Video description
Overview
More than nine hours of video instruction on configuration and troubleshooting tasks to prepare you for the Cisco CCNA Cyber Ops SECOPS 210-255 certification exam.
Description
CCNA Cyber Ops SECOPS 210-255LiveLessons is a unique video product that provides a solid understanding of the key areas of knowledge required to pass the 210-255 SECOPS exam. This product walks through each topic of the Implementing Cisco Cybersecurity Operations exam blueprint, so you can gain the knowledge you need to pass the exam and start your career as a Security Operations Center (SOC) Security Analyst.
CCNA Cyber Ops SECOPS 210-255 contains more than nine hours of instruction with 11 lessons. The videos consist of live video training, video screencasts, and demos. Video instruction throughout offers detailed explanations, tips, and design recommendations. The Complete Video Couse Premium Edition also comes with:
- Lesson quizzes to help you test yourself on concepts and commands
- Interactive exercises so you can put your knowledge to the test
- A full practice exam delivered in the Pearson Test Prep Engine
Major topics include:
Skill Level
What You Will Learn
- Presents real-world solutions for understand Cisco's threat analysis and incident response solution
- Covers all of the objectives in the CCNA Cyber Ops exam
- Easy to follow demonstrations of cybersecurity tools, products, and solutions
- Scenarios offered to help learners understand real-world applications
Who Should Take This Course
Anyone who wants to obtain their CCNA Cyber Ops certification. This includes security professionals interested in learning how to develop, manage, or improve a security operations center, a CSIRT, PSIRT, or to become a cyber security incident response expert. Anyone wishing to take the CCNA CyberOps exam would also benefit from viewing this course.
Course Requirements
The video course assumes that the learner has the skills to navigate the user interface of a PC running Windows, Mac or Linux and who has completed typical high school-level math courses (mainly that the reader has been exposed to binary math). The course also assumes that the reader has used PCs connected to either a home network or a network inside a school or company, but that the reader might not understand anything about the network to which the PC was connected. It is also assumes that the reader knows how to use typical Internet applications, primarily web browsers and email clients.
Table of Contents
Introduction
CCNA Cyber Ops SECOPS 210-255: Introduction
Lesson 1: Threat Analysis
Learning objectives
1.1 Understanding Risk Analysis
1.2 Understanding the Common Vulnerability Scoring System (CVSS)
1.3 Interpreting Malware Analysis Tool Output
Lesson 2: Forensics
Learning objectives
2.1 Examining Types of Evidence
2.2 Surveying Windows Forensics: Application Processes, Threads, and Vulnerabilities
2.3 Surveying Windows Forensics: Memory
2.4 Surveying Windows Forensics: The Windows Registry
2.5 Surveying Windows Forensics: Hard Drives, FAT, and NTFS
2.6 Surveying Linux Forensics
2.7 Understanding Evidence Collection
2.8 Handling Evidence
2.9 Examining Asset and Threat Actor Attribution
Lesson 3: Intrusion Analysis
Learning objectives
3.1 Introducing Intrusion Analysis Fundamentals
3.2 Examining Packet Captures
3.3 Examining Protocol Headers
3.4 Analyzing Security Device Data
3.5 Differentiating False Positives, False Negatives, True Positives, and True Negatives
Lesson 4: NetFlow for Cyber Security
Learning objectives
4.1 Introducing NetFlow
4.2 Comparing NetFlow Versions
4.3 Understanding NetFlow for Cyber Security and Incident Response
4.4 Examining NetFlow Analysis Tools
4.5 Introducing IPFIX
Lesson 5: Introduction to Incident Response
Learning objectives
5.1 Scoping the Incident Response Plan and Process
5.2 Understanding Information Sharing and Coordination
5.3 Identifying the Incident Response Team Structure
Lesson 6: Incident Response Teams
Learning objectives
6.1 Analyzing Computer Incident Response Teams (CSIRTs)
6.2 Analyzing Product Security Incident Response Teams (PSIRTs)
6.3 Surveying Coordination Centers
6.4 Analyzing Managed Security Service Providers Incident Response Teams
Lesson 7: Compliance Frameworks
Learning objectives
7.1 Considering PCI-DSS
7.2 Considering HIPAA
7.3 Considering SOX
Lesson 8: Network and Host Profiling
Learning objectives
8.1 Understanding Network Profiling
8.2 Understanding Host Profiling
Lesson 9: Data and Event Analysis
Learning objectives
9.1 Understanding Data Normalization
9.2 Deconstructing Universal Data Formats
9.3 Understanding the 5-tuple Correlation
9.4 Performing DNS Analysis
9.5 Performing Web Log Analysis
9.6 Performing Deterministic and Probabilistic Analysis
Lesson 10: Intrusion Event Categories
Learning objectives
10.1 Identifying and Mitigating Reconnaissance
10.2 Identifying and Mitigating Weaponization
10.3 Identifying and Mitigating Delivery
10.4 Identifying and Mitigating Exploitation
10.5 Identifying and Mitigating Installation
10.6 Identifying and Mitigating Command and Control
10.7 Understanding Action on Objectives
Lesson 11: The Incident Handling Process
Learning objectives
11.1 Introducing the Vocabulary for Event Recording and Incident Sharing (VERIS)
11.2 Applying the VERIS Schema to Incident Handling
11.3 Surveying the VERIS Incident Recording Tool and Other VERIS Resources
Summary
CCNA Cyber Ops SECOPS 210-255: Summary