Implementing Cisco Cybersecurity Operations

SECOPS v1.0 allows learners to understand how a Security Operations Center (SOC) functions and the introductory-level skills and knowledge needed in this environment. Students in this course obtain the core skills needed to grasp the associate-level materials in the 210-255 SECOPS exam, which when combined with passing the 210-250 SECFND exam, leads to the Cisco CCNA Cyber Ops certification. This course focuses on the introductory-level skills needed for a SOC Analyst at the associate level. Specifically, understanding basic threat analysis, event correlation, identifying malicious activity, and how to use a playbook for incident response.

COURSE OVERVIEW

This Cisco  course is designed to be as effective as classroom training. Course content is presented in easily-consumable segments via both instructor video and text. Interactivity is enabled through Discovery labs, content review questions, and graded Challenge labs and tests. This makes the learning experience hands-on, increasing course effectiveness, and provides students direct feedback on how well they have mastered the material. 

SCHEDULE

No records were found for your query

COURSE OUTLINE

Prerequisites

It is recommended, but not required, that students have the following knowledge and skills:

  • Skills and knowledge equivalent to those learned in Interconnecting Cisco Networking Devices, Part 1 (ICND1)
  • Skills and knowledge equivalent to those learned in Understanding Cisco Cybersecurity Fundamentals (SECFND)
  • Working knowledge of the Windows operating system
  • Working knowledge of Cisco IOS networking and concepts

LESSONS LEARNED

Upon completion of this course, you will have the skills and knowledge to:

  • Define an SOC and the various job roles in an SOC
  • Understand SOC infrastructure tools and systems
  • Learn basic incident analysis for a threat-centric SOC
  • Explore resources available to assist with an investigation
  • Explain basic event correlation and normalization
  • Describe common attack vectors
  • Learn how to identify malicious activity
  • Understand the concept of a playbook
  • Describe and explain an incident respond handbook
  • Define types of SOC metrics
  • Understand SOC Workflow Management system and automation

DELIVERY OPTIONS
Name MSRP($) Sale Price($) Register
;