CCNA Cyber Ops SECFND 210-250

More than nine hours of video instruction on configuration and troubleshooting tasks to prepare you for the Cisco CCNA Cyber Ops SECFND 210-250 certification exam.

CCNA Cyber Ops SECFND 210-250

Course Description

CCNA Cyber Ops SECFND 210-250 LiveLessons from Pearson is a unique video product that provides a solid understanding of the key areas of knowledge required to pass the 210-250 SECFND exam. This product walks through each topic of the exam blueprint, so you can gain the knowledge you need to pass the exam and start your career as an associate-level Security Operations Center (SOC) Security Analyst. CCNA Cyber Ops SECFND 210-250 contains more than nine hours of instruction with 12 lessons. The videos consist of live video training, video screencasts, and demos. Video instruction throughout offers detailed explanations, tips, and design recommendations. Major topics that are covered in this course: Networking Concepts Security Concepts Cryptography Host-Based Analysis Security Monitoring Attack Methods What you will l... Read More »

CCNA Cyber Ops SECFND 210-250 LiveLessons from Pearson is a unique video product that provides a solid understanding of the key areas of knowledge required to pass the 210-250 SECFND exam. This product walks through each topic of the exam blueprint, so you can gain the knowledge you need to pass the exam and start your career as an associate-level Security Operations Center (SOC) Security Analyst.

CCNA Cyber Ops SECFND 210-250 contains more than nine hours of instruction with 12 lessons. The videos consist of live video training, video screencasts, and demos. Video instruction throughout offers detailed explanations, tips, and design recommendations.

Major topics that are covered in this course:

  • Networking Concepts
  • Security Concepts
  • Cryptography
  • Host-Based Analysis
  • Security Monitoring
  • Attack Methods
  • What you will learn:

    • Presentation on key Cyber Security solutions
    • Covers all of the objectives in the CCNA Cyber Ops exam
    • Easy to follow demonstrations of cybersecurity tools, products, and solutions
    • Scenarios offered to help learners understand real-world applications
    Read Less
    Course Details:

    Target Audience

    • Anyone who wants to obtain their CCNA Cyber Ops certification. This includes security professionals interested in learning how to develop, manage, or improve a security operations center, a CSIRT, PSIRT, or to become a cyber security incident response expert. Anyone wishing to take the CCNA CyberOps exam would also benefit from viewing this course.

    Prerequisites

    • High-school level math courses (including binary math.)
    • You should also know how to use an internet connection, primarily web browsers and email clients.
    Certificate Info:

    Type of Certification

    Certificate of Completion

    Format of Certification

    Digital and Print

    Professional Association/Affiliation

    This certificate is issued by Pearson LearnIT

    Method of Obtaining Certification

    Upon successful completion of the course, participants will receive a certificate of completion.

    Course Outline

    • CCNA CyberOps SECFND: Introduction
    • Learning objectives
    • 1.1 Reviewing the OSI Model
    • 1.2 Reviewing the TCP/IP Network Models
    • 1.3 Surveying Common Networking Protocols: DHCP
    • 1.4 Surveying Common Networking Protocols: Routing Protocols
    • 1.5 Surveying Common Networking Protocols: ICMP
    • 1.6 Surveying Common Networking Protocols: DNS
    • 1.7 Identifying Networking Device Types
    • 1.8 Understanding IP Subnets
    • 1.9 Examining VLANs and Data Visibility
    • Learning objectives
    • 2.1 Comparing Traditional and Next-Generation Firewalls
    • 2.2 Comparing Traditional and Next-Generation Intrusion Prevention Systems (IPS)
    • 2.3 Understanding Cisco Web Security
    • 2.4 Understanding Cisco Email Security
    • 2.5 Examining Advanced Malware Protection
    • 2.6 Examining Identity Management Systems
    • 2.7 Surveying Other Network Security Devices
    • Learning objectives
    • 3.1 Understanding Defense-in-Depth
    • 3.2 Identifying Threats, Vulnerabilities, and Exploits and Their Associated Risk
    • 3.3 Identifying Threat Actors
    • 3.4 Understanding Reverse Engineering
    • 3.5 Understanding Chain of Custody
    • 3.6 Examining Run Books
    • 3.7 Introducing PII and PHI
    • 3.8 Understanding Principle of Least Privilege
    • 3.9 Performing Risk Assessment
    • Learning objectives
    • 4.1 Understanding Confidentiality, Integrity, and Availability
    • 4.2 Understanding Authentication, Authorization, and Accounting
    • 4.3 Examining the Access Control Process: Terminology and Data Classification
    • 4.4 Examining the Access Control Process: Data States and Policy Roles
    • 4.5 Examining the Access Control Process: Security and Access Control Classification
    • 4.6 Understanding Discretionary Access Control
    • 4.7 Understanding Mandatory Access Control
    • 4.8 Understanding Role Based Access Control
    • 4.9 Understanding Attribute Based Access Control
    • Learning objectives
    • 5.1 Surveying Asset Management
    • 5.2 Surveying Configuration Management
    • 5.3 Surveying Mobile Device Management
    • 5.4 Surveying Patch Management
    • 5.5 Surveying Vulnerability Management
    • 5.6 Understanding Network and Host Antivirus
    • 5.7 Understanding SEIM and Log Collection
    • Learning objectives
    • 6.1 Understanding the Basic Components of Cryptography
    • 6.2 Introducing Public Key Infrastructure
    • 6.3 Deciphering Encryption Algorithms
    • 6.4 Understanding Hashing Algorithms
    • 6.5 Examining Secure Socket Layer and Transport Layer Security
    • 6.6 Examining Digital Certificates
    • Learning objectives
    • 7.1 Introducing VPNs and Why We Use Them
    • 7.2 Examining Remote Access VPNs
    • 7.3 Examining Site-to-Site VPNs
    • 7.4 Understanding IPsec Concepts, Components, and Operations
    • 7.5 Surveying Cisco VPN Solutions: Traditional IPsec, DMVPN, FlexVPN
    • 7.6 Surveying Cisco VPN Solutions: Clientless SSL and AnyConnect
    • Learning objectives
    • 8.1 Understanding Windows Forensics Basics
    • 8.2 Understanding Linux and MAC OS X Forensics Basics
    • 8.3 Examining Web Server Logo
    • 9.1 Examining Host-Based Intrusion Detection
    • 9.2 Exploring Antimalware and Antivirus
    • 9.3 Understanding Host-based Firewalls
    • 9.4 Exploring Application-level Whitelisting/Blacklisting
    • 9.5 Exploring Systems-based Sandboxing
    • Learning objectives
    • 10.1 Introducing NetFlow
    • 10.2 Surveying Commercial and Open Source NetFlow Tools
    • 10.3 Understanding Flexible NetFlow
    • 10.4 Examining Firewall Logs
    • 10.5 Understanding Application Visibility and Control
    • 10.6 Examining Web and Email Content Filtering Logs
    • 10.7 Exploring Full Packet Capture
    • 10.8 Surveying IPS Events
    • 10.9 Surveying Host or Endpoint Events
    • Learning objectives
    • 11.1 Understanding Security Monitoring Fundamentals
    • 11.2 Surveying Security Monitoring Tools
    • 11.3 Grasping Security Monitoring Operational Challenges
    • Learning objectives
    • 12.1 Surveying Types of Vulnerabilities
    • 12.2 Understanding Passive Reconnaissance and Social Engineering
    • 12.3 Understanding Active Reconnaissance Port Scanning and Host Profiling
    • 12.4 Understanding Privilege Escalation and Code Execution Attacks
    • 12.5 Understanding Backdoors and Man-in-the Middle Attacks
    • 12.6 Understanding Denial of Service Attacks
    • 12.7 Surveying Attack Methods for Data Exfiltration
    • 12.8 Understanding ARP Cache Poisoning and Route Manipulation Attacks
    • 12.9 Understanding Password Attacks
    • 12.10 Understanding Wireless Attacks
    • 12.11 Exploring Security Evasion Techniques
    • CCNA CyberOps SECFND: Summary

    Technical Requirements

    • In order to take this course, you should have a PC, Mac or Linux with an internet connection.

    DON'T HAVE TIME?

    We can send you everything you need to know about this course through email.
    We respect your privacy. Your information is safe and will never be shared.