Cisco Certified CyberOps Associate
Learn the fundamental skills, techniques, technologies, and hands-on practice necessary to prevent and defend against cyber-attacks as part of the SOC team.
This course enables the learners to install virtual machines to create a safe environment, the danger, operating systems, network protocols, and services. Furthermore, it enables the learners to run the operation of the network infrastructure, various types of network attacks and tools, access control, threat intelligence, common threats, and attacks. In addition, it equips the learners with the skills to use network monitoring tools, malicious access to computer networks, cryptography, investigate endpoint vulnerabilities and attacks, and endpoint vulnerability assessment. Furthermore, it teaches learners how to evaluate network security alerts and analyze network intrusion data. Learners also learn how to apply incident response models to manage network security incidents.
*One continuing education unit equals 10 contact hours.
Upon the successful completion of this course, learners will be able to:
1. Identify the danger, threat actors, and Fighters in the War Against Cybercrime.
2. Explain the Windows Operating System features and characteristics needed to support cybersecurity analyses.
3. Explain the features and characteristics of the Linux Operating System.
4. Analyze the operation of network protocols and services.
5. Explain Ethernet, Internet Protocol (IP), and connectivity verification.
6. Explain the operation of ARP, transport layer, and network services.
7. Explain network security infrastructure and network communication devices.
8. Classify the various types of network attacks.
9. Use network monitoring tools to identify attacks against network protocols and services.
10. Explain how to prevent malicious access to computer networks, hosts, and data.
11. Identify access control and threat intelligence.
12. Explain the impacts of cryptography on network security monitoring.
13. Explain how to investigate endpoint vulnerabilities and attacks.
14. Evaluate network security alerts and network security data.
15. Apply incident response models to manage network security incidents.
Working knowledge of operating systems.