Cisco Security Fundamentals
- Référence SECFNDU
- Durée 3 jour(s)
- Version 1.0
Modalité pédagogique
Options de paiement complémentaires
- CLC 28
Classe inter à distance Prix
EUR2,590.00
hors TVA
Demander une formation en intra-entreprise S'inscrireAller à:
Modalité pédagogique
La formation est disponible dans les formats suivants:
-
Classe inter à distance
Depuis n'importe quelle salle équipée d'une connexion internet, rejoignez la classe de formation délivrée en inter-entreprises.
-
Classe inter en présentiel
Formation délivrée en inter-entreprises. Cette méthode d'apprentissage permet l'interactivité entre le formateur et les participants en classe.
-
Intra-entreprise
Cette formation est délivrable en groupe privé, et adaptable selon les besoins de l’entreprise. Nous consulter.
Demander cette formation dans un format différent
Résumé
Haut de pageStay ahead of evolving threats with Cisco Security Fundamentals (SECFNDU), a course crafted for IT professionals who want actionable skills in modern network security. Delve into the latest technologies, including virtualization, next-generation firewalls, VPNs, and endpoint protection. You’ll master the deployment and management of Cisco Secure Firewall ASA and Umbrella, learning how to implement robust security policies and respond to real-world attack scenarios.
SECFNDU goes beyond theory, offering practical insights into attack vectors, reconnaissance techniques, and infrastructure protection. By the end of the course, you’ll be ready to secure networks, endpoints, and cloud environments with confidence—making you an indispensable asset to any organization.
This course is worth 24 Continuing Education (CE) Credits
Virtual and Classroom learning - V&C Select™
V&C Select™ is a simple concept and a flexible approach to delivery. You can 'select' a course from our public schedule and attend in person or as a virtual delegate. Virtual delegates do not travel to this course, we will send you all the information you need before the start of the course and you can test the logins.
Prochaines dates
Haut de page-
- Modalité: Classe inter à distance
- Date: 08-10 juin, 2026 | 9:00 AM to 5:00 PM
- Centre: SITE DISTANT (W. Europe )
- Langue: Français
-
- Modalité: Classe inter à distance
- Date: 08-10 juillet, 2026 | 9:00 AM to 5:00 PM
- Centre: SITE DISTANT (W. Europe )
- Langue: Anglais
-
- Modalité: Classe inter à distance
- Date: 14-16 septembre, 2026 | 10:00 AM to 6:00 PM
- Centre: SITE DISTANT (W. Europe )
- Langue: Anglais
-
- Modalité: Classe inter à distance
- Date: 14-16 octobre, 2026 | 9:00 AM to 5:00 PM
- Centre: SITE DISTANT (W. Europe )
- Langue: Français
-
- Modalité: Classe inter à distance
- Date: 02-04 novembre, 2026 | 9:00 AM to 5:00 PM
- Centre: SITE DISTANT (W. Europe )
- Langue: Anglais
-
- Modalité: Classe inter à distance
- Date: 11-13 janvier, 2027 | 10:00 AM to 6:00 PM
- Centre: SITE DISTANT (W. Europe )
- Langue: Anglais
Public
Haut de pageObjectifs de la formation
Haut de pageAfter completing this course you should be able to:
- Understand and articulate the principles of defense-in-depth and the attack continuum in modern network security.
- Identify and describe the functions of key network security technologies, including firewalls, intrusion prevention systems, and malware protection.
- Analyze common TCP/IP and network application attacks, recognizing vulnerabilities and attack vectors.
- Implement foundational network infrastructure protection strategies, including control, management, and data plane security controls.
- Deploy and configure Cisco Secure Firewall ASA and Secure Endpoint solutions to enhance organizational security.
- Explain the concepts and applications of VPN technologies and cryptography in securing communications.
Programme détaillé
Haut de pageNetwork Security Technologies
- Defense-in-Depth Strategy
- Defending Across the Attack Continuum
- Network Segmentation and Virtualization Overview
- Stateful Firewall Overview
- Cisco IOS Zone-Based Policy Firewall Overview
- Security Intelligence Overview
- Threat Information Standardization
- Network-Based Malware Protection Overview
- IPS Overview
- Next Generation Firewall Overview
- Email Content Security Overview
- Web Content Security Overview
- Threat Analytic Systems Overview
- DNS Security Overview
- Authentication, Authorization, and Accounting Overview
- Identity and Access Management Overview
- Virtual Private Network (VPN) Technology Overview
- Network Security Device Form Factors Overview
Describe Common TCP/IP Attacks
- Legacy TCP/IP Vulnerabilities
- IP Vulnerabilities
- ICMP Vulnerabilities
- UDP Vulnerabilities
- Attack Surface and Attack Vectors
- Reconnaissance Attacks
- Access Attacks
- Man-In-The-Middle Attacks
- Denial of Service and Distributed Denial of Service Attacks
- Reflection and Amplification Attacks
- Spoofing Attacks
- DHCP Attacks
Describe Common Network Application Attacks
- Password Attacks
- DNS Tunneling
- Web-Based Attacks
- HTTP 302 Cushioning
- Command Injections
- SQL Injections
- Cross-Site Scripting and Request Forgery
- Email-Based Attacks
Network Infrastructure Protection
- Network Device Planes
- Control Plane Security Controls
- Management Plane Security Controls
- Network Telemetry
- Layer 2 Data Plane Security Controls
- Layer 3 Data Plane Security Controls
Cisco Secure Firewall ASA Deployment
- Cisco Secure Firewall ASA Deployment Types
- Cisco Secure Firewall ASA Interface Security Levels
- Cisco Secure Firewall ASA Objects and Object Groups
- Network Address Translation
- Cisco Secure Firewall ASA Interface ACLs
- Cisco Secure Firewall ASA Global ACLs
- Cisco Secure Firewall ASA Advanced Access Policies
- Cisco Secure Firewall ASA High Availability Overview
VPN Technologies AND Cryptography Concepts
- VPN Definition
- VPN Types
- Secure Communication and Cryptographic Services
- Keys in Cryptography
- Public Key Infrastructure
Cisco Umbrella Deployment
- Cisco Umbrella Capabilities
- Cisco Umbrella Identities and Policies Overview
- Cisco Umbrella DNS Security
- Cisco Umbrella Investigate Overview
- Cisco Umbrella Secure Web Gateway
- Cisco Umbrella CASB Functionalities
Common Endpoint Attacks
- Buffer Overflow
- Malware
- Reconnaissance Attack
- Gaining Access and Control
- Gaining Access via Social Engineering
- Gaining Access via Web-Based Attacks
- Exploit Kits and Rootkits
- Privilege Escalation
- Post-Exploitation Phase
- Angler Exploit Kit
Endpoint Security Technologies
- Host-Based Personal Firewall
- Host-Based Anti-Virus
- Host-Based Intrusion Prevention System
- Application Allowed Lists and Blocked Lists
- Host-Based Malware Protection
- Sandboxing Overview
- File Integrity Checking
Cisco Secure Endpoint
- Cisco Secure Endpoint Architecture
- Cisco Secure Endpoint Engines
- Retrospective Security with Cisco Secure Endpoint
- Cisco Secure Endpoint Device and File Trajectory
- Managing Cisco Secure Endpoint for Endpoints
802.1X Authentication
- Cisco Catalyst Switch 802.1X Configuration
- Cisco IBNS 2.0 Configuration on Cisco Catalyst Switch
- Cisco WLC 802.1X Configuration
- Cisco ISE 802.1X Configuration
- Supplicant 802.1x Configuration
- Cisco Central Web Authentication
Labs:
- Discovery 1: Configure Network Settings and NAT on Cisco Secure Firewall ASA
- Discovery 2: Configure Cisco Secure Firewall ASA Access Control Policies
- Discovery 3: Examine Cisco Umbrella Dashboard and DNS Security
- Discovery 4: Explore Cisco Umbrella Secure Web Gateway and Cloud-Delivered Firewall
- Discovery 5: Explore Cisco Umbrella CASB Functionalities
- Discovery 6: Explore Cisco Secure Endpoint
- Discovery 7: Perform Endpoint Analysis Using Cisco Secure Endpoint Console
- Discovery 8: Explore File Ransomware Protection by Cisco Secure Endpoint Console
Pré-requis
Haut de pageAttendees should meet the following prerequisites:
- Familiarity with Ethernet and TCP/IP networking
- Working knowledge of the Windows operating system
- Working knowledge of Cisco IOS networking and concepts
- Familiarity with basics of networking security concepts
Certification
Haut de pageRecommended as preparation for the following exam:
- There is no exam currently linked to this course.
Bon à savoir
Haut de pageThis course is not recommended if you are planning on doing SCOR.