CCNA Cyber Ops Training


CCNA Cyber Ops Training


CCNA Cyber Ops 210-250 (SECFND) + Kali Linux Hacking Tools


Learn Cyber Security and prepare for your Cisco CCNA CyberOps certification exam. Kali Linux Classes Included.

 TRAINING FEES: 250 USD

ccna cyber Ops

Requirements For This Training:

A basic understanding of internet and Operating System. Be able to download and install software. A willingness to learn.

What this Course will help:


This course will help you prepare for the CCNA 210-250 (SECFND) exam. After completetion of this CCNA Cyber OPs Training  You will gain an understanding of cybersecurity’s basic principles, foundation knowledge, and core skills needed to grasp the more advanced associate-level materials in the second required exam, “Implementing Cisco Cyber-security Operations (SECOPS)”.

 

Course Description:


Master the CCNA CyberOps 210-250 (SECFND) exam topics

Network Concepts
Security Concepts
Cryptography
Host-Based Analysis
Security Monitoring
Attack Methods

As an added bonus you will also learn how to use the hacking tools software Kali Linux!


Golismero
Nmap Monitorining Tool
Metasploit
Armitage

 

Who is the target audience?


For anyone who would love to gain a practical skill set in mitigating the risk from, malware, Trojans, hackers, tracker, cyber criminals and all online threats.
For anyone studying for the Cisco CCNA Cyber Ops certification exam.


Cisco CCNA Cyber Ops 210-250 SECFND


Introduction

Kali Install

Networking Concept
Network Fundamentals

Network Protocols – ICMP/HTTP/DHCP/DNS Theory

Network Protocols – ICMP/HTTP/DHCP/DNS Lab Using Cisco Packet Tracer

Network Protocols – ARP/FTP/SMTP/IMAP/POP3 Theory

Network Protocols – ARP/FTP/SMTP/IMAP/POP3 Lab using Cisco Packet Tracer

Network Protocols – DHCP+DNS+SMTP+POP3+FTP+HTTP Combined Lab

Network Devices(Router/Switches/bridge/HUB/Brouters/Wi-Fi devices)

Special and Reserved IPv4 Addresses


Host Based Analysis

Windows Based Ananlysis

Linux Based Analysis

End Point Security Technology

Security Monitoring and Attack Methods

Network and Host Telemetry

Types of Attacks and Vulnerablities

Intersubnet IP PACKET ROUTING

Network Address translation

Static Translation

High Availablity

firewall in data center

Virtual firewalls

personal firewalls

Security Cloud Based Solution

Cisco Cloud Web security

Cisco Cloud Email security


OpenDNS

CloudLock

Cisco Netflow

Radius

Tacacs+

Firewaling

Firewall DMZ

Access Review

Access revocation

Password Management

Password Creation

Password Storage and Password Transmission

Password Reset

Password Synchronization


Network Infrastructure Logs

console Logging

Terminal Logging

Email Logging

syslog server logging

Buffered logging

Configuring Logging on the CISCO ASA

SPLUNK

GrayLog

ElasticSearch

Network packet capture

tcpdump

wireshark

Host telemetry

Logs from users endpoints

Logs from servers

Security Monitoring and Encryption

Security Monitoring and TOR

Security Monitoring and Peer to Peer communication


Types of Attacks

Social Engineering

backdoors

Code execution

MAN in Middle Attacks

DOS Attacks

DDOS Attacks

Direct DDOS Attacks

Spoofing Attacks

Password Attacks

Wireless Attacks

Route manipulation Attacks

Privilege escalation Attacks

Botnets Participating in DDOS Attacks

Reflected DDOS Attacks

ARP cache Poisoning


Firewalls Basics

Firewall Configuration in Kali Linux

Email & Web Security

Inline Traffic Interrogation, Taps & NetFlow

Security Concepts(Both Networking and Operating System)

Defense in Depth Strategy

Vulnerabilities

Exploits Systems

Risks Management

Security Terms

Access Control Models

Security Management

Cryptography Basics

Encryption Decryption

 Hashing Algorithms

Host-Based Analysis

Microsoft Windows – Introduction

Microsoft Windows – Terms

Linux – Introduction

Linux – Terms

Endpoint Protection

Whitelisting and Blacklisting

Systems-Based Sandboxing

System Logs

Security Monitoring and Security Audits

Network Logging
Packet Capturing

NetFlow Basics

NetFlow Configuration Lab

Application Visibility and Control (AVC)

Monitoring Challenges

Attack Methods

Network Attacks Using Kali Linux

Web Application Attacks using kali Linux

Social Engineering and Phishing Attacks

Endpoint-Based Attacks Using Kali Linux

Evasion Methods

ccna cyber ops

 

 

 

 For training and Registration :










ccna cyber ops training