Understanding Cisco Cybersecurity Fundamentals (v1.0) - CTU Training Solutions
Login / Register

Understanding Cisco Cybersecurity Fundamentals (v1.0)

This is an Associate-level self-study technical course in the curriculum for the CCNA Cyber Ops certification. This course allows learners to understand cybersecurity’s basic principles and foundational knowledge, as well as obtain the core skills needed to grasp the more advanced associate-level materials in the second required exam, “Implementing Cisco Cybersecurity Operations (SECOPS)”. It focuses on cybersecurity operations principles and technologies, using hands-on examples in realistic scenarios, with real-life security products and equipment. Upon completion you will be able to: Describe, compare and identify various network concepts Fundamentals of TCP/IP Describe and compare fundamental security concepts Describe network applications and the security challenges Understand basic cryptography principles. Understand endpoint attacks, including interpreting log data to identify events in Windows and Linux Develop knowledge in security monitoring, including i...
Course Prerequisites:
The knowledge and skills necessary before attending this course are: Working knowledge of the Windows and... Show More
Request A Quote

Only available On-Demand

On-Demand Training

Now you can control your learning experience. When you purchase on-demand training, you gain access to official course content that is available to you from anywhere at any time. This product includes high-quality videos that covers in-depth content, hands-on learning through live lab environments, knowledge checks at the end of the modules and course and helps you build deep technical skills at your own pace.

Please note, Cisco on-demand is currently unavailable, please contact us for any enquiries.
Request a FREE 30-Day Demo

Course Price
On Request

Get Access for
1 Year

Course Content

Course Content

  • Section 1: Understanding the TCP/IP Protocol Suite
  • Section 2: Understanding the Network Infrastructure
  • Section 3: Understanding Common TCP/IP Attacks
  • Section 4: Understanding Basic Cryptography Concepts
  • Section 5: Describing Information Security Concepts
  • Section 6: Understanding Network Applications
  • Section 7: Understanding Common Network Application Attacks
  • Section 8: Understanding Windows Operating System Basics
  • Section 9: Understanding Linux Operating System Basics
  • Section 10: Understanding Common Endpoint Attacks
  • Section 11: Understanding Network Security Technologies
  • Section 12: Understanding Endpoint Security Technologies
  • Section 13: Describing Security Data Collection
  • Section 14: Describing Security Event Analysis

- See fewer details

Lab Outline

  • Discovery Lab 1.21: Explore the TCP/IP Protocol Suite
  • Discovery Lab 2.14: Explore the Network Infrastructure
  • Discovery Lab 3.15: Explore TCP/IP Attacks
  • Discovery Lab 4.18: Explore Cryptographic Technologies
  • Discovery Lab 6.10: Explore Network Applications
  • Discovery Lab 7.14: Explore Network Application Attacks
  • Discovery Lab 8.27: Explore the Windows Operating System
  • Discovery Lab 9.32: Explore the Linux Operating System
  • Discovery Lab 10.16: Explore Endpoint Attacks
  • Discovery Lab 11.24: Explore Network Security Technologies
  • Discovery Lab 12.9: Explore Endpoint Security
  • Discovery Lab 13.19: Explore Security Data for Analysis

+ See more details

CTU Training Solutions , Updated: October 11th, 2018

Request A Quote

The course information above is subject to change without notification due to market trends in the industry, legislation and/or programme version updates. Terms and Conditions

Join the CTU community

Join the CTU Community Portal and gain access to superior resources.

Join for Free

Open chat
Need Help?
How can we assist you today?