Limit this search to....

CCNA Cyber Ops SECFND #210-250 Official Cert Guide
Contributor(s): Santos, Omar (Author), Muniz, Joseph (Author), De Crescenzo, Stefano (Author)
ISBN: 1587147025     ISBN-13: 9781587147029
Publisher: Cisco Press
OUR PRICE:   $47.49  
Product Type: Hardcover - Other Formats
Published: April 2017
Qty:
Temporarily out of stock - Will ship within 2 to 5 weeks
Additional Information
BISAC Categories:
- Computers | Security - Networking
Series: Certification Guide
Physical Information: 1.5" H x 7.6" W x 9.2" (2.85 lbs) 672 pages
 
Descriptions, Reviews, Etc.
Publisher Description:
Modern organizations rely on Security Operations Center (SOC) teams to vigilantly watch security systems, rapidly detect breaches, and respond quickly and effectively. To succeed in these crucial tasks, SOCs desperately need more qualified cybersecurity professionals. Cisco's new CCNA Cyber Ops certification prepares candidates to begin a career working with associate-level cybersecurity analysts within SOCs. To earn this valuable certification, candidates must pass two exams. CCNA Cyber Ops SECFND #210-250 Official Cert Guide is Cisco's official, comprehensive self-study resource for the first of these two exams.

Designed for all CCNA Cyber Ops candidates, it covers every SECFND #210-250 objective concisely and logically, with extensive teaching features designed to promote retention and understanding. You'll find:

  • Pre-chapter quizzes to assess knowledge upfront and focus your study more efficiently
  • Foundation topics sections that explain concepts and configurations, and link theory to practice
  • Key topics sections calling attention to every figure, table, and list you must know
  • Exam Preparation sections with additional chapter review features
  • Final preparation chapter providing tools and a complete final study plan
  • A customizable practice test library
This guide offers comprehensive, up-to-date coverage of all SECFND #210-250 topics related to:

  • Network concepts
  • Security concepts
  • Cryptography
  • Host based analysis
  • Security monitoring
  • Attack methods