CCNA Cyber Ops 210-250 (SECFND) – Matt Carey
$8.00
This course will help you prepare for the CCNA 210-250 (SECFND) exam. You will gain an understanding of cyber-security’s basic principles, foundation knowledge, and core skills needed to grasp the more advanced associate-level materials in the second required exam, “Implementing Cisco Cybersecurity Operations (SECOPS)”.
- Description
- Reviews (0)
Description
CCNA Cyber Ops 210-250 (SECFND) – Matt Carey
Lifetime support – Download unlimited when you buy CCNA Cyber Ops 210-250 (SECFND) – Matt Carey Course at Course Farm. The market leader in online learning – Offers a variety of diverse topics: Internet Marketing, Forex & Trading, NLP & Hypnosis, SEO – Traffic, …
Learn how to pass the Cisco CCNA CyberOps SECFND certification exam
This course will help you prepare for the CCNA 210-250 (SECFND) exam. You will gain an understanding of cyber-security’s basic principles, foundation knowledge, and core skills needed to grasp the more advanced associate-level materials in the second required exam, “Implementing Cisco Cybersecurity Operations (SECOPS)”.
Master the CCNA CyberOps 210-250 (SECFND) exam topics
- Network Concepts
- Security Concepts
- Cryptography
- Host-Based Analysis
- Security Monitoring
- Attack Methods
As an added bonus you will also learn how to use the hacking tools software Kali Linux!
- Golismero
- Nmap
- Metasploit
- Armitage
What does CCNA Cyber Ops 210-250 (SECFND) – Matt Carey include?
Cisco CCNA Cyber Ops 210-250 (SECFND)
- Introduction (1:16)
- Kali Install (8:36)
Network Concepts
- Network Fundamentals (9:42)
- Network Protocols – ICMP (2:55)
- Network Protocols – DHCP (4:01)
- Network Protocols – DNS (2:56)
- Network Devices (4:48)
- Firewalls (2:49)
- IPS & AMP (8:38)
- Email & Web Security (1:18)
- Inline Traffic Interrogation, Taps & NetFlow (1:46)
Security Concepts
- Defense in Depth Strategy (0:57)
- Vulnerabilities (5:54)
- Exploits (7:19)
- Risks (1:17)
- Security Terms (4:06)
- Access Control Models (1:36)
- Security Management (2:24)
Cryptography
- Encryption and Hashing (2:39)
- PKI (11:43)
Host-Based Analysis
- Microsoft Windows – Introduction (5:31)
- Microsoft Windows – Terms (8:40)
- Linux – Introduction (2:37)
- Linux – Terms (9:46)
- Endpoint Protection (2:07)
- Systems-Based Sandboxing (3:26)
- System Logs (3:55)
Security Monitoring
- Network Logging (5:14)
- Packet Captures (6:23)
- NetFlow (2:54)
- Monitoring Challenges (4:02)
- NextGen IPS Event Types (1:29)
Attack Methods
- Attack Surface Analysis (1:16)
- Network Attacks (6:36)
- Web Application Attacks (2:16)
- Social Engineering and Phishing Attacks (5:07)
- Endpoint-Based Attacks (5:41)
- Evasion Methods (6:55)
Reviews
There are no reviews yet.