Understanding Cisco Cybersecurity Fundamentals

Networking
CCNA Cyber Ops
Cisco
5 days
it
Cisco Certified CyberOps Associate
Course description

The Understanding Cisco Cybersecurity Fundamentals (SECFND) course gives you foundation-level knowledge of common security concepts, basic security techniques, and the fundamentals of applications, operating systems, and networking used in a Security Operations Center (SOC). This course helps you learn to find threats within a real-life network infrastructure using a variety of popular security tools. Through expert instruction and hands-on experience using enterprise-grade security tools, you will learn the basics of network and security concepts, endpoint attacks, cryptography, analysis, and monitoring. This course provides introductory knowledge for those interested in entering the field of cybersecurity and is the first of two courses that prepare you for the Cisco CCNA® Cyber Ops certification. This course helps you prepare to take the 210-250 SECFND exam, first of the two required exams to achieve the CCNA Cyber Ops certification. The 210-250 SECFND exam will be available on February 24, 2020.

Course schedule

TCP/IP and Cryptography Concepts
• Understanding the TCP/IP Protocol Suite
• Understanding the Network Infrastructure
• Understanding Common TCP/IP Attacks
• Understanding Basic Cryptography Concepts
Network Applications and Endpoint Security
• Describing Information Security Concepts
• Understanding Network Applications
• Understanding Common Network Application Attacks
• Understanding Windows Operating System Basics
• Understanding Linux Operating System Basics
• Understanding Common Endpoint Attacks
• Understanding Network Security Technologies
• Understanding Endpoint Security Technologies
Security Monitoring and Analysis
• Describing Security Data Collection
• Describing Security Event Analysis
Lab outline
• Explore the TCP/IP Protocol Suite
• Explore the Network Infrastructure
• Explore TCP/IP Attacks
• Explore Cryptographic Technologies
• Explore Network Applications
• Explore Network Application Attacks
• Explore the Windows Operating System
• Explore the Linux Operating System
• Explore Endpoint Attacks
• Explore Network Security Technologies
• Explore Endpoint Security
• Explore Security Data for Analysis


Ad hoc

Looking for
ad-hoc course?
Get it now

Contacts

Do you
need help?
Contact us