Loading...
首页 > CCNA系列认证> 网络安全运营(CCNA CyberOps) > SECFND考试 > 文档

SECFND考试学习

创建于: 2016-06-20 16:58:16          

Study Material欢迎来到200-250 SECFND学习页面,你可以使用以下资源来帮助你准备考试,作为您学习的辅助资料。但它们的设计初衷并不是作为一项完整的自学计划,我们建议您将以下学习资料作为您学习的起点。

 

 

CLN Premium ContentPremium Subscription requires login.

Network Concepts

CLN Premium ContentThe Nuts and Bolts of Networking Series: Part 1: Lesson 1: Identify Network Devices in a Topology - Buy Now 00:26:08
CLN Premium ContentThe Fundamentals of Network Device Communications Series: Part 2: Lesson 1: The Function of Layer 1, 2 & 3 Devices & Layer 4 - Buy Now 00:32:36
CLN Premium ContentThe Fundamentals of Network Device Communications Series: Part 2: Lesson 2: Host to Host Communication using TCP/IP - Buy Now 00:19:07
CLN Premium ContentIntroduction to TCP/IP Series: Cisco TCP/IP Model: Lesson 2: Internet Layer - Buy Now 00:13:11
CLN Premium ContentDNS and DHCP Fundamentals Series: Lesson 1: High-Level Concepts - Buy Now 00:15:23
CLN Premium ContentCCNA Training Series: Part 1: Lesson 1: Introduction to Networking Concepts - Buy Now 00:14:41
CLN Premium ContentCCNA Training Series: Part 2: Lesson 1: LAN Switching - Buy Now 00:19:54
CLN Premium ContentCCNA Training Series: Part 5: Lesson 1: Cisco IP Routing Overview - Buy Now 00:15:27
CLN Premium ContentCisco Security Fundamentals Series: Part 1: Lesson 1: Basic Firewall Terminology - Buy Now 00:13:51
CLN Premium ContentCisco Security Fundamentals Series: Part 3: Lesson 1: IDS and IPS Overview - Buy Now 00:19:35
DNS Best Practices, Network Protections, and Attack Identification Varies
Chapter 6: Network Security Using Cisco IOS IPS 52 pages
Chapter 5: Cisco IOS  IPS 13 pages
Advanced Malware Protection (AMP) Varies
Cisco Advanced Malware Protection for Endpoints Varies
Cisco Advanced Malware Protection 2 pages

Security Concepts 

Network Security Policy: Best Practices White Paper Varies
Network Security Concepts and Policies Varies
IP Network Traffic Plane Security Concepts Varies
BRKSEC-1011 - Written to Realised Security Policy 01:30:00

Cryptography

Diffie Hellman Exchange 2 Pages
BRKSEC-2015 - Designing Network Encryption for the Future 01:30:00
Cryptography in CCNA Varies
Cryptography Varies
Deploying Cisco IOS Security with a Public-Key Infrastructure Varies
Cisco IOS PKI Overview Understanding and Planning a PKI Varies
Next Generation Encryption Varies

Host Based Analysis

Micrsoft Processes and Threads Varies
Microsoft Services Varies

Security Monitoring

Network Telemetry Varies
BRKSEC-2073 - Cisco CSIRT: Security Analytics and Forensics with NetFlow 01:30:00
BRKSEC-3034 - Sourcefire Network Security Analytics: Finding the Needle in the Haystack 01:30:00

Attack Methods

Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks Varies
Defeating DDOS Attacks Varies
Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks Varies
ARP Poisoning Attack and Mitigation Techniques Varies
Social Engineering – the Exploit that Predates Computers Varies
Understanding SQL Injection Varies
Drive By Web Exploits Varies
Cisco Phishing Overview Varies
Network IPS Traffic Analysis Methods, Evasion Possibilities, and Anti-evasive Countermeasures Varies
Characterizing and Tracing Packet Floods Using Cisco Routers Varies
Types of Attacks Varies
DDoS Attacks: an End-to-End Mitigation Approach Varies
评论 (0)