Cisco CyberOps

Cisco CyberOps

Cyber operations (Cyber Ops) is a specialization of information security that is in high demand within areas of the government and military, including the National Security Agency (NSA). If you have an interest in working for the NSA, or a similar organization, certification in Cyber Ops may be the right fit for you.

Course Objectives

After completing this course, students will be able to :

  • Security concepts
  • Security monitoring
  • Host-based analysis
  • Network intrusion analysis
  • Security policies and procedures

Target Audience

  • IT Professional
  • Network Professional
  • Network Admin
  • System Engineer

Course Pre-Requisites

There are no formal prerequisites for CyberOps Associate certification. But you should have an understanding of the exam topics before taking the exam.

Course Duration

Cisco Cyber Ops Introduction

1
Introduction
2
Kali Linux

Network Concepts

1
Network Fundamentals
2
Network Protocols – ICMP
3
Network Protocols – ARP
4
Network Protocols – DHCP
5
Network Protocols – DNS
6
Network Devices
7
Firewalls
8
IPS & AMP
9
Email & Web Security
10
Inline Traffic Interrogation, Taps & NetFlow
11
Network Concepts

Security Concepts

1
CIA Triad
2
Defense in Depth Strategy
3
Vulnerabilities
4
Exploits & Risks
5
Security Terms & Access Control Models
6
Threat Hunting
7
Zero Trust
8
Threat intelligence platform (TIP)
9
Authentication, Authorization, Accounting
10
Rule-based, Time-based & Role-based Access Control
11
CVSS 3.0 & 5-tuple
12
Rule-based detection vs. Behavioral and Statistical detection
13
Rule-based, Time-based & Role-based Access Control

Security Monitoring

1
Attack Surface Analysis
2
Network Attacks
3
Web Application Attacks
4
Endpoint-Based Attacks
5
Social Engineering and Phishing Attacks
6
Evasion Methods
7
Network Logging & Packet Captures
8
NetFlow & Application Visibility and Control (AVC)
9
Monitoring Challenges
10
NextGen IPS Event Types
11
Encryption and Hashing
12
PKI

Host-Based Analysis

1
Microsoft Windows – Introduction
2
Microsoft Windows – Terms
3
Microsoft Windows File System
4
Linux – Introduction
5
Linux – Terms
6
Linux File System
7
Endpoint Protection
8
Whitelisting and Blacklisting
9
Systems-Based Sandboxing
10
System Logs
11
Indicators of Compromise and Attack
12
Evidence and Attribution

Network Intrusion Analysis

1
Common Artifact Elements and Protocol Headers
2
Security Analysis with Wireshark
3
NetFlow v5 and Security Events
4
Map Events to Source Technologies
5
Impact Flags with the Firepower Management Center (FMC)
6
Interpret Basic Regular Expressions
7
Application Layer Protocols (SMTP/POP3/IMAP/HTTP/HTTPS/HTTP2)

Security Policies and Procedures

1
Security Management
2
NIST.SP800-61 r2
3
Apply the incident handling process (such as NIST.SP800-61) to an event
4
CSIRT & Network Profiling
5
PCI & Server Profiling
6
HIPAA & SOX
7
PSI & Intellectual Property
8
SOC Metrics
9
Cyber Kill Chain Model

Be the first to add a review.

Please, login to leave a review
Add to Wishlist
Lectures: 66
Video: 48 Hours

Archive

Working hours

Monday 9:30 am - 6.00 pm
Tuesday 9:30 am - 6.00 pm
Wednesday 9:30 am - 6.00 pm
Thursday 9:30 am - 6.00 pm
Friday 9:30 am - 5.00 pm
Saturday Closed
Sunday Closed

Login Or Register