CISCO CyberOps Associate
[Download course outline]
Course Description
Endless supply of this course, applicants will have the right stuff and information about
Common security concepts
Basic security techniques
Fundamentals of applications, operating systems, and networking used in a Security Operations Center (SOC).
Find threats within an enterprise infrastructure
Using enterprise-grade security tools
Security incident analysis techniques used in SOC.
Identify and analyze threats and malicious activity.
Conduct security investigations.
SOC operations and procedures.
Course Curriculum
Defining the Security Operations Center
Understanding Network Infrastructure and Network Security Monitoring Tools
Exploring Data Type Categories
Understanding Basic Cryptography Concepts
Understanding Common TCP/IP Attacksn
Understanding Endpoint Security Technologies
Understanding Incident Analysis in a Threat-Centric SOC
Identifying Resources for Hunting Cyber Threats
Understanding Event Correlation and Normalization
Identifying Common Attack Vectors
Identifying Malicious Activity
Identifying Patterns of Suspicious Behavior
Conducting Security Incident Investigations
Using a Playbook Model to Organize Security Monitoring
Understanding SOC Metrics
Understanding SOC Workflow and Automation
Describing Incident Response
Understanding the Use of VERIS
Understanding Windows Operating System Basics
Understanding Linux Operating System Basics
Hands-on Labs
Explore the TCP/IP Protocol Suite
Explore the Network Infrastructure
Explore TCP/IP Attacks
Explore Cryptographic Technologies
Explore Network Applications
Explore Network Application Attacks
Explore the Windows Operating System
Explore the Linux Operating System
Explore Endpoint Attacks
Explore Network Security Technologies
Explore Endpoint Security
Explore Security Data for Analysis
Explore Network Security Monitoring Tools
Investigate Hacker Methodology
Hunt Malicious Traffic
Correlate Event Logs, PCAPs, and Alerts of an Attack
Investigate Browser-Based Attacks
Analyze Suspicious DNS Activity
Investigate Suspicious Activity Using Security Onion
Investigate Advanced Persistent Threats
Explore SOC Playbooks