Cisco Cyber Security

Learn How to Attack & defend from the Latest attacks

Instructed by ratnesh kumar

  • Includes all Standard Features
  • Get Unlimited access to all the courses
  • No Contract. Cancel Anytime
Starting in just $19 / mo see all plans
Subscribe Now
$ 299
Annual Subscription
  • One year Unlimited Access
  • Access to all courses
    You will be able to access all the courses from any category on the platform.
  • Learning paths access
  • Access Assignments & Projects
  • Access on Mobile, PC and Tablet
  • Pause & Resume Courses Anytime
  • Offline viewing
  • Instructor Support
  • Course Completion Certificates
  • Cancel Anytime
Subscribe Now
  • Network Security Professionals

In This course Students will get to experience life-like cyber security attack situations in a virtualized enterprise lab environment, where they will get to play both

the role of attacker and defender. Utilizing an environment that models after many enterprise networks, students will learn and understand how their own environments get

compromised, how security breaches get detected, and how to respond with maximum effectiveness.

We have both the attacker Tools and defender tools in this Course .

Defender Tools :

a. Cisco Private AMP console:

b. Cisco Stealthwatch Management Console (SMC)

c. Cisco Identity Services Engine (ISE)

d. Cisco Email Security Appliance (ESA)

e. Rapid7 Nexpose:

Attacker Tools:

Kali Linux & others

  • If students already know latest threats & familiar with Cisco security tools / Appliances like FirePower ISE FireAMP ESA Stealthwatch , then well and good
  • In This course Students will get to experience life-like cyber security attack situations in a virtualized enterprise lab environment, where they will get to play both the role of attacker and defender.
View More...

Section 1 : Course introduction with Hacking Tools & Strategy

  • Lecture 1 :
  • Topic With Topology Diagram Preview
  • Section A: 01 Topic With Topology Diagram 02 Cybersecurity & Cisco Defender components 03 ISE PxGrid Integration with FMC 04 AMP Installation 05 reconnaissance 06 Masscan 07 Nmap Scan 08 Nexpose Section B:  09 Attack the network & get root access 10 Firepower Intrusion Defence Rule 11 How IPS protecitng from Attack 12 Rapid7 Nexpose Integration with Cisco Firepower 13 Advance Attack Part 01 14 Advance Attack 02 Section C: 15 Ransomware Attack 16 Recovery from Ransomware 01 17 Recovery From Ransomware 02 18 Insider Threats FTP Attack 19 StealthWatch 20 Compromised Hosts Controlling Access and Monitoring for Malicious Threats 21 ISE & Firepower Logs
  • Lecture 2 :
  • Cybersecurity & Cisco Defender components
  • Lecture 3 :
  • ISE PxGrid Integration with FMC
  • Lecture 4 :
  • AMP Installation
  • Lecture 5 :
  • reconnaissance
  • Lecture 6 :
  • Masscan
  • Lecture 7 :
  • Nmap Scan
  • Lecture 8 :
  • Nexpose

Section 2 : Attack & Gain Access to the Network

  • Lecture 1 :
  • Attack the network & get root access
  • Lecture 2 :
  • Firepower Intrusion Defence Rule
  • Lecture 3 :
  • How IPS protecitng from Attack
  • Lecture 4 :
  • Rapid7 Nexpose Integration with Cisco Firepower
  • Lecture 5 :
  • Advance Attack Part 01
  • Lecture 6 :
  • Advance Attack 02

Section 3 : Ransomware Attack & Protection from Hacking

  • Lecture 1 :
  • Ransomware Attack
  • Lecture 2 :
  • Recovery from Ransomware 01
  • Lecture 3 :
  • Recovery From Ransomware 02
  • Lecture 4 :
  • Insider Threats FTP Attack
  • Lecture 5 :
  • StealthWatch
  • Lecture 6 :
  • Compromised Hosts Controlling Access and Monitoring for Malicious Threats
  • Lecture 7 :
  • ISE & Firepower Logs

ratnesh kumar,

I am Technical Trainer having CCIE (Security #61380) , Providing Online & classroom training . I am amazed by Cisco Innovations , how they are making things easier for Business. Cisco Always coming with new innovations & products such as SDWAN , ACI , Nexus , UCS , Firepower , Meraki , NSO and Many others. As a learner , i learn these technologies and then Sharing the knowledge over Public Platform such as Learnfly . With my Videos over latest technologies , i always try to fill the Gap what is used in Enterprise vs What type of training available in the Market .
View More...
learn-nxtgen-hacking-with-technology

Learn NxtGen Hacking with Technolog...

By : Gopikrishna C

Lecture 80

tcp-ip-the-complete-course

TCP/IP: The Complete Course

By : Lazaro (Laz) Diaz

Lecture 17

the-complete-ethical-hacking-certification-course

The Complete Ethical Hacking Certif...

By : Mohamed Amer

Lecture 151

voip-configuration-and-attacking-hacking

VoIP Configuration and Attacking (H...

By : Arpit Mittal

Lecture 6

cissp-certification-introduction

CISSP- Certification Introduction

By : MUKESH SINGH

Lecture 18

practical-blockchain-smart-contracts-ethereum-solidity

Practical Blockchain & Smart Contra...

By : Abhilash Nelson

Lecture 40

Sign up and start learning
By signing up. you agree to our Terms of Use and Privacy Policy
Forget Password