CCNA Cyber Ops (210-250 SECFND)
Login is required! Please visit : http://pheniix.com/impressum
- 8 hr8 hours
- Login is required!Login is required!
- Customer's Place
1.1 Describe the function of the network layers as specified by the OSI and the TCP/IP network models 1.2 Describe the operation of the following 1.2.a IP 1.2.b TCP 1.2.c UDP 1.2.d ICMP 1.3 Describe the operation of these network services 1.3.a ARP 1.3.b DNS 1.3.c DHCP 1.4 Describe the basic operation of these network device types 1.4.a Router 1.4.b Switch 1.4.c Hub 1.4.d Bridge 1.4.e Wireless access point (WAP) 1.4.f Wireless LAN controller (WLC) 1.5 Describe the functions of these network security systems as deployed on the host, network, or the cloud: 1.5.a Firewall 1.5.b Cisco Intrusion Prevention System (IPS) 1.5.c Cisco Advanced Malware Protection (AMP) 1.5.d Web Security Appliance (WSA) / Cisco Cloud Web Security (CWS) 1.5.e Email Security Appliance (ESA) / Cisco Cloud Email Security (CES) 1.6 Describe IP subnets and communication within an IP subnet and between IP subnets 1.7 Describe the relationship between VLANs and data visibility 1.8 Describe the operation of ACLs applied as packet filters on the interfaces of network devices 1.9 Compare and contrast deep packet inspection with packet filtering and stateful firewall operation 1.10 Compare and contrast inline traffic interrogation and taps or traffic mirroring 1.11 Compare and contrast the characteristics of data obtained from taps or traffic mirroring and NetFlow in the analysis of network traffic 1.12 Identify potential data loss from provided traffic profiles 2.1 Describe the principles of the defense in depth strategy 2.2 Compare and contrast these concepts 2.2.a Risk 2.2.b Threat 2.2.c Vulnerability 2.2.d Exploit 2.3 Describe these terms 2.3.a Threat actor 2.3.b Run book automation (RBA) 2.3.c Chain of custody (evidentiary) 2.3.d Reverse engineering 2.3.e Sliding window anomaly detection 2.3.f PII 2.3.g PHI 2.4 Describe these security terms 2.4.a Principle of least privilege 2.4.b Risk scoring/risk weighting 2.4.c Risk reduction 2.4.d Risk assessment 2.5 Compare and contrast these access control models 2.5.a Discretionary access control 2.5.b Mandatory access control 2.5.c Nondiscretionary access control 2.6 Compare and contrast these terms 2.6.a Network and host antivirus 2.6.b Agentless and agent-based protections 2.6.c SIEM and log collection 2.7 Describe these concepts 2.7.a Asset management 2.7.b Configuration management 2.7.c Mobile device management 2.7.d Patch management 2.7.e Vulnerability management 3.1 Describe the uses of a hash algorithm And other skills
Please read our policy before anything else! https://www.pheniix.com/impressum For cancellations, please contact us at least 48 hours in advance to avoid being charged. Best regards, Pheniix
Dubai - United Arab Emirates