The Understand Cisco Cybersecurity Fundamentals (SECFND) v1.0 course allows learners to understand cybersecurity’s basic principles and foundational knowledge, as well as obtain the core skills needed to grasp the more advanced associate-level materials in the second required exam, Implementing Cisco Cybersecurity Operations (SECOPS). It focuses on cybersecurity operations principles and technologies, using hands-on examples in realistic scenarios, with real-life security products and equipment.


After finishing this course, you will be able to:
  • Describe, compare and identify various network concepts
  • Fundamentals of TCP/IP
  • Describe and compare fundamental security concepts
  • Describe network applications and the security challenges
  • Understand basic cryptography principles
  • Understand endpoint attacks, including interpreting log data to identify events in Windows and Linux
  • Develop knowledge in security monitoring, including identifying sources and types of data and events
  • Know various attack methods, security weaknesses, evasion methods, and remote versus local exploits


The course contains the following components:
  • TCP/IP and Cryptography Concepts
    • Understanding the TCP/IP Protocol Suite
    • Understanding the Network Infrastructure
    • Understanding Common TCP/IP Attacks
    • Understanding Basic Cryptography Concepts
  • Network Applications and Endpoint Security
    • Describing Information Security Concepts
    • Understanding Network Applications
    • Understanding Common Network Application Attacks
    • Understanding Windows Operating System Basics
    • Understanding Linux Operating System Basics
    • Understanding Common Endpoint Attacks
    • Understanding Network Security Technologies
    • Understanding Endpoint Security Technologies
  • Security Monitoring and Analysis
    • Describing Security Data Collection
    • Describing Security Event Analysis

    Lab outline:
    • Explore the TCP/IP Protocol Suite
    • Explore the Network Infrastructure
    • Explore TCP/IP Attacks
    • Explore Cryptographic Technologies
    • Explore Network Applications
    • Explore Network Application Attacks
    • Explore the Windows Operating System
    • Explore the Linux Operating System
    • Explore Endpoint Attacks
    • Explore Network Security Technologies
    • Explore Endpoint Security
    • Explore Security Data for Analysis

Prerequisite Knowledge

It is highly recommended to have the following skills and knowledge before attending this course:

Associated certifications

  • CCNA Cyber Ops Certification