Cisco

CCNA Security Technology Course: 210-260 IINS

Cristian Matei
Cristian Matei
CCIEx2 #23684

This course is included in our All Access Pass! Get unlimited streaming access to 14,000+ videos, workbooks, and practice exams today!
Choose your plan!


Course Description
There is a huge gap of Security professionals on the market, so this will be your starting point in the Security world, a complex but fun and challenging track. As being CCNA Security certified, a network professional demonstrates the skills required to develop a security infrastructure, recognize threats and vulnerabilities to networks, and mitigate security threats. This course will help candidates obtain a deeper understanding of the technologies from the blueprint, which will tremendously help prepare for the certification exam and also for real-life deployments. As opposed to Bootcamp courses, this certification video series is a mix of slides, visual explanations and configuration examples to reinforce the knowledge. Slides should be used as a reference for the exam, while the examples as a reference for real-life deployments. Lab topologies will be designed, explaining the objective for each design, and then built from scratch by the instructor, nothing being pre-scripted, pre-tested or pre-recorded . During the process, the instructor will intentionally demonstrate the effects of misconfigurations and failures, randomly making learners think how to approach a specific problem, never seen before. You will also learn how to build a proper study and learning methodology. It’s highly recommended to also watch the "CCNA Security Bootcamp :: 210-260 IINS” course.
  • Course
    • Course Introduction
      • Introduction
      • IINS Overview
      • About the Certification
      • Certification Goals
      • Study Materials
      • Recommended Books
      • Cisco Documentation
      • Additional Information
      • IINS Sample Exam Questions :: Part 1
      • IINS Sample Exam Questions :: Part 2
      • IINS Sample Exam Questions :: Part 3
      • IINS Sample Exam Questions :: Part 4
    • Network Security Concepts
      • Computer Security Terminology
      • Goals of Network Security
      • Understanding Security Threats
      • Internal Security Threats
      • Responding to Security Threats
      • Assets
      • Vulnerabilities
      • Countermeasures :: Part 1
      • Countermeasures :: Part 2
      • Risk Analysis
      • Network Security Design Principles :: Part 1
      • Network Security Design Principles :: Part 2
      • Network Security Responsibilities
      • Social Engineering Attacks
      • Phishing Attacks
      • Social Engineering & Phishing Mitigation
      • DoS & DDoS Attacks :: Part 1
      • DoS & DDoS Attacks :: Part 2
      • DoS & DDoS Mitigation
      • Spoofing Attacks
      • TCP Spoofing Attacks
      • Spoofing Attack Mitigation
      • Reflection Attack
      • Amplification Attack
      • Passwords Attacks
      • Reconnaissance Attacks
      • Buffer Overflow Attacks
      • MiTM Attacks
      • Evolution of Malicious Code
      • Script Kiddies
      • Malware as a Service
      • Common Threat Defense Technologies
      • Firewall
      • Content Security Firewall
      • Intrusion Prevention System
      • Virtual Private Networks
      • Logging & Monitoring
      • Endpoint Security
    • Securing Network Devices
      • Network Device Planes of Operation
      • Securing the Management Plane - AAA
      • What is AAA?
      • AAA Model
      • Radius
      • TACACS+
      • When to Use Which Protocol
      • Cisco's Authentication Servers
      • AAA for Device Administration
      • IOS Privilege Levels
      • Authentication Configuration & Verification Steps
      • Remote Access for Device Administration
      • AAA Implementation :: Part 1
      • AAA Implementation :: Part 2
      • AAA Implementation :: Part 3
      • Syslog
      • Syslog Configuration & Verification Steps
      • Network Time Protocol - NTP
      • NTP Configuration & Verification Steps
      • Simple Network Management Protocol
      • SNMPv3
      • SNMPv3 Configuration & Verification Steps
      • Netflow
      • Control-Plane Security
      • Routing Protocol Authentication
      • EIGRP Authentication Configuration Steps
      • Control-Plane Policing - CoPP
      • Control-Plane Protection - CPPr
      • Management-Plane Protection - MPP
      • Network Device Reconnaissance
      • Lateral Movement Attacks
      • Private VLAN Edge Overview
      • Private VLANs Overview
      • Private VLANs VLAN & Port Types
      • Private VLANs Traffic Filtering
      • VLAN Hopping Attack
      • VLAN Hopping Mitigation
      • CAM Table Attacks
      • CAM Attack Mitigation
      • Port Security Violation Options
      • Port Security Configuration
      • DHCP Starvation Attack
      • DHCP Starvation Variation & Mitigation
      • Dynamic ARP Inspection Configuration Steps
      • ARP Spoofing Attacks & Mitigation
      • DAI Configuration Steps
      • STP Attacks & Mitigation
    • Firewalls
      • Firewall Overview
      • Stateless Packet Filters
      • ACL Configuration Steps
      • Application Level Gateways
      • Stateful Firewalls
      • Next-Generation Firewalls
      • ASA Firewall Overview
      • ASA Firewall Features
      • ASA Firewall Modes of Operation
      • ASA Firewall High Availability
      • ASA Firewall Clustering
      • ASA Routed Mode Initialization
      • ASA Firewall Basic Routing :: Part 1
      • ASA Firewall Basic Routing :: Part 2
      • ASA Basic Firewall Policies
      • ASA Basic Firewall Policy Guidelines
      • ASA Firewall ACL Configuration :: Part 1
      • ASA Firewall ACL Configuration :: Part 2
      • ASA Firewall MPF Overview :: Part 1
      • ASA Firewall MPF Overview :: Part 2
      • ASA Firewall NAT Overview :: Part 1
      • ASA Firewall NAT Overview :: Part 2
      • ASA Firewall NAT Configuration :: Part 1
      • ASA Firewall NAT Configuration :: Part 2
      • IOS Zone Based Policy Firewall Overview :: Part 1
      • IOS Zone Based Policy Firewall Overview :: Part 2
      • IOS Zone Based Policy Firewall Configuration
    • Virtual Private Networks
      • Cryptography Overview :: Part 1
      • Cryptography Overview :: Part 2
      • Cryptography Overview :: Part 3
      • Public Key Infrastructure Overview :: Part 1
      • Public Key Infrastructure Overview :: Part 2
      • IPsec VPN Overview :: Part 1
      • IPsec VPN Overview :: Part 2
      • Site-to-Site IPsec VPN Configuration
      • SSL VPN Overview
      • ASA AnyConnect SSL VPN Overview
      • ASA AnyConnect SSL VPN Configuration
      • ASA Clientless SSL VPN Overview
      • ASA Clientless SSL VPN Configuration
    • Advanced Topics
      • Security Architecture
      • Identity Management :: Part 1
      • Identity Management :: Part 2
      • Content Security
      • Intrusion Prevention System
      • Endpoint Security
Course Outline:
  • Course
    • Course Introduction
      • Introduction
      • IINS Overview
      • About the Certification
      • Certification Goals
      • Study Materials
      • Recommended Books
      • Cisco Documentation
      • Additional Information
      • IINS Sample Exam Questions :: Part 1
      • IINS Sample Exam Questions :: Part 2
      • IINS Sample Exam Questions :: Part 3
      • IINS Sample Exam Questions :: Part 4
    • Network Security Concepts
      • Computer Security Terminology
      • Goals of Network Security
      • Understanding Security Threats
      • Internal Security Threats
      • Responding to Security Threats
      • Assets
      • Vulnerabilities
      • Countermeasures :: Part 1
      • Countermeasures :: Part 2
      • Risk Analysis
      • Network Security Design Principles :: Part 1
      • Network Security Design Principles :: Part 2
      • Network Security Responsibilities
      • Social Engineering Attacks
      • Phishing Attacks
      • Social Engineering & Phishing Mitigation
      • DoS & DDoS Attacks :: Part 1
      • DoS & DDoS Attacks :: Part 2
      • DoS & DDoS Mitigation
      • Spoofing Attacks
      • TCP Spoofing Attacks
      • Spoofing Attack Mitigation
      • Reflection Attack
      • Amplification Attack
      • Passwords Attacks
      • Reconnaissance Attacks
      • Buffer Overflow Attacks
      • MiTM Attacks
      • Evolution of Malicious Code
      • Script Kiddies
      • Malware as a Service
      • Common Threat Defense Technologies
      • Firewall
      • Content Security Firewall
      • Intrusion Prevention System
      • Virtual Private Networks
      • Logging & Monitoring
      • Endpoint Security
    • Securing Network Devices
      • Network Device Planes of Operation
      • Securing the Management Plane - AAA
      • What is AAA?
      • AAA Model
      • Radius
      • TACACS+
      • When to Use Which Protocol
      • Cisco's Authentication Servers
      • AAA for Device Administration
      • IOS Privilege Levels
      • Authentication Configuration & Verification Steps
      • Remote Access for Device Administration
      • AAA Implementation :: Part 1
      • AAA Implementation :: Part 2
      • AAA Implementation :: Part 3
      • Syslog
      • Syslog Configuration & Verification Steps
      • Network Time Protocol - NTP
      • NTP Configuration & Verification Steps
      • Simple Network Management Protocol
      • SNMPv3
      • SNMPv3 Configuration & Verification Steps
      • Netflow
      • Control-Plane Security
      • Routing Protocol Authentication
      • EIGRP Authentication Configuration Steps
      • Control-Plane Policing - CoPP
      • Control-Plane Protection - CPPr
      • Management-Plane Protection - MPP
      • Network Device Reconnaissance
      • Lateral Movement Attacks
      • Private VLAN Edge Overview
      • Private VLANs Overview
      • Private VLANs VLAN & Port Types
      • Private VLANs Traffic Filtering
      • VLAN Hopping Attack
      • VLAN Hopping Mitigation
      • CAM Table Attacks
      • CAM Attack Mitigation
      • Port Security Violation Options
      • Port Security Configuration
      • DHCP Starvation Attack
      • DHCP Starvation Variation & Mitigation
      • Dynamic ARP Inspection Configuration Steps
      • ARP Spoofing Attacks & Mitigation
      • DAI Configuration Steps
      • STP Attacks & Mitigation
    • Firewalls
      • Firewall Overview
      • Stateless Packet Filters
      • ACL Configuration Steps
      • Application Level Gateways
      • Stateful Firewalls
      • Next-Generation Firewalls
      • ASA Firewall Overview
      • ASA Firewall Features
      • ASA Firewall Modes of Operation
      • ASA Firewall High Availability
      • ASA Firewall Clustering
      • ASA Routed Mode Initialization
      • ASA Firewall Basic Routing :: Part 1
      • ASA Firewall Basic Routing :: Part 2
      • ASA Basic Firewall Policies
      • ASA Basic Firewall Policy Guidelines
      • ASA Firewall ACL Configuration :: Part 1
      • ASA Firewall ACL Configuration :: Part 2
      • ASA Firewall MPF Overview :: Part 1
      • ASA Firewall MPF Overview :: Part 2
      • ASA Firewall NAT Overview :: Part 1
      • ASA Firewall NAT Overview :: Part 2
      • ASA Firewall NAT Configuration :: Part 1
      • ASA Firewall NAT Configuration :: Part 2
      • IOS Zone Based Policy Firewall Overview :: Part 1
      • IOS Zone Based Policy Firewall Overview :: Part 2
      • IOS Zone Based Policy Firewall Configuration
    • Virtual Private Networks
      • Cryptography Overview :: Part 1
      • Cryptography Overview :: Part 2
      • Cryptography Overview :: Part 3
      • Public Key Infrastructure Overview :: Part 1
      • Public Key Infrastructure Overview :: Part 2
      • IPsec VPN Overview :: Part 1
      • IPsec VPN Overview :: Part 2
      • Site-to-Site IPsec VPN Configuration
      • SSL VPN Overview
      • ASA AnyConnect SSL VPN Overview
      • ASA AnyConnect SSL VPN Configuration
      • ASA Clientless SSL VPN Overview
      • ASA Clientless SSL VPN Configuration
    • Advanced Topics
      • Security Architecture
      • Identity Management :: Part 1
      • Identity Management :: Part 2
      • Content Security
      • Intrusion Prevention System
      • Endpoint Security