Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Coursera

CCNA Cybersecurity (200-201) - Video Training Series

Packt via Coursera

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
This course features Coursera Coach! A smarter way to learn with interactive, real-time conversations that help you test your knowledge, challenge assumptions, and deepen your understanding as you progress through the course. The course offers comprehensive coverage of CCNA Cybersecurity concepts, preparing you for the 200-201 exam. Starting with foundational principles of digital defense, you'll learn key cybersecurity terms and frameworks like the CIA Triad, vulnerabilities, and defense strategies. The journey continues with an in-depth exploration of threat detection, endpoint protection, network traffic analysis, and cybersecurity governance. You'll also learn about advanced topics, including attack types, social engineering, malware analysis, and incident response plans. The course's approach is structured with practical techniques and real-world scenarios for efficient learning. This course is ideal for aspiring cybersecurity professionals and anyone wanting to gain a deep understanding of security measures in modern IT environments. It covers beginner to intermediate-level topics, so it’s suitable for individuals with basic IT knowledge or those looking to specialize in cybersecurity. By the end of the course, you will be able to assess cybersecurity risks, detect and mitigate network attacks, secure endpoints, and implement defense strategies effectively.

Syllabus

  • Welcome to the Course!
    • In this module, we will provide an overview of the course, its objectives, and how it will help you in your journey to prepare for the CCNA Cybersecurity exam. You’ll also meet your instructor and gain insight into their experience and qualifications in cybersecurity education. This introduction is essential to set the stage for the course, ensuring you’re aware of the topics and skills covered throughout.
  • Foundations of Digital Defense
    • In this module, we will explore the foundational principles of digital defense, an essential aspect of cybersecurity. You will gain a solid understanding of the basic terminology, including the CIA Triad, which underpins most security strategies. We will introduce several security solutions for network, endpoint, and application protection, illustrating how these solutions help mitigate various cybersecurity risks. The module will also provide insights into how defense-in-depth strategies add multiple layers of security.
  • Threat Detection and Surveillance
    • In this module, we will dive into threat detection and surveillance techniques used to safeguard systems and data. You will learn how to identify different attack surfaces and gain insight into various data visibility techniques. The module also covers key attacks such as Denial of Service (DoS), SQL Injection, and Man-in-the-Middle (MitM) attacks. By the end of this module, you will understand the tools and methods that can detect and mitigate these threats.
  • Endpoint Protection and Analysis
    • In this module, we will explore various strategies and techniques for endpoint protection. You will gain insights into how host-based protection methods secure individual devices and servers from cyber threats. We will also delve into the security considerations for different operating systems such as Windows, macOS, and Linux. This module will also cover best practices for responsibility determination in endpoint protection and the crucial process of evidence collection during cybersecurity incidents.
  • Network Traffic Analysis and Interpretation
    • In this module, we will introduce network traffic analysis and how it plays a vital role in detecting security threats. You will explore various techniques such as Deep Packet Inspection (DPI) and NetFlow analysis to monitor network traffic and detect malicious activity. The module will also include hands-on examples using tools like Wireshark to analyze traffic and investigate potential security risks. You’ll also learn how to classify and prioritize security alerts for effective threat management.
  • Cybersecurity Governance & Best Practices
    • In this module, we will cover best practices and governance frameworks that guide the management of cybersecurity programs. You’ll explore essential management considerations and how to create incident response plans to handle cybersecurity breaches effectively. The module will also introduce the Cyber Kill Chain and the Diamond Model of intrusion analysis to help understand and defend against cyber attacks. By the end of the module, you’ll have a comprehensive understanding of the governance aspects that support cybersecurity efforts.
  • Exam Preparation
    • In this module, we will provide valuable tips and strategies to prepare for the CCNA Cybersecurity exam. You’ll learn how to manage your time effectively, study efficiently, and navigate the registration process for the exam. This module also provides insights into the types of questions you may encounter on the exam and offers resources to help you practice. By the end of this module, you’ll be well-equipped to take the exam with confidence.
  • Next Steps
    • In this final module, we will congratulate you on completing the course and guide you through the next steps in your cybersecurity journey. You’ll learn about further certification opportunities and career paths in cybersecurity. This module will also provide insight into how you can continue to build your skills and knowledge to advance in the field of cybersecurity.

Taught by

Packt - Course Instructors

Reviews

Start your review of CCNA Cybersecurity (200-201) - Video Training Series

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.