Existing User Login

New User? Create An Account

Request new password

We are iCollege

Established in 2003 under the parent company XpertSkills, iCollege is one of the most trusted marketplaces in E-Learning. Our dedication transcends mere content – we source learning products from only the best suppliers and vendors across the globe so you have the widest selection of educational courses designed to equip you for success.

Headquartered in stunning South Africa, our distributed company spans 3 continents with employees in the U.S., India, and of course, South Africa. Our customers call more than 120 countries home. We're proud to say iCollege is trusted by leading organizations in major tech hubs, including Silicon Valley, to train and equip employees to be the very best that they can be.

Whether partnering with Fortune 500 companies or being part of an individual's journey toward career growth, we are committed to the success of all who trust us as their source for education and training.

Contact Details:

Web: www.xpertskills.com
Skype: xpertskills
Mail: info@xpertskills.com

Physical Address:

Head Office - South Africa
16 Monte Carlo Crescent
Kyalami business Park
Johannesburg
South Africa 1684

You are here

Cisco 210-260: Implementing Cisco Network Security (2018)

EDUTAINMENT COURSE

Cisco 210-260: Implementing Cisco Network Security (2018)

Interactive and entertaining talk-show style format presented by industry leading experts.
Overview

The CCNA Security show will build knowledge of network infrastructure security,  increase understanding core security concepts,  show how to configure and manage secure access,  VPN encryption,  firewalls,  intrusion prevention,  web and email content security,  and endpoint security using different security technologies.  Also demonstrates how install,  troubleshoot,  and monitor these technologies to achieve business defined security goals.

Objectives
  • Intrusion prevention
  • IPS technology
  • Management of secure access
  • Secure switching and routing
  • End-point and content security
Prerequisites
  • It is recommended that learners should be familiar with Cisco IOS Catalyst Switches, Routers,  ASA firewall,  and of course a PC.
  • Knowledge in basic networking.
Target Audience
  • IT professionals seeking to get into network security.
  • Network engineers.
Instructor: ITProTV

ITProTV delivers the IT instruction that you need to advance or launch your IT career in a fun and creative way. With attractive studios and an interactive, talk-show style format, you'll watch more and learn more. From CompTIA, Cisco, and Microsoft to Security and Cloud Fundamentals, you can learn it all. Dive deep into one or master many with the friendly faces of IT training.

  1. SECURITY CONCEPTS
1
Start
Overview
2
Start
Describe CIA Triad and SIEM Technology
3
Start
Describe CIA Triad and SIEM Technology Pt2
4
Start
Identify Common Security Terms
6
Start
Describe Common Network Attacks Part 2
7
Start
Describe Common Network Attacks Part 3
8
Start
Identify Common Malware Types
9
Start
Classify Data Loss Vectors
11
Start
Describe Encryption Methods Part 2
12
Start
Describe Crypto Key Exchange
13
Start
Describe Crypto Key Exchange Part 2
14
Start
Describe Network Topologies
15
Start
Describe Network Topologies Part 2
  1. VPN
5
Start
Describe Common Network Attacks
32
Start
Describe IPsec Protocols and Modes
33
Start
Describe VPN Implementations
35
Start
Setup AnyConnect VPN Using ASDM
36
Start
Setup AnyConnect VPN Using ASDM Part 2
37
Start
Setup IPsec Site-to-Site VPN with PSK
38
Start
Setup IPsec Site-to-Site VPN with PSK Part 2
  1. SECURE ACCESS
16
Start
Compare In-band and Out-of-band Mgmt
17
Start
Configure and Verify Secure Mgmt
18
Start
Configure and Verify Secure Mgmt Part 2
19
Start
Secure Management Plane Access
20
Start
Secure Management Plane Access Part 2
21
Start
Configure and Verify SNMPv3
22
Start
Configure and Verify NTP Security
23
Start
Configure and Verify NTP Security Part 2
24
Start
Describe AAA Technologies
25
Start
Configure Access Using TACACSplus
26
Start
Configure Access Using TACACSplus Part 2
27
Start
Use SCP For File Transfer
28
Start
Explain AD Integration With AAA
29
Start
Describe Using Cisco ACS and ISE
30
Start
Identify 802.1x Components and Functions
31
Start
Describe BYOD Framework and MDM
  1. SECURE ROUTING AND SWITCHING
39
Start
Secure CLI Access and IOS
40
Start
Secure CLI Access and IOS Part 2
41
Start
Setup OSPF Authentication with MD5
42
Start
Setup EIGRP Authentication with MD5
43
Start
Setup L2 Attack Mitigation
44
Start
Setup L2 Attack Mitigation Part 2
45
Start
Setup L2 Attack Mitigation Part 3
46
Start
Explain Control Plane Policing
47
Start
Setup PVLANs for L2 Security
48
Start
Describe Native VLAN Security Issues
61
Start
Configure IPS Policy on Cisco FMC
  1. CISCO FIREWALL TECHNOLOGIES
49
Start
Describe Different Firewall Technologies
50
Start
Implement NAT on Cisco ASA 9.x
51
Start
Implement NAT on Cisco ASA 9.x Part 2
52
Start
Setup Zone Based Firewall: Zone to Zone
53
Start
Setup Zone Based Firewall: Self Zone
54
Start
Configure ASA: Access Management
55
Start
Configure ASA: Security Access Policies
56
Start
Configure ASA: Modular Policy Framework
57
Start
Describe Firewall Features
  1. IPS
58
Start
Describe IPS Deployment Considerations
59
Start
Configure Cisco IOS IPS
60
Start
Configure Cisco IOS IPS Part 2
  1. CONTENT AND ENDPOINT SECURITY
62
Start
Describe Threat Mitigation for Email
64
Start
Describe Threat Mitigation for Endpoints
EDUTAINMENT COURSE
?Interactive and entertaining talk-show style format presented by industry leading experts.
USD 59
  • 31:49:00
    Hours of learning
  • Receive a Certificate of Excellence on successful completion
  • Presented by highly qualified, industry leading experts
  • 12 Months access
  • 10-Day money-back guarantee
Back to Top