Cisco

CCNA Security v3 210-260 IINS : Security Concepts

Gabe Rivas
Gabe Rivas
CCNA R&S, CCNA Security, CCDA, CCNP R&S

This course is included in our All Access Pass! Get unlimited streaming access to 13,000+ videos, workbooks, and practice exams today!
Choose your plan!


Course Description
In this introductory course, we will walk through basic security concepts that are meant to build a solid network security foundation and help you dive into more practical and advanced topics. We will start by helping you understand the meaning of Asset, Vulnerability, Threat, Risk, and Countermeasure terms. Then we will break down the CIA triad and show how it helps organizations develop sound security policies. We will also cover monitoring tools that assist in detecting events in real-time as well as cover concepts about common security zones. As we move forward, we will cover social engineering topics, network attacks, different kinds of malware found in today's networks, data loss, cryptography and hashing, and finally we will go over common network topologies seen in a LAN, CAN, WAN, DC, and SOHO.
  • Course
    • Security Concepts Overview
      • Course Introduction
    • Security Principles
      • Common Security Principles
    • Security Threats
      • Common Security Threats :: Part 1
      • Common Security Threats :: Part 2
      • Common Security Threats :: Part 3
      • Common Security Threats :: Part 4
      • Common Security Threats :: Part 5
    • Cryptography Concepts
      • Cryptography Concepts :: Part 1
      • Cryptography Concepts :: Part 2
      • Cryptography Concepts :: Part 3
      • Cryptography Concepts :: Part 4
      • Cryptography Concepts :: Part 5
    • Network Topologies
      • Network Topologies :: Part 1
      • Network Topologies :: Part 2
    • Course Checkpoint
      • Course Summary
Course Outline:
  • Course
    • Security Concepts Overview
      • Course Introduction
    • Security Principles
      • Common Security Principles
    • Security Threats
      • Common Security Threats :: Part 1
      • Common Security Threats :: Part 2
      • Common Security Threats :: Part 3
      • Common Security Threats :: Part 4
      • Common Security Threats :: Part 5
    • Cryptography Concepts
      • Cryptography Concepts :: Part 1
      • Cryptography Concepts :: Part 2
      • Cryptography Concepts :: Part 3
      • Cryptography Concepts :: Part 4
      • Cryptography Concepts :: Part 5
    • Network Topologies
      • Network Topologies :: Part 1
      • Network Topologies :: Part 2
    • Course Checkpoint
      • Course Summary

If you would like more information on how to purchase this course individually, contact a Training Specialist.