through Firebrand Training.

If you have any doubts as to whether you meet the pre-requisites please call 78 79 16 53 and speak to one of our enrolment consultants, who can help you with a training plan.

Interested? See prices or call 78 79 16 53

When

When do you want to sit your accelerated course?

Start

Finish

Status

Location

Book now

21/5/2018 (Monday)

27/5/2018 (Sunday)

Finished

-

 

24/9/2018 (Monday)

30/9/2018 (Sunday)

Wait list

Nationwide

 

5/11/2018 (Monday)

11/11/2018 (Sunday)

Limited availability

Nationwide

 

17/12/2018 (Monday)

23/12/2018 (Sunday)

Open

Nationwide

 

28/1/2019 (Monday)

3/2/2019 (Sunday)

Open

Nationwide

 

11/3/2019 (Monday)

17/3/2019 (Sunday)

Open

Nationwide

 

Reviews

We've currently trained 68.075 students in 12 years. We asked them all to review our Accelerated Learning. Currently,
96,69% have said Firebrand exceeded their expectations:

"The firebrand "crew" nice and the trainer I had Was very passionate and knowledgeable. "
Tomas Andersen. - Cisco ICND1 (CCENT) (4 days) (27/6/2016 to 29/6/2016)

"I Would choose Firebrand again"
Sean Nielsen . - Cisco CCNA (Routing & Switching) (7 days) (11/1/2016 to 16/1/2016)

"nice accomodation. good enviroment "
s.c.. - Cisco CCNA (Routing & Switching) (7 days) (11/1/2016 to 16/1/2016)

"Great teacher"
Anonymous - Cisco CCNP (Routing & Switching) (8 days) (8/11/2015 to 15/11/2015)

"The facilities are fantastic, the staff and food, including training facilities are of a excellent standard. Most definitely will return."
Michael Dye . - Cisco CCNA & CCNA Security (11 days) (26/10/2015 to 3/11/2015)

"Very good course, the instructor was amazing. He was very interactive, and was not at one point unable to answer a technical question. Very good and qualified teacher! "
David Stampe Groenborg, Vald. Birn A/S. - Cisco CCNA (Routing & Switching) (7 days) (12/10/2015 to 17/10/2015)

"Fantastic, learned a lot in very short time!"
M.S., Atea AS Norway. - Cisco CCNA (Routing & Switching) (7 days) (26/10/2015 to 31/10/2015)

"Bra instructor, flott sted"
Alf Kare Holmebakk . - Cisco CCNA (Routing & Switching) (7 days) (26/10/2015 to 31/10/2015)

"Great instructor, great food, great course!"
Anonymous - Cisco CCNA (Routing & Switching) (7 days) (26/10/2015 to 31/10/2015)

"Great for keeping focused with no interruptions."
Jesper Christensen , none. - Cisco ICND1 (CCENT) (4 days) (12/10/2015 to 14/10/2015)

"Firebrand did everything they can do so I could focus on my studies. It is intensive and fun."
Joakim Åberg . - Cisco CCNA (Routing & Switching) (7 days) (8/6/2015 to 13/6/2015)

"Excellent teacher"
Vincent Yarra . - Cisco CCNA (Routing & Switching) (7 days) (8/6/2015 to 13/6/2015)

"Fast paced learning, not just remebering the correct answers. I will have good use of this."
Ilmo Anttonen , Cygate. - Cisco CCNP (Routing & Switching) (8 days) (19/4/2015 to 26/4/2015)

"Wonderful experience, good food, nice rooms and an outstanding climate. I learned a lot, in a very short period of time."
Henning Clausen , EUC Syd. - Cisco CCNA (Routing & Switching) (7 days) (16/3/2015 to 21/3/2015)

"Excellent course. The best teacher. The 6 days feels like 1!!"
Brian Pedersen , Vestforbranding. - Cisco CCNA (Routing & Switching) (7 days) (16/3/2015 to 21/3/2015)

"The Instructor was energetic, very, very knowledgable and helpful. Firebrand choices of instructors is top notch. The food was very good and the rooms were clean, warm and comfortable."
James Miller , Viste & Sømme AS. - Cisco CCNA (Routing & Switching) (7 days) (16/3/2015 to 21/3/2015)

"Good rooms, good food, equipment works well, brilliant instructor."
M.W.. - Cisco CCNA (Routing & Switching) (7 days) (16/3/2015 to 21/3/2015)

"Great course, living and food."
S.T.. - Cisco CCNA (Routing & Switching) (7 days) (16/3/2015 to 21/3/2015)

"Firebrand is the perfect Place for Learning alot, and you do it very fast."
Marcus Holmberg, Bredband 2. - Cisco CCNA Service Provider (6 days) (16/2/2015 to 21/2/2015)

"well organized course and good facilites"
Anonymous - Cisco CCNP (Routing & Switching) (8 days) (9/11/2014 to 16/11/2014)

"Good training and no wasted time. Efficient. Got my CCNP"
Erik Lauridsen , TekCon / Freelance Network Consultant. - Cisco CCNP (Routing & Switching) (8 days) (9/11/2014 to 16/11/2014)

"Firebrand courses are very good, and also very intense, and they require your full dedication. Dont plan on doing any work-related things during the course, expect to study 15 hours a day, and youll get your certification."
Anonymous - Cisco CCNA & CCNA Security (11 days) (27/10/2014 to 4/11/2014)

"Very intense corse. Very good instruktor. "
Anonymous, DeLaval - Cisco CCNA (Routing & Switching) (7 days) (27/10/2014 to 1/11/2014)

"Good facilities and excellent trainer."
Jari Hynninen , Dedicated Network Partners Oy. - Cisco ICND1 (CCENT) (4 days) (27/10/2014 to 29/10/2014)

"Firebrand: Dedicate yourself and be stronger"
Yahya Alazri , IT Authority Oman. - Cisco CCNA & CCNA Security (11 days) (1/9/2014 to 9/9/2014)

"The best way to get certifications, hard but so much better than normal courses."
Per Jørgensen, Comendo A/S. - Cisco CCNA (Routing & Switching) (7 days) (1/9/2014 to 6/9/2014)

"Very good way of learning having so many hours per day with skilled people to answer our questions. "
Thomas Vassøy . - Cisco CCNA (Routing & Switching) (7 days) (1/9/2014 to 6/9/2014)

"The instructor is fantastic to explain and we got some very good simulations / practical tasks. "
Simon Scheffmann . - Cisco CCNA (Routing & Switching) (7 days) (1/9/2014 to 6/9/2014)

"Great course with an engaging instructor that really helped in breaking down and emphizizing the important and relevant parts of the course material."
Anonymous - Cisco CCNA (Routing & Switching) (7 days) (1/9/2014 to 6/9/2014)

"The way of training and the instructor is extremely good!"
Rene Roland . - Cisco CCNA (Routing & Switching) (7 days) (1/9/2014 to 6/9/2014)

"Extremly good learning, good instructor and on accelerated courses people are highly motivated. "
Frodi Danielsen , TF Holding. - Cisco CCNA (Routing & Switching) (7 days) (1/9/2014 to 6/9/2014)

"Firebrand, as named produce persons to be a brand of fire with strong knowledge & unlimited confidence. "
Yahya Alazri , Information Tech Authority. - Cisco CCNA (Routing & Switching) (7 days) (1/9/2014 to 6/9/2014)

"Good course and good instructor Food was good and location"
Anonymous - Cisco CCNP (Routing & Switching) (8 days) (27/4/2014 to 4/5/2014)

"It was really fantastic experience"
Ranjan Tangarajah . - Cisco CCNP (Routing & Switching) (8 days) (27/4/2014 to 4/5/2014)

"Great place with kind people and inspiring instructor(s)!"
Anonymous - Cisco CCNP (Routing & Switching) (8 days) (2/3/2014 to 9/3/2014)

"I was very happy to attend the CCNP as it gave me the knowledge in a very meaningfull form. Loved the location and in combination with a trainer who knows how to keep you focused at later stages of the day it is a great setup. Love to come back for next round !"
michal werner , Bond Technical Management. - Cisco CCNP (Routing & Switching) (8 days) (2/3/2014 to 9/3/2014)

"Firebrand at Sundsgaarden give excellent working conditions for accelerated training - thank you."
Soren Fleron , Solutors A/s. - Cisco CCNP (Routing & Switching) (8 days) (2/3/2014 to 9/3/2014)

"Very good teachers and very good course material that the student can focus 100 % on! "
A.M., Barret AB. - Cisco CCNA (Routing & Switching) (7 days) (31/3/2014 to 5/4/2014)

"Thank you very much. Teacher, accommodation and specially planning is great "
Alireza Emam Doost , LSP. - Cisco CCNA (Routing & Switching) (7 days) (7/4/2014 to 12/4/2014)

"Excsllent trainer, location. Loved it!"
Anonymous - Cisco ICND1 (CCENT) (4 days) (16/9/2013 to 18/9/2013)

"Prepare for the most instense week of your life, but also quickest!!! AND WORTH IT."
Ove Braathen , Digiplex. - Cisco CCNA (Routing & Switching) (7 days) (16/9/2013 to 21/9/2013)

"Courses are tough, just paced. But the quality of instructors makes up for it with their knowledge in their given area. "
Thomas Eriksen, FDE A/S. - Cisco CCNA (Routing & Switching) (7 days) (16/9/2013 to 21/9/2013)

"An extremely intense day, oh itwas a week but due to the intensity it just flew away. Especially the instructor, that taught us all we need - without us students needed to open our books, best teacher ever!"
Martin Bech , DanCenter Danland. - Cisco CCNA (Routing & Switching) (7 days) (16/9/2013 to 21/9/2013)

"Good instructor, interesting lectures. Good facilities."
Anonymous - Cisco CCNA (Routing & Switching) (7 days) (16/9/2013 to 21/9/2013)

"Professional course staff. Inspiring instructor. Learned a lot. "
Vegard Bingen , Euro Engineering AS. - Cisco CCNA (Routing & Switching) (7 days) (16/9/2013 to 21/9/2013)

"Nice and effective"
Jan Olsson , UPSYS AB. - Cisco CCNA (Routing & Switching) (7 days) (16/9/2013 to 21/9/2013)

"Excellent Trainer!!!! Good food a nice room"
Kenneth Lawrence , Firmsite. - Cisco CCNA (Routing & Switching) (7 days) (16/9/2013 to 21/9/2013)

"CCNP is a tough exam, the Firebrand instructor was very skilled and made it easy for us."
Morten Bank. - Cisco CCNP (Routing & Switching) (8 days) (11/8/2013 to 18/8/2013)

"It was a good course and i learned a lots of things very quickely. "
Terje Svensson , Volvo. - Cisco CCNA (Routing & Switching) (7 days) (1/7/2013 to 6/7/2013)

"Hard hard work, but brilliant instructors, Hands on practise and in the end your hard work pays of!!!"
Thomas Bornemann , BureauVeritas. - Cisco CCNA (Routing & Switching) (7 days) (1/7/2013 to 6/7/2013)

See prices