Understanding Cisco Cybersecurity Operations Fundamentals

(CBROPS)

After completing this course you should be able to:

  • Explain how a SOC operates and describe the different types of services that are performed from a Tier
    1 SOC analyst’s perspective.
  • Explain Network Security Monitoring (NSM) tools that are available to the network security analyst.
  • Explain the data that is available to the network security analyst.
  • Describe the basic concepts and uses of cryptography.
  • Describe security flaws in the TCP/IP protocol and how they can be used to attack networks and hosts.
  • Understand common endpoint security technologies.
  • Understand the kill chain and the diamond models for incident investigations, and the use of exploit kits
    by threat actors.
  • Identify resources for hunting cyber threats.
  • Explain the need for event data normalization and event correlation.
  • Identify the common attack vectors.
  • Identify malicious activities.
  • Identify patterns of suspicious behaviors.
  • Conduct security incident investigations.
  • Explain the use of a typical playbook in the SOC.
  • Explain the use of SOC metrics to measure the effectiveness of the SOC.
  • Explain the use of a workflow management system and automation to improve the effectiveness of the
    SOC.
  • Describe a typical incident response plan and the functions of a typical CSIRT.
  • Explain the use of VERIS to document security incidents in a standard format.
  • Describe the Windows operating system features and functionality.
  • Describe the Linux operating system features and functionality

Attendees should meet the following prerequisites:

  • Familiarity with Ethernet and TCP/IP networking.
  • Working knowledge of the Windows and Linux operating systems.
  • Familiarity with basics of networking security concepts.

Pre-requisitos:

  • CCNA – Implementing and Administering Cisco Solutions.

Contenido del acordeón

  • Defining the Security Operations Center.
  • Understanding Network Infrastructure and Network Security Monitoring Tools.
  • Exploring Data Type Categories.
  • Understanding Basic Cryptography Concepts.
  • Understanding Common TCP/IP Attacks.
  • Understanding Endpoint Security Technologies.
  • Understanding Incident Analysis in a Threat-Centric SOC.
  • Identifying Resources for Hunting Cyber Threats.
  • Understanding Event Correlation and Normalization.
  • Identifying Common Attack Vectors.
  • Identifying Malicious Activity.
  • Identifying Patterns of Suspicious Behavior.
  • Conducting Security Incident Investigations.
  • Using a Playbook Model to Organize Security Monitoring.
  • Understanding SOC Metrics.
  • Understanding SOC Workflow and Automation.
  • Describing Incident Response.
  • Understanding the Use of VERIS.
  • Understanding Windows Operating System Basics.
  • Configure the Initial Collaboration Lab Environment.
  • Use NSM Tools to Analyze Data Categories.
  • Explore Cryptographic Technologies.
  • Explore TCP/IP Attacks.
  • Explore Endpoint Security.
  • Investigate Hacker Methodology.
  • Hunt Malicious Traffic.
  • Correlate Event Logs, PCAPs, and Alerts of an Attack.
  • Investigate Browser-Based Attacks.
  • Analyze Suspicious DNS Activity.
  • Explore Security Data for Analysis.
  • Investigate Suspicious Activity Using Security Onion.
  • Investigate Advanced Persistent Threats.
  • Explore SOC Playbooks.
  • Explore the Windows Operating System.
  • Explore the Linux Operating System.

También puede descargar esta información en formato PDF.

Nota: Para inscribirse debe hacer un depósito o transferencia a la siguiente cuenta en bolivianos Nro. 10000019891048 del Banco Unión a nombre de Claudia Riveros Gomez.

Luego haga clic en Inscribirse y adjunte el comprobante bancario de transferencia o depósito.