Pearson CCNA Cyber Ops SECFND 210-250

(SECFND-210-250)/ISBN:978-1-61691-983-2

This course includes
Lessons
TestPrep
Video Lessons (Add-on)

Start your prep for CISCO 210-250 SECFND certification exam with CCNA Cyber Ops Course. The course focuses on topics of the 210-250 SECFND exam and provides knowledge of cybersecurity basic principles, foundational knowledge, and core skills needed to grasp the more associate-level materials in the second required exam, Implementing Cisco Cybersecurity Operations (SECOPS). 

Here's what you will get

CISCO 210-250 SECFND certification exam is the first step of the two required exams to get the CCNA Cyber Ops certification. The SECFND exam validates the candidates expertise in cybersecurity’s foundational knowledge, basic principles, and core skills required to understand the more advanced associate-level materials in the second required exam, Implementing Cisco Cybersecurity Operations (SECOPS). The SECFND certification provides the job role of an associate-level Security Operations Center (SOC) Security Analyst.

Lessons

15+ Lessons | 46+ Exercises | 305+ Quizzes | 177+ Flashcards | 177+ Glossary of terms

TestPrep

60+ Pre Assessment Questions | 2+ Full Length Tests | 60+ Post Assessment Questions | 120+ Practice Test Questions

Video Lessons

97+ Videos | 09:27+ Hours

Here's what you will learn

Download Course Outline

Lessons 1: Introduction

  • About the 210-250 CCNA Cyber Ops SECFND Exam

Lessons 2: Fundamentals of Networking Protocols and Networking Devices

  • TCP/IP and OSI Model
  • Layer 2 Fundamentals and Technologies
  • Internet Protocol and Layer 3 Technologies
  • Internet Control Message Protocol (ICMP)
  • Domain Name System (DNS)
  • IPv6 Fundamentals
  • Transport Layer Technologies and Protocols
  • Review All Key Topics
  • References and Further Reading

Lessons 3: Network Security Devices and Cloud Services

  • Network Security Systems
  • Security Cloud-based Solutions
  • Cisco NetFlow
  • Data Loss Prevention
  • Review All Key Topics

Lessons 4: Security Principles

  • The Principles of the Defense-in-Depth Strategy
  • What Are Threats, Vulnerabilities, and Exploits?
  • Confidentiality, Integrity, and Availability: The CIA Triad
  • Risk and Risk Analysis
  • Personally Identifiable Information and Protected Health Information
  • Principle of Least Privilege and Separation of Duties
  • Security Operation Centers
  • Forensics
  • Review All Key Topics

Lessons 5: Introduction to Access Controls

  • Information Security Principles
  • Subject and Object Definition
  • Access Control Fundamentals
  • Access Control Process
  • Information Security Roles and Responsibilities
  • Access Control Types
  • Access Control Models
  • Access Control Mechanisms
  • Identity and Access Control Implementation
  • Review All Key Topics
  • References and Additional Reading

Lessons 6: Introduction to Security Operations Management

  • Introduction to Identity and Access Management
  • Security Events and Logs Management
  • Assets Management
  • Introduction to Enterprise Mobility Management
  • Configuration and Change Management
  • Vulnerability Management
  • Patch Management
  • References and Additional Readings
  • Review All Key Topics

Lessons 7: Fundamentals of Cryptography and Public Key Infrastructure (PKI)

  • Cryptography
  • Fundamentals of PKI
  • Review All Key Topics

Lessons 8: Introduction to Virtual Private Networks (VPNs)

  • What Are VPNs?
  • Site-to-site vs. Remote-Access VPNs
  • An Overview of IPsec
  • SSL VPNs
  • Review All Key Topics

Lessons 9: Windows-Based Analysis

  • Process and Threads
  • Memory Allocation
  • Windows Registration
  • Windows Management Instrumentation
  • Handles
  • Services
  • Windows Event Logs
  • Review All Key Topics
  • References and Further Reading

Lessons 10: Linux- and Mac OS X—Based Analysis

  • Processes
  • Forks
  • Permissions
  • Symlinks
  • Daemons
  • UNIX-Based Syslog
  • Apache Access Logs
  • Review All Key Topics
  • References and Further Reading

Lessons 11: Endpoint Security Technologies

  • Antimalware and Antivirus Software
  • Host-Based Firewalls and Host-Based Intrusion Prevention
  • Application-Level Whitelisting and Blacklisting
  • System-Based Sandboxing
  • Review All Key Topics

Lessons 12: Network and Host Telemetry

  • Network Telemetry
  • Host Telemetry
  • Review All Key Topics

Lessons 13: Security Monitoring Operational Challenges

  • Security Monitoring and Encryption
  • Security Monitoring and Network Address Translation
  • Security Monitoring and Event Correlation Time Synchronization
  • DNS Tunneling and Other Exfiltration Methods
  • Security Monitoring and Tor
  • Security Monitoring and Peer-to-Peer Communication
  • Review All Key Topics

Lessons 14: Types of Attacks and Vulnerabilities

  • Types of Attacks
  • Types of Vulnerabilities
  • Review All Key Topics

Lessons 15: Security Evasion Techniques

  • Encryption and Tunneling
  • Resource Exhaustion
  • Traffic Fragmentation
  • Protocol-Level Misinterpretation
  • Traffic Timing, Substitution, and Insertion
  • Pivoting
  • Review All Key Topics
  • References and Further Reading

Exam FAQs

The policies for retaking exams are as follows:

  • Candidates who fail an Associate, Professional, or Specialist exam must wait a period of five (5) calendar days, beginning the day after the failed attempt, before they may retest for the same exam.
  • Candidates who fail any CCIE or CCDE written exam must wait for a period of 15 calendar days, beginning the day after the failed attempt, before retaking the same exam.
  • Once passed, a candidate must wait a minimum of 180 days before taking the same exam with an identical exam number.
  • Candidates who violate these policies are in violation of the agreement. Such conduct is strictly prohibited as described in the Cisco Certification and Confidentiality Agreement.