Cisco

CCNA Security Technology Course: 210-260 IINS

Cristian Matei
Cristian Matei
CCIEx2 #23684

Course Description
There is a huge gap of Security professionals on the market, so this will be your starting point in the Security world, a complex but fun and challenging track. As being CCNA Security certified, a network professional demonstrates the skills required to develop a security infrastructure, recognize threats and vulnerabilities to networks, and mitigate security threats. This course will help candidates obtain a deeper understanding of the technologies from the blueprint, which will tremendously help prepare for the certification exam and also for real-life deployments. As opposed to Bootcamp courses, this certification video series is a mix of slides, visual explanations and configuration examples to reinforce the knowledge. Slides should be used as a reference for the exam, while the examples as a reference for real-life deployments. Lab topologies will be designed, explaining the objective for each design, and then built from scratch by the instructor, nothing being pre-scripted, pre-tested or pre-recorded . During the process, the instructor will intentionally demonstrate the effects of misconfigurations and failures, randomly making learners think how to approach a specific problem, never seen before. You will also learn how to build a proper study and learning methodology. It’s highly recommended to also watch the "CCNA Security Bootcamp :: 210-260 IINS” course.
  • Course
    • Course Introduction
      • Introduction
      • IINS Overview
      • About the Certification
      • Certification Goals
      • Study Materials
      • Recommended Books
      • Cisco Documentation
      • Additional Information
      • IINS Sample Exam Questions :: Part 1
      • IINS Sample Exam Questions :: Part 2
      • IINS Sample Exam Questions :: Part 3
      • IINS Sample Exam Questions :: Part 4
    • Network Security Concepts
      • Computer Security Terminology
      • Goals of Network Security
      • Understanding Security Threats
      • Internal Security Threats
      • Responding to Security Threats
      • Assets
      • Vulnerabilities
      • Countermeasures :: Part 1
      • Countermeasures :: Part 2
      • Risk Analysis
      • Network Security Design Principles :: Part 1
      • Network Security Design Principles :: Part 2
      • Network Security Responsibilities
      • Social Engineering Attacks
      • Phishing Attacks
      • Social Engineering & Phishing Mitigation
      • DoS & DDoS Attacks :: Part 1
      • DoS & DDoS Attacks :: Part 2
      • DoS & DDoS Mitigation
      • Spoofing Attacks
      • TCP Spoofing Attacks
      • Spoofing Attack Mitigation
      • Reflection Attack
      • Amplification Attack
      • Passwords Attacks
      • Reconnaissance Attacks
      • Buffer Overflow Attacks
      • MiTM Attacks
      • Evolution of Malicious Code
      • Script Kiddies
      • Malware as a Service
      • Common Threat Defense Technologies
      • Firewall
      • Content Security Firewall
      • Intrusion Prevention System
      • Virtual Private Networks
      • Logging & Monitoring
      • Endpoint Security
    • Securing Network Devices
      • Network Device Planes of Operation
      • Securing the Management Plane - AAA
      • What is AAA?
      • AAA Model
      • Radius
      • TACACS+
      • When to Use Which Protocol
      • Cisco's Authentication Servers
      • AAA for Device Administration
      • IOS Privilege Levels
      • Authentication Configuration & Verification Steps
      • Remote Access for Device Administration
      • AAA Implementation :: Part 1
      • AAA Implementation :: Part 2
      • AAA Implementation :: Part 3
      • Syslog
      • Syslog Configuration & Verification Steps
      • Network Time Protocol - NTP
      • NTP Configuration & Verification Steps
      • Simple Network Management Protocol
      • SNMPv3
      • SNMPv3 Configuration & Verification Steps
      • Netflow
      • Control-Plane Security
      • Routing Protocol Authentication
      • EIGRP Authentication Configuration Steps
      • Control-Plane Policing - CoPP
      • Control-Plane Protection - CPPr
      • Management-Plane Protection - MPP
      • Network Device Reconnaissance
      • Lateral Movement Attacks
      • Private VLAN Edge Overview
      • Private VLANs Overview
      • Private VLANs VLAN & Port Types
      • Private VLANs Traffic Filtering
      • VLAN Hopping Attack
      • VLAN Hopping Mitigation
      • CAM Table Attacks
      • CAM Attack Mitigation
      • Port Security Violation Options
      • Port Security Configuration
      • DHCP Starvation Attack
      • DHCP Starvation Variation & Mitigation
      • Dynamic ARP Inspection Configuration Steps
      • ARP Spoofing Attacks & Mitigation
      • DAI Configuration Steps
      • STP Attacks & Mitigation
    • Firewalls
      • Firewall Overview
      • Stateless Packet Filters
      • ACL Configuration Steps
      • Application Level Gateways
      • Stateful Firewalls
      • Next-Generation Firewalls
      • ASA Firewall Overview
      • ASA Firewall Features
      • ASA Firewall Modes of Operation
      • ASA Firewall High Availability
      • ASA Firewall Clustering
      • ASA Routed Mode Initialization
      • ASA Firewall Basic Routing :: Part 1
      • ASA Firewall Basic Routing :: Part 2
      • ASA Basic Firewall Policies
      • ASA Basic Firewall Policy Guidelines
      • ASA Firewall ACL Configuration :: Part 1
      • ASA Firewall ACL Configuration :: Part 2
      • ASA Firewall MPF Overview :: Part 1
      • ASA Firewall MPF Overview :: Part 2
      • ASA Firewall NAT Overview :: Part 1
      • ASA Firewall NAT Overview :: Part 2
      • ASA Firewall NAT Configuration :: Part 1
      • ASA Firewall NAT Configuration :: Part 2
      • IOS Zone Based Policy Firewall Overview :: Part 1
      • IOS Zone Based Policy Firewall Overview :: Part 2
      • IOS Zone Based Policy Firewall Configuration
    • Virtual Private Networks
      • Cryptography Overview :: Part 1
      • Cryptography Overview :: Part 2
      • Cryptography Overview :: Part 3
      • Public Key Infrastructure Overview :: Part 1
      • Public Key Infrastructure Overview :: Part 2
      • IPsec VPN Overview :: Part 1
      • IPsec VPN Overview :: Part 2
      • Site-to-Site IPsec VPN Configuration
      • SSL VPN Overview
      • ASA AnyConnect SSL VPN Overview
      • ASA AnyConnect SSL VPN Configuration
      • ASA Clientless SSL VPN Overview
      • ASA Clientless SSL VPN Configuration
    • Advanced Topics
      • Security Architecture
      • Identity Management :: Part 1
      • Identity Management :: Part 2
      • Content Security
      • Intrusion Prevention System
      • Endpoint Security
This course is also included in a training bundle:
View Training Bundle
Course Outline:
  • Course
    • Course Introduction
      • Introduction
      • IINS Overview
      • About the Certification
      • Certification Goals
      • Study Materials
      • Recommended Books
      • Cisco Documentation
      • Additional Information
      • IINS Sample Exam Questions :: Part 1
      • IINS Sample Exam Questions :: Part 2
      • IINS Sample Exam Questions :: Part 3
      • IINS Sample Exam Questions :: Part 4
    • Network Security Concepts
      • Computer Security Terminology
      • Goals of Network Security
      • Understanding Security Threats
      • Internal Security Threats
      • Responding to Security Threats
      • Assets
      • Vulnerabilities
      • Countermeasures :: Part 1
      • Countermeasures :: Part 2
      • Risk Analysis
      • Network Security Design Principles :: Part 1
      • Network Security Design Principles :: Part 2
      • Network Security Responsibilities
      • Social Engineering Attacks
      • Phishing Attacks
      • Social Engineering & Phishing Mitigation
      • DoS & DDoS Attacks :: Part 1
      • DoS & DDoS Attacks :: Part 2
      • DoS & DDoS Mitigation
      • Spoofing Attacks
      • TCP Spoofing Attacks
      • Spoofing Attack Mitigation
      • Reflection Attack
      • Amplification Attack
      • Passwords Attacks
      • Reconnaissance Attacks
      • Buffer Overflow Attacks
      • MiTM Attacks
      • Evolution of Malicious Code
      • Script Kiddies
      • Malware as a Service
      • Common Threat Defense Technologies
      • Firewall
      • Content Security Firewall
      • Intrusion Prevention System
      • Virtual Private Networks
      • Logging & Monitoring
      • Endpoint Security
    • Securing Network Devices
      • Network Device Planes of Operation
      • Securing the Management Plane - AAA
      • What is AAA?
      • AAA Model
      • Radius
      • TACACS+
      • When to Use Which Protocol
      • Cisco's Authentication Servers
      • AAA for Device Administration
      • IOS Privilege Levels
      • Authentication Configuration & Verification Steps
      • Remote Access for Device Administration
      • AAA Implementation :: Part 1
      • AAA Implementation :: Part 2
      • AAA Implementation :: Part 3
      • Syslog
      • Syslog Configuration & Verification Steps
      • Network Time Protocol - NTP
      • NTP Configuration & Verification Steps
      • Simple Network Management Protocol
      • SNMPv3
      • SNMPv3 Configuration & Verification Steps
      • Netflow
      • Control-Plane Security
      • Routing Protocol Authentication
      • EIGRP Authentication Configuration Steps
      • Control-Plane Policing - CoPP
      • Control-Plane Protection - CPPr
      • Management-Plane Protection - MPP
      • Network Device Reconnaissance
      • Lateral Movement Attacks
      • Private VLAN Edge Overview
      • Private VLANs Overview
      • Private VLANs VLAN & Port Types
      • Private VLANs Traffic Filtering
      • VLAN Hopping Attack
      • VLAN Hopping Mitigation
      • CAM Table Attacks
      • CAM Attack Mitigation
      • Port Security Violation Options
      • Port Security Configuration
      • DHCP Starvation Attack
      • DHCP Starvation Variation & Mitigation
      • Dynamic ARP Inspection Configuration Steps
      • ARP Spoofing Attacks & Mitigation
      • DAI Configuration Steps
      • STP Attacks & Mitigation
    • Firewalls
      • Firewall Overview
      • Stateless Packet Filters
      • ACL Configuration Steps
      • Application Level Gateways
      • Stateful Firewalls
      • Next-Generation Firewalls
      • ASA Firewall Overview
      • ASA Firewall Features
      • ASA Firewall Modes of Operation
      • ASA Firewall High Availability
      • ASA Firewall Clustering
      • ASA Routed Mode Initialization
      • ASA Firewall Basic Routing :: Part 1
      • ASA Firewall Basic Routing :: Part 2
      • ASA Basic Firewall Policies
      • ASA Basic Firewall Policy Guidelines
      • ASA Firewall ACL Configuration :: Part 1
      • ASA Firewall ACL Configuration :: Part 2
      • ASA Firewall MPF Overview :: Part 1
      • ASA Firewall MPF Overview :: Part 2
      • ASA Firewall NAT Overview :: Part 1
      • ASA Firewall NAT Overview :: Part 2
      • ASA Firewall NAT Configuration :: Part 1
      • ASA Firewall NAT Configuration :: Part 2
      • IOS Zone Based Policy Firewall Overview :: Part 1
      • IOS Zone Based Policy Firewall Overview :: Part 2
      • IOS Zone Based Policy Firewall Configuration
    • Virtual Private Networks
      • Cryptography Overview :: Part 1
      • Cryptography Overview :: Part 2
      • Cryptography Overview :: Part 3
      • Public Key Infrastructure Overview :: Part 1
      • Public Key Infrastructure Overview :: Part 2
      • IPsec VPN Overview :: Part 1
      • IPsec VPN Overview :: Part 2
      • Site-to-Site IPsec VPN Configuration
      • SSL VPN Overview
      • ASA AnyConnect SSL VPN Overview
      • ASA AnyConnect SSL VPN Configuration
      • ASA Clientless SSL VPN Overview
      • ASA Clientless SSL VPN Configuration
    • Advanced Topics
      • Security Architecture
      • Identity Management :: Part 1
      • Identity Management :: Part 2
      • Content Security
      • Intrusion Prevention System
      • Endpoint Security

Course Format Options:

Online Streaming

Train anywhere with our web, iOS, Android and Apple TV apps! You'll also have access to any course updates and additions.

Video Download

Download the entire course in mobile, high and HD(1080p) resolutions.

  • Regular price $159.99
  • Save


31hr 33min
February 1, 2016