Course outline

Sale!

Understanding Cisco Cybersecurity Fundamentals (SECFND) v1.0

Course Code: SECFND Topics: ,

US$1,500.00 US$1,230.00

13 Learning Credits

This course helps prepare you for beginning and associate-level roles in cybersecurity operations. It focuses on security principles and technologies using Cisco security products.

Share it:

FacebookTwitterGoogle PlusLinkedinEmail

Access Duration: 365 Days

Grace Period: 30 Days

Share it:

FacebookTwitterGoogle PlusLinkedinEmail

Overview

The Understanding Cisco Cybersecurity Fundamentals (SECFND) version 1.0 Cisco® Training on Demand course helps prepare you for beginning and associate-level roles in cybersecurity operations. It focuses on security principles and technologies using Cisco security products.

In addition, you gain an understanding of the TCP/IP suite, common security and basic cryptography concepts, network infrastructure and applications, and the different types of attacks. Finally, you learn the basic security techniques used in a security operations center (SOC) to find threats on a network using a variety of popular security tools within a “real-life” network infrastructure.

Duration

The SECFND v1.0 Training on Demand course is a self-paced course that consists of 14 sections of instructor video and text along with interactive activities, 12 hands-on lab exercises, content review questions, and challenge questions.

Target Audience

This course is designed for SOC security analysts and personnel, computer network defense analysts and infrastructure support personnel, future incident responders, Cisco channel partners, and those preparing for the 210-255 SECOPS exam.

Objectives

After completing this course, you should be able to:

  • Describe, compare, and identify various network concepts
  • Understand the fundamentals of TCP/IP
  • Describe and compare fundamental security concepts
  • Describe network applications and their security challenges
  • Understand basic cryptography principles
  • Understand endpoint attacks, including interpreting log data to identify events in Windows and Linux
  • Develop knowledge in security monitoring, including identifying sources and types of data and events

Course Prerequisites

The knowledge and skills necessary before attending this course are:

  • Working knowledge of the Windows and Linux operation systems, and basic knowledge of IPv4 and IPv6 addressing
  • Section 1: Understanding the TCP/IP Protocol Suite
  • Section 2: Understanding the Network Infrastructure
  • Section 3: Understanding Common TCP/IP Attacks
  • Section 4: Understanding Basic Cryptography Concepts
  • Section 5: Describing Information Security Concepts
  • Section 6: Understanding Network Applications
  • Section 7: Understanding Common Network Application Attacks
  • Section 8: Understanding Windows Operating System Basics
  • Section 9: Understanding Linux Operating System Basics
  • Section 10: Understanding Common Endpoint Attacks
  • Section 11: Understanding Network Security Technologies
  • Section 12: Understanding Endpoint Security Technologies
  • Section 13: Describing Security Data Collection
  • Section 14: Describing Security Event Analysis

This course contains 12 hands-on lab exercises.

Representative topology for all labs in the course:

The labs included in this course are:

  • Discovery Lab 1.21: Explore the TCP/IP Protocol Suite
  • Discovery Lab 2.14: Explore the Network Infrastructure
  • Discovery Lab 3.15: Explore TCP/IP Attacks
  • Discovery Lab 4.18: Explore Cryptographic Technologies
  • Discovery Lab 6.10: Explore Network Applications
  • Discovery Lab 7.14: Explore Network Application Attacks
  • Discovery Lab 8.27: Explore the Windows Operating System
  • Discovery Lab 9.32: Explore the Linux Operating System
  • Discovery Lab 10.16: Explore Endpoint Attacks
  • Discovery Lab 11.24: Explore Network Security Technologies
  • Discovery Lab 12.9: Explore Endpoint Security
  • Discovery Lab 13.19: Explore Security Data for Analysis
Privacy and Cookies

This website stores cookies on your computer which help us make the website work better for you.

Learn moreAccept and Close
Social media & sharing icons powered by UltimatelySocial