CCNA Cyber Ops Training
CCNA Cyber Ops Training
CCNA Cyber Ops 210-250 (SECFND) + Kali Linux Hacking Tools
Learn Cyber Security and prepare for your Cisco CCNA CyberOps certification exam. Kali Linux Classes Included.
TRAINING FEES: 250 USD
Requirements For This Training:
A basic understanding of internet and Operating System. Be able to download and install software. A willingness to learn.
What this Course will help:
This course will help you prepare for the CCNA 210-250 (SECFND) exam. After completetion of this CCNA Cyber OPs Training You will gain an understanding of cybersecurity’s basic principles, foundation knowledge, and core skills needed to grasp the more advanced associate-level materials in the second required exam, “Implementing Cisco Cyber-security Operations (SECOPS)”.
CCNA Cyber Ops Tools
(RHEL5/6/7/8,CentOS5/6/7, Ubuntu Linux, Wireshark,Hydra,arpsppof,dsniff,medusa,ncrack,openssl, Kali Linux, Metasploit, Nmap, GNS3, and VirtualBox): This course will teach you how to create your Cyber Ops home labs, and how to use Cyber Ops tools in both labs and production environment as well as help you clear ccna cyber Ops Exam.
Course Description:
Master the CCNA CyberOps 210-250 (SECFND) exam topics
Network Concepts
Security Concepts
Cryptography
Host-Based Analysis
Security Monitoring
Attack Methods
As an added bonus you will also learn how to use the hacking tools software Kali Linux!
Golismero
Nmap Monitorining Tool
Metasploit
Armitage
Who is the target audience?
For anyone who would love to gain a practical skill set in mitigating the risk from, malware, Trojans, hackers, tracker, cyber criminals and all online threats.
For anyone studying for the Cisco CCNA Cyber Ops certification exam.
–
Cisco CCNA Cyber Ops 210-250 SECFND
Introduction
Kali Install
Networking Concept
Network Fundamentals
Network Protocols – ICMP/HTTP/DHCP/DNS Theory
Network Protocols – ICMP/HTTP/DHCP/DNS Lab Using Cisco Packet Tracer
Network Protocols – ARP/FTP/SMTP/IMAP/POP3 Theory
Network Protocols – ARP/FTP/SMTP/IMAP/POP3 Lab using Cisco Packet Tracer
Network Protocols – DHCP+DNS+SMTP+POP3+FTP+HTTP Combined Lab
Network Devices(Router/Switches/bridge/HUB/Brouters/Wi-Fi devices)
Special and Reserved IPv4 Addresses
Host Based Analysis
Windows Based Ananlysis
Linux Based Analysis
End Point Security Technology
Security Monitoring and Attack Methods
Network and Host Telemetry
Types of Attacks and Vulnerablities
Intersubnet IP PACKET ROUTING
Network Address translation
Static Translation
High Availablity
firewall in data center
Virtual firewalls
personal firewalls
Security Cloud Based Solution
Cisco Cloud Web security
Cisco Cloud Email security
OpenDNS
CloudLock
Cisco Netflow
Radius
Tacacs+
Firewaling
Firewall DMZ
Access Review
Access revocation
Password Management
Password Creation
Password Storage and Password Transmission
Password Reset
Password Synchronization
Network Infrastructure Logs
console Logging
Terminal Logging
Email Logging
syslog server logging
Buffered logging
Configuring Logging on the CISCO ASA
SPLUNK
GrayLog
ElasticSearch
Network packet capture
tcpdump
wireshark
Host telemetry
Logs from users endpoints
Logs from servers
Security Monitoring and Encryption
Security Monitoring and TOR
Security Monitoring and Peer to Peer communication
Types of Attacks
Social Engineering
backdoors
Code execution
MAN in Middle Attacks
DOS Attacks
DDOS Attacks
Direct DDOS Attacks
Spoofing Attacks
Password Attacks
Wireless Attacks
Route manipulation Attacks
Privilege escalation Attacks
Botnets Participating in DDOS Attacks
Reflected DDOS Attacks
ARP cache Poisoning
Firewalls Basics
Firewall Configuration in Kali Linux
Email & Web Security
Inline Traffic Interrogation, Taps & NetFlow
Security Concepts(Both Networking and Operating System)
Defense in Depth Strategy
Vulnerabilities
Exploits Systems
Risks Management
Security Terms
Access Control Models
Security Management
Cryptography Basics
Encryption Decryption
Hashing Algorithms
Host-Based Analysis
Microsoft Windows – Introduction
Microsoft Windows – Terms
Linux – Introduction
Linux – Terms
Endpoint Protection
Whitelisting and Blacklisting
Systems-Based Sandboxing
System Logs
Security Monitoring and Security Audits
Network Logging
Packet Capturing
NetFlow Basics
NetFlow Configuration Lab
Application Visibility and Control (AVC)
Monitoring Challenges
Attack Methods
Network Attacks Using Kali Linux
Web Application Attacks using kali Linux
Social Engineering and Phishing Attacks
Endpoint-Based Attacks Using Kali Linux
Evasion Methods
You must be logged in to post a comment.