{"id":995043,"date":"2025-01-09T15:22:21","date_gmt":"2025-01-09T12:22:21","guid":{"rendered":"http:\/\/18.199.85.50\/?p=995043"},"modified":"2025-08-18T15:37:31","modified_gmt":"2025-08-18T12:37:31","slug":"understanding-cisco-cybersecurity-fundamentals-secfnd","status":"publish","type":"post","link":"https:\/\/www.morten.com.tr\/en\/understanding-cisco-cybersecurity-fundamentals-secfnd\/","title":{"rendered":"Understanding Cisco Cybersecurity Fundamentals (SECFND)"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"995043\" class=\"elementor elementor-995043\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5c62cda e-flex e-con-boxed e-con e-parent\" data-id=\"5c62cda\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5d6a6c0 elementor-widget elementor-widget-text-editor\" data-id=\"5d6a6c0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About Education<\/strong><\/p><p>The \u2018Understanding Cisco Cybersecurity Fundamentals (SECFND)\u2019 course provides you with a basic understanding of common security concepts, basic security techniques, and the fundamentals of applications, operating systems, and networks used in a Security Operations Centre (SOC). This course helps you learn to find threats in a real network infrastructure using a variety of popular security tools. Through expert instruction and hands-on experience using enterprise-class security tools, you will learn the basics of network and security concepts, endpoint attacks, cryptography, analysis and monitoring. This course is an introduction for those who want to enter the cybersecurity field and is the first of two courses that prepare you for the Cisco CCNA\u00ae Cyber Ops certification.<\/p><p>Today's cyber security professionals need to detect, investigate and respond to a wide range of security incidents. This course will help you gain the skills needed to play a role in detecting and responding to security incidents in your organisation's SOC.<\/p><p><strong>Prerequisites<\/strong><\/p><ul><li>Basic network knowledge<\/li><li>Familiarity with basic computer concepts<\/li><li>Completion of \u2018Introduction to Cybersecurity\u2019 or a similar entry-level cyber security course<\/li><\/ul><p><strong>Duration of Training<\/strong><\/p><p><strong>Toplam S\u00fcre:<\/strong>\u00a05 G\u00fcn (G\u00fcnde 6 saat)<br \/><strong>Toplam E\u011fitim Saati:<\/strong>\u00a030 saat<br \/><strong>E\u011fitim Format\u0131:<\/strong>\u00a0Uygulamal\u0131 ve interaktif y\u00fcz y\u00fcze \/online ortam<\/p><p><strong>Who Should Participate?<\/strong><\/p><ul><li>IT Professionals<\/li><li>All students looking to enter mid-level cybersecurity roles such as:<ul><li>SOC cybersecurity analysts<\/li><li>Computer or network defense analysts<\/li><li>Computer network defense infrastructure support personnel<\/li><li>Future incident response teams and SOC personnel<\/li><li>Cisco integrators or partners<\/li><\/ul><\/li><\/ul><p><strong>Educational Content<\/strong><\/p><ul><li><strong>TCP\/IP and Cryptography Concepts<\/strong><ul><li>Understanding the TCP\/IP Protocol Suite<\/li><li>Understanding Network Infrastructure<\/li><li>Understanding Common TCP\/IP Attacks<\/li><li>Understanding Basic Cryptography Concepts<\/li><\/ul><\/li><li><strong>Network Applications and Endpoint Security<\/strong><ul><li>Explaining Information Security Concepts<\/li><li>Understanding Network Applications<\/li><li>Understanding Common Network Application Attacks<\/li><li>Understanding Windows Operating System Basics<\/li><li>Understanding Linux Operating System Basics<\/li><li>Understanding Common Endpoint Attacks<\/li><li>Understanding Network Security Technologies<\/li><li>Understanding Endpoint Security Technologies<\/li><\/ul><\/li><li><strong>Security Monitoring and Analysis<\/strong><ul><li>Explaining Security Data Collection<\/li><li>Security Incident Analysis Description<\/li><\/ul><\/li><\/ul><p><strong>What You Will Gain at the End of Training<\/strong><\/p><ul><li>Describe network operations and attacks, basic cryptography concepts, and network infrastructure device operations.<\/li><li>Describe basic Windows and Linux operating system operations, common network applications and attacks, endpoint attacks, and network and endpoint security solutions.<\/li><li>Explain security data collection and monitoring, and common threat models that security operations organizations can reference when performing cybersecurity analysis.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"vamtam-has-theme-widget-styles elementor-element elementor-element-5154baa elementor-align-right elementor-widget elementor-widget-button\" data-id=\"5154baa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/wp-content\/uploads\/2025\/01\/Understanding-Cisco-Cybersecurity-Fundamentals-SECFND.pdf\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download PDF<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>E\u011fitim Hakk\u0131nda &#8220;Understanding Cisco Cybersecurity Fundamentals (SECFND)&#8221; kursu, size ortak g\u00fcvenlik kavramlar\u0131, temel g\u00fcvenlik teknikleri ve bir G\u00fcvenlik Operasyon Merkezi&#8217;nde (SOC) kullan\u0131lan uygulamalar, i\u015fletim sistemleri ve a\u011flar\u0131n temelleri hakk\u0131nda temel d\u00fczeyde bilgi sa\u011flar. Bu kurs, \u00e7e\u015fitli pop\u00fcler g\u00fcvenlik ara\u00e7lar\u0131n\u0131 kullanarak ger\u00e7ek bir a\u011f altyap\u0131s\u0131nda tehditleri bulmay\u0131 \u00f6\u011frenmenize yard\u0131mc\u0131 olur. Uzman talimatlar\u0131 ve kurumsal s\u0131n\u0131f g\u00fcvenlik&#8230;<\/p>","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[116,104,189],"tags":[],"class_list":["post-995043","post","type-post","status-publish","format-standard","hentry","category-cisco","category-egitimler","category-cisco-teknoloji-egitimleri"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.9 (Yoast SEO v25.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Understanding Cisco Cybersecurity Fundamentals (SECFND) - Morten<\/title>\n<meta name=\"description\" content=\"Understanding Cisco Cybersecurity Fundamentals (SECFND) - Morten\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/morten.com.tr\/en\/understanding-cisco-cybersecurity-fundamentals-secfnd\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Understanding Cisco Cybersecurity Fundamentals (SECFND)\" \/>\n<meta property=\"og:description\" content=\"Understanding Cisco Cybersecurity Fundamentals (SECFND) - Morten\" \/>\n<meta property=\"og:url\" content=\"https:\/\/morten.com.tr\/en\/understanding-cisco-cybersecurity-fundamentals-secfnd\/\" \/>\n<meta property=\"og:site_name\" content=\"Morten\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/BTEgitimMorten\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-09T12:22:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-18T12:37:31+00:00\" \/>\n<meta name=\"author\" content=\"dvususer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"dvususer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/morten.com.tr\/en\/understanding-cisco-cybersecurity-fundamentals-secfnd\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/morten.com.tr\/en\/understanding-cisco-cybersecurity-fundamentals-secfnd\/\"},\"author\":{\"name\":\"dvususer\",\"@id\":\"https:\/\/www.morten.com.tr\/#\/schema\/person\/91a44ec134dd4d2bda435ff6c6975820\"},\"headline\":\"Understanding Cisco Cybersecurity Fundamentals (SECFND)\",\"datePublished\":\"2025-01-09T12:22:21+00:00\",\"dateModified\":\"2025-08-18T12:37:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/morten.com.tr\/en\/understanding-cisco-cybersecurity-fundamentals-secfnd\/\"},\"wordCount\":486,\"publisher\":{\"@id\":\"https:\/\/www.morten.com.tr\/#organization\"},\"articleSection\":[\"Cisco\",\"E\u011fitimler\",\"TEKNOLOJI E\u011eITIMLERI\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/morten.com.tr\/en\/understanding-cisco-cybersecurity-fundamentals-secfnd\/\",\"url\":\"https:\/\/morten.com.tr\/en\/understanding-cisco-cybersecurity-fundamentals-secfnd\/\",\"name\":\"Understanding Cisco Cybersecurity Fundamentals (SECFND) - Morten\",\"isPartOf\":{\"@id\":\"https:\/\/www.morten.com.tr\/#website\"},\"datePublished\":\"2025-01-09T12:22:21+00:00\",\"dateModified\":\"2025-08-18T12:37:31+00:00\",\"description\":\"Understanding Cisco Cybersecurity Fundamentals (SECFND) - Morten\",\"breadcrumb\":{\"@id\":\"https:\/\/morten.com.tr\/en\/understanding-cisco-cybersecurity-fundamentals-secfnd\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/morten.com.tr\/en\/understanding-cisco-cybersecurity-fundamentals-secfnd\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/morten.com.tr\/en\/understanding-cisco-cybersecurity-fundamentals-secfnd\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.morten.com.tr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Understanding Cisco Cybersecurity Fundamentals (SECFND)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.morten.com.tr\/#website\",\"url\":\"https:\/\/www.morten.com.tr\/\",\"name\":\"Morten\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.morten.com.tr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.morten.com.tr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.morten.com.tr\/#organization\",\"name\":\"Morten Bilgi ve \u0130leti\u015fim Hizmetleri A.\u015e.\",\"alternateName\":\"Morten\",\"url\":\"https:\/\/www.morten.com.tr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.morten.com.tr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.morten.com.tr\/wp-content\/uploads\/2024\/11\/mortenbt.webp\",\"contentUrl\":\"https:\/\/www.morten.com.tr\/wp-content\/uploads\/2024\/11\/mortenbt.webp\",\"width\":265,\"height\":116,\"caption\":\"Morten Bilgi ve \u0130leti\u015fim Hizmetleri A.\u015e.\"},\"image\":{\"@id\":\"https:\/\/www.morten.com.tr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/BTEgitimMorten\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.morten.com.tr\/#\/schema\/person\/91a44ec134dd4d2bda435ff6c6975820\",\"name\":\"dvususer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.morten.com.tr\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ddb6fbf1df37151ad4ff2c3518920a29?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ddb6fbf1df37151ad4ff2c3518920a29?s=96&d=mm&r=g\",\"caption\":\"dvususer\"},\"sameAs\":[\"https:\/\/www.morten.com.tr\"],\"url\":\"https:\/\/www.morten.com.tr\/en\/author\/dvususer\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Understanding Cisco Cybersecurity Fundamentals (SECFND) - Morten","description":"Understanding Cisco Cybersecurity Fundamentals (SECFND) - Morten","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/morten.com.tr\/en\/understanding-cisco-cybersecurity-fundamentals-secfnd\/","og_locale":"en_US","og_type":"article","og_title":"Understanding Cisco Cybersecurity Fundamentals (SECFND)","og_description":"Understanding Cisco Cybersecurity Fundamentals (SECFND) - Morten","og_url":"https:\/\/morten.com.tr\/en\/understanding-cisco-cybersecurity-fundamentals-secfnd\/","og_site_name":"Morten","article_publisher":"https:\/\/www.facebook.com\/BTEgitimMorten","article_published_time":"2025-01-09T12:22:21+00:00","article_modified_time":"2025-08-18T12:37:31+00:00","author":"dvususer","twitter_card":"summary_large_image","twitter_misc":{"Written by":"dvususer","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/morten.com.tr\/en\/understanding-cisco-cybersecurity-fundamentals-secfnd\/#article","isPartOf":{"@id":"https:\/\/morten.com.tr\/en\/understanding-cisco-cybersecurity-fundamentals-secfnd\/"},"author":{"name":"dvususer","@id":"https:\/\/www.morten.com.tr\/#\/schema\/person\/91a44ec134dd4d2bda435ff6c6975820"},"headline":"Understanding Cisco Cybersecurity Fundamentals (SECFND)","datePublished":"2025-01-09T12:22:21+00:00","dateModified":"2025-08-18T12:37:31+00:00","mainEntityOfPage":{"@id":"https:\/\/morten.com.tr\/en\/understanding-cisco-cybersecurity-fundamentals-secfnd\/"},"wordCount":486,"publisher":{"@id":"https:\/\/www.morten.com.tr\/#organization"},"articleSection":["Cisco","E\u011fitimler","TEKNOLOJI E\u011eITIMLERI"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/morten.com.tr\/en\/understanding-cisco-cybersecurity-fundamentals-secfnd\/","url":"https:\/\/morten.com.tr\/en\/understanding-cisco-cybersecurity-fundamentals-secfnd\/","name":"Understanding Cisco Cybersecurity Fundamentals (SECFND) - Morten","isPartOf":{"@id":"https:\/\/www.morten.com.tr\/#website"},"datePublished":"2025-01-09T12:22:21+00:00","dateModified":"2025-08-18T12:37:31+00:00","description":"Understanding Cisco Cybersecurity Fundamentals (SECFND) - Morten","breadcrumb":{"@id":"https:\/\/morten.com.tr\/en\/understanding-cisco-cybersecurity-fundamentals-secfnd\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/morten.com.tr\/en\/understanding-cisco-cybersecurity-fundamentals-secfnd\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/morten.com.tr\/en\/understanding-cisco-cybersecurity-fundamentals-secfnd\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.morten.com.tr\/"},{"@type":"ListItem","position":2,"name":"Understanding Cisco Cybersecurity Fundamentals (SECFND)"}]},{"@type":"WebSite","@id":"https:\/\/www.morten.com.tr\/#website","url":"https:\/\/www.morten.com.tr\/","name":"Morten","description":"","publisher":{"@id":"https:\/\/www.morten.com.tr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.morten.com.tr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.morten.com.tr\/#organization","name":"Morten Information and Communication Services Inc.","alternateName":"Morten","url":"https:\/\/www.morten.com.tr\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.morten.com.tr\/#\/schema\/logo\/image\/","url":"https:\/\/www.morten.com.tr\/wp-content\/uploads\/2024\/11\/mortenbt.webp","contentUrl":"https:\/\/www.morten.com.tr\/wp-content\/uploads\/2024\/11\/mortenbt.webp","width":265,"height":116,"caption":"Morten Bilgi ve \u0130leti\u015fim Hizmetleri A.\u015e."},"image":{"@id":"https:\/\/www.morten.com.tr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/BTEgitimMorten"]},{"@type":"Person","@id":"https:\/\/www.morten.com.tr\/#\/schema\/person\/91a44ec134dd4d2bda435ff6c6975820","name":"dvususer","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.morten.com.tr\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ddb6fbf1df37151ad4ff2c3518920a29?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ddb6fbf1df37151ad4ff2c3518920a29?s=96&d=mm&r=g","caption":"dvususer"},"sameAs":["https:\/\/www.morten.com.tr"],"url":"https:\/\/www.morten.com.tr\/en\/author\/dvususer\/"}]}},"_links":{"self":[{"href":"https:\/\/www.morten.com.tr\/en\/wp-json\/wp\/v2\/posts\/995043"}],"collection":[{"href":"https:\/\/www.morten.com.tr\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.morten.com.tr\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.morten.com.tr\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.morten.com.tr\/en\/wp-json\/wp\/v2\/comments?post=995043"}],"version-history":[{"count":9,"href":"https:\/\/www.morten.com.tr\/en\/wp-json\/wp\/v2\/posts\/995043\/revisions"}],"predecessor-version":[{"id":996986,"href":"https:\/\/www.morten.com.tr\/en\/wp-json\/wp\/v2\/posts\/995043\/revisions\/996986"}],"wp:attachment":[{"href":"https:\/\/www.morten.com.tr\/en\/wp-json\/wp\/v2\/media?parent=995043"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.morten.com.tr\/en\/wp-json\/wp\/v2\/categories?post=995043"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.morten.com.tr\/en\/wp-json\/wp\/v2\/tags?post=995043"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}