Scroll to top button

CCNA Security 210-260 Official Cert Guide

ISBN : 9781616917173

Prepare for the Cisco CCNA 210-260 exam with the CCNA Security 210-260 Official Cert Guide course and lab. Lab simulates real-world, hardware, software, and command-line interface environments and can be mapped to any text-book, course or training. The course and lab cover the objectives of the Cisco CCNA 210-260 exam and teach candidates how to secure Cisco networks, develop a security infrastructure, recognize threats and vulnerabilities to networks; and mitigate security threats.

The Cisco CCNA 210-260 exam validates a candidate's knowledge and skills in securing network infrastructure, understanding core security concepts, managing secure access, VPN encryption, firewalls, intrusion prevention, web and email content security; and endpoint security using SIEM Technology, and more. The 210-260 exam also tests candidates' skills in the installation, troubleshooting, and monitoring of a secure network to maintain integrity, confidentiality, and availability of data and devices.

Lessons
Lessons
21+
Quizzes
198+
Flashcards
150+
Glossary of terms
150+
TestPrep
Pre Assessment Questions
71+
Full Length Tests
2+
Post Assessment Questions
71+
Lab
Performance lab
Learn the real world skills using LiveLab.
40+
Video tutorials
Get interactive learning videos with transcripts and voice-over.
40+
Hours
Signify the duration of video tutorials in labs.
02:56+

Videos and How To

uCertify course includes videos to help understand concepts. It also includes How Tos that help learners with how to accomplish certain tasks.

Video Lessons
Videos
3+
Hours
01:30+
  • Understanding Network and Information Security Basics
  • Recognizing Current Network Threats
  • Applying Fundamental Security Principles to Network Design
  • Review All the Key Topics
  • Network Security Threat Landscape
  • Distributed Denial-of-Service Attacks
  • Social Engineering Methods
  • Malware Identification Tools
  • Data Loss and Exfiltration Methods
  • Summary
  • Review All the Key Topics
  • Cisco Secure ACS, RADIUS, and TACACS
  • Configuring Routers to Interoperate with an ACS Server
  • Configuring the ACS Server to Interoperate with a Router
  • Verifying and Troubleshooting Router-to-ACS Server Interactions
  • Review All the Key Topics
  • Command Reference to Check Your Memory
  • Foundation Topics
  • Bring Your Own Device Fundamentals
  • BYOD Architecture Framework
  • Mobile Device Management
  • Exam Preparation Tasks
  • Review All the Key Topics
  • Understanding VPNs and Why We Use Them
  • Cryptography Basic Components
  • Public Key Infrastructure
  • Putting the Pieces of PKI to Work
  • Review All the Key Topics
  • Command Reference to Check Your Memory
  • IPsec Concepts, Components, and Operations
  • Configuring and Verifying IPsec
  • Review All the Key Topics
  • Command Reference to Check Your Memory
  • Planning and Preparing an IPsec Site-to-Site VPN
  • Implementing and Verifying an IPsec Site-to-Site VPN in Cisco IOS Devices
  • Implementing and Verifying an IPsec Site-to-Site VPN in Cisco ASA
  • Review All the Key Topics
  • Command Reference to Check Your Memory
  • Functions and Use of SSL for VPNs
  • Configuring Clientless SSL VPNs on ASA
  • Using the Cisco AnyConnect Secure Mobility Client
  • Troubleshooting SSL VPN
  • Review All the Key Topics
  • VLAN and Trunking Fundamentals
  • Spanning-Tree Fundamentals
  • Common Layer 2 Threats and How to Mitigate Them
  • CDP and LLDP
  • DHCP Snooping
  • Dynamic ARP Inspection
  • Review All the Key Topics
  • Command Reference to Check Your Memory
  • Using Network Foundation Protection to Secure Networks
  • Understanding the Management Plane
  • Understanding the Control Plane
  • Understanding the Data Plane
  • Review All the Key Topics
  • Securing Management Traffic
  • Implementing Security Measures to Protect the Management Plane
  • Review All the Key Topics
  • Command Reference to Check Your Memory
  • Understanding and Configuring IPv6
  • Configuring IPv6 Routing
  • Developing a Security Plan for IPv6
  • Review All the Key Topics
  • Command Reference to Check Your Memory
  • Foundation Topics
  • Securing the Control Plane
  • Control Plane Policing
  • Securing Routing Protocols
  • Exam Preparation Tasks
  • Review All the Key Topics
  • Firewall Concepts and Technologies
  • Using Network Address Translation
  • Creating and Deploying Firewalls
  • Review All the Key Topics
  • Cisco IOS Zone-Based Firewalls
  • Configuring and Verifying Cisco IOS Zone-Based Firewalls
  • Review All the Key Topics
  • Command Reference to Check Your Memory
  • The ASA Appliance Family and Features
  • ASA Firewall Fundamentals
  • Configuring the ASA
  • Review All the Key Topics
  • Command Reference to Check Your Memory
  • IPS Versus IDS
  • Identifying Malicious Traffic on the Network
  • Managing Signatures
  • Monitoring and Managing Alarms and Alerts
  • Cisco Next-Generation IPS Solutions
  • Review All the Key Topics
  • Mitigation Technology for E-mail-Based Threats
  • Mitigation Technology for Web-Based Threats
  • Cisco Content Security Management Appliance
  • Review All the Key Topics
  • Command Reference to Check Your Memory
  • Antivirus and Antimalware Solutions
  • Personal Firewalls and Host Intrusion Prevention Systems
  • Advanced Malware Protection for Endpoints
  • Hardware and Software Encryption of Endpoint Data
  • Review All the Key Topics
  • The Cisco Learning Network
  • Lesson-Ending Review Tools
  • Recall the Facts
  • Practice Configurations
  • Using the Exam Engine

Hands on Activities (Labs)

  • Installing Both Root and Identity Certificates
  • Generating an RSA Key Pair
  • Implementing IPsec VPNs through CLI
  • Sending Commands to the Cisco ASA by ASDM
  • Testing Ping Using the Correct Source Interface
  • Troubleshooting AnyConnect Client Issues
  • Configuring Clientless SSL VPNs on ASA 
  • Configuring an SSL Cisco AnyConnect Secure Mobility Client VPN
  • Using SVC Logging
  • Creating a New VLAN and Placing Switch Ports into that VLAN
  • Configure Interfaces as Trunk Ports
  • Configuring Router-on-a-Stick and Switch Support for the Router
  • Configuring Port Fast and Rapid Spanning Tree
  • Configuring the Switch to Automatically Restore Errdisabled Ports
  • Locking Down Switch Ports Administratively
  • Implementing a BPDU Guard on a Switch Port
  • Implementing Port Security
  • Disabling CDP
  • Configuring DHCP Snooping
  • Using Service Timestamps with Syslog Events
  • Disabling HTTPS
  • Creating and Applying a Custom Method List to vty Lines
  • Implementing Parser Views
  • Implementing Logging Features
  • Configuring SNMPv3 
  • Configuring the Secure Copy Protocol
  • Configuring the Router to Use NTP Services
  • Adding a Local User with the Privilege Level 15
  • Configuring an IPv6 Address in the Hard Way
  • Enabling IPv6 Routing and Routing Protocols
  • Using the IPv6 Access Control List
  • Verifying MD5 Authentication Between BGP Peers
  • Observing the Show ip cef Output
  • Verifying the Control Plane Policing Configuration
  • Configuring the Static Translation of Inside Source Addresses
  • Configuring the Interfaces
  • Issuing an ICMP Echo Request (Ping) from the ASA
  • Configuring the ASA as a DHCP Server for Inside Clients
  • Creating and Applying an ACL at the CLI
  • Using the Packet Tracer Utility at the CLI

Customer Testimonials

Leo Leo
excellent
CCNA Security 210-260 Official Cert Guide covers all of the objectives to exam preparation. The reading materials are complete and easy to understand. We can use the practice exam at the end of the study. Practice exam mode is useful if you want to do simulation as like real exam this is with limit time. I really recommended to all of you who need to improve your knowledge and prepare for your exam.
Emmanuel Eze
best
I had the opportunity to take the CCNA Security 210-260 course on uCertify and I had an amazing UX. It was a hands-on learning process! I enjoyed one of the tools; the study card drills which helped me get familiar with the terminologies, definitions, and concepts associated with each topic I'm learning. Other tools like the pre-assessment, exercises, quizzes, etc are all geared to provide an effective learning process for the learner. I would recommend uCertify to anyone who wants to get an IT certification.
×