Author
Updated
12/4/2020Released
9/21/2017This course corresponds to the security fundaments portion of the 200-301 CCNA exam.
- Security principles and terms
- SIEM technology
- Common security threats
- Social engineering
- Data loss prevention
- Cryptographic concepts
- Symmetric and asymmetric encryption
- Hash algorithms
- Network topologies, CAN, WAN, and SOHO
- Securing a virtual environment
Skill Level Intermediate
Duration
Views
- [Instructor] Cybersecurity specialists are one of the most in-demand jobs today. Organizations need employees with specialized security knowledge. In this course I'll cover security principles such as the CIA Triad, common security threats such as social engineering, malware, and active and passive attacks. I'll review cryptographic techniques such as encryption, hashing, and digital signatures along with describing various network topologies such as a campus area network, wide area network, and virtual environments. Hello. My name is Lisa Bock and I'm a security ambassador. I am super excited to bring you this series on CCNA network security and this section on security concepts so that you can improve your skills in configuration and maintenance of Cisco devices to maintain the confidentiality, integrity, and availability of an organization's infrastructure. Are you ready? Let's get started.
Related Courses
-
Cisco Network Security: VPN
with Lisa Bock1h 27m Intermediate -
Cisco ICND2 Cert Prep: Switching
with Russell Long2h 20m Intermediate -
Cisco ICND2 Cert Prep: Routing
with Russell Long2h 30m Intermediate -
Cisco Network Security: Secure Access
with Lisa Bock1h 25m Intermediate -
Cisco Network Security: Cisco Firewall Technologies
with Lisa Bock1h 34m Intermediate
-
Introduction
-
What you need to know1m 19s
-
1. Security Principles
-
Secure network overview5m 2s
-
Security services4m 10s
-
Describing SIEM technology3m 27s
-
Learning security terms3m 39s
-
Staying informed4m 13s
-
Network security domains4m 50s
-
Zone defense3m 52s
-
-
2. Common Security Threats
-
Attacking the network5m 1s
-
Identify malware5m 10s
-
Data loss prevention4m 22s
-
3. Cryptography
-
Cryptographic concepts3m 58s
-
Symmetric encryption5m 6s
-
Asymmetric encryption4m 42s
-
Key exchange3m 27s
-
Public key infrastructure4m 21s
-
-
4. Describe Network Topologies
-
Campus area network2m 30s
-
Cloud and wide area network2m 58s
-
Data center3m 3s
-
-
Conclusion
-
Next steps1m 11s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Defending the network (HIYA)