TOIT Training

Cisco CyberOps Associate

Cisco CyberOps Associate
  • Overview
  • Curriculum
  • Reviews

Overview

The Cisco CyberOps Associate course provides students with skills and knowledge to setup network infrastructure devices, operations, and vulnerabilities of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite. Students who have attended the CyberOps Associate online training course will gain competency with security concepts, common network application operations and attacks, the Windows and Linux operating systems, and the types of data used to investigate security incidents.

Exam Number: 200-201 – CBROPS

  • 6 Sections
  • 49 Lessons
  • 8h Duration
Expand All

Introduction to CyberOps Associate

4 Lessons
  • Instructor
  • Prerequisites
  • CyberOps vs Information Security
  • Course Overview

Introduction to Security Concepts

9 Lessons
  • Understanding the CIA triad
  • Standards
  • Common security terms and concepts
  • Security Deployments
  • Defense-in-depth
  • Access control models
  • Common Vulnerability Scoring System CVSS
  • S-tuple approach
  • Rule-based & behavioral and statistical detection

Security Monitoring

9 Lessons
  • Attack surface and vulnerability management
  • Security effect on data visibility
  • Data types in security monitoring
  • Network attacks
  • Web application attacks
  • Social engineering attacks
  • Endpoint-based attacks
  • Certificates
  • Certificate components

Host-Based Security

7 Lessons
  • Endpoint technologies
  • Operating system components
  • Cyber Attribution
  • Evidence types in logs
  • Disk image inspection
  • Log interpretation
  • Malware analysis

Network Intrusion Analysis

10 Lessons
  • Intrusion event identification
  • Cybersecurity impact
  • Packet filtering and inspection
  • Inline traffic interrogation vs taps
  • Network taps vs transactional data (NetFlow)
  • Extracting files from a TCP stream
  • Identifying intrusion using a PCAP file
  • Analyzing protocol headers
  • Identifying alerts from events
  • Interpret basic regular expressions

Security Policies and Procedures

10 Lessons
  • Management concepts
  • NIST.SP800-61 response plan
  • Incident handling process
  • NIST.SP800-61 analysis steps
  • NIST.SP800-86 concepts
  • Network profiling elements
  • Server profiling elements
  • Protected data in a network
  • Intrusion event classification
  • SOC metrics & scope analysis

0

0 Ratings
5 Star 0%
4 Star 0%
3 Star 0%
2 Star 0%
1 Star 0%

Reviews

Free

Start Course

Retake Course

Are you sure you want to retake the course? This action will permanently delete all your progress in this course.

Course Includes

  • Describe the CIA triad
  • Describe NIST and ISO
  • Describe common security terms and concepts, like Assets, Threats, Exploits, Malware analysis, and more
  • Describe DoD Two Door policy
  • Describe CVSS
  • Describe data types in security monitoring
  • Describe network attacks, social engineering attacks, and endpoint-based attacks
  • Utilize different evidence types in logs
  • Analyze malware
  • Utilize network intrusion analysis
  • Identify intrusion using a PCAP file
  • Identify alerts from events
  • Implement security policies and procedures

Deleting Course Review

Are you sure? You can't restore this back

Course Access

This course is password protected. To access it please enter your password below:

Buy for group

Cisco CyberOps Associate
No groups Found

You don't have any groups yet

Create a group and add group members. Sync Group(s)