Books & Videos

Table of Contents

Chapter: Introduction

CCNA Security 210-260: Introduction

05m 59s

Chapter: Module 1: Fundamentals of Network Security

Fundamentals of Network Security

00m 25s

Chapter: Lesson 1: Networking Security Concepts and Common Principles

Learning objectives

00m 47s

1.1 Understanding Network and Information Security Basics

05m 53s

1.2 Confidentiality, Integrity, and Availability

02m 25s

1.3 Classifying Assets

01m 44s

1.4 Types of Security Vulnerabilities

06m 30s

1.5 Classifying Countermeasures

00m 56s

1.6 Attack Methods & Vectors

06m 12s

1.7 Applying Fundamental Security Principles To Network Design

01m 30s

1.8 Understanding the Security Attack Surface in Different Network Topologies

02m 14s

Chapter: Lesson 2: Common Security Threats

Learning objectives

00m 47s

2.1 Network Security Threat Landscape

02m 23s

2.2 Distributed Denial of Service (DDoS) Attacks

02m 11s

2.3 Social Engineering Methods

04m 3s

2.4 Man-in-the-middle Attacks

00m 44s

2.5 Malware Identification Tools

02m 12s

2.6 Data Loss and Exfiltration Methods

01m 4s

Chapter: Module 2: Virtual Private Networks (VPNs)

Virtual Private Networks (VPNs)

00m 29s

Chapter: Lesson 3: Fundamentals of VPN Technology and Cryptography

Learning objectives

00m 28s

3.1 Understanding VPNs and Why We Use Them

03m 14s

3.2 Cryptography Basic Components

06m 32s

3.3 Public Key Infrastructure

02m 42s

3.4 Putting the Pieces of PKI to Work

04m 24s

Chapter: Lesson 4: Fundamentals of IP Security

Learning objectives

00m 32s

4.1 IPsec Concepts, Components, and Operations

02m 6s

4.2 IKE version 1 Fundamentals

03m 3s

4.3 IKE version 2 Fundamentals

01m 58s

Chapter: Lesson 5: Implementing IPsec Site-to-Site VPNs

Learning objectives

00m 27s

5.1 Configuring IPsec Site-to-Site VPNs in Cisco IOS Devices

10m 17s

5.2 Troubleshooting IPsec Site-to-Site VPNs in Cisco IOS Devices

06m 51s

5.3 Configuring IPsec Site-to-Site VPNs in Cisco ASA

09m 2s

5.4 Troubleshooting IPsec Site-to-Site VPNs in Cisco ASA

03m 42s

Chapter: Lesson 6: Implementing SSL Remote Access VPNs Using Cisco ASA

Learning objectives

00m 55s

6.1 Introduction to Clientless SSL VPN

01m 38s

6.2 Configuring Clientless SSL VPNs in the Cisco ASA

06m 11s

6.3 Introduction to AnyConnect

02m 54s

6.4 Installing AnyConnect

06m 36s

6.5 AnyConnect for Mobile Devices

07m 15s

6.6 Configuring AnyConnect SSL VPN Connections in the Cisco ASA

10m 8s

6.7 Troubleshooting SSL VPNs in the Cisco ASA

11m 58s

Chapter: Module 3: Content and Endpoint Security

Content and Endpoint Security

00m 33s

Chapter: Lesson 7: Mitigation Technologies for Email-based and Web-based Threats

Learning objectives

00m 47s

7.1 Introduction to E-mail-Based Threats

00m 49s

7.2 Cisco Cloud E-mail Security

02m 34s

7.3 Cisco Hybrid E-mail Security

01m 44s

7.4 Cisco E-mail Security Appliance

09m 43s

7.5 Introduction to Cisco Web Security

02m 28s

7.6 Cisco Cloud Web Security (CWS)

02m 30s

7.7 Cisco Web Security Appliance (WSA)

06m 22s

7.8 Cisco Content Security Management Appliance (SMA)

01m 57s

Chapter: Lesson 8: Mitigation Technology for Endpoint Threats

Learning objectives

00m 34s

8.1 Antivirus and Anti-malware Solutions

05m 1s

8.2 Personal Firewalls and Host Intrusion Prevention Systems

00m 50s

8.3 Cisco Advanced Malware Protection (AMP) For Endpoints

01m 9s

8.4 Hardware and Software Encryption of Endpoint Data

03m 3s

Chapter: Module 4: Cisco Firewall Technologies and Intrusion Prevention System Technologies

Cisco Firewall Technologies and Intrusion Prevention System Technologies

00m 56s

Chapter: Lesson 9: Understanding Firewall Fundamentals

Learning objectives

00m 36s

9.1 Understanding Firewall Functions, Placement, Benefits, and Limitations

07m 37s

9.2 Examining Types of Firewalls

09m 19s

9.3 Understanding Stateful vs Stateless Inspection

05m 24s

9.4 Network Address Translation Overview

07m 16s

Chapter: Lesson 10: Implementing Cisco IOS Zone-Based Firewalls

Learning objectives

00m 31s

10.1 IOS Firewall Benefits

04m 58s

10.2 Basic Configuration and Features

09m 58s

10.3 NAT Configuration on the IOS Firewall

05m 27s

10.4 Using Cisco Configuration Professional (CCP)

05m 4s

Chapter: Lesson 11: Configuring Basic Firewall Policies on Cisco ASA

Learning objectives

00m 44s

11.1 Basic Configuration of the ASA

08m 2s

11.2 Network Objects for Access Control

13m 29s

11.3 NAT Configuration on the ASA

07m 5s

11.4 Security Contexts on the ASA

06m 23s

11.5 High Availability and Failover on the ASA

12m 51s

Chapter: Lesson 12: IPS Fundamentals

Learning objectives

00m 35s

12.1 Comparing IPS to Firewall and IDS

04m 49s

12.2 IDS Deployment Considerations

03m 41s

12.3 IPS Deployement Considerations

04m 37s

12.4 IPS Configuration Basics: Rules and Detection Methods

10m 6s

12.5 IPS Configuration: Signatures and Alerts

09m 47s

12.6 Understanding Blacklists and Whitelists

02m 3s

Chapter: Module 5: Secure Routing and Switching

Secure Routing and Switching

00m 52s

Chapter: Lesson 13: Securing Layer 2 Technologies

Learning objectives

00m 36s

13.1 Understanding Layer 2 Communication

03m 40s

13.2 Understanding VLAN Basics, Segmentation, and Trunking

09m 44s

13.3 Understanding Spanning-Tree Protocol Basics

04m 16s

13.4 Understanding Layer 2 Exploitation by Attackers

01m 48s

13.5 Layer 2 Attacks and Mitigation: BPDU Guard and Root Guard

03m 17s

13.6 Layer 2 Attacks and Mitigation: ARP Spoofing

03m 17s

13.7 Layer 2 Attacks and Mitigation: CAM Table Exhaustion/MAC Flooding

03m 12s

13.8 Layer 2 Attacks and Mitigation: Cisco Discovery Protocol

03m 23s

13.9 Layer 2 Attacks and Mitigation: DHCP Snooping and Dynamic ARP Inspection

05m 25s

13.10 Layer 2 Attacks and Mitigation: Private VLANs and VLAN Hopping

04m 34s

Chapter: Lesson 14: Network Foundation Protection

Learning objectives

00m 21s

14.1 Understanding How Critical Your Network Is

02m 14s

14.2 Introducing the Network Foundation Protection Framework

03m 53s

14.3 Basic Security Guidelines for the Network Foundation Protection Framework

07m 50s

Chapter: Lesson 15: Securing the Management Plane

Learning objectives

01m 21s

15.1 Overview of the Management Plane and Security Best Practices

03m 13s

15.2 Understanding User Authentication and AAA

05m 13s

15.3 Understanding AAA Options

02m 4s

15.4 Introducing AAA Servers

03m 43s

15.5 Security Best Practices: Passwords and Role Based Access Control

04m 45s

15.6 Security Best Practices: Encrypted Management Controls, Logging, and Monitoring

04m 38s

15.7 Security Best Practices: Management Protocol Security, NTP, and System Files

03m 25s

15.8 Connecting to a Cisco Router and Setting a Secure Password

05m 45s

15.9 Associating a Username with a Secure Password from the Router Console

05m 19s

15.10 Configuring Basic Security for Telnet Connectivity

07m 17s

15.11 RADIUS vs. TACACS+

12m 15s

15.12 Configuring AAA

11m 44s

15.13 Troubleshooting AAA

02m 32s

15.14 Privilege Levels and Parser Views

09m 5s

15.15 Configuring Secure Management Protocols: SSH

05m 48s

15.16 Configuring Secure Management Protocols: HTTPS

01m 47s

15.17 Configuring Secure Management Protocols: Logging

04m 45s

15.18 Configuring Secure Management Protocols: SNMP

13m 21s

15.19 Configuring Secure Management Protocols: NTP and SCP

05m 27s

15.20 Securing IOS Image and Config Files

02m 10s

15.21 Using CCP

03m 7s

Chapter: Lesson 16: Securing the Data Plane in IPv6

Learning objectives

00m 55s

16.1 Understanding IPv6 Basics

05m 24s

16.2 Understanding IPv6 Addressing and Address Types

11m 43s

16.3 Introducing IPv6 Routing Protocols

03m 21s

16.4 Security Best Practices for IPv4/IPv6

04m 55s

16.5 Examining IPv4/IPv6 Threats and Mitigation

07m 14s

16.6 Examining IPv6-specific Threats and Mitigation

08m 19s

16.7 IPv6 Best Practices

07m 23s

16.8 IPv6 Access Control Lists

02m 42s

16.9 Understanding the Data Plane

01m 18s

Chapter: Lesson 17: Securing Routing Protocols and the Control Plane

Learning objectives

00m 32s

17.1 Understanding the Control Plane

07m 8s

17.2 Control Plane Policing / Protection

10m 34s

17.3 Securing Routing Protocols

14m 0s

Chapter: Module 6: Secure Access

Secure Access

01m 3s

Chapter: Lesson 18: Implementing AAA Using IOS and ISE

Learning objectives

01m 10s

18.1 History and Evolution of Cisco ACS

18m 35s

18.2 Understanding NAC

04m 51s

18.3 Evolution of Access Control and ISE

08m 36s

18.4 Comparing/Contrasting ACS and ISE

05m 23s

18.5 Configuring IOS for Device Admin with ACS

09m 40s

18.6 Verifying IOS Device Admin with ACS

03m 37s

18.7 Understanding ISE Terms and Concepts

17m 53s

18.8 Network Access Control with ISE Demo

05m 12s

18.9 Configuring IOS for Network Access with ISE

06m 45s

18.10 Verifying AAA with IOS and ISE

04m 1s

18.11 Configuring Device Admin with ISE 2.0

06m 22s

Chapter: Lesson 19: Bring Your Own Device (BYOD)

Learning objectives

00m 38s

19.1 What Is BYOD?

11m 49s

19.2 BYOD Architecture and Components

02m 26s

19.3 Mobile Device Management

09m 19s

Chapter: Summary

Summary

03m 8s