Cisco-CyberOps-Associate-Certification-Training-Course

CISCO CyberOps Associate CBROPS

 

Develop the know-how to monitor, detect and respond to cybersecurity threats.

This course introduces the core security concepts and skills needed to configure and troubleshoot computer networks and help ensure the integrity of devices and data.

Course Overivew

 

  • Develop the know-how to monitor, detect and respond to cybersecurity threats.
  • This course introduces the core security concepts and skills needed to configure and troubleshoot computer networks and help ensure the integrity of devices and data.
  • Uncovering cybercrime, cyber espionage, and other networking threats are just some of the exciting cybersecurity jobs spanning across every industry. Learn the skills to join this fast-growing field and take advantage of the opportunities found in security operation centers. Feel confident that you are helping make the world a safer place by pursuing a role in this field.
  • In this course you will learn security concepts, security monitoring, host-based analysis, network intrusion analysis, and security policies procedures. This course also aligns with the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework to support consistent communication language for cybersecurity education, training, and workforce development.
  • This course aligns with the Cisco Certified CyberOps Associate (CBROPS) certification.
  • Candidates need to pass the 200-201 CBROPS exam to achieve the Cisco Certified CyberOps Associate certification.
  • The CBROPS exam tests a candidate’s knowledge and skills related to security concepts, security monitoring, host-based analysis, network intrusion analysis, and security policies and procedures.

 

You’ll Learn These Core Skills:

    • Deepen knowledge in how best to detect and respond to security incidents.
    • Gain job-ready, practical skills in cybersecurity operations.
    • Develop critical thinking and problem-solving skills using real equipment and Cisco Packet Tracer.
    • Prepare for Cisco Certified CyberOps Associate Certification.
Read More
Read Less
Course Benefits:

Module 1. The Danger

  • Introduction
  • War Stories
  • Threat Actors
  • Threat Impact
  • The Danger Summary

Module 2. Fighters in the War Against Cybercrime

  • Introduction
  • The Modern Security Operations Center
  • Becoming a Defender
  • Fighters in the War Against Cybercrime Summary

Module 3. The Windows Operating System

  • Introduction
  • Windows History
  • Windows Architecture and Operations
  • Windows Configuration and Monitoring
  • Windows Security
  • The Windows Operating System Summary

Module 4. Linux Overview

  • Introduction
  • Linux Basics
  • Working in the Linux Shell
  • Linux Servers and Clients
  • Basic Server Administration
  • The Linux File System
  • Working with the Linux GUI
  • Working on a Linux Host
  • Linux Basics Summary

Module 5. Network Protocols

  • Introduction
  • Network Communication Process
  • Communication Protocols
  • Data Encapsulation
  • Network Protocols Summary

Module 6. Ethernet and Internet Protocol (IP)

  • Introduction
  • Ethernet
  • IPv4
  • IP Addressing Basics
  • Types of IPv4 Addresses
  • The Default Gateway
  • IPv6 Prefix Length
  • Ethernet and IP Protocol Summary

Module 7. Principles of Network Security

  • Introduction
  • ICMP
  • Ping and Traceroute Utilities
  • Connectivity Verification Summary

Module 8. Address Resolution Protocol

  • Introduction
  • MAC and IP
  • ARP
  • ARP Issues
  • Address Resolution Protocol Summary

Module 9. The Transport Layer

  • Introduction
  • Transport Layer Characteristics
  • Transport Layer Session Establishment
  • Transport Layer Reliability
  • The Transport Layer Summary

Module 10. Network Services

  • Introduction
  • DHCP
  • DNS
  • NAT
  • File Transfer and Sharing Services
  • Email
  • HTTP
  • Network Services Summary

Module 11. Network Communication Devices

  • Introduction
  • Network Devices
  • Wireless Communications
  • Network Communication Devices Summary

Module 12. Network Security Infrastructure

  • Introduction
  • Network Topologies
  • Security Devices
  • Security Services
  • Network Security Infrastructure Summary

Module 13. Attackers and Their Tools

  • Introduction
  • Who is Attacking Our Network?
  • Threat Actor Tools
  • Attackers and Their Tools Summary

Module 14. Common Threats and Attacks

  • Introduction
  • Malware
  • Common Network Attacks – Reconnaissance, Access, and Social Engineering
  • Network Attacks – Denial of Service, Buffer Overflows, and Evasion
  • Common Threats and Attacks Summary

Module 15. Observing Network Operation

  • Introduction
  • Introduction to Network Monitoring
  • Introduction to Network Monitoring Tools
  • Network Monitoring and Tools Summary

Module 16. Attacking the Foundation

  • Introduction
  • IP PDU Details
  • IP Vulnerabilities
  • TCP and UDP Vulnerabilities
  • Attacking the Foundation Summary

Module 17. Attacking What We Do

  • Introduction
  • IP Services
  • Enterprise Services
  • Attacking What We Do Summary

Module 18. Understanding Defense

  • Introduction
  • Defense-in-Depth
  • Security Policies, Regulations, and Standards
  • Understanding Defense Summary

Module 19. Access Control

  • Introduction
  • Access Control Concepts
  • AAA usage and operation
  • Access Control Summary

Module 20. Threat Intelligence

  • Introduction
  • Information Sources
  • Threat Intelligence Services
  • Threat Intelligence Summary

Module 21. Cryptography

  • Introduction
  • Integrity and Authenticity
  • Confidentiality
  • Public Key Cryptography
  • Authorities and the PKI Trust System
  • Applications and Impacts of Cryptography
  • Cryptography Summary

Module 22. Endpoint Protection

  • Introduction
  • Antimalware Protection
  • Host-based Intrusion Prevention
  • Application Security
  • Endpoint Protection Summary

Module 23. Endpoint Vulnerability Assessment

  • Introduction
  • Network and Server Profiling
  • Common Vulnerability Scoring System (CVSS)
  • Secure Device Management
  • Information Security Management Systems
  • Endpoint Vulnerability Assessment Summary

Module 24. Technologies and Protocols

  • Introduction
  • Monitoring Common Protocols
  • Security Technologies
  • Technologies and Protocols Summary

Module 25. Network Security Data

  • Introduction
  • Types of Security Data
  • End Device Logs
  • Network Logs
  • Network Security Data Summary

Module 26. Evaluating Alerts

  • Introduction
  • Source of Alerts
  • Overview of Alert Evaluation
  • Evaluating Alerts Summary

Module 27. Working with Network Security Data

  • Introduction
  • A Common Data Platform
  • Investigating Network Data
  • Enhancing the Work of the Cybersecurity Analyst
  • Working with Network Security Data Summary

Module 28. Digital Forensics and Incident Analysis and Response

  • Introduction
  • Evidence Handling and Attack Attribution
  • The Cyber Kill Chain
  • The Diamond Model of Intrusion Analysis
  • Incident Response
  • Digital Forensics and Incident Analysis and Response Summary
  • Prepare for Your Exam and Launch Your Career!
  • Explain network security.
  • Explain the various types of threats and attacks.
  • Explain tools and procedures to mitigate the effects of malware and common network attacks.
  • Configure command authorization using privilege levels and role-based CLI.
  • Implement the secure management and monitoring of network devices.
  • Configure AAA to secure a network.
  • Explain how firewalls are implemented to provide network security.
  • Explain endpoint vulnerabilities and protection methods
  • Implement security measures to mitigate Layer 2 attacks
  • Explain how cryptography is used to ensure data integrity and authenticity
  • Explain the purpose of VPNs.
  • Configure a site-to-site IPsec VPN, with pre-shared key authentication, using CLI.
  • Implement an ASA firewall configuration.
  • Describe the various techniques and tools for network security
  • The CyberOps Associate course is designed for Cisco Networking Academy® students who are seeking careeroriented, entry-level security analyst skills.
  • Target students include individuals enrolled in technology degree programs at institutions of higher education and IT professionals who want to pursue a career in the Security
    Operation Center (SOC).
  • Learners in this course are exposed to all of the foundational knowledge required to detect, analyze, and escalate basic cybersecurity threats using common open-source tools.
Download
Course
Brochure

Prerequisites

This course is available at :

Classroom Training

Cairo
Giza
Onsite

Online Training

Virtual Interactive Instructor LED
Self-Paced Training

WHY CHOOSE CLS

Experience

We have been in the market since 1995, and we kept accumulating experience in the training business, and providing training for more than 100,000 trainees ever since, in Egypt, and the MENA region.

Premium Facilities

CLS facilities are well-equipped with strong hardware and software technologies that aid both students and trainers lead very effective smooth training programs.

Customer Support

We provide our clients with the best solutions, customized to their specific needs and goals. Our team is highly qualified to answer whatever questions you have.

Global Accredited

CLS is an authorized and accredited partner by technology leaders. This means that our training programs are of the highest quality source materials.

Up To Date

We keep tabs on every change in the market and the technology field, so our training programs will always be updated up to the World-class latest standards, and adapted to the global shape-shifting job market.

Certified Instructors

We select the best instructors, who are certified from trustworthy international vendors. They share their professional experience with the Trainees, so they can have a clear hands-on experience.

Over 200,000 Gradutes From CLS

Play Video
Amr Mostafa
An employee of the Security Department at the Ministry of Electricity

I`m attending now CEH Training with Eng Mohamed Hamdy ,CISSP Training with Eng Mohamed Gohar, I really learned a lot from him , everything here in CLS  is very satisfying including facilities .

Play Video
Lamiaa Medhat
CIO

We took a series of courses as the digital Transformation Unit of the ministry . we just finished CRISC Certification Training with DR Adel Abdel Meneim . Thank you CLS for all your efforts, we really appreciate it

Play Video
Ahmed Salah
Senior Cyber Security Engineer

Me and my colleagues are working in a government Organization, We took a no. of cyber security trainings with CLS starting with CEH and CISSP. we liked every thing the instructors, the stuff and whole environment

Play Video
Ferras Hassan
Head of the Programming Department at Bashayer Energy Company

I`m attending ASP.NET Core with MVC Training with Eng Mohamed Hesham , I really learned a lot from him , everything here in CLS  is very satisfying including facilities .Thanks you all team.

Play Video
Mohamed Ahmed Ali
Systems management specialist

Qualifying the cadres of digital transformation units in government agencies moving to the administrative capital .Thanks CLS

Play Video
Zeinab Salah
Software Developer at Bashayer Energy Company

I`m attending ASP.NET Core with MVC Training with Eng Mohamed Hesham , I really learned a lot from him , everything here in CLS  is very satisfying including facilities .Thanks you all team.

Play Video
Ibrahim Khalaf
IT Infrastructure and Security Manger

I`m attending now CRISC Training with DR Adel Abdel Meneim , I really learned a lot from him , everything here in CLS  is very satisfying including facilities , locations and the team.

Play Video
Samar Shams ElDin
Programmer at Bashayer Energy Company

I`m attending ASP.NET Core with MVC Training with Eng Mohamed Hesham , I really learned a lot from him , everything here in CLS  is very satisfying including facilities .Thanks you all team.

Student Application For

CISCO CyberOps Associate CBROPS
Full Name *
Email *
Phone *
Full Phone
Training Location *
Additional Request

Business Application For

CISCO CyberOps Associate CBROPS
Full Name *
Company Name *
Job Title *
Number of Employees
Email *
Phone *
Full Phone
Training Location *
Additional Request