{"product_id":"cisco-200-201-cbrops-cybersecurity-training-365-days-access","title":"Cisco 200-201 CBROPS: Cybersecurity Operations Fundamentals | 365 Days Access","description":"\u003cp data-mce-fragment=\"1\"\u003eThe Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) CertKit teaches you security concepts, common network and application operations and attacks, and the types of data needed to investigate security incidents. This course teaches you how to monitor alerts and breaches, and how to understand and follow established procedures for response to alerts converted to incidents. You will learn the essential skills, concepts, and technologies to be a contributing member of a Cybersecurity Operations Center (SOC) including under­standing the IT infrastructure, operations, and vulnerabilities. This course helps you prepare for the Cisco Certified CyberOps Associate certification and the role of a Junior or Entry-level cybersecurity operations analyst in a SOC.\u003c\/p\u003e\n\u003cp data-mce-fragment=\"1\"\u003e\u003cstrong data-mce-fragment=\"1\"\u003ePrerequisites:\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp data-mce-fragment=\"1\"\u003eTo fully benefit from this course, you should have the following knowledge and skills:\u003c\/p\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eFamiliarity with Ethernet and TCP\/IP networking\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eWorking knowledge of the Windows and Linux operating systems\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eFamiliarity with basics of networking security concepts\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp data-mce-fragment=\"1\"\u003e\u003cstrong data-mce-fragment=\"1\"\u003eCourse outcome:\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eExplain how a Security Operations Center (SOC) operates and describe the different types of services that are performed from a Tier 1 SOC analyst’s perspective.\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eExplain Network Security Monitoring (NSM) tools that are available to the network security analyst.\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eExplain the data that is available to the network security analyst.\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eDescribe the basic concepts and uses of cryptography.\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eDescribe security flaws in the TCP\/IP protocol and how they can be used to attack networks and hosts.\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eUnderstand common endpoint security technologies.\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eIdentify resources for hunting cyber threats.\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eExplain the need for event data normalization and event correlation.\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eIdentify the common attack vectors.\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eIdentify malicious activities.\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eIdentify patterns of suspicious behaviors.\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eConduct security incident investigations.\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eExplain the use of a typical playbook in the SOC.\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eExplain the use of SOC metrics to measure the effectiveness of the SOC.\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp data-mce-fragment=\"1\"\u003e\u003cstrong data-mce-fragment=\"1\"\u003e \u003c\/strong\u003e\u003cstrong data-mce-fragment=\"1\"\u003eWho should attend:\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp data-mce-fragment=\"1\"\u003eThis course is designed for individuals seeking a role as an associate-level cybersecurity analyst and IT professionals desiring knowledge in Cybersecurity operations or those in pursuit of the Cisco Certified CyberOps Associate certification including:\u003c\/p\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eStudents pursuing a technical degree\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eCurrent IT professionals\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eRecent college graduates with a technical degree\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp data-mce-fragment=\"1\"\u003e\u003cstrong data-mce-fragment=\"1\"\u003e\u003c\/strong\u003e\u003cstrong data-mce-fragment=\"1\"\u003eDiviTrain CertKit content:\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eE-learning courses:\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eCBROPS: The CIA Triad \u0026amp; Security Approaches\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eCBROPS: Threat Actors, Security, \u0026amp; Risk Management\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eCBROPS: CVSS, Deployments, Access Control, \u0026amp; Data Visibility\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eCBROPS: Data Loss, Host Isolation, \u0026amp; Detection Methods\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eCBROPS: Attack Surfaces, Vulnerability, \u0026amp; Analysis Tools\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eCBROPS: Firewall, Filtering, Visibility, \u0026amp; Control Data\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eCBROPS: Data \u0026amp; Attack Types\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eCBROPS: Social Engineering, Evasion, Obfuscation, \u0026amp; Certificates\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eCBROPS: Host-based Analysis \u0026amp; the Role of Attribution\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eCBROPS: Log Evidence, Disk Images, \u0026amp; Malware Analysis Output\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eCBROPS: File Extraction, Event Artifacts, \u0026amp; Regular Expressions\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eCBROPS: Incident Response, Security Management, \u0026amp; Analysis\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eCBROPS: Protected Data, Profiling, Forensics, \u0026amp; IRP\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eMeasureUp Exam simulation\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003e220+ questions\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eTips \u0026amp; Tricks\u003c\/li\u003e\n\u003c\/ul\u003e","brand":"DiviTrain.com","offers":[{"title":"Default Title","offer_id":39294813503574,"sku":"","price":263.2,"currency_code":"EUR","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0280\/0350\/0118\/files\/7_271c692a-3ae5-4a29-9c9c-3fcd4272b9e7.png?v=1743683503","url":"https:\/\/www.divitrain.com\/en-eu\/products\/cisco-200-201-cbrops-cybersecurity-training-365-days-access","provider":"DiviTrain.com","version":"1.0","type":"link"}