CCNA-Security (210-260)
3.2 (15 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
468 students enrolled
Wishlisted Wishlist

Please confirm that you want to add CCNA-Security (210-260) to your Wishlist.

Add to Wishlist

CCNA-Security (210-260)

Cisco Certified Security Associate
3.2 (15 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
468 students enrolled
Last updated 1/2016
English
Current price: $10 Original price: $35 Discount: 71% off
1 day left at this price!
30-Day Money-Back Guarantee
Includes:
  • 15 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Understand and implement network security concepts and technologies. You will be able to implement security on routers, switches and firewalls and also configure VPNs
View Curriculum
Requirements
  • You should have access to real routers, switches and ASA firewall but if thats not possible then GNS3 or even packet tracer would cover most of the topics. Though I would strongly urge to have access to physical equipment.
Description

Learn the technologies and concepts of network security in this complete course and earn your CISCO certification.

Grasp the understanding of security models, appliances, tools and techniques and make yourself known as security specialist.

Concepts of Security

Cryptography basics

IPSec Fundamentals and Operation

Manage CISCO Firewalls

Implement security through certificates

Learn about ACS and ISE

CISCO is the leading Networking equipment provider with a large product portfolio ranging from small Enterprises to large Data Centers. CCNA (Security) certification is one of the fundamental certifications that will help you in realizing the concepts of cyber security and its implementations in real world.

This course has been designed for intermediate level IT Engineers. It will take you through the basics of terminologies in cyber security, while implementing them on Cisco Routers switches and firewalls. By taking this course you will learn the advanced features of firewall contexts and high availability You will observe actual packets as they move through the wires and make those “dots connect”. While configuring the devices you will feel as if you are doing it yourself, its that close and personal. By following this course you will not only be able achieve your CCNA (Security) certification but you will also feel to go deeper into the security domain and learn more about it.

Who is the target audience?
  • This course is meant for aspiring network engineers with some knowledge of computer networking and a knack of security. In order to fully get benfit from this course I would recommend to have CCNA or at least CCENT level certification.
Students Who Viewed This Course Also Viewed
Curriculum For This Course
Expand All 50 Lectures Collapse All 50 Lectures 14:58:24
+
Introduction
1 Lecture 06:47

Introductory lecture to the course. What to expect? How to learn and what are the learning sources.

Preview 06:47
+
Security Concepts
3 Lectures 45:34

We will learn about basic terminologies related to security such as Confidentiality, Integrity and Availability.

Security Concepts - CIA
15:57

Learn about Security Models in the industry related to Campus / WAN / Virtualization. Also see some of the possible Data Loss mechanisms that a hacker can employ to steal your information.

Securing Network Topologies
19:02

Lets work together to grasp the foundations of cryptography.

Understand basics of Cryptography
10:35
+
Secure Access
11 Lectures 03:13:20

We will learn about installing and managing Cisco Configuration Professional (CCP) GUI to manage our CISCO devices.

Introduction to Cisco Configuration Professional
17:34

In this lecture we will discuss methods and techniques to make it harder to compromise the system security.

Securing the Management Plane
18:35

Let's lab to help us understand the implementation of Management Plane Security.

Configure Management plane security including AAA
20:01

Continuation from previous lecture. Some more interesting lab work.
Configure AAA and Syslog
20:21

TACACS & RADIUS Overview
11:24

Configure Router with TACACS
18:18

Configure Router with TACACS (part-2)
21:00

Configure Router with RADIUS
15:39

We will briefly cover some of the important functions and features that Access Control Server (ACS) and Identity Services Engine (ISE) provide to manage our network security infrastructure.

CISCO ACS and ISE
16:44

Lets protect our network by utilizing 802.1x (aka dot1x) on our CISCO switches.

Configure IEEE 802.1x
23:44

You will understand the security concerns regarding BYOD infrasturcture and how Mobile Device Management helps to address them.

BYOD and Mobile Device Management
10:00
+
Secure Control Plane and Routing Protocols
5 Lectures 01:42:53

Learn about https configuration on CISCO devices and introducing securtiyt measures for NTP protocol.

HTTPS and NTP Protection
17:36

We will see how we can configure SCP protocol, Syslog logging and how we can make IOS resilient to untowards situations.

Secure Copy, Syslogging and IOS Resiliency
22:12

Learn about different versions of SNMP and what are the security benefits of using SNMPv3. We will also see configuration of SNMPv3 on CISCO router.

Secure Management through SNMPv3
20:54

In this video we will learn about CPP and see the relevant configuration.

Control Plane Policing
20:12

You will see how security aspects are added in routing protocols such OSPF, RIP and EIGRP.

Secure Routing
21:59
+
Layer 2 Network Security
5 Lectures 01:30:26

In this lecture we will talk about STP protocol and its features such as BPDU guard, Loop Guard and Root Guard.

Spanning Tree Protocol protection mechanisms
19:24

Let's learn about CAM table directed attacks and the techniques to thwart such attacks.

CAM Table Overflow / MAC Spoofing
20:08

I will show you what is DHCP exhaustion and how we can counter such attacks

DHCP exhaustion attack
25:50

Let's see how ARP protocol can be used to exploit the layer 2 (switched) network and how we can use DAI (Dynamic ARP inspection) to couter those kind of threats. Also have a sneak peak at Native VLAN based potential security threats.

ARP Spoofing and Native VLAN vulnerability
16:02

You will learn about some of the security concerns associated with CDP / LLDP protocols. Also I'll show you what are private VLANs and their associated security implications.

CDP / LLDP and Private VLAN related threats
09:02
+
CISCO Firewall Technologies
11 Lectures 03:32:32

You will learn about different firewall types that we can use in our network for protection agaist malicious activities.

Firewall Technologies
19:59

We will learn how to configure a CISCO router to act like zone based firewall.

CISCO Zone Based Firewall
19:59

Let's see this great CISCO product known as Adaptive Security Appliance (ASA)

Preview 18:41

Let's take a look at the basic configuration of ASA.

Configure ASA - basics
19:50

Here I'll show you how to configure ASA to allow different kind of trafiic.

Configure ASA - Our first Rules
21:28

We will see how DHCP works and what are different NAT functions we can configure on ASA.

Preview 16:13

I will teach you how to configure DHCP sever on ASA as well as how you can configure static NAT and interface overload on ASA.

Configure DHCP, Static NAT and Interface Overload
20:22

You will see how to configure dynamic NAT as well as PAT on ASA.

Configure Dynamic NAT & PAT
14:32

You will understand what are security contexts and how we can configure them on ASA.

ASA Security contexts
21:47

ASA High Availability (part-1)
19:58

ASA High Availability (part-2)
19:43
+
Virtual Private Networks
8 Lectures 02:35:11

I will teach you VPNs, their requirement in the real world and also some details about cryptography.

Understand VPNs
18:45

This is continuation from previous lecture where we will delve deeper into cryptography.

Cryptography Ciphers and Hashing
21:04

Let's look at what are digital signatures and what is all about PKI (Public Key Infrastructure)

Digital Signatures & Public Key Infrastructure
20:39

You will learn about the details of IPSec protocol that is used in the industry to protect our network communication.

Understanding IPSec
19:15

In this very important lecture you will see how to configure Site-to-site IPSec VPN between CISCO ASA and CISCO Router.

Configure IPSec Site-to-Site
19:32

I will show you how to configure our CISCO routers to provide secure Remote-Access VPN facility to our distant workers.

Configure IPsec Remote-Access
25:29

We will configure ASA to provide Clientless (or browser based) connectivity to our remote users.

Configure SSL VPN - Clientless
19:43

I'll show you how to configure SSL VPN on ASA to provide connectivity to users who have CISCO AnyConnect client software.

Configure SSL VPN - AnyConnect
10:44
+
Intrusion Prevention System (IPS)
3 Lectures 43:49
IPS / IDS Introduction
14:00

IPS / IDS Detection Mechanisms
18:25

IPS Signature Engines and Monitoring Tools
11:24
+
Content and End Point Security
3 Lectures 47:52
Email based threats and Security
17:34

Web based Security threats and tools to mitigate
12:20

End Point Security threats
17:58
About the Instructor
Ahmad Nadeem
3.9 Average rating
597 Reviews
13,298 Students
6 Courses
Independent Network & Telecom Consultant

Mr. Ahmad Nadeem has a Bachelors in Telecom Engineering and a Masters in Engineering Management. He has been working in multiple roles focusing on different technologies in both private and public sector for over 14 years now. In his early years of professional life, he developed aptitude towards IP based networks and gradually that became as his core field. He likes to work on latest technologies including virtualization and cloud computing. He is also an ardent supporter of Opensource systems and likes to implement technology based on Opensource platforms. When he is not busy doing tech stuff, he likes to cook and just spend time with his family and friends.

Mehreen Kamran
4.2 Average rating
436 Reviews
12,088 Students
5 Courses