CyberOps Associate

DURATION:
70 уч.ч.

Categories

CYBERSECURITY

CyberOps Associate

The Cisco Networking Academy Program is focused on creating the global problem solvers needed to build, scale, secure, and defend the networks that are used in our businesses and daily lives. The need for well-trained cybersecurity specialists continues to grow at an exponential rate. Training to become a cybersecurity specialist requires in depth understanding and exposure to how cyber attacks occur, as well as how they are detected and prevented. These skills will naturally also include learning the techniques that threat actors use to circumvent data, privacy, and computer and network security.

CyberOps Associate covers knowledge and skills needed to successfully handle the tasks, duties, and responsibilities of an associate-level Security Analyst working in a Security Operations Center (SOC).

Upon completion of the CyberOps Associate v1.0 course, students will be able to perform the following tasks:

  • Install virtual machines to create a safe environment for implementing and analyzing cybersecurity threat events.
  • Explain the role of the Cybersecurity Operations Analyst in the enterprise.
  • Explain the Windows Operating System features and characteristics needed to support cybersecurity analyses.
  • Explain the features and characteristics of the Linux Operating System.
  • Analyze the operation of network protocols and services.
  • Explain the operation of the network infrastructure.
  • Classify the various types of network attacks.
  • Use network monitoring tools to identify attacks against network protocols and services.
  • Explain how to prevent malicious access to computer networks, hosts, and data.
  • Explain the impacts of cryptography on network security monitoring.
  • Explain how to investigate endpoint vulnerabilities and attacks.
  • Evaluate network security alerts.
  • Analyze network intrusion data to identify compromised hosts and vulnerabilities.
  • Apply incident response models to manage network security incidents.

Course Outline:

1 – The Danger
1.0 – Introduction
1.1 – War Stories
1.2 – Threat Actors
1.3 – Threat Impact
2 – Fighters in the War Against Cybercrime
2.0 – Introduction
2.1 – The Modern Security Operations Center
2.2 – Becoming a Defender
2.3 – Fighters in the War Against Cybercrime Summary
3 – The Windows Operating System
3.0 – Introduction
3.1 – Windows History
3.2 – Windows Architecture and Operations
3.3 – Windows Configuration and Monitoring
3.4 – Windows Security
3.5 – The Windows Operating System Summary
4 – Linux Overview
4.0 – Introduction
4.1 – Linux Basics
4.2 – Working in the Linux Shell
4.3 – Linux Servers and Clients
4.4 – Basic Server Administration
4.5 – The Linux File System
4.6 – Working with the Linux GUI
4.7 – Working on a Linux Host
4.8 – Linux Basics Summary
5 – Network Protocols
5.0 – Introduction
5.1 – Network Communications Process
5.2 – Communications Protocols
5.3 – Data Encapsulation
5.4 – Network Protocols Summary
6 – Ethernet and Internet Protocol (IP)
6.0 – Introduction
6.1 – Ethernet
6.2 – IPv4
6.3 – IP Addressing Basics
6.4 – Types of IPv4 Addresses
6.5 – The Default Gateway
6.6 – IPv6
6.7 – Ethernet and IP Protocol Summary
7 – Connectivity Verification
7.0 – Introduction
7.1 – ICMP
7.2 – Ping and Traceroute Utilities
7.3 – Connectivity Verification Summary
8 – Address Resolution Protocol
8.0 – Introduction
8.1 – MAC and IP
8.2 – ARP
8.3 – ARP Issues
8.4 – Address Resolution Protocol Summary
9 – The Transport Layer
9.0 – Introduction
9.1 – Transport Layer Characteristics
9.2 – Transport Layer Session Establishment
9.3 – Transport Layer Reliability
9.4 – The Transport Layer Summary
10 – Network Services
10.0 – Introduction
10.1 – DHCP
10.2 – DNS
10.3 – NAT
10.4 – File Transfer and Sharing Services
10.5 – Email
10.6 – HTTP
10.7 – Network Services Summary
11 – Network Communication Devices
11.0 – Introduction
11.1 – Network Devices
11.2 – Wireless Communications
11.3 – Network Communication Devices Summary
12 – Network Security Infrastructure
12.0 – Introduction
12.1 – Network Topologies
12.2 – Security Devices
12.3 – Security Services
12.4 – Network Security Infrastructure Summary
13 – Attackers and Their Tools
13.0 – Introduction
13.1 – Who is Attacking Our Network?
13.2 – Threat Actor Tools
13.3 – Attackers and Their Tools Summary
14 – Common Threats and Attacks
14.0 – Introduction
14.1 – Malware
14.2 – Common Network Attacks – Reconnaissance, Access, and Social Engineering
14.3 – Network Attacks – Denial of Service, Buffer Overflows, and Evasion
14.4 – Common Threats and Attacks Summary
15 – Network Monitoring and Tools
15.0 – Introduction
15.1 – Introduction to Network Monitoring
15.2 – Introduction to Network Monitoring Tools
15.3 – Network Monitoring and Tools Summary
16 – Attacking the Foundation
16.0 – Introduction
16.1 – IP PDU Details
16.2 – IP Vulnerabilities
16.3 – TCP and UDP Vulnerabilities
16.4 – Attacking the Foundation Summary
17 – Attacking What We Do
17.0 – Introduction
17.1 – IP Services
17.2 – Enterprise Services
17.3 – Attacking What We Do Summary
18 – Understanding Defense
18.0 – Introduction
18.1 – Defense-in-Depth
18.2 – Security Policies, Regulations, and Standards
18.3 – Understanding Defense Summary
19 – Access Control
19.0 – Introduction
19.1 – Access Control Concepts
19.2 – AAA Usage and Operation
19.3 – Access Control Summary
20 – Threat Intelligence
20.0 – Introduction
20.1 – Information Sources
20.2 – Threat Intelligence Services
20.3 – Threat Intelligence Summary
21.0 – Introduction
21.1 – Integrity and Authenticity
21.2 – Confidentiality
21.3 – Public Key Cryptography
21.4 – Authorities and the PKI Trust System
21.5 – Applications and Impacts of Cryptography
21.6 – Cryptography Summary
22 – Endpoint Protection
22.0 – Introduction
22.1 – Antimalware Protection
22.2 – Host-Based Intrusion Prevention
22.3 – Application Security
22.4 – Endpoint Protection Summary
23 – Endpoint Vulnerability Assessment
23.0 – Introduction
23.1 – Network and Server Profiling
23.2 – Common Vulnerability Scoring System (CVSS)
23.3 – Secure Device Management
23.4 – Information Security Management Systems
23.5 – Endpoint Vulnerability Assessment Summary
24 – Technologies and Protocols
24.0 – Introduction
24.1 – Monitoring Common Protocols
24.2 – Security Technologies
24.3 – Technologies and Protocols Summary
25 – Network Security Data
25.0 – Introduction
25.1 – Types of Security Data
25.2 – End Device Logs
25.3 – Network Logs
25.4 – Network Security Data Summary
26 – Evaluating Alerts
26.0 – Introduction
26.1 – Sources of Alerts
26.2 – Overview of Alert Evaluation
26.3 – Evaluating Alerts Summary
27 – Working with Network Security Data
27.0 – Introduction
27.1 – A Common Data Platform
27.2 – Investigating Network Data
27.3 – Enhancing the Work of the Cybersecurity Analyst
27.4 – Working with Network Security Data Summary
28 – Digital Forensics and Incident Analysis and Response
28.0 – Introduction
28.1 – Evidence Handling and Attack Attribution
28.2 – The Cyber Kill Chain
28.3 – The Diamond Model of Intrusion Analysis
28.4 – Incident Response
28.5 – Digital Forensics and Incident Analysis and Response Summary
28.6 – Prepare for Your Exam and Launch Your Career!

300 лв.

Записване