SECFND – Understanding Cisco Cybersecurity Fundamentals (SECFND)

  COURSE CONTENT

Today’s organizations are challenged with rapidly detecting cybersecurity breaches and effectively responding to security incidents. Teams of people in Security Operations Centers (SOC’s) keep a vigilant eye on security systems, protecting their organizations by detecting and responding to cybersecurity threats. CCNA Cyber Ops prepares candidates to begin a career working with associate-level cybersecurity analysts within security operations centers.

This course allows learners to understand cybersecurity’s basic principles and foundational knowledge, as well as obtain the core skills needed to grasp the more advanced associate-level materials in the second required exam, “Implementing Cisco Cybersecurity Operations (SECOPS)”. It focuses on cybersecurity operations principles and technologies, using hands-on examples in realistic scenarios, with real-life security products and equipment.

Exam Description

  • 210-250 SECFND

This exam is the first of the two required exams to achieve the CCNA Cyber Ops certification and is aligned with the job role of an associate-level Security Operations Center (SOC) Security Analyst. The SECFND exam tests candidates understanding of cybersecurity’s basic principles, foundational knowledge, and core skills needed to grasp the more advanced associate-level materials in the second required exam, “Implementing Cisco Cybersecurity Operations (SECOPS)”.

  WHO SHOULD ATTEND

  • Security Operations Center – Security Analyst
  • Computer/Network Defense Analysts
  • Computer Network Defense Infrastructure Support Personnel
  • Future Incident Responders and Security Operations Center (SOC) personnel.
  • Students beginning a career, entering the cybersecurity field.
  • Cisco Channel Partners

  CERTIFICATIONS

This course is part of the following Certifications:

  PREREQUISITES

It is highly recommended to have the following skills and knowledge before attending this course:

  • Skills and knowledge equivalent to those learned in Interconnecting Cisco Networking Devices Part 1 (ICND1)
  • Working knowledge of the Windows operating system
  • Working knowledge of Cisco IOS networking and concepts

  COURSE OBJECTIVES

Upon completion of this course, you will be able to:

  • Describe, compare and identify various network concepts
  • Fundamentals of TCP/IP
  • Describe and compare fundamental security concepts
  • Describe network applications and the security challenges
  • Understand basic cryptography principles.
  • Understand endpoint attacks, including interpreting log data to identify events in Windows and Linux
  • Develop knowledge in security monitoring, including identifying sources and types of data and events
  • Know various attack methods, security weaknesses, evasion methods, and remote versus local exploits

  FOLLOW ON COURSES

  OUTLINE: Understanding Cisco Cybersecurity Fundamentals (SECFND)

Module 1: TCP/IP and Cryptography Concepts

  • Lesson 1: Understanding the TCP/IP Protocol Suite
  • Lesson 2: Understanding the Network Infrastructure
  • Lesson 3: Understanding Common TCP/IP Attacks
  • Lesson 4: Understanding Basic Cryptography Concepts

Module 2: Network Applications and Endpoint Security

  • Lesson 1: Describing Information Security Concepts
  • Lesson 2: Understanding Network Applications
  • Lesson 3: Understanding Common Network Application Attacks
  • Lesson 4: Understanding Windows Operating System Basics
  • Lesson 5: Understanding Linux Operating System Basics
  • Lesson 6: Understanding Common Endpoint Attacks
  • Lesson 7: Understanding Network Security Technologies
  • Lesson 8: Understanding Endpoint Security Technologies

Module 3: Security Monitoring and Analysis

  • Lesson 1: Describing Security Data Collection
  • Lesson 2: Describing Security Event Analysis

Labs:

  • Guided Lab 1: Explore the TCP/IP Protocol Suite
  • Guided Lab 2: Explore the Network Infrastructure
  • Guided Lab 3: Explore TCP/IP Attacks
  • Guided Lab 4: Explore Cryptographic Technologies
  • Guided Lab 5: Explore Network Applications
  • Guided Lab 6: Explore Network Application Attacks
  • Guided Lab 7: Explore the Windows Operating System
  • Guided Lab 8: Explore the Linux Operating System
  • Guided Lab 9: Explore Endpoint Attacks
  • Guided Lab 10: Explore Network Security Technologies
  • Guided Lab 11: Explore Endpoint Security
  • Guided Lab 12: Explore Security Data for Analysis