SECFND – Understanding Cisco Cybersecurity Fundamentals v1.0

Course
Name: Understanding Cisco Cybersecurity Fundamentals (SECFND) v1.0

Duration:
5 Days

What you’ll learn in this course:

The Understanding Cisco Cybersecurity Fundamentals (SECFND) course
gives you foundation-level knowledge of common security concepts, basic
security techniques, and the fundamentals of applications, operating systems,
and networking used in a Security Operations Center (SOC). This course helps
you learn to find threats within a real-life network infrastructure using a
variety of popular security tools. Through expert instruction and hands-on
experience using enterprise-grade security tools, you will learn the basics of
network and security concepts, endpoint attacks, cryptography, analysis, and
monitoring. This course provides introductory knowledge for those interested in
entering the field of cybersecurity and prepares you for the 210-250 SECFND
exam, one of the two exams for the current Cisco Certified CyberOps Associate*
certification.

How you’ll benefit:

  • Learn fundamental principles of cryptography, applications,
    operating systems, and networking
  • Learn foundational knowledge for detecting and responding to
    cybersecurity incidents, including monitoring, analysis, and understanding
    common attacks
  • Prepare for the Cisco CCNA Cyber Ops certification with hands-on
    practice using real-life security analysis tools, such as those found in a
    Linux distribution
  • Start your career in the high-demand area of cybersecurity
  • If you need privileged access to DoD Systems, and are military
    personnel, civilian contractors, and others, this course helps your prepare for
    Cisco CCNA Cyber Ops certification, which is one of the DoD Approved 8570
    Baseline Certifications

Who should enroll:

  • IT professionals
  • Any learner interested in entering associate-level cybersecurity
    roles such as:
    • SOC cybersecurity analysts
    • Computer or network defense analysts
    • Computer network defense infrastructure support personnel
    • Future incident responders and SOC personnel
    • Cisco integrators or partners

Course
Objectives:

After
taking this course, you should be able to:

  • Describe network operations and attacks, basic cryptography
    concepts, and network infrastructure device operations
  • Describe basic Windows and Linux OS operations, common network
    applications and attacks, endpoint attacks, and network and endpoint security
    solutions
  • Describe security data collection and monitoring and the common
    threat models that security operations organizations can reference when
    performing cybersecurity analysis

Course Prerequisites:

We
recommend that you have knowledge of one or more of the following before
attending this course:

  • Familiarity with basic networking concepts
  • Working knowledge of the Windows operating system
  • Familiarity with the Linux operating system

Course Outline:

  • TCP/IP and Cryptography Concepts
    • Understanding the TCP/IP Protocol Suite
    • Understanding the Network Infrastructure
    • Understanding Common TCP/IP Attacks
    • Understanding Basic Cryptography Concepts
  • Network Applications and Endpoint Security
    • Describing Information Security Concepts
    • Understanding Network Applications
    • Understanding Common Network Application Attacks
    • Understanding Windows Operating System Basics
    • Understanding Linux Operating System Basics
    • Understanding Common Endpoint Attacks
    • Understanding Network Security Technologies
    • Understanding Endpoint Security Technologies
  • Security Monitoring and Analysis
    • Describing Security Data Collection
    • Describing Security Event Analysis

Labs Outline:

  • Explore the TCP/IP Protocol Suite
  • Explore the Network Infrastructure
  • Explore TCP/IP Attacks
  • Explore Cryptographic Technologies
  • Explore Network Applications
  • Explore Network Application Attacks
  • Explore the Windows Operating System
  • Explore the Linux Operating System
  • Explore Endpoint Attacks
  • Explore Network Security Technologies
  • Explore Endpoint Security
  • Explore Security Data for Analysis

X

Giriş Yap

Şifremi Unuttum

Şifremi Unuttum

Geri