XpertSkills - the parent company under which iCollege operates - was established in South Africa in 2003 and since then, we have grown globally in leaps and bounds with customers and partners in more than 120 countries. With employees on 3 continents and as a next-generation, virtual organization we are unconstrained by the limits that are usually associated with traditional “brick & mortar” companies.
This allows us to focus, without distraction, on reaching our ultimate goal – ensuring your ongoing success – by providing affordable, reliable, high quality and relevant learning products whilst remaining innovative and agile.
Web: www.xpertskills.com
Skype: xpertskills
Mail: info@xpertskills.com
Head Office - South Africa
16 Monte Carlo Crescent
Kyalami business Park
Johannesburg
South Africa 1684
Head Office - South Africa 16 Monte Carlo Crescent Kyalami business Park Johannesburg South Africa 1684 Mail: info@icollege.co
Cisco 210-260: Implementing the Cisco Network Security course focusing on security principles and technologies, using Cisco security products to provide hands-on examples. Using instructor-led discussions, extensive hands-on lab exercises, and supplemental materials, this course allows learners to understand common security concepts, and deploy basic security techniques utilizing a variety of popular security appliances within a real-life network infrastructure.
In addition to their professional experience, students who attend this training should already have the following technical knowledge:
Module 1: Network Review
1.1 Course Introduction
1.2 Network Review Part 1
1.3 Network Review Part 2
1.4 Network Review Part 3
1.5 Network Review Part 4
Module 2: Terminology And Fundamentals
2.1 Terminology And Fundamentals Part 1
2.2 Terminology And Fundamentals Part 2
2.3 Terminology And Fundamentals Part 3
2.4 Terminology And Fundamentals Part 4
2.5 Terminology And Fundamentals Part 5
2.6 Terminology And Fundamentals Part 6
2.7 Terminology And Fundamentals Part 7
Module 3: PKI And Cryptography
3.1 Pki And Cryptography Part 1
3.2 Pki And Cryptography Part 2
Module 4: AAA
4.1 AAA Part 1
4.2 AAA Part 2
4.3 AAA Part 3
Module 5: Bring Your Own Device
5.1 Bring Your Own Device Part 1
5.2 Bring Your Own Device Part 2
5.3 Bring Your Own Device Part 3
Module 6: Secure Access
6.1 Secure Access Part 1
6.2 Secure Access Part 2
6.3 Secure Access Part 3
6.4 Secure Access Demo
Module 7: VPNs
7.1 VPN Concepts Part 1
7.2 VPN Concepts Part 2
7.3 Remote Access VPNs Part 1
7.4 Remote Access VPNs Part 2
7.5 Site To Site VPNs
Module 8: Secure Routing And Switching
8.1 Secure Routing And Switching Part 1
8.2 Secure Routing And Switching Part 2
8.3 Secure Routing And Switching Demo 1
8.4 Secure Routing And Switching Demo 2
8.5 Layer2 Attacks Part 1
8.6 Layer2 Attacks Part 2
8.7 Layer2 Attacks Part 3
8.9 Mitigation Part 1
8.10 Mitigation Part 2
Module 9: Firewalls
9.1 Firewall Technologies Part 1
9.2 Firewall Technologies Part 2
9.3 Implementing Nat Part 1
9.4 Implementing Nat Part 2
9.5 Zone Based Firewall
9.6 Firewall Features On The ASA Part 1
9.7 Firewall Features On The ASA Part 2
9.8 Firewall Features On The ASA Part 3
Module 10: Intrusion Protection System (IPS)
10.1 Intrusion Protection System Part 1
10.2 Intrusion Protection System Part 2
Module 11: Content And Endpoint Security
11.1 Content And Endpoint Security Part 1
11.2 Content And Endpoint Security Part 2
11.3 Course Conclusion