WGU-CCNA-210-260-V2 : CCNA Security 210-260 Official Cert Guide V2

WGU-CCNA-210-260-V2 WGU-CCNA-210-260-V2
WGU-CCNA-210-260-V2
CCNA Security 210-260 Official Cert Guide V2
Rating :
(16)

Here's what you will get

Lessons
Lessons
21+
Quizzes
198+
Flashcards
150+
Glossary of terms
150+
Test prep
Pre-assessment Questions
71+
Full Length Tests
2+
Post-Assessment Questions
71+
Lab
Performance based lab
15+

Videos and How To..

uCertify course includes videos to help understand concepts. It also includes How Tos that help learners with how to accomplish certain tasks.

Video Lessons
Videos
49+
Hours
14:47+

Here's what you will learn

  • Understanding Network and Information Security Basics
  • Recognizing Current Network Threats
  • Applying Fundamental Security Principles to Network Design
  • Review All the Key Topics
  • Network Security Threat Landscape
  • Distributed Denial-of-Service Attacks
  • Social Engineering Methods
  • Malware Identification Tools
  • Data Loss and Exfiltration Methods
  • Summary
  • Review All the Key Topics
  • Cisco Secure ACS, RADIUS, and TACACS
  • Configuring Routers to Interoperate with an ACS Server
  • Configuring the ACS Server to Interoperate with a Router
  • Verifying and Troubleshooting Router-to-ACS Server Interactions
  • Review All the Key Topics
  • Command Reference to Check Your Memory
  • Foundation Topics
  • Bring Your Own Device Fundamentals
  • BYOD Architecture Framework
  • Mobile Device Management
  • Exam Preparation Tasks
  • Review All the Key Topics
  • Understanding VPNs and Why We Use Them
  • Cryptography Basic Components
  • Public Key Infrastructure
  • Putting the Pieces of PKI to Work
  • Review All the Key Topics
  • Command Reference to Check Your Memory
  • IPsec Concepts, Components, and Operations
  • Configuring and Verifying IPsec
  • Review All the Key Topics
  • Command Reference to Check Your Memory
  • Planning and Preparing an IPsec Site-to-Site VPN
  • Implementing and Verifying an IPsec Site-to-Site VPN in Cisco IOS Devices
  • Implementing and Verifying an IPsec Site-to-Site VPN in Cisco ASA
  • Review All the Key Topics
  • Command Reference to Check Your Memory
  • Functions and Use of SSL for VPNs
  • Configuring Clientless SSL VPNs on ASA
  • Using the Cisco AnyConnect Secure Mobility Client
  • Troubleshooting SSL VPN
  • Review All the Key Topics
  • VLAN and Trunking Fundamentals
  • Spanning-Tree Fundamentals
  • Common Layer 2 Threats and How to Mitigate Them
  • CDP and LLDP
  • DHCP Snooping
  • Dynamic ARP Inspection
  • Review All the Key Topics
  • Command Reference to Check Your Memory
  • Using Network Foundation Protection to Secure Networks
  • Understanding the Management Plane
  • Understanding the Control Plane
  • Understanding the Data Plane
  • Review All the Key Topics
  • Securing Management Traffic
  • Implementing Security Measures to Protect the Management Plane
  • Review All the Key Topics
  • Command Reference to Check Your Memory
  • Understanding and Configuring IPv6
  • Configuring IPv6 Routing
  • Developing a Security Plan for IPv6
  • Review All the Key Topics
  • Command Reference to Check Your Memory
  • Foundation Topics
  • Securing the Control Plane
  • Control Plane Policing
  • Securing Routing Protocols
  • Exam Preparation Tasks
  • Review All the Key Topics
  • Firewall Concepts and Technologies
  • Using Network Address Translation
  • Creating and Deploying Firewalls
  • Review All the Key Topics
  • Cisco IOS Zone-Based Firewalls
  • Configuring and Verifying Cisco IOS Zone-Based Firewalls
  • Review All the Key Topics
  • Command Reference to Check Your Memory
  • The ASA Appliance Family and Features
  • ASA Firewall Fundamentals
  • Configuring the ASA
  • Review All the Key Topics
  • Command Reference to Check Your Memory
  • IPS Versus IDS
  • Identifying Malicious Traffic on the Network
  • Managing Signatures
  • Monitoring and Managing Alarms and Alerts
  • Cisco Next-Generation IPS Solutions
  • Review All the Key Topics
  • Mitigation Technology for E-mail-Based Threats
  • Mitigation Technology for Web-Based Threats
  • Cisco Content Security Management Appliance
  • Review All the Key Topics
  • Command Reference to Check Your Memory
  • Antivirus and Antimalware Solutions
  • Personal Firewalls and Host Intrusion Prevention Systems
  • Advanced Malware Protection for Endpoints
  • Hardware and Software Encryption of Endpoint Data
  • Review All the Key Topics
  • The Cisco Learning Network
  • Lesson-Ending Review Tools
  • Recall the Facts
  • Practice Configurations
  • Using the Exam Engine

Hands on Activities (Labs)

  • Implement an IOS IPSec Site-to-Site VPN with Pre-Shared Key Authentication
  • Implement SSL VPN using ASA Device Manager
  • Implement VLANs and Trunking
  • Spanning Tree and other Layer 2 Best Practices
  • Securing the Management Plane on Cisco Routers using the CLI
  • Control Plane Policing
  • Configuring Secure OSPF with Authentication
  • Implement Zone Based Policy Firewall using the CLI
  • Implement the Cisco Adaptive Security Appliance
  • Implement Network Address Translation and Port Address Translation
  • Policy Based NAT on a Cisco ASA
  • Configure Cisco IOS IPS using the CLI
  • Implement Security on Cisco Routers using the CLI
  • Implement IOS Features to Mitigate Threats in a Network
  • Configure and Verify Switch Security Features