CCNA Security 210-260, Section 1: Network Attack Fundamentals
  • Fund. 1: Citizen C.I.A.
  • Fund. 2: Intro To SIEM
  • Fund 3: More SIEM
  • Fund 4: Recon Attacks and Phishing
  • Fund 5: Spear Phishing, QPQ, And Pretexting
  • Fund 6: Privilege Escalation and Telnet
  • Fund 7: Privilege Escalation Continues
  • Fund 8: DoS and DDoS Attacks
  • Fund 9: Advanced Persistent Threats
CCNA Security 210-260, Section 2: Specific Attacks And Defenses
  • Attack 1: Man-In-The-Middle Attacks
  • Attack 2: ARP Poisoning and Dynamic ARP Inspection
  • Attack 3: DAI Commands
  • Attack 4: MAC Spoofing and CAM Table Overflows
  • Attack 5: Port Security Fundamentals
  • Attack 6: Port Security and Dynamic Secure Addresses
  • Attack 7: Port Security Shutdown!
  • Attack 8: Port Security And Automatic Port Reenabling
  • Attack 9: Port Security Static Address Aging
  • Attack 10: Port Security Dynamic Address Aging
  • Attack 11: Refresh Your VLAN Knowledge Here!
  • Attack 12: Private VLAN Theory
  • Attack 13: Private VLAN Lab
  • Attack 14: OSPF Authentication Fundamentals
  • Attack 15: OSPF Clear-Text Authentication
  • Attack 16: OSPF MD5 Authentication
  • Attack 17: Root Guard
  • Attack 18: BPDU Guard and Loop Guard
  • Attack 19: VLAN ACLs, Part 1
  • Attack 20: VLAN ACLs, Part 2
  • Attack 21: Stoppin' VLAN Hoppin'
  • Attack 22: DHCP Snooping Intro
  • Attack 23: DHCP Snooping Address Renewal
  • Attack 24: DHCP Snooping -- 1st Time Address Acquisition Lab
  • Attack 25: IPSG Theory, Lab 1 Begins
  • Attack 26: IPSG Lab 1 Continues
  • Attack 27: IPSG Static Bindings Lab
  • Attack 28: Segue To The Next Section
CCNA Security 210-260: Privilege Levels
  • Levels 1: The Fundamentals
  • Levels 2: The Other Defaults
  • Levels 3: Intro To Custom Levels
  • Levels 4: Custom Level Lab Continues (Interface-Level Commands)
  • Levels 5: The Autocommand and One-Time Password Options
  • Levels 6: Privilege Levels and "Show Run"
  • Levels 7: Role-Based CLI Begins
  • Levels 8: Role-Based CLI Continues
  • Levels 9: Superviews!
  • Levels 10: Applying The Views, Part 1
  • Levels 11: Applying The Views, Part 2
  • Levels 12: Intro To Lawful Intercept
  • Levels 13: Resilient Config Labs Begin
  • Levels 14: Resilient Config Labs Continue
  • Levels 15: Resilient Config Test
  • Levels 16: Resilient Image Tes
CCNA Security Course: Protecting The Control Plane
  • Control Plane 1: Intro To CoPP
  • Control Plane 2: Class Maps and CoPP
  • Control Plane 3: Policy Maps and CoPP
  • Control Plane 4: Verifying CoPP / Intro To CPPp
CCNA Security 210-260: New VPN Section
  • VPN 1: Site-to-Site Theory
  • VPN 2: ISAKMP Phases 1 and 2
  • VPN 3: Writing The ISAKMP Policy, Part 1
  • VPN 4: Writing The ISAKMP Policy, Part 2
  • VPN 5: Finishing The ISAKMP Policy / Adding The Keys
  • VPN 6: Writing The Transform Sets
  • VPN 6A: Defining Interesting Traffic
  • VPN 7: Writing The Crypto Map
  • VPN 8: Testing and Troubleshooting
  • VPN 9: Crypto Map This n' That
  • VPN 10: Debugging A Tunnel Build
  • VPN 11: Diffie-Hellman Details
  • VPN 12: Using ASDM To Build A VPN
  • VPN 13: More ASDM VPN Building
  • VPN 14: Wrapping Up Our 1st ADSM VPN Build
CCNA Security 210-260: Firewalls
  • Firewall 1: So Just What IS A Firewall?
  • Firewall 2: Stateless and Stateful Filtering
  • Firewall 3: Proxy Firewalls
  • Firewall 4: Personal Firewalls
  • Firewalls 5: The ZBF And Zone Pairs
  • Firewalls 6: The DMZ
  • Firewalls 7: IP Addressing For Firewall Labs
  • Firewalls 8: Basic Firewall Lab With CCP
  • Firewall 9: Basic Firewall Wizard Lab Concludes
  • Firewall 10: Advanced Firewall Wizard Lab Begins
  • Firewall 11: Advanced Firewall Wizard Lab Concludes
  • Firewall 12: Intro To ASA Firewalling
  • Firewall 13: Configuring A New ASA
  • Firewall 14: ADSM Lab Begins -- Outside Interface
  • Firewall 15: ADSM Lab Continues
  • Firewall 16: ADSM Lab Continues (Access Rule Application)
  • Firewall 17: ADSM Lab Continues (Global Rule Permit IP Any Any?)
  • Firewall 18: ADSM Lab Concludes
  • Firewall 19: Same Security Levels... And "Phone Home"
CCNA Security 210-260: The IPS and IDS
  • IPS 1: The Differences
  • IPS 2: Where They Can Go and What They Can DO