O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CCNA Cyber Ops SECFND 210-250

Video Description

9+ Hours of Video Instruction

Overview

More than nine hours of video instruction on configuration and troubleshooting tasks to prepare you for the Cisco CCNA Cyber Ops SECFND 210-250 certification exam.

Description

CCNA Cyber Ops SECFND 210-250 LiveLessons is a unique video product that provides a solid understanding of the key areas of knowledge required to pass the 210-250 SECFND exam. This product walks through each topic of the exam blueprint, so you can gain the knowledge you need to pass the exam and start your career as an associate-level Security Operations Center (SOC) Security Analyst.

CCNA Cyber Ops SECFND 210-250 contains more than nine hours of instruction with 12 lessons. The videos consist of live video training, video screencasts, and demos. Video instruction throughout offers detailed explanations, tips, and design recommendations.

Major topics include:

  • Networking Concepts
  • Security Concepts
  • Cryptography
  • Host-Based Analysis
  • Security Monitoring
  • Attack Methods

About the Instructor

Omar Santos, CISSP No. 463598, is a Principal Engineer in the Cisco Product Security Incident Response Team (PSIRT) within Cisco's Security Research and Operations. He mentors and leads engineers and incident managers during the investigation and resolution of security vulnerabilities in all Cisco products, including cloud services. Omar has been working with information technology and cybersecurity since the mid-1990s. Omar has designed, implemented, and supported numerous secure networks for Fortune 100 and 500 companies and the U.S. government. Prior to his current role, he was a Technical Leader within the World Wide Security Practice and the Cisco Technical Assistance Center (TAC), where he taught, led, and mentored many engineers within both organizations.

Omar is an active member of the security community, where he leads several industry-wide initiatives and standard bodies. His active role helps businesses, academic institutions, state and local law enforcement agencies, and other participants that are dedicated to increasing the security of the critical infrastructure.

Omar is the author of several books and numerous whitepapers, articles, and security configuration guidelines and best practices. He has also delivered numerous technical presentations at many conferences and to Cisco customers and partners, in addition to many C-level executive presentations to many organizations.

You can follow Omar on Twitter: @santosomar

Skill Level

  • Beginning to intermediate

What You Will Learn

  • Presentation on key Cyber Security solutions
  • Covers all of the objectives in the CCNA Cyber Ops exam
  • Easy to follow demonstrations of cybersecurity tools, products, and solutions
  • Scenarios offered to help learners understand real-world applications

Who Should Take This Course

Anyone who wants to obtain their CCNA Cyber Ops certification. This includes security professionals interested in learning how to develop, manage, or improve a security operations center, a CSIRT, PSIRT, or to become a cyber security incident response expert. Anyone wishing to take the CCNA CyberOps exam would also benefit from viewing this course.

Course Requirements

The video course assumes that the learner has the skills to navigate the user interface of a PC running on Microsoft Window, Mac, or Linux and who has completed typical high school-level math courses (mainly that the reader has been exposed to binary math). The course also assumes that the reader has used PCs connected to either a home network or a network inside a school or company, but that the reader might not understand anything about the network to which the PC was connected. It is also assumes that the reader knows how to use typical Internet applications, primarily web browsers and email clients.

About LiveLessons Video Training

LiveLessons Video Training series publishes hundreds of hands-on, expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. This professional and personal technology video series features world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, IBM Press, Pearson IT Certification, Prentice Hall, Sams, and Que. Topics include: IT Certification, Programming, Web Development, Mobile Development, Home and Office Technologies, Business and Management, and more. View all LiveLessons on InformIT at: http://www.ciscopress.com/livelessons

Table of Contents

  1. Introduction
    1. CCNA CyberOps SECFND: Introduction 00:02:03
  2. Lesson 1: Networking Fundamentals
    1. Learning objectives 00:00:36
    2. 1.1 Reviewing the OSI Model 00:04:53
    3. 1.2 Reviewing the TCP/IP Network Models 00:01:28
    4. 1.3 Surveying Common Networking Protocols: DHCP 00:02:58
    5. 1.4 Surveying Common Networking Protocols: Routing Protocols 00:13:07
    6. 1.5 Surveying Common Networking Protocols: ICMP 00:03:13
    7. 1.6 Surveying Common Networking Protocols: DNS 00:09:07
    8. 1.7 Identifying Networking Device Types 00:03:54
    9. 1.8 Understanding IP Subnets 00:03:28
    10. 1.9 Examining VLANs and Data Visibility 00:06:54
  3. Lesson 2: Network Security Devices and Cloud Services
    1. Learning objectives 00:00:37
    2. 2.1 Comparing Traditional and Next-Generation Firewalls 00:14:21
    3. 2.2 Comparing Traditional and Next-Generation Intrusion Prevention Systems (IPS) 00:12:32
    4. 2.3 Understanding Cisco Web Security 00:06:32
    5. 2.4 Understanding Cisco Email Security 00:11:23
    6. 2.5 Examining Advanced Malware Protection 00:11:40
    7. 2.6 Examining Identity Management Systems 00:08:23
    8. 2.7 Surveying Other Network Security Devices 00:02:55
  4. Lesson 3: Security Principles
    1. Learning objectives 00:00:53
    2. 3.1 Understanding Defense-in-Depth 00:04:09
    3. 3.2 Identifying Threats, Vulnerabilities, and Exploits and Their Associated Risk 00:07:51
    4. 3.3 Identifying Threat Actors 00:03:08
    5. 3.4 Understanding Reverse Engineering 00:04:14
    6. 3.5 Understanding Chain of Custody 00:06:55
    7. 3.6 Examining Run Books 00:02:13
    8. 3.7 Introducing PII and PHI 00:03:29
    9. 3.8 Understanding Principle of Least Privilege 00:04:08
    10. 3.9 Performing Risk Assessment 00:07:43
  5. Lesson 4: Access Control Models
    1. Learning objectives 00:00:31
    2. 4.1 Understanding Confidentiality, Integrity, and Availability 00:03:00
    3. 4.2 Understanding Authentication, Authorization, and Accounting 00:03:09
    4. 4.3 Examining the Access Control Process: Terminology and Data Classification 00:03:24
    5. 4.4 Examining the Access Control Process: Data States and Policy Roles 00:06:02
    6. 4.5 Examining the Access Control Process: Security and Access Control Classification 00:08:17
    7. 4.6 Understanding Discretionary Access Control 00:04:22
    8. 4.7 Understanding Mandatory Access Control 00:04:20
    9. 4.8 Understanding Role Based Access Control 00:02:56
    10. 4.9 Understanding Attribute Based Access Control 00:02:44
  6. Lesson 5: Introduction to Security Management
    1. Learning objectives 00:00:36
    2. 5.1 Surveying Asset Management 00:12:40
    3. 5.2 Surveying Configuration Management 00:12:06
    4. 5.3 Surveying Mobile Device Management 00:15:19
    5. 5.4 Surveying Patch Management 00:10:29
    6. 5.5 Surveying Vulnerability Management 00:16:55
    7. 5.6 Understanding Network and Host Antivirus 00:09:27
    8. 5.7 Understanding SEIM and Log Collection 00:12:07
  7. Lesson 6: Fundamentals of Cryptography and PKI
    1. Learning objectives 00:00:33
    2. 6.1 Understanding the Basic Components of Cryptography 00:05:51
    3. 6.2 Introducing Public Key Infrastructure 00:03:39
    4. 6.3 Deciphering Encryption Algorithms 00:03:34
    5. 6.4 Understanding Hashing Algorithms 00:05:59
    6. 6.5 Examining Secure Socket Layer and Transport Layer Security 00:04:19
    7. 6.6 Examining Digital Certificates 00:07:18
  8. Lesson 7: Introduction to Virtual Private Networks (VPNs)
    1. Learning objectives 00:00:36
    2. 7.1 Introducing VPNs and Why We Use Them 00:02:27
    3. 7.2 Examining Remote Access VPNs 00:02:40
    4. 7.3 Examining Site-to-Site VPNs 00:02:16
    5. 7.4 Understanding IPsec Concepts, Components, and Operations 00:10:17
    6. 7.5 Surveying Cisco VPN Solutions: Traditional IPsec, DMVPN, FlexVPN 00:12:37
    7. 7.6 Surveying Cisco VPN Solutions: Clientless SSL and AnyConnect 00:07:11
  9. Lesson 8: Windows, Linux, and MAC OS X Based Analysis
    1. Learning objectives 00:00:28
    2. 8.1 Understanding Windows Forensics Basics 00:14:32
    3. 8.2 Understanding Linux and MAC OS X Forensics Basics 00:13:01
    4. 8.3 Examining Web Server Logs 00:06:07
  10. Lesson 9: Endpoint Security Technologies
    1. Learning objectives 00:00:30
    2. 9.1 Examining Host-Based Intrusion Detection 00:03:35
    3. 9.2 Exploring Antimalware and Antivirus 00:05:43
    4. 9.3 Understanding Host-based Firewalls 00:04:04
    5. 9.4 Exploring Application-level Whitelisting/Blacklisting 00:07:20
    6. 9.5 Exploring Systems-based Sandboxing 00:03:22
  11. Lesson 10: Network and Host Telemetry
    1. Learning objectives 00:00:35
    2. 10.1 Introducing NetFlow 00:09:11
    3. 10.2 Surveying Commercial and Open Source NetFlow Tools 00:06:52
    4. 10.3 Understanding Flexible NetFlow 00:02:42
    5. 10.4 Examining Firewall Logs 00:13:13
    6. 10.5 Understanding Application Visibility and Control 00:02:04
    7. 10.6 Examining Web and Email Content Filtering Logs 00:01:55
    8. 10.7 Exploring Full Packet Capture 00:04:20
    9. 10.8 Surveying IPS Events 00:04:39
    10. 10.9 Surveying Host or Endpoint Events 00:04:42
  12. Lesson 11: Security Monitoring Operations and Challenges
    1. Learning objectives 00:00:26
    2. 11.1 Understanding Security Monitoring Fundamentals 00:02:41
    3. 11.2 Surveying Security Monitoring Tools 00:02:48
    4. 11.3 Grasping Security Monitoring Operational Challenges 00:13:28
  13. Lesson 12: Types of Attacks and Vulnerabilities
    1. Learning objectives 00:01:03
    2. 12.1 Surveying Types of Vulnerabilities 00:12:39
    3. 12.2 Understanding Passive Reconnaissance and Social Engineering 00:12:26
    4. 12.3 Understanding Active Reconnaissance Port Scanning and Host Profiling 00:11:43
    5. 12.4 Understanding Privilege Escalation and Code Execution Attacks 00:02:04
    6. 12.5 Understanding Backdoors and Man-in-the Middle Attacks 00:05:45
    7. 12.6 Understanding Denial of Service Attacks 00:05:35
    8. 12.7 Surveying Attack Methods for Data Exfiltration 00:02:33
    9. 12.8 Understanding ARP Cache Poisoning and Route Manipulation Attacks 00:07:08
    10. 12.9 Understanding Password Attacks 00:04:14
    11. 12.10 Understanding Wireless Attacks 00:04:20
    12. 12.11 Exploring Security Evasion Techniques 00:07:44
  14. Summary
    1. CCNA CyberOps SECFND: Summary 00:01:09