✆ (855)77/87-616102
delicious
facebook
email
  • Home
  • Courses
    • Upcoming Courses
  • Partners
  • Contact Us
    • Why with us?
    • About Us

CCNA Cybersecurity Operations

February 14, 2022
by admin
Cybersecurity, Security
Comments are off

CCNA Cybersecurity Operations (CyberOPs) is End Of Life (EoF) and It upgrade to CyberOps Associate Course.

Introduction

Today’s organizations are challenged with rapidly detecting cybersecurity breaches and effectively responding to
security incidents. Teams of people in Security Operations Centers (SOCs) keep a vigilant eye on security systems,
protecting their organizations by detecting and responding to cybersecurity threats. CCNA Cybersecurity Operations
prepares candidates to begin a career working with associate-level cybersecurity analysts within security operations
centers.

Target Audience

The Cisco CCNA® Cybersecurity Operations v1.1 (CyberOps) course is designed for Cisco Networking Academy®
students seeking career-oriented, entry-level security analyst skills. Target students include individuals enrolled in
technology degree programs at institutions of higher education and IT professionals who want to pursue a career in
the Security Operation Center (SOC).

Prerequisites

CCNA Cybersecurity Operations students should have the following skills and knowledge:

  • PC and Internet navigation skills
  • Basic Windows and Linux system concepts
  • Basic Networking concepts
  • Binary and Hexadecimal understanding
  • Awareness of basic programming concepts
  • Awareness of basic SQL queries

Target Certifications

This course aligns with the CCNA Cyber Ops certification. Candidates need to pass the 210-250 SECFND exam and
the 210-255 SECOPS exam to achieve the CCNA Cyber Ops certification.

Curriculum Description

The course has many features to help students understand these concepts:

  • Rich multimedia content, including interactive activities, videos, games, and quizzes, addresses a variety of learning styles and help stimulate learning and increase knowledge retention
  • Virtual environments simulate real-world cybersecurity threat scenarios and create opportunities for ethical hacking, security monitoring, analysis and resolution
  • Hands-on labs help students develop critical thinking and complex problem solving skills
  • Innovative assessments provide immediate feedback to support the evaluation of knowledge and acquired skills
  • Technical concepts are explained using language that works well for learners at all levels and embedded
  • interactive activities break up reading of the content and help reinforce understanding
  • The curriculum encourages students to consider additional IT education, but also emphasizes applied skills and hands-on experience
  • Cisco Packet Tracer activities are designed for use with Packet Tracer 7.0 or later.

Curriculum Objectives

CCNA Cybersecurity Operations v1.1 covers knowledge and skills needed to successfully handle the tasks, duties,
and responsibilities of an associate-level Security Analyst working in a Security Operations Center (SOC).
Upon completion of the CCNA Cybersecurity Operations v1.1 course, students will be able to perform the following
tasks:

  • Install virtual machines to create a safe environment for implementing and analyzing cybersecurity threat events.
  • Explain the role of the Cybersecurity Operations Analyst in the enterprise.
  • Explain the Windows Operating System features and characteristics needed to support cybersecurity analyses.
  • Explain the features and characteristics of the Linux Operating System.
  • Analyze the operation of network protocols and services.
  • Explain the operation of the network infrastructure.
  • Classify the various types of network attacks.
  • Use network monitoring tools to identify attacks against network protocols and services.
  • Use various methods to prevent malicious access to computer networks, hosts, and data.
  • Explain the impacts of cryptography on network security monitoring.
  • Explain how to investigate endpoint vulnerabilities and attacks.
  • Evaluate network security alerts.
  • Analyze network intrusion data to identify compromised hosts and vulnerabilities.
  • Apply incident response models to manage network security incidents.

Course Outline
Chapter/SectionGoals/Objectives
Chapter 1. Cybersecurity and the Security Operations CenterExplain the role of the Cybersecurity Operations Analyst in the enterprise.
1.1 The DangerExplain why networks and data are attacked.
1.2 Fighters in the War Against CybercrimeExplain how to prepare for a career in Cybersecurity operations.
Chapter 2. Windows Operating SystemExplain the Windows Operating System features and
characteristics needed to support cybersecurity analyses.
2.1 Windows OverviewExplain the operation of the Windows Operating System.
2.2 Windows AdministrationExplain how to secure Windows endpoints.
Chapter 3. Linux Operating SystemExplain the features and characteristics of the Linux Operating System.
3.1 Using LinuxPerform basic operations in the Linux shell.
3.2 Linux AdministrationPerform basic Linux administration tasks.
3.3 Linux ClientsPerform basic security-related tasks on a Linux host.
Chapter 4. Network Protocols and ServicesAnalyze the operation of network protocols and services.
4.1 Network ProtocolsExplain how protocols enable network operations.
4.2 Ethernet and Internet Protocol (IP)Explain how the Ethernet and IP protocols support network
communication.
4.3 Connectivity VerificationUse common testing utilities to verify and test network connectivity.
4.4 Address Resolution ProtocolExplain how the address resolution protocol enables communication
on a network.
4.5 The Transport Layer and Network ServicesExplain how transport layer protocols and network services support
network functionality.
4.6 Network ServicesExplain how network services enable network functionality
Chapter 5. Network InfrastructureExplain the operation of the network infrastructure.
5.1 Network Communication DevicesExplain how network devices enable wired and wireless network communication.
5.2 Network Security InfrastructureExplain how devices and services are used to enhance network
security.
5.3 Network RepresentationsExplain how networks and network topologies are represented.
Chapter 6. Principles of Network SecurityClassify the various types of network attacks.
6.1 Attackers and Their ToolsExplain how networks are attacked.
6.2 Common Threats and AttacksExplain the various types of threats and attacks.
Chapter 7. Network Attacks: A Deeper LookUse network monitoring tools to identify attacks that against network protocols and services.
7.1 Observing Network OperationExplain network traffic monitoring.
7.2 Attacking the FoundationExplain how TCP/IP vulnerabilities enable network attacks.
7.3 Attacking What We DoExplain how common network applications and services are vulnerable to attack.
Chapter 8. Protecting the NetworkUse various methods to prevent malicious access to computer networks, hosts, and data.
8.1 Understanding DefenseExplain approaches to network security defense.
8.2 Access ControlExplain access control as a method of protecting a network.
8.3 Network Firewalls and Intrusion PreventionExplain how firewalls and other devices prevent network intrusions.
8.4 Content FilteringExplain how content filtering prevents unwanted data from entering the network.
8.5 Threat IntelligenceUse various intelligence sources to locate current security threats.
Chapter 9. Cryptography and the Public Key InfrastructureExplain the impacts of cryptography on network security monitoring.
9.1 CryptographyUse tools to encrypt and decrypt data.
9.2 Public Key CryptographyExplain how the public key infrastructure (PKI) supports network
security.
Chapter 10. Endpoint Security and AnalysisExplain how to investigate endpoint vulnerabilities and attacks.
10.1 Endpoint ProtectionUse a tool to generate a malware analysis report.
10.2 Endpoint Vulnerability AssessmentClassify endpoint vulnerability assessment information.
Chapter 11. Security MonitoringEvaluate network security alerts.
11.1 Technologies and ProtocolsExplain how security technologies affect security monitoring.
11.2 Log FilesExplain the types of log files used in security monitoring
Chapter 12. Intrusion Data AnalysisAnalyze network intrusion data to identify compromised hosts and vulnerabilities
12.1 Data CollectionExplain how security-related data is collected.
12.2 Data PreparationArrange a variety of log files in preparation for intrusion data analysis.
12.3 Data AnalysisAnalyze intrusion data to determine the source of an attack.
Chapter 13. Incident Response and HandlingExplain how network security incidents are handled by CSIRTs.
13.1 Incident Response ModelsApply incident response models to an intrusion event.
13.2 CSIRTs and NIST 800-61r2Apply standards specified in NIST 800-61r2 to a computer security incident.
13.3 Case-Based PracticeGiven a set of logs, isolate a threat actor and recommend an incident response plan.

Social Share
Other Courses
  • Upcoming Courses
  • IT Essentials
  • Cisco CCNAv7
  • Cisco CCNA1v7
  • Cisco CCNA2v7
  • Cisco CCNA3v7
  • Introduction to Cybersecurity
  • Cybersecurity Essentials
  • CyberOps Associate
  • Network Security
  • Cloud Security
  • MikroTik MTCNA
  • INE
  • VoIP and PABX
  • CCNA Exam Preparation

PPIC is qualified IT Training Center that authorized to teach Cisco and MikroTik courses in Phnom Penh, Cambodia.

Address: #194D, Russian Federation Blvd, CPC, Toeuk Thlar, Sen Sok, Phnom Penh, Cambodia.

  • Why with us?
  • Upcoming Courses
  • Contact Us
Facebook Pagelike Widget
https://t.me/ppictraining Our Telegram Channel
✆ (855)77-616102 ✆ (855)87-616102 ✉ info@ppic-training.com
© Copyright 2022, PPIC