Cisco Cybersecurity Operations Fundamentals (CBROPS)

This course will help:
  • Learn the fundamental skills, techniques, technologies, and the hands-on practice necessary to prevent and defend against cyberattacks as part of a SOC team 
  • Prepare for the 200-201 Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) exam which earns the Cisco Certified CyberOps Associate certification 

Course syllabus:

  • Use NSM Tools to Analyze Data Categories 
  • Explore Cryptographic Technologies 
  • Explore TCP/IP Attacks 
  • Explore Endpoint Security 
  • Investigate Hacker Methodology 
  • Hunt Malicious Traffic 
  • Correlate Event Logs, Packet Captures (PCAPs), and Alerts of an Attack 
  • Investigate Browser-Based Attacks 
  • Analyze Suspicious Domain Name System (DNS) Activity 
  • Explore Security Data for Analysis 
  • Investigate Suspicious Activity Using Security Onion 
  • Investigate Advanced Persistent Threats 
  • Explore SOC Playbooks 
  • Explore the Windows Operating System 
  • Explore the Linux Operating System 

You will learn:

  • Explain how a Security Operations Center (SOC) operates and describe the different types of services that are performed from a Tier 1 SOC analyst’s perspective
  • Explain Network Security Monitoring (NSM) tools that are available to the network security analyst
  • Explain the data that is available to the network security analyst
  • Describe the basic concepts and uses of cryptography
  • Describe security flaws in the TCP/IP protocol and how they can be used to attack networks and hosts
  • Understand common endpoint security technologies
  • Understand the kill chain and the diamond models for incident investigations, and the use of exploit kits by threat actors
  • Identify resources for hunting cyber threats
  • Explain the need for event data normalization and event correlation
  • Identify the common attack vectors
  • Identify malicious activities
  • Identify patterns of suspicious behaviors
  • Conduct security incident investigations
  • Explain the use of a typical playbook in the SOC
  • Explain the use of SOC metrics to measure the effectiveness of the SOC
  • Explain the use of a workflow management system and automation to improve the effectiveness of the SOC
  • Describe a typical incident response plan and the functions of a typical Computer Security Incident Response Team (CSIRT)
  • Explain the use of Vocabulary for Event Recording and Incident Sharing (VERIS) to document security incidents in a standard format. 

Pre-requisites:

Before taking this training, you should have the following knowledge and skills: 

  • Familiarity with Ethernet and TCP/IP networking 
  • Working knowledge of the Windows and Linux operating systems 
  • Familiarity with basics of networking security concepts 

The following Cisco training can help you gain the knowledge you need to prepare for this training: 

  • Implementing and Administering Cisco Solutions (CCNA) 
Sign up for a course Cisco Cybersecurity Operations Fundamentals (CBROPS)