Cisco 210-255: Implementing Cisco Cybersecurity Operations (SECOPS)

(0 review)
₦25,000.00
Cisco 210-255 Implementing Cisco Cybersecurity Operations (SECOPS) (300 x 225)

Overview

The Cisco Cybersecurity Operations show (Exam 210-255) will help prepare someone preparing for the 2 exams of the CCNA Cyber Ops Certification.  It also aids them to get ready to begin working as an associate level analyst within a Security Operations Center (SOC) and help the candidate handle the tasks,  duties, and responsibilities working as an analyst in the SOC.  The show will focus on introductory-level skills of basic threat analysis,  event correlation,  identifying malicious activities, and using a playbook for incident response.

Objectives

  • Presents real-world solutions for understand Cisco’s threat analysis and incident response solution
  • Covers all of the objectives in the CCNA Cyber Ops exam
  • Easy to follow demonstrations of cybersecurity tools,  products,  and solutions
  • Scenarios offered to help learners understand real-world applications

Prerequisites

A basic understanding of using operating systems,  networks,  and the Internet.

Target Audience

  • For anyone who would love to gain a practical skillset in mitigating the risk from,  malware,  Trojans,  hackers,  tracker,  cyber criminals, and all online threats.
  • For anyone studying for the Cisco CCNA Cyber Ops certification exam.
1.     ENDPOINT THREAT ANALYSIS AND COMPUTER FORENSICS
 Course Outline
 Read Analysis Reports
 Read Analysis Reports Part 2
 Read Analysis Reports Part 3
 Describe CVSS 3.0
 Describe CVSS 3.0 Part 2
 Describe CVSS 3.0 Part 3
 Understand Windows File Systems
 Understand Windows File Systems Part 2
 Understand Linux File Systems
 Identify Forensic Evidence
 Identify Forensic Evidence Part 2
1.     NETWORK INTRUSION ANALYSIS
 Interpret Basic Regular Expressions
 Interpret Basic Regular Expressions Part 2
 Describe Protocol Headers
 Describe Protocol Headers Part 2
 Describe Protocol Headers Part 3
 Describe IP Headers
 Describe IP Headers Part 2
 Describe IP Headers Part 3
 Describe ICMP Intrusion
 Describe ICMP Intrusion Part 2
 Describe ICMP Intrusion Part 3
 Describe ICMP Intrusion Part 4
 Describe Transport Layer Headers
 Describe Transport Layer Headers Part 2
 Describe Transport Layer Headers Part 3
 Describe HTTP Headers
 Describe HTTP Headers Part 2
 Describe HTTP Headers Part 3
 Identify Netflow V5 Records
 Identify Netflow V5 Records Part 2
 Examine Intrusion Events
 Intrusion Event Technologies
 Intrusion Event Technologies Part 2
 Intrusion Event Technologies Part 3
 Intrusion Impact Analysis
 Intrusion Impact Analysis Part 2

 

1.     INCIDENT RESPONSE
 Incident Response Elements
 Incident Response Elements Part 2
 Describe CSIRT Goals
 Identify Cybersec Elements And Frameworks
1.     DATA AND EVENT ANALYSIS
 Describe Data Normalization
 Describe 5 Tuple Correlation
 FirePower Management Console
 Compare And Contrast Analysis Methods

 

1.     INCIDENT HANDLING
 Classify And Categorize Intrusions
 Classify And Categorize Intrusions Part 2
 Classify And Categorize Intrusions Part 3
 Apply NIST.SP800-61 R2 To Events
 NIST SP800-86 Evidence Handling
 Apply VERIS Schema Categories

 

Course Features

  • Lectures 0
  • Quizzes 0
  • Duration 22 hours 50 minutes
  • Skill level All levels
  • Language English
  • Students 0
  • Assessments Yes
Curriculum is empty
₦25,000.00
×

Hello, Welcome to New Horizons!

Do you need any question, we are here to help. Click one of our representatives below to chat on WhatsApp

× How can I help you?