Join Lisa Bock for an in-depth discussion in this video Next steps, part of CCNA Security (210-260) Cert Prep: 1 Security Concepts.
- [Instructor] Thank you for watching.…In this course, I've covered security principles…such as the CIA triad, security services,…terms and network domains.…I've also covered common security threats…such as social engineering, malware…and active and passive attacks.…I reviewed cryptographic techniques such as encryption,…hashing, digital signatures, along with describing…various network topologies such as a campus area network,…data centers and virtual environments.…
If you're interested in learning more,…please check out the IT segment of the library…where we add courses all the time.…It's well worth your time to check out any course…in the Ethical Hacking series,…including Ethical Hacking: Viruses and Worms.…If you want to learn more about encryption, check out…my course Learning Cryptography and Network Security.…You also might want to see what my colleague,…Malcolm Shore, has for you on his home page.…
Keep learning, I hope to see you again soon.…
Author
Released
9/21/2017- Security principles and terms
- SIEM technology
- Common security threats
- Social engineering
- Data loss prevention
- Cryptographic concepts
- Symmetric and asymmetric encryption
- Hash algorithms
- Network topologies, CAN, WAN, and SOHO
- Securing a virtual environment
Skill Level Intermediate
Duration
Views
Related Courses
-
Cisco ICND2 Cert Prep: Switching
with Russell Long2h 20m Intermediate -
Cisco ICND2 Cert Prep: Routing
with Russell Long2h 30m Intermediate -
CCNA Security (210-260) Cert Prep: 2 Secure Access
with Lisa Bock1h 25m Intermediate -
CCNA Security (210-260) Cert Prep: 3 VPN
with Lisa Bock1h 27m Intermediate
-
Introduction
-
Welcome1m 21s
-
-
1. Security Principles
-
Secure network overview5m 2s
-
Security services4m 10s
-
SIEM technology3m 44s
-
Security terms3m 39s
-
Security organizations4m 13s
-
Network security domains4m 50s
-
Zone defense3m 52s
-
-
2. Common Security Threats
-
Common network attacks7m 16s
-
Identify malware5m 10s
-
Data loss prevention4m 22s
-
-
3. Cryptography
-
Cryptographic concepts3m 58s
-
Symmetric encryption5m 6s
-
Asymmetric encryption4m 42s
-
Hash algorithms4m 38s
-
Key exchange3m 27s
-
Public key infrastructure4m 21s
-
-
4. Describe Network Topologies
-
Campus area network2m 30s
-
Cloud and wide area network2m 58s
-
Data center3m 3s
-
-
Conclusion
-
Next steps1m 9s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Next steps