AVRIL LAVIGNE One Stop Hub for all of Your International Educational Testing Needs - Fortray Networks Canada One Stop Hub for all of Your Educational Testing Needs - Fortray Networks
img

CISCO CyberOps Associate

1 week

55 Enrolled Students

Start Date Timings Days Duration Fee
2020-10-28 7:00 pm to 09:00 PM Monday,Tuesday,Wednesday 45 days $150

CISCO CyberOps Associate

[Download course outline]

Course Description

Endless supply of this course, applicants will have the right stuff and information about

  • Common security concepts
  • Basic security techniques
  • Fundamentals of applications, operating systems, and networking used in a Security Operations Center (SOC).
  • Find threats within an enterprise infrastructure
  • Using enterprise-grade security tools
  • Security incident analysis techniques used in SOC.
  • Identify and analyze threats and malicious activity.
  • Conduct security investigations.
  • SOC operations and procedures.
  • Course Curriculum

    Defining the Security Operations Center
    Understanding Network Infrastructure and Network Security Monitoring Tools
    Exploring Data Type Categories
    Understanding Basic Cryptography Concepts
    Understanding Common TCP/IP Attacksn
    Understanding Endpoint Security Technologies
    Understanding Incident Analysis in a Threat-Centric SOC
    Identifying Resources for Hunting Cyber Threats
    Understanding Event Correlation and Normalization
    Identifying Common Attack Vectors
    Identifying Malicious Activity
    Identifying Patterns of Suspicious Behavior
    Conducting Security Incident Investigations
    Using a Playbook Model to Organize Security Monitoring
    Understanding SOC Metrics
    Understanding SOC Workflow and Automation
    Describing Incident Response
    Understanding the Use of VERIS
    Understanding Windows Operating System Basics
    Understanding Linux Operating System Basics

    Hands-on Labs

    Explore the TCP/IP Protocol Suite
    Explore the Network Infrastructure
    Explore TCP/IP Attacks
    Explore Cryptographic Technologies
    Explore Network Applications
    Explore Network Application Attacks
    Explore the Windows Operating System
    Explore the Linux Operating System
    Explore Endpoint Attacks
    Explore Network Security Technologies
    Explore Endpoint Security
    Explore Security Data for Analysis
    Explore Network Security Monitoring Tools
    Investigate Hacker Methodology
    Hunt Malicious Traffic
    Correlate Event Logs, PCAPs, and Alerts of an Attack
    Investigate Browser-Based Attacks
    Analyze Suspicious DNS Activity
    Investigate Suspicious Activity Using Security Onion
    Investigate Advanced Persistent Threats
    Explore SOC Playbooks

    Leave a Review