This course features Coursera Coach! A smarter way to learn with interactive, real-time conversations that help you test your knowledge, challenge assumptions, and deepen your understanding as you progress through the course.
通过 Coursera Plus 提高技能,仅需 239 美元/年(原价 399 美元)。立即节省

推荐体验
推荐体验
中级
Basic understanding of IT and networking concepts is beneficial but not required. This course is ideal for those pursuing a career in cybersecurity.
推荐体验
推荐体验
中级
Basic understanding of IT and networking concepts is beneficial but not required. This course is ideal for those pursuing a career in cybersecurity.
您将获得的技能
您将学习的工具
要了解的详细信息

添加到您的领英档案
October 2025
8 项作业
了解顶级公司的员工如何掌握热门技能

该课程共有8个模块
In this module, we will provide an overview of the course, its objectives, and how it will help you in your journey to prepare for the CCNA Cybersecurity exam. You’ll also meet your instructor and gain insight into their experience and qualifications in cybersecurity education. This introduction is essential to set the stage for the course, ensuring you’re aware of the topics and skills covered throughout.
涵盖的内容
2个视频1篇阅读材料
2个视频• 总计6分钟
- Welcome to the Course!• 5分钟
- Meet Your Instructor• 1分钟
1篇阅读材料• 总计10分钟
- Full Course Resources• 10分钟
In this module, we will explore the foundational principles of digital defense, an essential aspect of cybersecurity. You will gain a solid understanding of the basic terminology, including the CIA Triad, which underpins most security strategies. We will introduce several security solutions for network, endpoint, and application protection, illustrating how these solutions help mitigate various cybersecurity risks. The module will also provide insights into how defense-in-depth strategies add multiple layers of security.
涵盖的内容
19个视频1个作业
19个视频• 总计92分钟
- Module 1 - Foundations of Digital Defense• 1分钟
- Cybersecurity Defined• 4分钟
- The CIA Triad• 4分钟
- Vulnerabilities, Threats, Exploits, and Risks• 2分钟
- Cybersecurity Terminology• 5分钟
- Defense-in-Depth• 9分钟
- Network Security Solutions• 10分钟
- Endpoint Security Solutions• 5分钟
- Application Security Solutions• 4分钟
- Agent-Based vs. Agentless Security Solutions• 8分钟
- SIEM and SOAR• 5分钟
- Virtualized Solutions• 8分钟
- Cloud-Based Solutions• 5分钟
- Access Control Model Options• 6分钟
- Common Vulnerability Scoring System (CVSS)• 5分钟
- Data Visibility Considerations• 2分钟
- Data Loss Analysis• 2分钟
- The 5-Tuple Approach• 4分钟
- Detection Methods• 3分钟
1个作业• 总计15分钟
- Foundations of Digital Defense - Assessment• 15分钟
In this module, we will dive into threat detection and surveillance techniques used to safeguard systems and data. You will learn how to identify different attack surfaces and gain insight into various data visibility techniques. The module also covers key attacks such as Denial of Service (DoS), SQL Injection, and Man-in-the-Middle (MitM) attacks. By the end of this module, you will understand the tools and methods that can detect and mitigate these threats.
涵盖的内容
19个视频1个作业
19个视频• 总计89分钟
- Module 2 - Threat Detection and Surveillance• 1分钟
- Attack Surfaces• 2分钟
- Monitoring Sources• 7分钟
- Data Visibility Comparison• 6分钟
- Categories of Data Types• 3分钟
- Denial of Service (DoS) Attacks• 6分钟
- Man-in-the-Middle Attacks• 10分钟
- Protocol-Based Attacks• 8分钟
- SQL Injection Attacks• 7分钟
- Cross-Site Scripting (XSS) Attacks• 5分钟
- Command Injection Attacks• 1分钟
- Social Engineering Attacks• 8分钟
- AI-Based Social Engineering Attacks• 2分钟
- Malware and Ransomware Attacks• 4分钟
- Buffer Overflow Attacks• 2分钟
- Command and Control (C2) Attacks• 2分钟
- Comparison of Obfuscation Techniques• 2分钟
- Encryption with Digital Certificates• 4分钟
- Digital Certificate Components• 7分钟
1个作业• 总计15分钟
- Threat Detection and Surveillance - Assessment• 15分钟
In this module, we will explore various strategies and techniques for endpoint protection. You will gain insights into how host-based protection methods secure individual devices and servers from cyber threats. We will also delve into the security considerations for different operating systems such as Windows, macOS, and Linux. This module will also cover best practices for responsibility determination in endpoint protection and the crucial process of evidence collection during cybersecurity incidents.
涵盖的内容
9个视频1个作业
9个视频• 总计55分钟
- Module 3 - Endpoint Protection and Analysis• 1分钟
- Host-Based Protection• 4分钟
- Microsoft Windows Security Considerations• 7分钟
- macOS Security Considerations• 10分钟
- Linux Security Considerations• 9分钟
- Determining Responsibility• 3分钟
- Evidence Identification• 6分钟
- System Log Interpretation• 6分钟
- Malware Analysis• 8分钟
1个作业• 总计15分钟
- Endpoint Protection and Analysis - Assessment• 15分钟
In this module, we will introduce network traffic analysis and how it plays a vital role in detecting security threats. You will explore various techniques such as Deep Packet Inspection (DPI) and NetFlow analysis to monitor network traffic and detect malicious activity. The module will also include hands-on examples using tools like Wireshark to analyze traffic and investigate potential security risks. You’ll also learn how to classify and prioritize security alerts for effective threat management.
涵盖的内容
10个视频1个作业
10个视频• 总计52分钟
- Module 4 - Network Traffic Analysis and Interpretation• 1分钟
- Security Event Sources• 5分钟
- Alert Classification• 4分钟
- Deep Packet Inspection (DPI)• 4分钟
- Comparing Traffic Capture Methods and NetFlow Analysis• 5分钟
- Wireshark PCAP File Analysis for Telnet Flow• 3分钟
- Wireshark PCAP File Analysis for Malware Infection• 9分钟
- Interpreting Protocol Headers• 7分钟
- Artifact Elements• 8分钟
- Regular Expressions• 6分钟
1个作业• 总计15分钟
- Network Traffic Analysis and Interpretation - Assessment• 15分钟
In this module, we will cover best practices and governance frameworks that guide the management of cybersecurity programs. You’ll explore essential management considerations and how to create incident response plans to handle cybersecurity breaches effectively. The module will also introduce the Cyber Kill Chain and the Diamond Model of intrusion analysis to help understand and defend against cyber attacks. By the end of the module, you’ll have a comprehensive understanding of the governance aspects that support cybersecurity efforts.
涵盖的内容
11个视频1个作业
11个视频• 总计44分钟
- Module 5 - Cybersecurity Governance and Best Practices• 1分钟
- Cybersecurity Management Considerations• 4分钟
- Incident Response Plans• 5分钟
- Incident Response Example• 5分钟
- Evidence Collection Recommendations• 5分钟
- Network Profiling• 4分钟
- Server Profiling• 4分钟
- Categorizing Data Protection• 5分钟
- Cyber Kill Chain• 4分钟
- Diamond Model• 3分钟
- SOC Metrics and Scope Analysis• 4分钟
1个作业• 总计15分钟
- Cybersecurity Governance & Best Practices - Assessment• 15分钟
In this module, we will provide valuable tips and strategies to prepare for the CCNA Cybersecurity exam. You’ll learn how to manage your time effectively, study efficiently, and navigate the registration process for the exam. This module also provides insights into the types of questions you may encounter on the exam and offers resources to help you practice. By the end of this module, you’ll be well-equipped to take the exam with confidence.
涵盖的内容
4个视频1个作业
4个视频• 总计13分钟
- Module 6 - Exam Preparation• 1分钟
- Registering for the Exam• 4分钟
- Study Strategies• 5分钟
- What to do on Exam Day• 3分钟
1个作业• 总计15分钟
- Exam Preparation - Assessment• 15分钟
In this final module, we will congratulate you on completing the course and guide you through the next steps in your cybersecurity journey. You’ll learn about further certification opportunities and career paths in cybersecurity. This module will also provide insight into how you can continue to build your skills and knowledge to advance in the field of cybersecurity.
涵盖的内容
1个视频2个作业
1个视频• 总计2分钟
- Congratulations and Next Steps• 2分钟
2个作业• 总计75分钟
- Full Course Practice Assessment• 15分钟
- Full Course Assessment• 60分钟
位教师

提供方

提供方

Packt helps tech professionals put software to work by distilling and sharing the working knowledge of their peers. Packt is an established global technical learning content provider, founded in Birmingham, UK, with over twenty years of experience delivering premium, rich content from groundbreaking authors on a wide range of emerging and popular technologies.
从 Security 浏览更多内容
人们为什么选择 Coursera 来帮助自己实现职业发展

Felipe M.

Jennifer J.

Larry W.

Chaitanya A.
常见问题
CCNA Cybersecurity (200-201) is a comprehensive training program focused on cybersecurity fundamentals and strategies. It is designed for individuals who want to pursue a career in network security and IT protection. The course covers essential topics like digital defense, threat detection, network traffic analysis, and best practices in cybersecurity. It is highly relevant in today's world, where the increasing number of cyber threats requires skilled professionals to protect systems and data.
This course is tailored to prepare learners for the CCNA Cybersecurity exam by providing a deep dive into the key principles and tools of cybersecurity. The course covers various modules such as foundations of digital defense, threat detection, network traffic analysis, endpoint protection, and cybersecurity governance. It equips students with practical knowledge to manage and mitigate security risks in an ever-evolving digital landscape.
Upon completing the course, you will have the skills to identify cybersecurity threats, implement defense mechanisms, and protect network infrastructure. You will be able to analyze network traffic, secure endpoints, detect attacks, and deploy security solutions to safeguard systems and data. Additionally, you will be well-prepared for the CCNA Cybersecurity certification exam.
While no advanced prior knowledge is required, basic understanding of networking concepts, such as TCP/IP, IP addressing, and basic protocols, is recommended. This foundation will help you better understand the course material, though the content is designed to guide you through all necessary concepts.
This course is designed for individuals aiming to start or advance their careers in cybersecurity, particularly those seeking to prepare for the CCNA Cybersecurity exam. It is suitable for network administrators, IT professionals, and anyone interested in cybersecurity.
The course has a total duration of 6 hours of video content, which can be completed at your own pace.
Yes, you can preview the first video and view the syllabus before you enroll. You must purchase the course to access content not included in the preview.
If you decide to enroll in the course before the session start date, you will have access to all of the lecture videos and readings for the course. You’ll be able to submit assignments once the session starts.
Once you enroll and your session begins, you will have access to all videos and other resources, including reading items and the course discussion forum. You’ll be able to view and submit practice assessments, and complete required graded assignments to earn a grade and a Course Certificate.
If you complete the course successfully, your electronic Course Certificate will be added to your Accomplishments page - from there, you can print your Course Certificate or add it to your LinkedIn profile.
This course is currently available only to learners who have paid or received financial aid, when available.
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.
更多问题
提供助学金,





