CCNA Cyber Ops SECFND (210-250)

(SECFND-210-250-complete) / ISBN : 978-1-61691-989-4
This course includes
Interactive Lessons
Gamified TestPrep
Hands-On Labs
Video Lessons (Add-on)
319 Reviews
Get A Free Trial

About This Course

Skills You’ll Get

1

Introduction

  • About the 210-250 CCNA Cyber Ops SECFND Exam
2

Fundamentals of Networking Protocols and Networking Devices

  • TCP/IP and OSI Model
  • Layer 2 Fundamentals and Technologies
  • Internet Protocol and Layer 3 Technologies
  • Internet Control Message Protocol (ICMP)
  • Domain Name System (DNS)
  • IPv6 Fundamentals
  • Transport Layer Technologies and Protocols
  • Review All Key Topics
  • References and Further Reading
3

Network Security Devices and Cloud Services

  • Network Security Systems
  • Security Cloud-based Solutions
  • Cisco NetFlow
  • Data Loss Prevention
  • Review All Key Topics
4

Security Principles

  • The Principles of the Defense-in-Depth Strategy
  • What Are Threats, Vulnerabilities, and Exploits?
  • Confidentiality, Integrity, and Availability: The CIA Triad
  • Risk and Risk Analysis
  • Personally Identifiable Information and Protected Health Information
  • Principle of Least Privilege and Separation of Duties
  • Security Operation Centers
  • Forensics
  • Review All Key Topics
5

Introduction to Access Controls

  • Information Security Principles
  • Subject and Object Definition
  • Access Control Fundamentals
  • Access Control Process
  • Information Security Roles and Responsibilities
  • Access Control Types
  • Access Control Models
  • Access Control Mechanisms
  • Identity and Access Control Implementation
  • Review All Key Topics
  • References and Additional Reading
6

Introduction to Security Operations Management

  • Introduction to Identity and Access Management
  • Security Events and Logs Management
  • Assets Management
  • Introduction to Enterprise Mobility Management
  • Configuration and Change Management
  • Vulnerability Management
  • Patch Management
  • References and Additional Readings
  • Review All Key Topics
7

Fundamentals of Cryptography and Public Key Infrastructure (PKI)

  • Cryptography
  • Fundamentals of PKI
  • Review All Key Topics
8

Introduction to Virtual Private Networks (VPNs)

  • What Are VPNs?
  • Site-to-site vs. Remote-Access VPNs
  • An Overview of IPsec
  • SSL VPNs
  • Review All Key Topics
9

Windows-Based Analysis

  • Process and Threads
  • Memory Allocation
  • Windows Registration
  • Windows Management Instrumentation
  • Handles
  • Services
  • Windows Event Logs
  • Review All Key Topics
  • References and Further Reading
10

Linux- and Mac OS X—Based Analysis

  • Processes
  • Forks
  • Permissions
  • Symlinks
  • Daemons
  • UNIX-Based Syslog
  • Apache Access Logs
  • Review All Key Topics
  • References and Further Reading
11

Endpoint Security Technologies

  • Antimalware and Antivirus Software
  • Host-Based Firewalls and Host-Based Intrusion Prevention
  • Application-Level Whitelisting and Blacklisting
  • System-Based Sandboxing
  • Review All Key Topics
12

Network and Host Telemetry

  • Network Telemetry
  • Host Telemetry
  • Review All Key Topics
13

Security Monitoring Operational Challenges

  • Security Monitoring and Encryption
  • Security Monitoring and Network Address Translation
  • Security Monitoring and Event Correlation Time Synchronization
  • DNS Tunneling and Other Exfiltration Methods
  • Security Monitoring and Tor
  • Security Monitoring and Peer-to-Peer Communication
  • Review All Key Topics
14

Types of Attacks and Vulnerabilities

  • Types of Attacks
  • Types of Vulnerabilities
  • Review All Key Topics
15

Security Evasion Techniques

  • Encryption and Tunneling
  • Resource Exhaustion
  • Traffic Fragmentation
  • Protocol-Level Misinterpretation
  • Traffic Timing, Substitution, and Insertion
  • Pivoting
  • Review All Key Topics
  • References and Further Reading

1

Fundamentals of Networking Protocols and Networking Devices

  • Configuring a Static TCP/IP Address
  • Using the Process Explorer to View Specific Details About Running Processes on the System
  • Preventing Zone Transfers
2

Network Security Devices and Cloud Services

  • Enabling Intrusion Prevention and Detection
  • Configuring a Perimeter Firewall
3

Security Principles

  • Running a Security Scan to Identify Vulnerabilities
  • Remediating Vulnerabilities on the Local Workstation
  • Remediating Vulnerabilities on the Network 
4

Introduction to Security Operations Management

  • Consulting a Vulnerability Database
  • Scanning the Rootkit
  • Performing Reconnaissance on a Network
  • Identifying Search Options in Metasploit
  • Performing the Initial Scan
  • Conducting Vulnerability Scans
5

Fundamentals of Cryptography and Public Key Infrastructure (PKI)

  • Observing MD5 Hash
  • Using OpenSSL to Create a Public/Private Key Pair
  • Adding a Certificate to MMC
6

Introduction to Virtual Private Networks (VPNs)

  • Configuring Remote Access VPN
  • Installing Remote Access Services
  • Installing the Web Server IIS Server Role
  • Configuring the SSL Port Setting
7

Windows-Based Analysis

  • Assigning Permissions to Folders
  • Verifying Network Services
  • Working with Task Manager
  • Using Network Monitoring
  • Exporting your Windows logs
8

Linux- and Mac OS X—Based Analysis

  • Viewing Running Processes on a Linux-based Machine
  • Retrieving a Real-Time List of Running Processes
  • Initiating an SSH Session from your Windows 10 Client to your Windows Server
  • Enabling Debug Logging on the DNS Server
  • Making Syslog Entries Readable
  • Installing Splunk on the Server
9

Network and Host Telemetry

  • Working with Wireshark's Interface
  • Analyzing the Capture File to Find the Attack(s)
  • Generating Network Traffic and Using Filters
  • Examining the traffic between client and server
  • Assessing the impact of malware
  • Downloading and Installing Wireshark and WinPcap
  • Analyzing Protocols with Wireshark
  • Starting a Live Packet Capture
  • Confirming the Spoofing Attack in Wireshark
  • Observing Traffic Patterns Using Wireshark
  • Collecting network-based security intelligence
10

Types of Attacks and Vulnerabilities

  • Spoofing MAC Address with SMAC
  • Performing for ARP Spoofing
  • Responding to social engineering
  • Simulating a DoS Attack

Any questions?
Check out the FAQs

Still have unanswered questions and need to get in touch?

Contact Us Now

CCNA Cyber Ops SECFND (210-250)

$ 429.53

Buy Now

Related Courses

All Course
scroll to top