Course Description: Familiarize yourself with the knowledge and skills required for various IT careers, as well as a high-level overview of the CCNA exam topics. Examine hardware and software you should be able to identify as a CCNA professional, as well as where these components are used and how they are connected. In addition, discover the roles, functions, and importance of routers and switches in a conventional networking infrastructure. This course can be used in preparation for the Cisco Certified Network Associate 200-301 certification exam.
Course Title 41: Cisco Firewall, IPS Systems, & the FMCv in AWS
Course Description: Cisco Firepower devices from Cisco Systems have become very popular in enterprise environments. In this course, you'll first review the requirements of the SNCF 300-710 exam. Next, you'll look at the history of firewalls and IPS systems in the Cisco product portfolio. You'll learn about the AWS version of the FMCv, including the restrictions, limitations, and capabilities of this device. Finally, you'll examine the steps involved in constructing the Virtual Private Cloud when building a Firepower lab. This course can be used in...
Course Title 40: Protected Data, Profiling, Forensics, & IRP
Course Description: In this course, you'll learn how to identify protected data in a network, as well as how to identify elements in network and server profiling. You'll explore the use of NIST SP 800-61 to identify forensic elements and how to apply them to the incident handling process. Finally, you'll learn how NIST SP 800-61 guides incident handling and review the elements of an incident response plan. This course is one of a collection that prepares learners for the 200-201: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) exam.
Course Title 39: Incident Response, Security Management, & Analysis
Course Description: In this course, you'll review NIST800-86 to learn basic forensic techniques for incident response. You'll examine management concepts needed to be known and addressed in a security policy. Finally, you'll explore the relationship between metrics and scope analysis in a SOC. This course is one of a collection that prepares learners for the 200-201: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) exam.
Course Title 38: File Extraction, Event Artifacts, & Regular Expressions
Course Description: In this course, you'll learn how to extract files from a TCP stream from a PCAP file using Wireshark. Next, you'll explore how to identify intrusion elements from a given pcap file using Wireshark. You'll learn how to interpret common artifacts from events for an alert using the Cisco FMC. Finally, you'll examine how to use basic regular expressions with grep and the Cisco CLI. This course is one of a collection that prepares learners for the 200-201: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) exam.
Course Title 37: Security Events, Firewall Operations, & Traffic Analysis
Course Description: In this course, you'll learn to categorize intrusion events according to the cyber kill chain and diamond intrusion models. Next, with so many tools available, you'll examine which ones should be used to identify different security events. You'll learn the differences between deep packet inspection, packet filtering, and stateful firewall operations. Finally, you'll review the differences between inline traffic interrogation, taps, and traffic monitoring. This course is one of a collection that prepares learners for the 200-201: Understanding...
Course Title 36: Log Evidence, Disk Images, & Malware Analysis Output
Course Description: In this course, you'll examine the importance of logs, as well as types of evidence that can be acquired from them. Next, you'll learn how critical disk images can be during an investigation and about the comparisons and analysis that can transpire in an investigation. Finally, you'll review some of the most important information that can be found in the out of malware analysis tools. This course is one of a collection that prepares learners for the 200-201: Understanding Cisco Cybersecurity Operations Fundamentals...
Course Title 35: Host-based Analysis & the Role of Attribution
Course Description: In this course, you'll learn about host-based attacks in their various forms. Next, you'll explore components of Windows 10 and Ubuntu that are useful in host-based analysis. Finally, you'll examine the concept of attribution and its importance when investigating an organizational security breach. This course is one of a collection that prepares learners for the 200-201: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) exam.
Course Title 34: Social Engineering, Evasion, Obfuscation, & Certificates
Course Description: In this course, you'll examine multiple examples of social engineering attacks that you should be familiar with as an analyst. Attacks are not always easily identified, so you'll learn about the different evasion and obfuscation techniques. Finally, you'll learn about the different components of digital certificates and what these components do. This course is one of a collection that prepares learners for the 200-201: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) exam.
Course Title 33: Data & Attack Types
Course Description: In this course, you'll learn about data types that provide valuable information for security monitoring. You'll explore different network attacks, including protocol-based, DoS, DDoS and MITM attacks. Finally, you'll also look at common web application attacks like SQL injection, command injection, and cross-site scripting. This course is one of a collection that prepares learners for the 200-201: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) exam.
Course Title 32: Firewall, Filtering, Visibility, & Control Data
Course Description: A key part of your role as an SOC data analyst is knowing what tool will give you the type of data type you want to analyze. In this course, you'll learn about useful next-gen and stateful firewall data. You'll explore content filtering, as well as web and e-mail content filtering, and why they are useful. Next, you'll review application level visibility and control data. Finally, you'll learn how the use of different technology can cause unexpected data visibility challenges. This course is one of a collection that prepares learners for the 200...
Course Title 31: Attack Surfaces, Vulnerability, & Analysis Tools
Course Description: There are many things in cybersecurity that sound similar but are not. In this course, you'll learn to distinguish the attack surface from vulnerability. You'll also learn the basics of the tcpdump and NetFlow tools. This course is one of a collection that prepares learners for the 200-201: Understanding Cisco Cybersecurity Operation
Course Title 30: Data Loss, Host Isolation, & Detection Methods
Course Description: In this course, you'll learn to identify potential data loss indicators noted from a traffic profile. Then, you'll explore the 5-tuple approach for isolating a host. Finally, there are different detection methods that are used when securing networks dynamically. You'll review the similarities between them and how they operate to bring about usable results. This course is one of a collection that prepares learners for the 200-201: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) exam.
Course Title 29: CVSS, Deployments, Access Control, & Data Visibility
Course Description: A SOC data analyst may depend on external data to help with understanding potential attacks against systems. In this course, you'll learn how the CVSS helps and what information it provides to a cybersecurity data analyst. You'll examine the implementation of security methods and how they fit into security design. You'll review how access control is implemented across an organization and some of the available access control models. Finally, it's important to know about network data visibility challenges, so you'll learn what...
Course Title 28: Threat Actors, Security, & Risk Management
Course Description: In this course, you'll learn about threat actor types and review related examples. You'll then explore commonly confused security concepts - risk, threat, vulnerability, and exploit. Finally, you'll examine risk management concepts, including risk scoring/weighting, risk reduction, and risk assessment. This course is one of a collection that prepares learners for the 200-201: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) exam.
Course Title 27: The CIA Triad & Security Approaches
Course Description: For those aspiring or current IT professionals pursuing a job role as an entry or associate-level cybersecurity analyst, or for those pursuing the Cisco Certified CyberOps Associate certification, this course will introduce you to cybersecurity operations in a security operation center. You'll review security concepts, policies, and procedures used by a CyberOps Associate working within a SOC. You'll learn about the CIA triad, a model of implementing security on networks. Next, you'll explore basic models for cybersecurity...
Course Title 26: APIs & Cisco DNA Center
Course Description: Examine the concept of APIs, including REST-based APIs, data encoding, and authentication methods. Explore the differences between traditional campus device management and Cisco DNA Center device management, and the benefits and uses of Cisco DNA Center. This course can be used in preparation for the Cisco Certified Network Associate 200-301 certification exam.
Course Title 25: Automation, Network Programmability, & SDN Architectures
Course Description: Explore the concepts of automation and programmability domain objectives. Delve into network programmability, why it's needed, and why you should know about it. Examine the SDN Architecture and its terminology, as well as the difference between data and control planes. This course can be used in preparation for the Cisco Certified Network Associate 200-301 certification exam.
Course Title 24: Configuring Port Security, DHCP Snooping, & DAI
Course Description: Explore the importance of port security and the steps and options required to configure static and sticky port security. Discover how to configure DHCP snooping and Dynamic ARP Inspection and why they are used and configured on switches. This course can be used in preparation for the Cisco Certified Network Associate 200-301 certification exam.
Course Title 23: Configuring & Verifying ACLs
Course Description: Explore the use of ACLs on Cisco devices and how to configure and verify standard, extended, and named ACLs. In addition, examine the differences between named and numbered ACLs. This course can be used in preparation for the Cisco Certified Network Associate 200-301 certification exam.
Course Title 22: AAA Security & VPN Types
Course Description: Explore Cisco's new model security, AAA security. Discover the differences between authentication, authorization, and accounting, and how to configure a router to use a RADIUS server and verify the configuration. Examine VPN types, including remote access VPNs and site-to-site VPNs, and when to use them. This course can be used in preparation for the Cisco Certified Network Associate 200-301 certification exam.
Course Title 21: Security Program &Password Policy Components
Course Description: Explore the basics of security programs including end user security components, user awareness, training, and physical access controls. Discover how to establish and manage a security password policy, factoring in complexity requirements. This course can be used in preparation for the Cisco Certified Network Associate 200-301 certification exam.
Course Title 20: SNMP, Syslog, & PHB for QoS
Course Description: Explore SNMP, including why you need to know about it and how to configure it. Examine the different versions and how to configure version 2c and 3 to make a router send SNMP information to the SNMP server. Delve into Syslog, including how actions are logged on Cisco devices, where logs are stored, and how to understand the log messages. In addition, discover the need for QoS and what per-hop behaviors do. This course can be used in preparation for the Cisco Certified Network Associate 200-301 certification exam.
Course Title 19: NTP, DNS, & DHCP
Course Description: Discover how to configure NTP, as well why its needed and how it is used for network device synchronization. Explore DNS and how to configure a Cisco router to work as a DNS server. Examine how DHCP manage and distributes IP information and how to configure a DHCP server and relay. This course can be used in preparation for the Cisco Certified Network Associate 200-301 certification exam.
Course Title 18: Configuring & Verifying NAT
Course Description: Explore networking services a CCNA professional should be aware of. Examine the use of NAT with IPv4, configure static NAT, and the drawbacks of using static NAT. Discover how to configure dynamic NAT and Port Address Translation, and how to verify the working configuration. This course can be used in preparation for the Cisco Certified Network Associate 200-301 certification exam.
Course Title 17: Dynamic Routing
Course Description: Explore the concept of dynamic routing, including protocol types, metrics, and how routers learn routes. Examine OSPF concepts such as conditions for becoming OSPF neighbors, how OSPF works, and how to configure and verify it. In addition, discover how to configure FHRPs and why you would use them, and configure VRRP and GLBP. This course can be used in preparation for the Cisco Certified Network Associate 200-301 certification exam.
Course Title 16: Static Routing
Course Description: Explore routing basics, including how frames move through routes to a destination and how routers build routing tables. Discover the use of IPv4 and IPv6 static default and network routes, and how to implement additional types of IPv4 and IPv4 routes. This course can be used in preparation for the Cisco Certified Network Associate 200-301 certification exam.
Course Title 15: Cisco WLC Configuration & Wireless Management Access
Course Description: Explore the GUI interface of a Cisco WLC and discover where to configure WLANs, security settings, QoS profiles, and advanced WLAN settings. Discover the different authentication settings for your WLAN by configuring WPA2 PSK through the GUI. Examine where to configure different management access options in the WLC, including settings for SSH, HTTP-HTTPS access, and serial connections. The use of TACACS+/RADIUS for authentication is also covered. This course can be used in preparation for the Cisco...
Course Title 14: Cisco Wireless Architecture & WLAN Components
Course Description: Explore the basics of wireless networking, including what is required to set up a wireless network, and Cisco wireless architectures and AP modes. Discover different components connected to the WLC, how devices are physically connected, and the types of connections needed in wireless infrastructure. This course can be used in preparation for the Cisco Certified Network Associate 200-301 certification exam.
Course Title 13: L2 Discovery Protocols & L2 and L3 EtherChannel Configuration
Course Description: Familiarize yourself with L2 discovery protocols, including how to configure Cisco Discovery Protocol and Link Local Discovery Protocol and verify their configuration. Examine L2 EtherChannel configuration, including why to use it, options and verification commands, and the protocols that can be used. In addition, how to configure L3 EtherChannel and how configuration differs from L2 EtherChannel is also covered. This course can be used in preparation for the Cisco Certified Network Associate 200-301 certification...
Course Title 12: Network Access, VLAN Configuration, & Interswitch Connectivity
Course Description: Explore how network access can be configured, as well as how switches function and why they are the choice for LAN connectivity over hubs. Examine the basics of VLANs, how to create them on switches, types of VLANs, and how to verify configuration. In addition, discover why you would connect multiple switches, how to do it, and how to verify your configuration. This course can be used in preparation for the Cisco Certified Network Associate 200-301 certification exam.
Course Title 11: Virtualization Concepts
Course Description: Discover virtualization concepts that IT professionals should know, types of virtualization, and how to install a virtual machine. This course can be used in preparation for the Cisco Certified Network Associate 200-301 certification exam.
Course Title 10: IPv6 Addressing & Configuration
Course Description: Explore the basics of identifying IPv6 addresses and why you should be using them. Examine the different types of IPv6 addresses, how to configure them on Cisco devices and on a Windows OS, and how to find IP addressing information in various operating systems. This course can be used in preparation for the Cisco Certified Network Associate 200-301 certification exam.
Course Title 9: IPv4 Subnetting
Course Description: Explore subnetting principles as an important part of your exam preparation. Discover how to subnet various class addresses and the difference between them. Examine methods for speeding up the subnetting process and how to perform a VLSm with an address space. This course can be used in preparation for the Cisco Certified Network Associate 200-301 certification exam.
Course Title 8: IP Addressing Basics & Configuration
Course Description: Familiarize yourself with the basics of IP addressing and the hardware and software components a CCNA professional should be able to identify. Examine where components are used and how they are connected for networking. In addition, discover how to configure IPv4 addresses on physical and logical interfaces and verify the configuration. This course can be used in preparation for the Cisco Certified Network Associate 200-301 certification exam.
Course Title 7: Layer 1 Physical & Configuration Issues
Course Description: Discover how to identify physical and configuration issues that can occur at Layer 1. On Cisco routers and switches, examine some of the different issues that interrupt data flow. This course can be used in preparation for the Cisco Certified Network Associate 200-301 certification exam.
Course Title 6: Layer 1 Interfaces & Cabling
Course Description: Explore the basics of building networking pathways, the different physical interfaces and cabling used in networking for connecting devices together, and the basic logical topology created by components. Delve into the fiber-optic, copper, and Ethernet cabling and when to use them, and examine the concept of Power Over Ethernet. This course can be used in preparation for the Cisco Certified Network Associate 200-301 certification exam.
Course Description: Explore the different WAN access topology architectures that network technicians need to be able to identify and understand. Examine the basic topologies implemented, regardless of whether you're using MPLS, MetroE, Broadband PPPoE, or VPNs for connectivity. Discover cloud network topology architectures and the terminology that describes them, and SOHO network topology architectures and the differences between home and small office components uses in a SOHO environment. This course can be used...
Course Title 4: Network Topology Architectures
Course Description: Explore network topology architectures, including where to use them and their components. In addition, examine data center topology architectures, including traditional and spine-leaf, and the differences between them. This course can be used in preparation for the Cisco Certified Network Associate 200-301 certification exam.
Course Title 3: WLCs, Access Points, Servers, & Endpoints
Course Description: Explore the roles and functions of Wireless LAN Controllers and Wireless Access Points, including when they and are not required. Additionally, examine where servers and endpoints fit into network infrastructure and the purposes they serve. This course can be used in preparation for the Cisco Certified Network Associate 200-301 certification exam.
Course Title 2: Networking Components - NGFW, NGIPS, & Cisco DNA Center
Course Description: Explore NGFW and NGIPS security devices, including how they differ from traditional firewalls and IPS devices and why they are needed in today's networking environment. Examine the purpose of Cisco DNA Center, its interface, and how it is used to work with network programmability. The goal of intent-based networking management is also covered. This course can be used in preparation for the Cisco Certified Network Associate 200-301 certification exam.