CCNA-Security (210-260)
3.4 (20 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
484 students enrolled
Wishlisted Wishlist

Please confirm that you want to add CCNA-Security (210-260) to your Wishlist.

Add to Wishlist

CCNA-Security (210-260)

Cisco Certified Security Associate
3.4 (20 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
484 students enrolled
Last updated 1/2016
Current price: $10 Original price: $35 Discount: 71% off
5 hours left at this price!
30-Day Money-Back Guarantee
  • 15 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Understand and implement network security concepts and technologies. You will be able to implement security on routers, switches and firewalls and also configure VPNs
View Curriculum
  • You should have access to real routers, switches and ASA firewall but if thats not possible then GNS3 or even packet tracer would cover most of the topics. Though I would strongly urge to have access to physical equipment.

Learn the technologies and concepts of network security in this complete course and earn your CISCO certification.

Grasp the understanding of security models, appliances, tools and techniques and make yourself known as security specialist.

Concepts of Security

Cryptography basics

IPSec Fundamentals and Operation

Manage CISCO Firewalls

Implement security through certificates

Learn about ACS and ISE

CISCO is the leading Networking equipment provider with a large product portfolio ranging from small Enterprises to large Data Centers. CCNA (Security) certification is one of the fundamental certifications that will help you in realizing the concepts of cyber security and its implementations in real world.

This course has been designed for intermediate level IT Engineers. It will take you through the basics of terminologies in cyber security, while implementing them on Cisco Routers switches and firewalls. By taking this course you will learn the advanced features of firewall contexts and high availability You will observe actual packets as they move through the wires and make those “dots connect”. While configuring the devices you will feel as if you are doing it yourself, its that close and personal. By following this course you will not only be able achieve your CCNA (Security) certification but you will also feel to go deeper into the security domain and learn more about it.

Who is the target audience?
  • This course is meant for aspiring network engineers with some knowledge of computer networking and a knack of security. In order to fully get benfit from this course I would recommend to have CCNA or at least CCENT level certification.
Students Who Viewed This Course Also Viewed
Curriculum For This Course
50 Lectures
1 Lecture 06:47

Introductory lecture to the course. What to expect? How to learn and what are the learning sources.

Preview 06:47
Security Concepts
3 Lectures 45:34

We will learn about basic terminologies related to security such as Confidentiality, Integrity and Availability.

Security Concepts - CIA

Learn about Security Models in the industry related to Campus / WAN / Virtualization. Also see some of the possible Data Loss mechanisms that a hacker can employ to steal your information.

Securing Network Topologies

Lets work together to grasp the foundations of cryptography.

Understand basics of Cryptography
Secure Access
11 Lectures 03:13:20

We will learn about installing and managing Cisco Configuration Professional (CCP) GUI to manage our CISCO devices.

Introduction to Cisco Configuration Professional

In this lecture we will discuss methods and techniques to make it harder to compromise the system security.

Securing the Management Plane

Let's lab to help us understand the implementation of Management Plane Security.

Configure Management plane security including AAA

Continuation from previous lecture. Some more interesting lab work.
Configure AAA and Syslog


Configure Router with TACACS

Configure Router with TACACS (part-2)

Configure Router with RADIUS

We will briefly cover some of the important functions and features that Access Control Server (ACS) and Identity Services Engine (ISE) provide to manage our network security infrastructure.


Lets protect our network by utilizing 802.1x (aka dot1x) on our CISCO switches.

Configure IEEE 802.1x

You will understand the security concerns regarding BYOD infrasturcture and how Mobile Device Management helps to address them.

BYOD and Mobile Device Management
Secure Control Plane and Routing Protocols
5 Lectures 01:42:53

Learn about https configuration on CISCO devices and introducing securtiyt measures for NTP protocol.

HTTPS and NTP Protection

We will see how we can configure SCP protocol, Syslog logging and how we can make IOS resilient to untowards situations.

Secure Copy, Syslogging and IOS Resiliency

Learn about different versions of SNMP and what are the security benefits of using SNMPv3. We will also see configuration of SNMPv3 on CISCO router.

Secure Management through SNMPv3

In this video we will learn about CPP and see the relevant configuration.

Control Plane Policing

You will see how security aspects are added in routing protocols such OSPF, RIP and EIGRP.

Secure Routing
Layer 2 Network Security
5 Lectures 01:30:26

In this lecture we will talk about STP protocol and its features such as BPDU guard, Loop Guard and Root Guard.

Spanning Tree Protocol protection mechanisms

Let's learn about CAM table directed attacks and the techniques to thwart such attacks.

CAM Table Overflow / MAC Spoofing

I will show you what is DHCP exhaustion and how we can counter such attacks

DHCP exhaustion attack

Let's see how ARP protocol can be used to exploit the layer 2 (switched) network and how we can use DAI (Dynamic ARP inspection) to couter those kind of threats. Also have a sneak peak at Native VLAN based potential security threats.

ARP Spoofing and Native VLAN vulnerability

You will learn about some of the security concerns associated with CDP / LLDP protocols. Also I'll show you what are private VLANs and their associated security implications.

CDP / LLDP and Private VLAN related threats
CISCO Firewall Technologies
11 Lectures 03:32:32

You will learn about different firewall types that we can use in our network for protection agaist malicious activities.

Firewall Technologies

We will learn how to configure a CISCO router to act like zone based firewall.

CISCO Zone Based Firewall

Let's see this great CISCO product known as Adaptive Security Appliance (ASA)

Preview 18:41

Let's take a look at the basic configuration of ASA.

Configure ASA - basics

Here I'll show you how to configure ASA to allow different kind of trafiic.

Configure ASA - Our first Rules

We will see how DHCP works and what are different NAT functions we can configure on ASA.

Preview 16:13

I will teach you how to configure DHCP sever on ASA as well as how you can configure static NAT and interface overload on ASA.

Configure DHCP, Static NAT and Interface Overload

You will see how to configure dynamic NAT as well as PAT on ASA.

Configure Dynamic NAT & PAT

You will understand what are security contexts and how we can configure them on ASA.

ASA Security contexts

ASA High Availability (part-1)

ASA High Availability (part-2)
Virtual Private Networks
8 Lectures 02:35:11

I will teach you VPNs, their requirement in the real world and also some details about cryptography.

Understand VPNs

This is continuation from previous lecture where we will delve deeper into cryptography.

Cryptography Ciphers and Hashing

Let's look at what are digital signatures and what is all about PKI (Public Key Infrastructure)

Digital Signatures & Public Key Infrastructure

You will learn about the details of IPSec protocol that is used in the industry to protect our network communication.

Understanding IPSec

In this very important lecture you will see how to configure Site-to-site IPSec VPN between CISCO ASA and CISCO Router.

Configure IPSec Site-to-Site

I will show you how to configure our CISCO routers to provide secure Remote-Access VPN facility to our distant workers.

Configure IPsec Remote-Access

We will configure ASA to provide Clientless (or browser based) connectivity to our remote users.

Configure SSL VPN - Clientless

I'll show you how to configure SSL VPN on ASA to provide connectivity to users who have CISCO AnyConnect client software.

Configure SSL VPN - AnyConnect
Intrusion Prevention System (IPS)
3 Lectures 43:49
IPS / IDS Introduction

IPS / IDS Detection Mechanisms

IPS Signature Engines and Monitoring Tools
Content and End Point Security
3 Lectures 47:52
Email based threats and Security

Web based Security threats and tools to mitigate

End Point Security threats
About the Instructor
Ahmad Nadeem
4.1 Average rating
848 Reviews
18,586 Students
6 Courses
Independent Network & Telecom Consultant

Mr. Ahmad Nadeem has a Bachelors in Telecom Engineering and a Masters in Engineering Management. He has been working in multiple roles focusing on different technologies in both private and public sector for over 14 years now. In his early years of professional life, he developed aptitude towards IP based networks and gradually that became as his core field. He likes to work on latest technologies including virtualization and cloud computing. He is also an ardent supporter of Opensource systems and likes to implement technology based on Opensource platforms. When he is not busy doing tech stuff, he likes to cook and just spend time with his family and friends.

Mehreen Kamran
4.2 Average rating
623 Reviews
17,017 Students
5 Courses