Description
Duration: 5 days
The Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) v1.0 course teaches you security concepts, common network and application operations and attacks, and the types of data needed to investigate security incidents. This course teaches you how to monitor alerts and breaches, and how to understand and follow established procedures for response to alerts converted to incidents. Through a combination of lecture, hands-on labs, and self-study, you will learn the essential skills, concepts, and technologies to be a contributing member of a cybersecurity operations center (SOC) including understanding the IT infrastructure, operations, and vulnerabilities. This course helps you prepare for the Cisco Certified CyberOps Associate certification and the role of a Junior or Entry-level cybersecurity operations analyst in a SOC.
During this five-day course, students will learn the common security concepts and security techniques that are used in a Security Operation Center. These concepts and techniques are used to find threats on a network using a variety of security tools within a real-world network infrastructure.
This boot camp is intended to teach students the requirements needed to pass exam 200-201 CBROPS
Upon completion of this course, students will be able to:
- Describe, compare and identify various network concepts
- Fundamentals of TCP/IP
- Describe and compare fundamental security concepts
- Describe network applications and the security challenges
- Understand basic cryptography principles
- Understand endpoint attacks, including interpreting log data to identify events in Windows and Linux
- Develop knowledge in security monitoring, including identifying sources and types of data and events
- Describe the three common SOC types, tools used by SOC analysts, job roles with SOC, and incident analysis within a threat-centric SOC
- Explain security incident investigations, including event correlation and normalization and common attack vectors, and be able to identify malicious and suspicious activities
- Explain the use of a SOC playbook to assist with investigations, the use of metrics to measure the effectiveness of the SOC, the use of a SOC workflow management system and automation to improve SOC efficiency, and the concepts of an incident response plan.
Prerequisites
It is recommended that students interested in this course have the knowledge and/or experience with:
- Windows Operating system
- Linux operating system
- IPv4 and IPv6 addressing knowledge
What’s included?
- Authorized Courseware
- Intensive Hands on Skills Development with an Experienced Subject Matter Expert
- Hands-on practice on real Servers and extended lab support 1.800.482.3172
- Examination Vouchers & Onsite Certification Testing- (excluding Adobe and PMP Boot Camps)
- Academy Code of Honor: Test Pass Guarantee
- Optional: Package for Hotel Accommodations, Lunch and Transportation
With several convenient training delivery methods offered, The Academy makes getting the training you need easy. Whether you prefer to learn in a classroom or an online live learning virtual environment, training videos hosted online, and private group classes hosted at your site. We offer expert instruction to individuals, government agencies, non-profits, and corporations. Our live classes, on-sites, and online training videos all feature certified instructors who teach a detailed curriculum and share their expertise and insights with trainees. No matter how you prefer to receive the training, you can count on The Academy for an engaging and effective learning experience.
Methods
- Instructor-Led (the best training format we offer)
- Live Online Classroom – Online Instructor-Led
- Self-Paced Video
Speak to an Admissions Representative for complete details
Start | Finish | Public Price | Public Enroll | Private Price | Private Enroll |
---|---|---|---|---|---|
9/2/2024 | 9/8/2024 | ||||
9/23/2024 | 9/29/2024 | ||||
10/14/2024 | 10/20/2024 | ||||
11/4/2024 | 11/10/2024 | ||||
11/25/2024 | 12/1/2024 | ||||
12/16/2024 | 12/22/2024 | ||||
1/6/2025 | 1/12/2025 | ||||
1/27/2025 | 2/2/2025 | ||||
2/17/2025 | 2/23/2025 | ||||
3/10/2025 | 3/16/2025 | ||||
3/31/2025 | 4/6/2025 | ||||
4/21/2025 | 4/27/2025 | ||||
5/12/2025 | 5/18/2025 | ||||
6/2/2025 | 6/8/2025 | ||||
6/23/2025 | 6/29/2025 | ||||
7/14/2025 | 7/20/2025 | ||||
8/4/2025 | 8/10/2025 | ||||
8/25/2025 | 8/31/2025 | ||||
9/15/2025 | 9/21/2025 | ||||
10/6/2025 | 10/12/2025 | ||||
10/27/2025 | 11/2/2025 | ||||
11/17/2025 | 11/23/2025 | ||||
12/8/2025 | 12/14/2025 | ||||
12/29/2025 | 1/4/2026 |
Cybersecurity Fundamentals (SECFND)
Module 1: Network Concepts
Module 2: Security Concepts
Module 3: Cryptography/IP
Module 4: Host-Based Analysis
Module 5: Security Monitoring
Module 6: Attack Methods
Implementing Cisco Cybersecurity Operations (SECOPS)
Module 1: SOC overview
Module 2: Security Incident Investigations
Module 3: SOC Operations
Lab Outline:
- Explore Network Security Monitoring Tools
- Investigate Hacker Methodology
- Hunt Malicious Traffic
- correlate Even logs, PCAPs, and Alerts of an attack
- Investigate Browser-Based Attacks
- Analyze Suspicious DNS Activity
- Investigate Suspicious Activity Using Security Onion
- Investigate Advanced Persistent Threats
- Explore SOC Playbooks