Autoplay
Autocomplete
HTML5
Flash
Player
Speed
Previous Lecture
Complete and continue
CCNA Cyber Ops SECFND 210-250
Introduction
CCNA CyberOps SECFND: Introduction (2:03)
Lesson 1: Networking Fundamentals
Learning objectives (0:36)
1.1 Reviewing the OSI Model (4:53)
1.2 Reviewing the TCP/IP Network Models (1:28)
1.3 Surveying Common Networking Protocols: DHCP (2:58)
1.4 Surveying Common Networking Protocols: Routing Protocols (13:06)
1.5 Surveying Common Networking Protocols: ICMP (3:13)
1.6 Surveying Common Networking Protocols: DNS (9:07)
1.7 Identifying Networking Device Types (3:54)
1.8 Understanding IP Subnets (3:28)
1.9 Examining VLANs and Data Visibility (6:53)
Lesson 2: Network Security Devices and Cloud Services
Learning objectives (0:37)
2.1 Comparing Traditional and Next-Generation Firewalls (14:20)
2.2 Comparing Traditional and Next-Generation Intrusion Prevention Systems (IPS) (12:31)
2.3 Understanding Cisco Web Security (6:32)
2.4 Understanding Cisco Email Security (11:22)
2.5 Examining Advanced Malware Protection (11:40)
2.6 Examining Identity Management Systems (8:23)
2.7 Surveying Other Network Security Devices (2:54)
Lesson 3: Security Principles
Learning objectives (0:52)
3.1 Understanding Defense-in-Depth (4:08)
3.2 Identifying Threats, Vulnerabilities, and Exploits and Their Associated Risk (7:50)
3.3 Identifying Threat Actors (3:08)
3.4 Understanding Reverse Engineering (4:14)
3.5 Understanding Chain of Custody (6:55)
3.6 Examining Run Books (2:13)
3.7 Introducing PII and PHI (3:29)
3.8 Understanding Principle of Least Privilege (4:08)
3.9 Performing Risk Assessment (7:42)
Lesson 4: Access Control Models
Learning objectives (0:31)
4.1 Understanding Confidentiality, Integrity, and Availability (2:59)
4.2 Understanding Authentication, Authorization, and Accounting (3:09)
4.3 Examining the Access Control Process: Terminology and Data Classification (3:23)
4.4 Examining the Access Control Process: Data States and Policy Roles (6:02)
4.5 Examining the Access Control Process: Security and Access Control Classification (8:16)
4.6 Understanding Discretionary Access Control (4:21)
4.7 Understanding Mandatory Access Control (4:19)
4.8 Understanding Role Based Access Control (2:55)
4.9 Understanding Attribute Based Access Control (2:44)
Lesson 5: Introduction to Security Management
Learning objectives (0:36)
5.1 Surveying Asset Management (12:40)
5.2 Surveying Configuration Management (12:05)
5.3 Surveying Mobile Device Management (15:18)
5.4 Surveying Patch Management (10:29)
5.5 Surveying Vulnerability Management (16:54)
5.6 Understanding Network and Host Antivirus (9:26)
5.7 Understanding SEIM and Log Collection (12:07)
Lesson 6: Fundamentals of Cryptography and PKI
Learning objectives (0:32)
6.1 Understanding the Basic Components of Cryptography (5:50)
6.2 Introducing Public Key Infrastructure (3:39)
6.3 Deciphering Encryption Algorithms (3:33)
6.4 Understanding Hashing Algorithms (5:58)
6.5 Examining Secure Socket Layer and Transport Layer Security (4:18)
6.6 Examining Digital Certificates (7:17)
Lesson 7: Introduction to Virtual Private Networks (VPNs)
Learning objectives (0:35)
7.1 Introducing VPNs and Why We Use Them (2:26)
7.2 Examining Remote Access VPNs (2:40)
7.3 Examining Site-to-Site VPNs (2:16)
7.4 Understanding IPsec Concepts, Components, and Operations (10:16)
7.5 Surveying Cisco VPN Solutions: Traditional IPsec, DMVPN, FlexVPN (12:37)
7.6 Surveying Cisco VPN Solutions: Clientless SSL and AnyConnect (7:10)
Lesson 8: Windows, Linux, and MAC OS X Based Analysis
Learning objectives (0:27)
8.1 Understanding Windows Forensics Basics (14:32)
8.2 Understanding Linux and MAC OS X Forensics Basics (13:00)
8.3 Examining Web Server Logs (6:06)
Lesson 9: Endpoint Security Technologies
Learning objectives (0:29)
9.1 Examining Host-Based Intrusion Detection (3:34)
9.2 Exploring Antimalware and Antivirus (5:42)
9.3 Understanding Host-based Firewalls (4:03)
9.4 Exploring Application-level Whitelisting/Blacklisting (7:20)
9.5 Exploring Systems-based Sandboxing (3:21)
Lesson 10: Network and Host Telemetry
Learning objectives (0:34)
10.1 Introducing NetFlow (9:10)
10.2 Surveying Commercial and Open Source NetFlow Tools (6:52)
10.3 Understanding Flexible NetFlow (2:42)
10.4 Examining Firewall Logs (13:13)
10.5 Understanding Application Visibility and Control (2:03)
10.6 Examining Web and Email Content Filtering Logs (1:55)
10.7 Exploring Full Packet Capture (4:20)
10.8 Surveying IPS Events (4:38)
10.9 Surveying Host or Endpoint Events (4:42)
Lesson 11: Security Monitoring Operations and Challenges
Learning objectives (0:25)
11.1 Understanding Security Monitoring Fundamentals (2:41)
11.2 Surveying Security Monitoring Tools (2:47)
11.3 Grasping Security Monitoring Operational Challenges (13:28)
Lesson 12: Types of Attacks and Vulnerabilities
Learning objectives (1:02)
12.1 Surveying Types of Vulnerabilities (12:39)
12.2 Understanding Passive Reconnaissance and Social Engineering (12:26)
12.3 Understanding Active Reconnaissance Port Scanning and Host Profiling (11:43)
12.4 Understanding Privilege Escalation and Code Execution Attacks (2:04)
12.5 Understanding Backdoors and Man-in-the Middle Attacks (5:44)
12.6 Understanding Denial of Service Attacks (5:34)
12.7 Surveying Attack Methods for Data Exfiltration (2:32)
12.8 Understanding ARP Cache Poisoning and Route Manipulation Attacks (7:07)
12.9 Understanding Password Attacks (4:13)
12.10 Understanding Wireless Attacks (4:19)
12.11 Exploring Security Evasion Techniques (7:44)
Summary
CCNA CyberOps SECFND: Summary (1:08)
12.8 Understanding ARP Cache Poisoning and Route Manipulation Attacks
Lecture content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock