CyberOps Associate
Overview
The Implementing Cisco Cybersecurity Operations (SECOPS) v1.0 course gives you foundation-level knowledge of security incident analysis techniques used in a Security Operations Center (SOC). You will learn how to identify and analyze threats and malicious activity, correlate events, conduct security investigations, use incident playbooks, and learn SOC operations and procedures. CyberOps Associate Certification Course prepares you for the 210-255 SECOPS exam, one of the two exams for the current Cisco Certified CyberOps Associate* certification. This certification validates your knowledge and hands-on skills to help handle cybersecurity events as an associate-level member of an SOC team.
CyberOps Associate Certification Course will help you:
- Learn the fundamental skills that a cybersecurity analyst in a security operations center uses, including threat analysis, event correlation, identifying malicious activity, and how to use a playbook for incident response
- Prepare for the Cisco Certified CyberOps Associate certification with hands-on practice using real-life security analysis tools, such as those found in a Linux distribution
- Qualify for entry-level job roles in the high-demand area of cybersecurity
Who should enroll
- IT professionals
- Any learner interested in entering associate-level cybersecurity roles such as:
- SOC cybersecurity analysts
- Computer or network defense analysts
- Computer network defense infrastructure support personnel
- Future incident responders and SOC personnel
- Cisco integrators or partners
Prerequisites
To fully benefit from CyberOps Associate Certification Course, you should first complete the following course or obtain the equivalent knowledge and skills:
- Understanding Cisco Cybersecurity Fundamentals (SECFND)
Full Description
Course Outline
- SOC Overview
- Defining the Security Operations Center
- Understanding NSM Tools and Data
- Understanding Incident Analysis in a Threat-Centric SOC
- Identifying Resources for Hunting Cyber Threats
- Security Incident Investigations
- Understanding Event Correlation and Normalization
- Identifying Common Attack Vectors
- Identifying Malicious Activity
- Identifying Patterns of Suspicious Behavior
- Conducting Security Incident Investigations
- SOC Operations Describing the SOC Playbook
- Understanding the SOC Metrics
- Understanding the SOC WMS and Automation
- Describing the Incident Response Plan
Lab outline
- Explore Network Security Monitoring Tools
- Investigate Hacker Methodology
- Hunt Malicious Traffic
- Correlate Event Logs, PCAPs, and Alerts of an Attack
- Investigate Browser-Based Attacks
- Analyze Suspicious DNS Activity
- Investigate Suspicious Activity Using Security Onion
- Investigate Advanced Persistent Threats
- Explore SOC Playbooks
Fees & Schedule
Delivery Mode | Course Duration | Fees |
---|---|---|
Live Virtual Training | 5 Days | Ask for Quote |
Onsite Classroom Training | 5 Days | Ask for Quote |
Customized Training | 5 Days | Ask for Quote |