Pluralsight

RF Fundamentals for Cisco WIFUND (200-355)

image1

Wireless technology is here to stay and is growing faster than ever. This course will teach you the basics of radio frequencies, standards, how to handle interference, and how to choose appropriate antennas. 

View Course

802.11 Technology Fundamentals for Cisco WIFUND (200-355)

image2

Continue your education in wireless technologies. This course will teach you about WLAN topologies, wireless equipment, and 802.11 frames. 

View Course

Implementing a Wireless Network for Cisco WIFUND (200-355)

image3

Learn to configure and implement wireless access points and controllers to prepare for the CCNA Wireless WIFUND (200-355) exam. You'll cover access points, wireless architecture types, and controller maintenance. 

View Course

Operating a Wireless Network for Cisco WIFUND (200-355)

image4

Learn how to configure and implement wireless LAN controllers. This course will teach you about features that can help ensure an efficient environment. 

View Course

Configuration of Client Connectivity for Cisco WIFUND (200-355)

image5

Clients need to know they can successfully and safely connect to their  wireless network. In this course, you will gain knowledge of wireless security and authentication methods for clients.

View Course

Troubleshooting Wireless Client Connectivity

image6

 Ensuring clients can connect and remain connected to your wireless  network is critical. In this course, you will learn how to verify  wireless client access to a wireless infrastructure and understand  interference issues caused by common technologies. 

View Course

Pluralsight Cont.

Preparing Wireless Site Surveys

image7

 Ensure that your wireless network is properly designed with a site  survey. In this course, you will learn how to create a site survey while  adhering to business requirements. 

View Course

INE

CCNA Cyber Ops Technology Course: SECFND 210-250

image8

Cisco's CCNA Cyber Ops certification provides individuals with the  knowledge to identify and respond to security incidents. This certification provides a path to working in a Security Operations Center (SOC) and security positions. As a CCNA level certification, Cyber Ops  provides introductory knowledge so one may be aware of the security  landscape, understand security concepts and general networking.


This  course will cover the exam topics of the Understanding Cisco Cybersecurity Fundamentals (SECFND 210-250) exam. We will dive into  topics such as networking concepts and IP addressing, as well as  security concepts including access control models, risk assessment, and the CIA triad. We will also review cryptography methods and host-based analysis details, as well as security monitoring tools, and attack  methods used by threat actors. 

View Course

CCNA Cyber Ops Technology Course: SECOPS 210-255

image9

Cisco's CCNA Cyber Ops certification provides individuals with the knowledge to identify and respond to security incidents. This certification provides a path to working in a Security Operations Center (SOC) and security positions. As a CCNA level certification, Cyber Ops  provides introductory knowledge so one may be aware of the security  landscape, understand security concepts and general networking.


This  course will cover the exam topics of the Understanding Cisco Cybersecurity Fundamentals (SECOPS 210-255) exam. We will dive into topics such as endpoint analysis and forensics, discuss NetFlow and IPFIX, and the importance of data analysis. We will also review incident response plans, various computer security teams, and compliance  frameworks such as PCI, HIPAA, and SOX. 

View Course

Packt Publishing

Mastering Wireshark 2

image10

Wireshark is a popular and powerful tool used to analyze the amount of bits and bytes that are flowing through a network. Wireshark deals with the second to seventh layer of network protocols, and the analysis made is presented in a human readable form.


Through this video, you will gain expertise in securing your network  using Wireshark 2. At the start of the video, you will be taught how to install Wireshark, and will be introduced to its interface so you understand all its functionalities. Moving forward, you will discover different ways to create and use capture and display filters. Halfway  through the video, you’ll be mastering the features of Wireshark, analyzing different layers of the network protocol, and looking for any anomalies. You will also learn about plugins and APIs.


As you reach to the end of the course, you will be taught how to use  Wireshark for network security analysis and configure it for troubleshooting purposes.

View Course

Mastering Wireshark 2 Book

image11

  

Wireshark, a combination of a Linux distro (Kali) and an  open source security framework (Metasploit), is a popular and powerful  tool. Wireshark is mainly used to analyze the bits and bytes that flow  through a network. It efficiently deals with the second to the seventh  layer of network protocols, and the analysis made is presented in a form  that can be easily read by people.

Mastering Wireshark 2 helps you gain expertise in securing your  network. We start with installing and setting up Wireshark2.0, and then  explore its interface in order to understand all of its functionalities.  As you progress through the chapters, you will discover different ways  to create, use, capture, and display filters. By halfway through the  book, you will have mastered Wireshark features, analyzed different  layers of the network protocol, and searched for anomalies. You’ll learn  about plugins and APIs in depth. Finally, the book focuses on pocket  analysis for security tasks, command-line utilities, and tools that  manage trace files.

By the end of the book, you'll have learned how to use Wireshark for  network security analysis and configured it for troubleshooting  purposes.

View Book

Learning Practical Network Scanning

image12

Network scanning is the process of assessing a network to identify active host network, either an attacker or a medium for security assessment. This procedure plays an extremely vital role in risk assessment programs or while preparing a security plan for your  organization.


This course starts with the concept of network scanning and how an  organization can benefit from it. Then we delve into different scanning  techniques such as port and firewall detection, TCP/IP port detection,  OS detection, and so on. We also implement these concepts using a few of the most prominent tools on the market such as Nmap, Nessus, and  OpenVAS.


By the end of this course, you will have hands-on experience in performing network scanning using different tools and choosing the best tool for your system.

View Course

Mastering Practical Network Scanning

image13

 

Network scanning is the process of assessing a network to identify an  active host network, which will either be an attacker or a medium for  security assessment. This procedure plays an extremely vital role in  risk assessment programs or when preparing a security plan for your  organization.


This course picks up where Learning Practical Network Scanning  finished and focuses on the most widely available customization network  scanning tool: Nmap. Sills learned with Nmap can be later applied to  many other applications.


First, it starts by understanding various methods to define scanning  targets. Next, the course covers understanding (and adjusting) how ports  are scanned and applications and operating systems are detected. Later,  it explains how to detect and bypass firewalls and perform scripting to  make common tasks easy to repeat.

View Course

YouTube

ShrikeCast Channel

image14

 ShrikeCast is a free IT training channel produced by Andrew Crouthamel. Learn Cisco's CCNA certification, Wireshark WCNA, SonicWALL, and more!

View Channel