Cisco CCNA Cyber Ops - Understanding Cisco Cybersecurity Fundamentals (SECFND) 210-250

Hours: 40 / Access Length: 12 Months / Delivery: Online, Self-Paced
Retail Price: $995.00

Course Overview:

The Cisco 210-250 SECFND certification exam is the first step of the two required exams to get the CCNA Cyber Ops certification. The SECFND 210-250 exam validates the candidates cybersecurity foundational knowledge, basic principles, and core skills required to understand the more advanced associate-level materials in the second required exam, Implementing Cisco Cybersecurity Operations (SECOPS).

This course prepares a student to take the Cisco CCNA Cyber Ops - Understanding Cisco Cybersecurity Fundamentals (SECFND) 210-250 certification exam.

Course Outline:

Chapter 1: Introduction
  • About the 210-250 CCNA Cyber Ops SECFND Exam
Chapter 2: Fundamentals of Networking Protocols and Networking Devices
  • TCP/IP and OSI Model
  • Layer 2 Fundamentals and Technologies
  • Internet Protocol and Layer 3 Technologies
  • Internet Control Message Protocol (ICMP)
  • Domain Name System (DNS)
  • IPv6 Fundamentals
  • Transport Layer Technologies and Protocols
  • Review All Key Topics
  • References and Further Reading
Chapter 3: Network Security Devices and Cloud Services
  • Network Security Systems
  • Security Cloud-based Solutions
  • Cisco NetFlow
  • Data Loss Prevention
  • Review All Key Topics
Chapter 4: Security Principles
  • The Principles of the Defense-in-Depth Strategy
  • What Are Threats, Vulnerabilities, and Exploits?
  • Confidentiality, Integrity, and Availability: The CIA Triad
  • Risk and Risk Analysis
  • Personally Identifiable Information and Protected Health Information
  • Principle of Least Privilege and Separation of Duties
  • Security Operation Centers
  • Forensics
  • Review All Key Topics
Chapter 5: Introduction to Access Controls
  • Information Security Principles
  • Subject and Object Definition
  • Access Control Fundamentals
  • Access Control Process
  • Information Security Roles and Responsibilities
  • Access Control Types
  • Access Control Models
  • Access Control Mechanisms
  • Identity and Access Control Implementation
  • Review All Key Topics
  • References and Additional Reading
Chapter 6: Introduction to Security Operations Management
  • Introduction to Identity and Access Management
  • Security Events and Logs Management
  • Assets Management
  • Introduction to Enterprise Mobility Management
  • Configuration and Change Management
  • Vulnerability Management
  • Patch Management
  • References and Additional Readings
  • Review All Key Topics
Chapter 7: Fundamentals of Cryptography and Public Key Infrastructure (PKI)
  • Cryptography
  • Fundamentals of PKI
  • Review All Key Topics
Chapter 8: Introduction to Virtual Private Networks (VPNs)
  • What Are VPNs?
  • Site-to-site vs. Remote-Access VPNs
  • An Overview of IPsec
  • SSL VPNs
  • Review All Key Topics
Chapter 9: Windows-Based Analysis
  • Process and Threads
  • Memory Allocation
  • Windows Registration
  • Windows Management Instrumentation
  • Handles
  • Services
  • Windows Event Logs
  • Review All Key Topics
  • References and Further Reading
Chapter 10: Linux- and Mac OS X—Based Analysis
  • Processes
  • Forks
  • Permissions
  • Symlinks
  • Daemons
  • UNIX-Based Syslog
  • Apache Access Logs
  • Review All Key Topics
  • References and Further Reading
Chapter 11: Endpoint Security Technologies
  • Antimalware and Antivirus Software
  • Host-Based Firewalls and Host-Based Intrusion Prevention
  • Application-Level Whitelisting and Blacklisting
  • System-Based Sandboxing
  • Review All Key Topics
Chapter 12: Network and Host Telemetry
  • Network Telemetry
  • Host Telemetry
  • Review All Key Topics
Chapter 13: Security Monitoring Operational Challenges
  • Security Monitoring and Encryption
  • Security Monitoring and Network Address Translation
  • Security Monitoring and Event Correlation Time Synchronization
  • DNS Tunneling and Other Exfiltration Methods
  • Security Monitoring and Tor
  • Security Monitoring and Peer-to-Peer Communication
  • Review All Key Topics
Chapter 14: Types of Attacks and Vulnerabilities
  • Types of Attacks
  • Types of Vulnerabilities
  • Review All Key Topics
Chapter 15: Security Evasion Techniques
  • Encryption and Tunneling
  • Resource Exhaustion
  • Traffic Fragmentation
  • Protocol-Level Misinterpretation
  • Traffic Timing, Substitution, and Insertion
  • Pivoting
  • Review All Key Topics
  • References and Further Reading

Certification(s):

This course prepares a student to take the Cisco CCNA Cyber Ops - Understanding Cisco Cybersecurity Fundamentals (SECFND) 210-250 certification exam.


System Requirements:

Internet Connectivity Requirements:
  • Cable and DSL internet connections are recommended.

Hardware Requirements:
  • Minimum Pentium 400 Mhz CPU or G3 Macintosh. 1 GHz or greater CPU recommended.
  • 256MB RAM minimum. 1 GB RAM recommended.
  • 800x600 video resolution minimum. 1025x768 recommended.
  • Speakers/Headphones to listen to Dialogue steaming audio sessions.
  • A microphone to speak in Dialogue streaming audio sessions.
Operating System Requirements:
  • Windows Vista, 7, 8, 8.1, 9, 10
  • Mac OSX 10 or higher.
  • OpenSUSE Linux 9.2 or higher.
Web Browser Requirements:
  • Google Chrome is recommended.
  • Firefox 13.x or greater.
  • Internet Explorer 6.x or greater.
  • Safari 3.2.2 or greater.
Software Requirements:
  • Adobe Flash Player 6 or greater.
  • Oracle Java 7 or greater.
  • Adobe Reader 7 or greater.
Web Browser Settings:
  • Accept Cookies
  • Disable Pop-up Blocker.


**Outlines are subject to change, as courses and materials are updated.**