1 - Course Outline
Defining the Security Operations CenterUnderstanding Network Infrastructure and Network Security Monitoring ToolsExploring Data Type CategoriesUnderstanding Basic Cryptography ConceptsUnderstanding Common TCP/IP AttacksUnderstanding Endpoint Security TechnologiesUnderstanding Incident Analysis in a Threat-Centric SOCIdentifying Resources for Hunting Cyber ThreatsUnderstanding Event Correlation and NormalizationIdentifying Common Attack VectorsIdentifying Malicious ActivityIdentifying Patterns of Suspicious BehaviorConducting Security Incident InvestigationsUsing a Playbook Model to Organize Security MonitoringUnderstanding SOC MetricsUnderstanding SOC Workflow and AutomationDescribing Incident ResponseUnderstanding the Use of VERISUnderstanding Windows Operating System BasicsUnderstanding Linux Operating System Basics
Actual course outline may vary depending on offering center. Contact your sales representative for more information.
Who is it For?
This course is designed for individuals seeking a role as an associate-level cybersecurity analyst and IT professionals desiring knowledge in Cybersecurity operations or those in pursuit of the Cisco Certified CyberOps Associate certification including
Students pursuing a technical degree
Current IT professionals
Recent college graduates with a technical degree
Before taking this course, you should have the following knowledge and skills
Familiarity with Ethernet and TCP/IP networking
Working knowledge of the Windows and Linux operating systems
Familiarity with basics of networking security concepts
The following Cisco course can help you gain the knowledge you need to prepare for this course
Implementing and Administering Cisco Solutions (CCNA®)