CCNA Security Technology Course: 210-260 IINS

Topic: Securing Network Devices

There is a huge gap of Security professionals on the market, so this will be your starting point in the Security world, a complex but fun and challenging track. As being CCNA Security certified, a network professional demonstrates the skills required to develop a security infrastructure, recognize threats and vulnerabilities to networks, and mitigate security threats. This course will help candidates obtain a deeper understanding of the technologies from the blueprint, which will tremendously help prepare for the certification exam and also for real-life deployments. As opposed to Bootcamp courses, this certification video series is a mix of slides, visual explanations and configuration examples to reinforce the knowledge. Slides should be used as a reference for the exam, while the examples as a reference for real-life deployments. Lab topologies will be designed, explaining the objective for each design, and then built from scratch by the instructor, nothing being pre-scripted, pre-tested or pre-recorded. During the process, the instructor will intentionally demonstrate the effects of misconfigurations and failures, randomly making learners think about how to approach a specific problem, never seen before. You will also learn how to build a proper study and learning methodology.
1
Network Device Planes of Operation
10m
2
Securing the Management Plane - AAA
3m
3
What is AAA?
6m
4
AAA Model
7m
5
Radius
6m
6
TACACS+
3m
7
When to Use Which Protocol
2m
8
Cisco's Authentication Servers
2m
9
AAA for Device Administration
5m
10
IOS Privilege Levels
5m
11
Authentication Configuration & Verification Steps
15m
12
Remote Access for Device Administration
22m
13
AAA Implementation :: Part 1
20m
14
AAA Implementation :: Part 2
19m
15
AAA Implementation :: Part 3
15m
16
Syslog
15m
17
Syslog Configuration & Verification Steps
11m
18
Network Time Protocol - NTP
6m
19
NTP Configuration & Verification Steps
4m
20
Simple Network Management Protocol
9m
21
SNMPv3
6m
22
SNMPv3 Configuration & Verification Steps
5m
23
Netflow
4m
24
Control-Plane Security
6m
25
Routing Protocol Authentication
3m
26
EIGRP Authentication Configuration Steps
1m
27
Control-Plane Policing - CoPP
6m
28
Control-Plane Protection - CPPr
5m
29
Management-Plane Protection - MPP
12m
30
Network Device Reconnaissance
9m
31
Lateral Movement Attacks
5m
32
Private VLAN Edge Overview
6m
33
Private VLANs Overview
2m
34
Private VLANs VLAN & Port Types
3m
35
Private VLANs Traffic Filtering
13m
36
VLAN Hopping Attack
9m
37
VLAN Hopping Mitigation
8m
38
CAM Table Attacks
3m
39
CAM Attack Mitigation
3m
40
Port Security Violation Options
3m
Port Security Configuration
8m
42
DHCP Starvation Attack
7m
43
DHCP Starvation Variation & Mitigation
6m
44
Dynamic ARP Inspection Configuration Steps
13m
45
ARP Spoofing Attacks & Mitigation
9m
46
DAI Configuration Steps
21m
47
STP Attacks & Mitigation
20m