Understanding Cisco Cybersecurity Fundamentals (SECFND)

Our classes are always live and instructor led from our Exton, PA or EPIC Partner locations. Springhouse AnywhereLive options require Internet Access. Select classes are Guaranteed to Run (GTR). View our complete schedule policies.

 

 

 

 

cd6e4e87-84e6-e711-8b1b-00155d0a14062018-05-14T08:00:00Z3595.000000000001510:00 AM6:00 PMAnywhereLivecd6e4e87-84e6-e711-8b1b-00155d0a1406
b5426c4f-7633-e811-87a2-00155d0a14062018-08-13T08:00:00Z3595.000000000001510:00 AM6:00 PMAnywhereLiveb5426c4f-7633-e811-87a2-00155d0a1406

Overview

The Understanding Cisco Cybersecurity Fundamentals (SECFND) v1.0 course will provide you with an understanding of network infrastructure devices, operations and vulnerabilities of the TCP/IP protocol suite, basic information security concepts, common network application operations and attacks, the Windows and Linux operating systems, and the types of data that are used to investigate security incidents.

After completing this course, you will have basic knowledge that is required to perform the job role of an entry-level cybersecurity analyst in a threat-centric security operations center.

Intended Audience

  • Security Operations Center - Security Analyst
  • Computer/Network Defense Analysts
  • Computer Network Defense Infrastructure Support Personnel
  • Future Incident Responders and Security Operations Center (SOC) personnel.
  • Students beginning a career, entering the cybersecurity field.
  • Cisco Channel Partners

At Completion

After completion of this course, students will be able to...

  • Describe, compare and identify various network concepts
  • Fundamentals of TCP/IP
  • Describe and compare fundamental security concepts
  • Describe network applications and the security challenges
  • Understand basic cryptography principles.
  • Understand endpoint attacks, including interpreting log data to identify events in Windows and Linux
  • Develop knowledge in security monitoring, including identifying sources and types of data and events
  • Know various attack methods, security weaknesses, evasion methods, and remote versus local exploits

Prerequisites

It is highly recommended to have the following skills and knowledge before attending this course:

  • Cisco certification (Cisco CCENT certification or higher)
  • Relevant industry certification [(ISC)2, CompTIA Security+, EC-Council, GIAC, ISACA]
  • Cisco Networking Academy letter of completion (CCNA 1 and CCNA 2)
  • Windows expertise: Microsoft (Microsoft Specialist, MCSA, MCSE), CompTIA (A+, Network+, Server+)
  • Linux expertise: CompTIA (Linux+), Linux Professional Institute (LPI) certification, Linux Foundation (LFCS, LFCE), Red Hat (RHCSA, RHCE, RHCA), Oracle Linux (OCA, OCP)

Exams & Certifications


Materials


Course Outline

Module 1: TCP/IP and Cryptography Concepts

  • Lesson 1: Understanding the TCP/IP Protocol Suite
  • Lesson 2: Understanding the Network Infrastructure
  • Lesson 3: Understanding Common TCP/IP Attacks
  • Lesson 4: Understanding Basic Cryptography Concepts


Module 2: Network Applications and Endpoint Security

  • Lesson 1: Describing Information Security Concepts
  • Lesson 2: Understanding Network Applications
  • Lesson 3: Understanding Common Network Application Attacks
  • Lesson 4: Understanding Windows Operating System Basics
  • Lesson 5: Understanding Linux Operating System Basics
  • Lesson 6: Understanding Common Endpoint Attacks
  • Lesson 7: Understanding Network Security Technologies
  • Lesson 8: Understanding Endpoint Security Technologies


Module 3: Security Monitoring and Analysis

  • Lesson 1: Describing Security Data Collection
  • Lesson 2: Describing Security Event Analysis


Labs:

  • Guided Lab 1: Explore the TCP/IP Protocol Suite
  • Guided Lab 2: Explore the Network Infrastructure
  • Guided Lab 3: Explore TCP/IP Attacks
  • Guided Lab 4: Explore Cryptographic Technologies
  • Guided Lab 5: Explore Network Applications
  • Guided Lab 6: Explore Network Application Attacks
  • Guided Lab 7: Explore the Windows Operating System
  • Guided Lab 8: Explore the Linux Operating System
  • Guided Lab 9: Explore Endpoint Attacks
  • Guided Lab 10: Explore Network Security Technologies
  • Guided Lab 11: Explore Endpoint Security
  • Guided Lab 12: Explore Security Data for Analysis

 

 

Understanding Cisco Cybersecurity Fundamentals (SECFND)http://springhouse.com/course-catalog/SECFNDUnderstanding Cisco Cybersecurity Fundamentals (SECFND)

Get More Information
Name:

Phone:  

Email:  

Comments:

Help us prove you're not a robot:
 

 ‭(Hidden)‬ Catalog-Item Reuse

Microsoft Gold Partner

PMI R.E.P.

AXELOS Limited

The Microsoft Gold CPLS logo is a mark of Microsoft, Inc.

The PMI R.E.P. logo is a mark of the Project Management Institute, Inc.

ITIL® is a registered trade mark of AXELOS Limited.
IT Infrastructure Library® is a registered trade mark of AXELOS Limited
The Swirl logo™ is a registered trade mark of AXELOS Limited
Accredited course material is property of ITSM Academy.

Connect with us

Springhouse Education & Consulting Services

Corporate HQ:Eagleview Corporate Park
707 Eagleview Boulevard
Suite 207
Exton, PA 19341

610-321-3500 - info@springhouse.com