Autoplay
Autocomplete
HTML5
Flash
Player
Speed
Previous Lecture
Complete and continue
CCNA Security 210-260
Introduction
CCNA Security 210-260: Introduction (5:59)
Module 1: Fundamentals of Network Security
Fundamentals of Network Security (0:25)
Lesson 1: Networking Security Concepts and Common Principles
Learning objectives (0:46)
1.1 Understanding Network and Information Security Basics (5:53)
1.2 Confidentiality, Integrity, and Availability (2:25)
1.3 Classifying Assets (1:44)
1.4 Types of Security Vulnerabilities (6:30)
1.5 Classifying Countermeasures (0:56)
1.6 Attack Methods & Vectors (6:12)
1.7 Applying Fundamental Security Principles To Network Design (1:30)
1.8 Understanding the Security Attack Surface in Different Network Topologies (2:14)
Lesson 2: Common Security Threats
Learning objectives (0:46)
2.1 Network Security Threat Landscape (2:23)
2.2 Distributed Denial of Service (DDoS) Attacks (2:11)
2.3 Social Engineering Methods (4:03)
2.4 Man-in-the-middle Attacks (0:43)
2.5 Malware Identification Tools (2:11)
2.6 Data Loss and Exfiltration Methods (1:03)
Module 2: Virtual Private Networks (VPNs)
Virtual Private Networks (VPNs) (0:28)
Lesson 3: Fundamentals of VPN Technology and Cryptography
Learning objectives (0:27)
3.1 Understanding VPNs and Why We Use Them (3:14)
3.2 Cryptography Basic Components (6:32)
3.3 Public Key Infrastructure (2:42)
3.4 Putting the Pieces of PKI to Work (4:24)
Lesson 4: Fundamentals of IP Security
Learning objectives (0:32)
4.1 IPsec Concepts, Components, and Operations (2:06)
4.2 IKE version 1 Fundamentals (3:03)
4.3 IKE version 2 Fundamentals (1:58)
Lesson 5: Implementing IPsec Site-to-Site VPNs
Learning objectives (0:27)
5.1 Configuring IPsec Site-to-Site VPNs in Cisco IOS Devices (10:17)
5.2 Troubleshooting IPsec Site-to-Site VPNs in Cisco IOS Devices (6:51)
5.3 Configuring IPsec Site-to-Site VPNs in Cisco ASA (9:02)
5.4 Troubleshooting IPsec Site-to-Site VPNs in Cisco ASA (3:42)
Lesson 6: Implementing SSL Remote Access VPNs Using Cisco ASA
Learning objectives (0:54)
6.1 Introduction to Clientless SSL VPN (1:38)
6.2 Configuring Clientless SSL VPNs in the Cisco ASA (6:11)
6.3 Introduction to AnyConnect (2:54)
6.4 Installing AnyConnect (6:36)
6.5 AnyConnect for Mobile Devices (7:14)
6.6 Configuring AnyConnect SSL VPN Connections in the Cisco ASA (10:08)
6.7 Troubleshooting SSL VPNs in the Cisco ASA (11:58)
Module 3: Content and Endpoint Security
Content and Endpoint Security (0:33)
Lesson 7: Mitigation Technologies for Email-based and Web-based Threats
Learning objectives (0:46)
7.1 Introduction to E-mail-Based Threats (0:49)
7.2 Cisco Cloud E-mail Security (2:34)
7.3 Cisco Hybrid E-mail Security (1:44)
7.4 Cisco E-mail Security Appliance (9:42)
7.5 Introduction to Cisco Web Security (2:28)
7.6 Cisco Cloud Web Security (CWS) (2:30)
7.7 Cisco Web Security Appliance (WSA) (6:22)
7.8 Cisco Content Security Management Appliance (SMA) (1:57)
Lesson 8: Mitigation Technology for Endpoint Threats
Learning objectives (0:33)
8.1 Antivirus and Anti-malware Solutions (5:01)
8.2 Personal Firewalls and Host Intrusion Prevention Systems (0:49)
8.3 Cisco Advanced Malware Protection (AMP) For Endpoints (1:09)
8.4 Hardware and Software Encryption of Endpoint Data (3:03)
Module 4: Cisco Firewall Technologies and Intrusion Prevention System Technologies
Cisco Firewall Technologies and Intrusion Prevention System Technologies (0:55)
Lesson 9: Understanding Firewall Fundamentals
Learning objectives (0:35)
9.1 Understanding Firewall Functions, Placement, Benefits, and Limitations (7:37)
9.2 Examining Types of Firewalls (9:19)
9.3 Understanding Stateful vs Stateless Inspection (5:24)
9.4 Network Address Translation Overview (7:16)
Lesson 10: Implementing Cisco IOS Zone-Based Firewalls
Learning objectives (0:31)
10.1 IOS Firewall Benefits (4:58)
10.2 Basic Configuration and Features (9:58)
10.3 NAT Configuration on the IOS Firewall (5:27)
10.4 Using Cisco Configuration Professional (CCP) (5:03)
Lesson 11: Configuring Basic Firewall Policies on Cisco ASA
Learning objectives (0:43)
11.1 Basic Configuration of the ASA (8:02)
11.2 Network Objects for Access Control (13:29)
11.3 NAT Configuration on the ASA (7:05)
11.4 Security Contexts on the ASA (6:22)
11.5 High Availability and Failover on the ASA (12:51)
Lesson 12: IPS Fundamentals
Learning objectives (0:34)
12.1 Comparing IPS to Firewall and IDS (4:49)
12.2 IDS Deployment Considerations (3:41)
12.3 IPS Deployement Considerations (4:36)
12.4 IPS Configuration Basics: Rules and Detection Methods (10:06)
12.5 IPS Configuration: Signatures and Alerts (9:46)
12.6 Understanding Blacklists and Whitelists (2:03)
Module 5: Secure Routing and Switching
Secure Routing and Switching (0:51)
Lesson 13: Securing Layer 2 Technologies
Learning objectives (0:35)
13.1 Understanding Layer 2 Communication (3:40)
13.2 Understanding VLAN Basics, Segmentation, and Trunking (9:44)
13.3 Understanding Spanning-Tree Protocol Basics (4:16)
13.4 Understanding Layer 2 Exploitation by Attackers (1:48)
13.5 Layer 2 Attacks and Mitigation: BPDU Guard and Root Guard (3:17)
13.6 Layer 2 Attacks and Mitigation: ARP Spoofing (3:17)
13.7 Layer 2 Attacks and Mitigation: CAM Table Exhaustion/MAC Flooding (3:12)
13.8 Layer 2 Attacks and Mitigation: Cisco Discovery Protocol (3:23)
13.9 Layer 2 Attacks and Mitigation: DHCP Snooping and Dynamic ARP Inspection (5:25)
13.10 Layer 2 Attacks and Mitigation: Private VLANs and VLAN Hopping (4:34)
Lesson 14: Network Foundation Protection
Learning objectives (0:21)
14.1 Understanding How Critical Your Network Is (2:14)
14.2 Introducing the Network Foundation Protection Framework (3:53)
14.3 Basic Security Guidelines for the Network Foundation Protection Framework (7:50)
Lesson 15: Securing the Management Plane
Learning objectives (1:21)
15.1 Overview of the Management Plane and Security Best Practices (3:13)
15.2 Understanding User Authentication and AAA (5:13)
15.3 Understanding AAA Options (2:04)
15.4 Introducing AAA Servers (3:43)
15.5 Security Best Practices: Passwords and Role Based Access Control (4:45)
15.6 Security Best Practices: Encrypted Management Controls, Logging, and Monitoring (4:38)
15.7 Security Best Practices: Management Protocol Security, NTP, and System Files (3:25)
15.8 Connecting to a Cisco Router and Setting a Secure Password (5:45)
15.9 Associating a Username with a Secure Password from the Router Console (5:19)
15.10 Configuring Basic Security for Telnet Connectivity (7:17)
15.11 RADIUS vs. TACACS+ (12:15)
15.12 Configuring AAA (11:43)
15.13 Troubleshooting AAA (2:32)
15.14 Privilege Levels and Parser Views (9:04)
15.15 Configuring Secure Management Protocols: SSH (5:48)
15.16 Configuring Secure Management Protocols: HTTPS (1:47)
15.17 Configuring Secure Management Protocols: Logging (4:45)
15.18 Configuring Secure Management Protocols: SNMP (13:21)
15.19 Configuring Secure Management Protocols: NTP and SCP (5:27)
15.20 Securing IOS Image and Config Files (2:10)
15.21 Using CCP (3:06)
Lesson 16: Securing the Data Plane in IPv6
Learning objectives (0:55)
16.1 Understanding IPv6 Basics (5:24)
16.2 Understanding IPv6 Addressing and Address Types (11:43)
16.3 Introducing IPv6 Routing Protocols (3:21)
16.4 Security Best Practices for IPv4/IPv6 (4:55)
16.5 Examining IPv4/IPv6 Threats and Mitigation (7:13)
16.6 Examining IPv6-specific Threats and Mitigation (8:19)
16.7 IPv6 Best Practices (7:22)
16.8 IPv6 Access Control Lists (2:42)
16.9 Understanding the Data Plane (1:18)
Lesson 17: Securing Routing Protocols and the Control Plane
Learning objectives (0:31)
17.1 Understanding the Control Plane (7:08)
17.2 Control Plane Policing / Protection (10:34)
17.3 Securing Routing Protocols (14:00)
Module 6: Secure Access
Secure Access (1:03)
Lesson 18: Implementing AAA Using IOS and ISE
Learning objectives (1:10)
18.1 History and Evolution of Cisco ACS (18:35)
18.2 Understanding NAC (4:51)
18.3 Evolution of Access Control and ISE (8:36)
18.4 Comparing/Contrasting ACS and ISE (5:22)
18.5 Configuring IOS for Device Admin with ACS (9:39)
18.6 Verifying IOS Device Admin with ACS (3:37)
18.7 Understanding ISE Terms and Concepts (17:53)
18.8 Network Access Control with ISE Demo (5:12)
18.9 Configuring IOS for Network Access with ISE (6:45)
18.10 Verifying AAA with IOS and ISE (4:01)
18.11 Configuring Device Admin with ISE 2.0 (6:22)
Lesson 19: Bring Your Own Device (BYOD)
Learning objectives (0:38)
19.1 What Is BYOD? (11:49)
19.2 BYOD Architecture and Components (2:26)
19.3 Mobile Device Management (9:19)
Summary
Summary (3:08)
5.3 Configuring IPsec Site-to-Site VPNs in Cisco ASA
Lecture content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock