Seminar Details

Implementing Cisco Cybersecurity Operations 1.0 (SECOPS)

ETC
SECOPS
Hersteller-ID:
Prüfungs ID: 210-255
Dauer: 5 Tage
Preis: € 2.505.- exkl.MwST
Wissensgarantie: hier nicht automatisch anwendbar – bitte kontaktieren Sie Ihren Betreuer für Details

Info: Dieses Seminar bereitet auf die Prüfung 210-255 SECOPS Implementing Cisco Cybersecurity Operations vor, die notwendig ist für die CCNA Cyber Ops Zertifizierung.
This course allows learners to understand how a Security Operations Center (SOC) functions and the introductory-level skills and knowledge needed in this environment. It focuses on the introductory-level skills needed for a SOC Analyst at the associate level. Specifically, understanding basic threat analysis, event correlation, identifying malicious activity, and how to use a playbook for incident response.

Course Objectives Upon completion of this course, you will be able to:
  • Define a SOC and the various job roles in a SOC
  • Understand SOC infrastructure tools and systems
  • Learn basic incident analysis for a threat centric SOC
  • Explore resources available to assist with an investigation
  • Explain basic event correlation and normalization
  • Describe common attack vectors
  • Learn how to identifying malicious activity
  • Understand the concept of a playbook
  • Describe and explain an incident respond handbook
  • Define types of SOC Metrics
  • Understand SOC Workflow Management system and automation

Alle Details einblenden

Zielgruppe

Dieses Seminar richtet sich an:
  • Security Operations Center – Security Analyst
  • Computer/Network Defense Analysts
  • Computer Network Defense Infrastructure Support Personnel
  • Future Incident Responders and Security Operations Center (SOC) personnel
  • Students beginning a career, entering the cybersecurity field
  • Cisco Channel Partners

Vorkenntnisse

Für dieses Seminar werden folgende Kenntnisse empfohlen:

Schwerpunkte

  1. Module 1: SOC Overview
    1. Lesson 1: Defining the Security Operations Center
    2. Lesson 2: Understanding NSM Tools and Data
    3. Lesson 3: Understanding Incident Analysis in a Threat-Centric SOC
    4. Lesson 4: Identifying Resources for Hunting Cyber Threats
  2. Module 2: Security Incident Investigations
    1. Lesson 1: Understanding Event Correlation and Normalization
    2. Lesson 2: Identifying Common Attack Vectors
    3. Lesson 3: Identifying Malicious Activity
    4. Lesson 4: Identifying Patterns of Suspicious Behavior
    5. Lesson 5: Conducting Security Incident Investigations
  3. Module 3: SOC Operations
    1. Lesson 1: Describing the SOC Playbook
    2. Lesson 2: Understanding the SOC Metrics
    3. Lesson 3: Understanding the SOC WMS and Automation
    4. Lesson 4: Describing the Incident Response Plan
    5. Lesson 5: Appendix A—Describing the Computer Security Incident Response Team
    6. Lesson 6: Appendix B—Understanding the use of VERIS
Alle Details ausblenden

Termin Anfragen

    Durch Angabe Ihrer E-Mail-Adresse und Anklicken des Buttons „Newsletter abonnieren“ erklären Sie sich damit einverstanden, dass ETC Ihnen regelmäßig Informationen zu IT Seminaren und weiteren Trainings- und Weiterbildungsthemen zusendet. Die Einwilligung kann jederzeit bei ETC widerrufen werden.

Ihre Fragen zum Seminar

CHAT mit Experten ODER Rückruf anfordern

Kein passender Termin dabei? Mehr als 5 Personen? Firmentermin gewünscht?

Rufen sie uns an +43/1/533 17 77 - 99

Bewertungen

Bisher keine Bewertungen