The Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) v1.0 course teaches you security concepts, common network and application operations and attacks, and the types of data needed to investigate security incidents.
This course teaches you how to monitor alerts and breaches, and how to understand and follow established procedures for response to alerts converted to incidents. Through a combination of lecture, hands-on labs, and self-study, you will learn the essential skills, concepts, and technologies to be a contributing member of a cybersecurity operations center (SOC) including understanding the IT infrastructure, operations, and vulnerabilities. This course helps you prepare for the Cisco Certified CyberOps Associate certification and the role of a Junior or Entry-level cybersecurity operations analyst in a SOC.
Digital courseware: Cisco provides students with electronic courseware for this course. Students who have a confirmed booking will be sent an email prior to the course start date, with a link to create an account via learningspace.cisco.com before they attend their first day of class. Please note that any electronic courseware or labs will not be available (visible) until the first day of the class.
By submitting an enquiry, you agree to our privacy policy and receiving email and other forms of communication from us. You can opt-out at any time.
What you’ll learn
After taking this course, you should be able to:
Explain how a Security Operations Center (SOC) operates and describe the different types of services that are performed from a Tier 1 SOC analyst’s perspective
Explain Network Security Monitoring (NSM) tools that are available to the network security analyst
Explain the data that is available to the network security analyst
Describe the basic concepts and uses of cryptography
Describe security flaws in the TCP/IP protocol and how they can be used to attack networks and hosts
Understand common endpoint security technologies
Understand the kill chain and the diamond models for incident investigations, and the use of exploit kits by threat actors
Identify resources for hunting cyber threats
Explain the need for event data normalisation and event correlation
Identify the common attack vectors
Identify malicious activities
Identify patterns of suspicious behaviors
Conduct security incident investigations
Explain the use of a typical playbook in the SOC
Explain the use of SOC metrics to measure the effectiveness of the SOC
Explain the use of a workflow management system and automation to improve the effectiveness of the SOC
Describe a typical incident response plan and the functions of a typical Computer Security Incident Response Team (CSIRT)
Explain the use of Vocabulary for Event Recording and Incident Sharing (VERIS) to document security incidents in a standard format
Cisco at Lumify Work
Lumify Work is the largest provider of authorised Cisco training in Australia, offering a wider range of Cisco courses, run more often than any of our competitors. Lumify Work has won awards such as ANZ Learning Partner of the Year (twice!) and APJC Top Quality Learning Partner of the Year.
Stay ahead of the technology curve
Don’t let your tech outpace the skills of your people
Train Anywhere
From our state-of-the-art classrooms to telepresence to your offices, our instructor-led training caters to your needs.
Track Record
We have a 30-year history of driving innovative, award-winning learning solutions.
More Courses, More Often
When you train with Lumify Work you get more courses, more often, in more locations, and from more vendors.
Quality Instructors and Content
Expert instructors with real world experience and the latest vendor-approved in-depth course content.
Partner-Preferred Supplier
Chosen and awarded by the world's leading vendors as preferred training partner.
Ahead of the Technology Curve
No matter your chosen technologies or platforms, we can help you stay one step ahead.
Train Anywhere
From our state-of-the-art classrooms to telepresence to your offices, our instructor-led training caters to your needs.
Track Record
We have a 30-year history of driving innovative, award-winning learning solutions.
More Courses, More Often
When you train with Lumify Work you get more courses, more often, in more locations, and from more vendors.
Quality Instructors and Content
Expert instructors with real world experience and the latest vendor-approved in-depth course content.
Partner-Preferred Supplier
Chosen and awarded by the world's leading vendors as preferred training partner.
Ahead of the Technology Curve
No matter your chosen technologies or platforms, we can help you stay one step ahead.
Train Anywhere
From our state-of-the-art classrooms to telepresence to your offices, our instructor-led training caters to your needs.
Track Record
We have a 30-year history of driving innovative, award-winning learning solutions.
More Courses, More Often
When you train with Lumify Work you get more courses, more often, in more locations, and from more vendors.
Who is the course for?
This course is designed for individuals seeking a role as an associate-level cybersecurity analyst and IT professionals desiring knowledge in Cybersecurity operations or those in pursuit of the Cisco Certified CyberOps Associate certification including:
Students pursuing a technical degree
Current IT professionals
Recent college graduates with a technical degree
We can also deliver and customise this training course for larger groups – saving your organisation time, money and resources. For more information, please contact us on 1800 U LEARN (1800 853 276)
Course subjects
Course outline
Defining the Security Operations Center
Understanding Network Infrastructure and Network Security Monitoring Tools
Exploring Data Type Categories
Understanding Basic Cryptography Concepts
Understanding Common TCP/IP Attacks
Understanding Endpoint Security Technologies
Understanding Incident Analysis in a Threat-Centric SOC
Identifying Resources for Hunting Cyber Threats
Understanding Event Correlation and Normalisation
Identifying Common Attack Vectors
Identifying Malicious Activity
Identifying Patterns of Suspicious Behavior
Conducting Security Incident Investigations
Using a Playbook Model to Organise Security Monitoring
Understanding SOC Metrics
Understanding SOC Workflow and Automation
Describing Incident Response
Understanding the Use of VERIS
Understanding Windows Operating System Basics
Understanding Linux Operating System Basics
Lab outline
Use NSM Tools to Analyse Data Categories
Explore Cryptographic Technologies
Explore TCP/IP Attacks
Explore Endpoint Security
Investigate Hacker Methodology
Hunt Malicious Traffic
Correlate Event Logs, Packet Captures (PCAPs), and Alerts of an Attack
Investigate Browser-Based Attacks
Analyse Suspicious Domain Name System (DNS) Activity
Explore Security Data for Analysis
Investigate Suspicious Activity Using Security Onion
Investigate Advanced Persistent Threats
Explore SOC Playbooks
Explore the Windows Operating System
Explore the Linux Operating System
Prerequisites
Before taking this course, you should have the following knowledge and skills:
Familiarity with Ethernet and TCP/IP networking
Working knowledge of the Windows and Linux operating systems
Familiarity with basics of networking security concepts
The following Cisco course can help you gain the knowledge you need to prepare for this course:
The supply of this course by Lumify Work is governed by the booking terms and conditions. Please read the terms and conditions carefully before enrolling in this course, as enrolment in the course is conditional on acceptance of these terms and conditions.
Request Course Information
By submitting an enquiry, you agree to our privacy policy and receiving email and other forms of communication from us. You can opt-out at any time.