Cisco

CCNA Cyber Ops Technology Course: SECFND 210-250

Andrew Crouthamel
Andrew Crouthamel
VCP, CCNA, CCNA Security, CCAI, Master CSSA & CSSR, Security+, Network+, A+

This course is included in our All Access Pass! Get unlimited streaming access to 12,000+ videos, workbooks, and practice exams by starting your free trial of the All Access Pass subscription!
Start Your FREE Trial!


Course Description
Cisco's CCNA Cyber Ops certification provides individuals with the knowledge to identify and respond to security incidents. This certification provides a path to working in a Security Operations Center (SOC) and security positions. As a CCNA level certification, Cyber Ops provides introductory knowledge so one may be aware of the security landscape, understand security concepts and general networking. This course will cover the exam topics of the Understanding Cisco Cybersecurity Fundamentals (SECFND 210-250) exam. We will dive into topics such as networking concepts and IP addressing, as well as security concepts including access control models, risk assessment, and the CIA triad. We will also review cryptography methods and host-based analysis details, as well as security monitoring tools, and attack methods used by threat actors.
  • Course
    • Overview
      • Course Introduction
    • Networking Fundamentals
      • Network Models
      • Ethernet Technology
      • IP Technology
      • ICMP
      • DNS
      • IPv6
      • TCP & UDP
    • Security Devices
      • Security Products
      • Cloud Options
      • NetFlow
      • Data Loss Prevention
    • Introduction to Security
      • Defense-in-Depth
      • Threats
      • CIA Triad
      • Risk Analysis
      • PII & PHI
      • Least Privilege
      • SOCs
      • Digital Forensics
    • Controls
      • Access Controls
      • Security Roles
      • Implementing Controls
    • Security Operations Management
      • Identity & Access Management
      • Log Management
      • Asset Management
      • Mobile Device Management
      • Configuration & Change Management
      • Vulnerability Management
      • Patch Management
    • VPNs
      • Cryptography
      • Public Key Infrastructure
      • VPNs & IPsec
    • Windows Host Security
      • Windows Processes & Memory
      • Windows Registry & WMI
      • Windows Handles & Services
      • Windows Event Logs
    • Linux Host Security
      • Linux Processes & Forks
      • Linux Permissions & Symlinks
      • Linux Daemons & Logs
    • Endpoint Protection
      • Antivirus Software
      • Host Firewalls & Sandboxing
    • Telemetry Data
      • Infrastructure Logs
      • Packet Captures
    • Attack Types Overview
      • P2P Applications
      • Reconnaissance & Social Engineering
      • Attack Types
      • Password Cracking
    • Security Evasion Overview
      • Security Evasion
Course Outline:
  • Course
    • Overview
      • Course Introduction
    • Networking Fundamentals
      • Network Models
      • Ethernet Technology
      • IP Technology
      • ICMP
      • DNS
      • IPv6
      • TCP & UDP
    • Security Devices
      • Security Products
      • Cloud Options
      • NetFlow
      • Data Loss Prevention
    • Introduction to Security
      • Defense-in-Depth
      • Threats
      • CIA Triad
      • Risk Analysis
      • PII & PHI
      • Least Privilege
      • SOCs
      • Digital Forensics
    • Controls
      • Access Controls
      • Security Roles
      • Implementing Controls
    • Security Operations Management
      • Identity & Access Management
      • Log Management
      • Asset Management
      • Mobile Device Management
      • Configuration & Change Management
      • Vulnerability Management
      • Patch Management
    • VPNs
      • Cryptography
      • Public Key Infrastructure
      • VPNs & IPsec
    • Windows Host Security
      • Windows Processes & Memory
      • Windows Registry & WMI
      • Windows Handles & Services
      • Windows Event Logs
    • Linux Host Security
      • Linux Processes & Forks
      • Linux Permissions & Symlinks
      • Linux Daemons & Logs
    • Endpoint Protection
      • Antivirus Software
      • Host Firewalls & Sandboxing
    • Telemetry Data
      • Infrastructure Logs
      • Packet Captures
    • Attack Types Overview
      • P2P Applications
      • Reconnaissance & Social Engineering
      • Attack Types
      • Password Cracking
    • Security Evasion Overview
      • Security Evasion

If you would like more information on how to purchase this course individually, contact a Training Specialist.