CCNA-Security (210-260)

Cisco Certified Security Associate
3.1 (14 ratings) Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
447 students enrolled
$19
$35
46% off
Take This Course
  • Lectures 50
  • Length 15 hours
  • Skill Level Intermediate Level
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works

Discover

Find online courses made by experts from around the world.

Learn

Take your courses with you and learn anywhere, anytime.

Master

Learn and practice real-world skills and achieve your goals.

About This Course

Published 1/2016 English

Course Description

Learn the technologies and concepts of network security in this complete course and earn your CISCO certification.

Grasp the understanding of security models, appliances, tools and techniques and make yourself known as security specialist.

Concepts of Security

Cryptography basics

IPSec Fundamentals and Operation

Manage CISCO Firewalls

Implement security through certificates

Learn about ACS and ISE

CISCO is the leading Networking equipment provider with a large product portfolio ranging from small Enterprises to large Data Centers. CCNA (Security) certification is one of the fundamental certifications that will help you in realizing the concepts of cyber security and its implementations in real world.

This course has been designed for intermediate level IT Engineers. It will take you through the basics of terminologies in cyber security, while implementing them on Cisco Routers switches and firewalls. By taking this course you will learn the advanced features of firewall contexts and high availability You will observe actual packets as they move through the wires and make those “dots connect”. While configuring the devices you will feel as if you are doing it yourself, its that close and personal. By following this course you will not only be able achieve your CCNA (Security) certification but you will also feel to go deeper into the security domain and learn more about it.

What are the requirements?

  • You should have access to real routers, switches and ASA firewall but if thats not possible then GNS3 or even packet tracer would cover most of the topics. Though I would strongly urge to have access to physical equipment.

What am I going to get from this course?

  • Understand and implement network security concepts and technologies. You will be able to implement security on routers, switches and firewalls and also configure VPNs

What is the target audience?

  • This course is meant for aspiring network engineers with some knowledge of computer networking and a knack of security. In order to fully get benfit from this course I would recommend to have CCNA or at least CCENT level certification.

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.

Curriculum

Section 1: Introduction
06:47

Introductory lecture to the course. What to expect? How to learn and what are the learning sources.

Section 2: Security Concepts
15:57

We will learn about basic terminologies related to security such as Confidentiality, Integrity and Availability.

19:02

Learn about Security Models in the industry related to Campus / WAN / Virtualization. Also see some of the possible Data Loss mechanisms that a hacker can employ to steal your information.

10:35

Lets work together to grasp the foundations of cryptography.

Section 3: Secure Access
17:34

We will learn about installing and managing Cisco Configuration Professional (CCP) GUI to manage our CISCO devices.

18:35

In this lecture we will discuss methods and techniques to make it harder to compromise the system security.

20:01

Let's lab to help us understand the implementation of Management Plane Security.

20:21
Continuation from previous lecture. Some more interesting lab work.
TACACS & RADIUS Overview
11:24
Configure Router with TACACS
18:18
Configure Router with TACACS (part-2)
21:00
Configure Router with RADIUS
15:39
16:44

We will briefly cover some of the important functions and features that Access Control Server (ACS) and Identity Services Engine (ISE) provide to manage our network security infrastructure.

23:44

Lets protect our network by utilizing 802.1x (aka dot1x) on our CISCO switches.

10:00

You will understand the security concerns regarding BYOD infrasturcture and how Mobile Device Management helps to address them.

Section 4: Secure Control Plane and Routing Protocols
17:36

Learn about https configuration on CISCO devices and introducing securtiyt measures for NTP protocol.

22:12

We will see how we can configure SCP protocol, Syslog logging and how we can make IOS resilient to untowards situations.

20:54

Learn about different versions of SNMP and what are the security benefits of using SNMPv3. We will also see configuration of SNMPv3 on CISCO router.

20:12

In this video we will learn about CPP and see the relevant configuration.

21:59

You will see how security aspects are added in routing protocols such OSPF, RIP and EIGRP.

Section 5: Layer 2 Network Security
19:24

In this lecture we will talk about STP protocol and its features such as BPDU guard, Loop Guard and Root Guard.

20:08

Let's learn about CAM table directed attacks and the techniques to thwart such attacks.

25:50

I will show you what is DHCP exhaustion and how we can counter such attacks

16:02

Let's see how ARP protocol can be used to exploit the layer 2 (switched) network and how we can use DAI (Dynamic ARP inspection) to couter those kind of threats. Also have a sneak peak at Native VLAN based potential security threats.

09:02

You will learn about some of the security concerns associated with CDP / LLDP protocols. Also I'll show you what are private VLANs and their associated security implications.

Section 6: CISCO Firewall Technologies
19:59

You will learn about different firewall types that we can use in our network for protection agaist malicious activities.

19:59

We will learn how to configure a CISCO router to act like zone based firewall.

18:41

Let's see this great CISCO product known as Adaptive Security Appliance (ASA)

19:50

Let's take a look at the basic configuration of ASA.

21:28

Here I'll show you how to configure ASA to allow different kind of trafiic.

16:13

We will see how DHCP works and what are different NAT functions we can configure on ASA.

20:22

I will teach you how to configure DHCP sever on ASA as well as how you can configure static NAT and interface overload on ASA.

14:32

You will see how to configure dynamic NAT as well as PAT on ASA.

21:47

You will understand what are security contexts and how we can configure them on ASA.

ASA High Availability (part-1)
19:58
ASA High Availability (part-2)
19:43
Section 7: Virtual Private Networks
18:45

I will teach you VPNs, their requirement in the real world and also some details about cryptography.

21:04

This is continuation from previous lecture where we will delve deeper into cryptography.

20:39

Let's look at what are digital signatures and what is all about PKI (Public Key Infrastructure)

19:15

You will learn about the details of IPSec protocol that is used in the industry to protect our network communication.

19:32

In this very important lecture you will see how to configure Site-to-site IPSec VPN between CISCO ASA and CISCO Router.

25:29

I will show you how to configure our CISCO routers to provide secure Remote-Access VPN facility to our distant workers.

19:43

We will configure ASA to provide Clientless (or browser based) connectivity to our remote users.

10:44

I'll show you how to configure SSL VPN on ASA to provide connectivity to users who have CISCO AnyConnect client software.

Section 8: Intrusion Prevention System (IPS)
IPS / IDS Introduction
14:00
IPS / IDS Detection Mechanisms
18:25
IPS Signature Engines and Monitoring Tools
11:24
Section 9: Content and End Point Security
Email based threats and Security
17:34
Web based Security threats and tools to mitigate
12:20
End Point Security threats
17:58

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

Ahmad Nadeem, Independent Network & Telecom Consultant

Mr. Ahmad Nadeem has a Bachelors in Telecom Engineering and a Masters in Engineering Management. He has been working in multiple roles focusing on different technologies in both private and public sector for over 14 years now. In his early years of professional life, he developed aptitude towards IP based networks and gradually that became as his core field. He likes to work on latest technologies including virtualization and cloud computing. He is also an ardent supporter of Opensource systems and likes to implement technology based on Opensource platforms. When he is not busy doing tech stuff, he likes to cook and just spend time with his family and friends.

Instructor Biography

Ready to start learning?
Take This Course