Existing User Login

New User? Create An Account

Request new password

We are iCollege

Established in 2003 under the parent company XpertSkills, iCollege is one of the most trusted marketplaces in E-Learning. Our dedication transcends mere content – we source learning products from only the best suppliers and vendors across the globe so you have the widest selection of educational courses designed to equip you for success.

Headquartered in stunning South Africa, our distributed company spans 3 continents with employees in the U.S., India, and of course, South Africa. Our customers call more than 120 countries home. We're proud to say iCollege is trusted by leading organizations in major tech hubs, including Silicon Valley, to train and equip employees to be the very best that they can be.

Whether partnering with Fortune 500 companies or being part of an individual's journey toward career growth, we are committed to the success of all who trust us as their source for education and training.

Contact Details:

Web: www.xpertskills.com
Skype: xpertskills
Mail: info@xpertskills.com

Physical Address:

Head Office - South Africa
16 Monte Carlo Crescent
Kyalami business Park
Johannesburg
South Africa 1684

You are here

Cisco 210-250: Understanding Cisco Cybersecurity Fundamentals (SECFND)

EDUTAINMENT COURSE

Cisco 210-250: Understanding Cisco Cybersecurity Fundamentals (SECFND)

Interactive and entertaining talk-show style format presented by industry leading experts.
Overview

The Cisco Cybersecurity Fundamentals show is based around the released exam objectives for SECFND Exam 210-250.  The show will cover every exam objective to help prepare those interested in becoming CCNA CyberOps certified.  The show aids those preparing for the first of two exams leading to that certification by helping understand cybersecurity basics,  foundational networking and security knowledge and develop skills needed in preparation for the second (SECOPS) exam.

Objectives
  • How to pass the Cisco CCNA Cyber Ops exam
  • How to use the Kali hacking tools
  • How to become a cyber security specialist
Prerequisites

A basic understanding of using operating systems,  networks,  and the Internet.

Target Audience
  • For anyone who would love to gain a practical skillset in mitigating the risk from,  malware,  Trojans,  hackers,  tracker,  cyber criminals and all online threats.
  • For anyone studying for the Cisco CCNA Cyber Ops certification exam.
Instructor: ITProTV

ITProTV delivers the IT instruction that you need to advance or launch your IT career in a fun and creative way. With attractive studios and an interactive, talk-show style format, you'll watch more and learn more. From CompTIA, Cisco, and Microsoft to Security and Cloud Fundamentals, you can learn it all. Dive deep into one or master many with the friendly faces of IT training.

  1. NETWORK CONCEPTS
1
Start
Overview
2
Start
Describe Network Models
3
Start
Describe Network Models Part 2
4
Start
Describe Network Models Part 3
5
Start
Describe Basic Networking Protocols
6
Start
Describe Basic Networking Protocols Part 2
7
Start
Describe Basic Networking Services
8
Start
Describe Basic Networking Services Part 2
9
Start
Describe Networking Devices Operations
10
Start
Describe Networking Devices Operations Part 2
11
Start
Describe Network Security Systems
12
Start
Describe Basic Network Addressing
13
Start
Describe Basic Network Addressing Part 2
14
Start
Describe VLANS and Data Visability
15
Start
Describe ACL Usage on Interfaces
16
Start
Describe ACL Usage on Interfaces Part 2
17
Start
Compare Different Filtering Methods
18
Start
Compare Packet Capture Methods
19
Start
Compare Packet Analysis Output
20
Start
Compare Packet Analysis Output Part 2
21
Start
Identify Traffic Loss from Packet Analysis
  1. SECURITY CONCEPTS
22
Start
Describe Defense in Depth Principles
23
Start
Define Security Concepts and Terms
24
Start
Define Security Concepts and Terms Part 2
25
Start
Understand Access Control Models
26
Start
Compare Security Admin Terms
27
Start
Describe Security Management Concepts
  1. CRYPTOGRAPHY
28
Start
Describe Crypto Algorithm Usage
29
Start
Describe Crypto Algorithm Usage Part 2
30
Start
Describe Digital Signature Creation
31
Start
Describe PKI Operations
32
Start
Describe Key Exchange Security
33
Start
Describe SSL TLS Components
34
Start
Describe SSL TLS Components Part 2
35
Start
Describe Hashing Algorithms
36
Start
Encryption Algorithms and Protocols
37
Start
Encryption Algorithms and Protocols Part 2
  1. HOST-BASE ANALYSIS
38
Start
Define Windows Terms
39
Start
Define Linux Terms
40
Start
Define Linux Terms Part 2
41
Start
Describe Endpoint Security Monitoring
42
Start
Interpret OS Log Data
43
Start
Interpret OS Log Data Part 2
  1. SECURITY MONITORING
44
Start
Identify Data Types
45
Start
Identify Data Types Part 2
46
Start
Identify Data Types Part 3
47
Start
Describe NSM Data
48
Start
Describe Monitoring Context
49
Start
Describe Monitoring Context Part 2
50
Start
Describe NGIPS Events
51
Start
Monitor Protocols
52
Start
Monitor Protocols Part 2
  1. ATTACK METHODS
53
Start
Describe Security Attack Concepts
54
Start
Describe Network and Web App Attacks
55
Start
Describe Network and Web App Attacks Part 2
56
Start
Describe Attacks and Evasion Methods
57
Start
Describe Attacks and Evasion Methods Part 2
EDUTAINMENT COURSE
?Interactive and entertaining talk-show style format presented by industry leading experts.
USD 59
  • 25:34:00
    Hours of learning
  • Receive a Certificate of Excellence on successful completion
  • Presented by highly qualified, industry leading experts
  • 12 Months Access (Unless indicated otherwise)
  • 10-Day money-back guarantee
Back to Top