MCSEClasses Certification Training Boot Camp MCSE MCSD MCDBA Cisco CIW Linux Oracle Java Security Military Discounts Testimonials About Us Linux/Unix Certification MCSD Certification Home MCSE Certification MCDBA Certification Cisco Certification Security Certification Java Certification Oracle® Certification CIW Certification Jobs Boot Camp Financing Boot Camp Pricing Boot Camp Technical Schedule Contact Us


Cisco SECOPS - Implementing Cisco Cybersecurity Operations (210-255)

Course Length: 5 days
Number of Exams: 1

Class Schedule
Call for Class Schedule

  • Includes roundtrip airfare and lodging (for boot camps held in Georgia and Florida only)
  • Hands-on instruction by a certified instructor
  • Includes all course materials
  • On-site Testing
  • Lunch & Snacks provided each day

Implementing Cisco Cybersecurity Operations (SECOPS - Exam 210-255)

The Implementing Cisco Cybersecurity Operations (SECOPS) v1.0 course gives you foundation-level knowledge of security incident analysis techniques used in a Security Operations Center (SOC). You will learn how to identify and analyze threats and malicious activity, correlate events, conduct security investigations, use incident playbooks, and learn SOC operations and procedures.

This is the second of two courses that prepare you for the Cisco® CCNA® Cyber Ops certification. This certification validates your knowledge and hands-on skills to help handle cybersecurity events as an associate-level member of an SOC team.

Today's cybersecurity professionals need to detect, investigate, and respond to a wide variety of security events. This course will help you gain the skills to play a role in your organization's SOC detecting and responding to security events.

The United States Department of Defense recognizes Cisco CCNA CyberOps certification as an approved baseline certification in the Information Assurance (IA) Workforce CCSP Incident Responder and CCSP Analyst job categories.

How you'll benefit

This course will help you:
  • Learn the fundamental skills that a cybersecurity analyst in a security operations center uses, including threat analysis, event correlation, identifying malicious activity, and how to use a playbook for incident response
  • Prepare for the Cisco CCNA Cyber Ops certification with hands-on practice using real-life security analysis tools, such as those found in a Linux distribution
  • Qualify for entry-level job roles in the high-demand area of cybersecurity
  • If you need privileged access to DoD Systems, and are military personnel, civilian contractors, and others, this course helps your prepare for Cisco CCNA Cyber Ops certification, which is one of the DoD Approved 8570 Baseline Certifications

Who should enroll

  • IT professionals
  • Any learner interested in entering associate-level cybersecurity roles such as:
    • SOC cybersecurity analysts
    • Computer or network defense analysts
    • Computer network defense infrastructure support personnel
    • Future incident responders and SOC personnel
    • Cisco integrators or partners

Course details

After taking this course, you should be able to:

  • Describe the three common SOC types, tools used by SOC analysts, job roles within the SOC, and incident analysis within a threat-centric SOC
  • Explain security incident investigations, including event correlation and normalization and common attack vectors, and be able to identify malicious and suspicious activities
  • Explain the use of a SOC playbook to assist with investigations, the use of metrics to measure the effectiveness of the SOC, the use of a SOC workflow management system and automation to improve SOC efficiency, and the concepts of an incident response plan

Prerequisites

To fully benefit from this course, you should first complete the following course or obtain the equivalent knowledge and skills:

  • Understanding Cisco Cybersecurity Fundamentals (SECFND)

Outline

SOC Overview
  • Defining the Security Operations Center
  • Understanding NSM Tools and Data
  • Understanding Incident Analysis in a Threat-Centric SOC
  • Identifying Resources for Hunting Cyber Threats
Security Incident Investigations
  • Understanding Event Correlation and Normalization
  • Identifying Common Attack Vectors
  • Identifying Malicious Activity
  • Identifying Patterns of Suspicious Behavior
  • Conducting Security Incident Investigations
SOC Operations
  • Describing the SOC Playbook
  • Understanding the SOC Metrics
  • Understanding the SOC WMS and Automation
  • Describing the Incident Response Plan
  • Appendix A - Describing the Computer Security Incident Response Team
  • Appendix B - Understanding the use of VERIS

Lab outline

  • Explore Network Security Monitoring Tools
  • Investigate Hacker Methodology
  • Hunt Malicious Traffic
  • Correlate Event Logs, PCAPs, and Alerts of an Attack
  • Investigate Browser-Based Attacks
  • Analyze Suspicious DNS Activity
  • Investigate Suspicious Activity Using Security Onion
  • Investigate Advanced Persistent Threats
  • Explore SOC Playbooks

MCSEClasses.com is your best choice for Cisco SECOPS, Cisco SECOPS training, Cisco SECOPS certification, Cisco SECOPS certification boot camp, Cisco SECOPS boot camp, Cisco SECOPS certification training, Cisco SECOPS boot camp training, Cisco SECOPS boot camp certification, Cisco SECOPS certification course, Cisco SECOPS course, training Cisco SECOPS, certification Cisco SECOPS, boot camp Cisco SECOPS, certification Cisco SECOPS boot camp, certification Cisco SECOPS training, boot camp Cisco SECOPS training, certification Cisco SECOPS course.



mcseclasses home | technical schedule | application schedule | class outlines | mcse, mcdba, mcsd training | microsoft .net | cisco certification | security training | ced solutions oracle® certification training | linux, unix, aix | comptia certification | webmaster training | pricing | locations | financing | instructors needed | e-mail us





Search classes by keyword:


Search classes by category:

Copyright © 2019 CED Solutions. CED Solutions Refund Policy. All Rights Reserved.