CCNA Security Technology Course: 210-260 IINS
What about this course?
There is a huge gap of Security professionals on the market, so this will be your starting point in the Security world, a complex but fun and challenging track. As being CCNA Security certified, a network professional demonstrates the skills required to develop a security infrastructure, recognize threats and vulnerabilities to networks, and mitigate security threats. This course will help candidates obtain a deeper understanding of the technologies from the blueprint, which will tremendously help prepare for the certification exam and also for real-life deployments. As opposed to Bootcamp courses, this certification video series is a mix of slides, visual explanations and configuration examples to reinforce the knowledge. Slides should be used as a reference for the exam, while the examples as a reference for real-life deployments. Lab topologies will be designed, explaining the objective for each design, and then built from scratch by the instructor, nothing being pre-scripted, pre-tested or pre-recorded. During the process, the instructor will intentionally demonstrate the effects of misconfigurations and failures, randomly making learners think about how to approach a specific problem, never seen before. You will also learn how to build a proper study and learning methodology.

Instructor for this course
Cristian Matei
CCIEx2 #23684
This course is composed by the following modules
Introduction
IINS Overview
About the Certification
Certification Goals
Study Materials
Recommended Books
Cisco Documentation
Additional Information
IINS Sample Exam Questions :: Part 1
IINS Sample Exam Questions :: Part 2
IINS Sample Exam Questions :: Part 3
IINS Sample Exam Questions :: Part 4
Computer Security Terminology
Goals of Network Security
Understanding Security Threats
Internal Security Threats
Responding to Security Threats
Assets
Vulnerabilities
Countermeasures :: Part 1
Countermeasures :: Part 2
Risk Analysis
Network Security Design Principles :: Part 1
Network Security Design Principles :: Part 2
Network Security Responsibilities
Social Engineering Attacks
Phishing Attacks
Social Engineering & Phishing Mitigation
DoS & DDoS Attacks :: Part 1
DoS & DDoS Attacks :: Part 2
DoS & DDoS Mitigation
Spoofing Attacks
TCP Spoofing Attacks
Spoofing Attack Mitigation
Reflection Attack
Amplification Attack
Passwords Attacks
Reconnaissance Attacks
Buffer Overflow Attacks
MiTM Attacks
Evolution of Malicious Code
Script Kiddies
Malware as a Service
Common Threat Defense Technologies
Firewall
Content Security Firewall
Intrusion Prevention System
Virtual Private Networks
Logging & Monitoring
Endpoint Security
Network Device Planes of Operation
Securing the Management Plane - AAA
What is AAA?
AAA Model
Radius
TACACS+
When to Use Which Protocol
Cisco's Authentication Servers
AAA for Device Administration
IOS Privilege Levels
Authentication Configuration & Verification Steps
Remote Access for Device Administration
AAA Implementation :: Part 1
AAA Implementation :: Part 2
AAA Implementation :: Part 3
Syslog
Syslog Configuration & Verification Steps
Network Time Protocol - NTP
NTP Configuration & Verification Steps
Simple Network Management Protocol
SNMPv3
SNMPv3 Configuration & Verification Steps
Netflow
Control-Plane Security
Routing Protocol Authentication
EIGRP Authentication Configuration Steps
Control-Plane Policing - CoPP
Control-Plane Protection - CPPr
Management-Plane Protection - MPP
Network Device Reconnaissance
Lateral Movement Attacks
Private VLAN Edge Overview
Private VLANs Overview
Private VLANs VLAN & Port Types
Private VLANs Traffic Filtering
VLAN Hopping Attack
VLAN Hopping Mitigation
CAM Table Attacks
CAM Attack Mitigation
Port Security Violation Options
Port Security Configuration
DHCP Starvation Attack
DHCP Starvation Variation & Mitigation
Dynamic ARP Inspection Configuration Steps
ARP Spoofing Attacks & Mitigation
DAI Configuration Steps
STP Attacks & Mitigation
Firewall Overview
Stateless Packet Filters
ACL Configuration Steps
Application Level Gateways
Stateful Firewalls
Next-Generation Firewalls
ASA Firewall Overview
ASA Firewall Features
ASA Firewall Modes of Operation
ASA Firewall High Availability
ASA Firewall Clustering
ASA Routed Mode Initialization
ASA Firewall Basic Routing :: Part 1
ASA Firewall Basic Routing :: Part 2
ASA Basic Firewall Policies
ASA Basic Firewall Policy Guidelines
ASA Firewall ACL Configuration :: Part 1
ASA Firewall ACL Configuration :: Part 2
ASA Firewall MPF Overview :: Part 1
ASA Firewall MPF Overview :: Part 2
ASA Firewall NAT Overview :: Part 1
ASA Firewall NAT Overview :: Part 2
ASA Firewall NAT Configuration :: Part 1
ASA Firewall NAT Configuration :: Part 2
IOS Zone Based Policy Firewall Overview :: Part 1
IOS Zone Based Policy Firewall Overview :: Part 2
IOS Zone Based Policy Firewall Configuration
Cryptography Overview :: Part 1
Cryptography Overview :: Part 2
Cryptography Overview :: Part 3
Public Key Infrastructure Overview :: Part 1
Public Key Infrastructure Overview :: Part 2
IPsec VPN Overview :: Part 1
IPsec VPN Overview :: Part 2
Site-to-Site IPsec VPN Configuration
SSL VPN Overview
ASA AnyConnect SSL VPN Overview
ASA AnyConnect SSL VPN Configuration
ASA Clientless SSL VPN Overview
ASA Clientless SSL VPN Configuration
Security Architecture
Identity Management :: Part 1
Identity Management :: Part 2
Content Security
Intrusion Prevention System
Endpoint Security
Common Course Questions
If you have a question you don’t see on this list, please visit our Frequently Asked Questions page by clicking the button below.
If you’d prefer getting in touch with one of our experts, we encourage you to call one of the numbers above or fill out our contact form.
Do you offer training for all student levels?