This course covers the fundamentals of network security. Is designed to take you through not only the fundamentals of security but also some of the most common threats that are seen in our networks today. In this course, you'll also learn fundamentals of cryptography and also look at a brief history of crypto. You'll also learn about various network security devices and how they're used in our network topologies today.
Course Introduction and CCNA Security Overview Well, hi there, everyone and welcome to Security Concepts for CCNA Security 210-260 IINS. This is your course introduction and CCNA Security overview. Now, I'm Brandon Carroll CCIE #23837 and I'm thrilled that you're joining me for this CCNA Security course. This is actually the first of six in the series, so I'm really happy that you're joining me. Let's go ahead and move into our overview of what we're going to cover in this module. Now in the module we're going to start out by doing a little bit of a course introduction. What we want to do while we go through this course introduction is we want to talk about who this course is for and we want to see some of the prerequisites. I want to discuss that just a little bit. We want to talk about course topics, what we're going to see as we move throughout this entire course in the time we have together here, and we're also going to talk a little bit about some lab information here, and then we're also in this module going to do a bit of an overview of the CCNA Security. So we're going to talk about where do we find information about the CCNA Security certification that's put out by Cisco. We're going to talk about what Cisco is looking for in a CCNA Security candidate or someone who is planning on passing that exam, and we're going to talk a little bit about the exam information. So those are the topics of this module, so let's go ahead and get started.
Common Security Principles Hi there everyone and welcome to Common Security Principles, Brandon Carroll here. Let's jump into our overview of what we're going to see in this particular module. We're going to start out in this module talking about some terminology that's going to be important to us in the security space. We're going to talk about confidentiality, integrity, and availability and talk about what those terms mean, how they work together and why it's important for us to understand them. We're also going to talk about a technology known as SIEM, Security Incident Event Management and Monitoring. We're going to talk about how we do that and take a look at a couple of products that are possibly out there that we might be using. We're going to go ahead and also cover some general security terms, go through sort of a dictionary list of terms that it's going to be important for you to understand and then we're also going to talk about some common security zones that we see in the data networking world and we'll again talk about how they relate to our topologies, our infrastructure, that kind of stuff. So let's go ahead and jump right into it and we'll start out with our first topic on confidentiality, integrity, and availability.
Common Security Threats Well, hi there everyone and welcome to Common Security Threats. I'm Brandon Carroll and we're going to jump right into this module. Here's what we're going to see as we move through this module and we spend a little bit of time together here. So first off we're going to talk about some various threats to our networks that we see, both threats that we see today as well as some threats that we have seen in the past and we'll talk about why they're not really an issue today, but we are going to talk about those. We're also going to talk about some data loss vectors and we're going to see different areas where we lose data. We'll talk about why and maybe mention a couple of ways that we can mitigate that and we're also going to talk about some of the tools that are used in hacking. I already mentioned this in a previous module but we're going to jump out to sectools. org and we'll just talk about some of the common tools. They have a top 100 list that we'll see so we'll talk a little bit about that. That is what we're going to cover in this module. So I hope you're ready to dive right in. We're going to start out with one or two of those threats that we see in our networks today and that is denial of service attacks and distributed denial of service attacks.
Cryptography Concepts Hi there everyone and welcome to Cryptography Concepts. My name is Brandon Carroll and in this module we're going to do an overview of what cryptography is all about. We're going to talk a bit about hashing. We're going to see the process of encryption. We'll take a look at how encryption works and talk about different encryption algorithms. We're also going to discuss cryptanalysis and we'll talk about keys and how keys are used in symmetric and asymmetric algorithms and we'll also discuss a little bit on digital signatures and the PKI infrastructure. So let's go ahead and get started with an overview of cryptography.
Network Topologies Well, hi there everyone and welcome to network topologies. In this module we're going to start out by talking about firewalls. We're going to do a little bit of an overview of the firewall functionality, how it operates at the edge of a network because we are going to tie this back into network topologies, of course. We're going to talk about intrusion prevention systems or the IP sensors and we'll tie that into network topologies. We're also going to talk about content security and we'll do a bit of an overview there. Talk about our web security appliance and our email security appliance, the WSA and the ESA. We are also going to do an overview of VPN. Now we have discussed cryptography, but we're going to put this in terms of a topology. We're also talking about endpoint security in this module. We'll do a bit of an overview there and we're going to talk about secure architecture design and take it back to a couple of different network architectures that we see, different areas of the network, things along those lines. So that's what we've got ahead of us in this module. Let's go ahead and get started with an overview of firewalls.