Mon to Sat morning 7:30am to 5:00pm
Call Us 070 30 40 92 / 085 682 471

Course Detail

CyberOps Associate (CA)Release Notes

2024-01-26

Course Duration
90 h
Course OverView

The CyberOps Associate course is designed for Cisco Networking Academy® students who are seeking career-oriented, entry-level security analyst skills. Target students include individuals enrolled in technology degree programs at institutions of higher education and IT professionals who want to pursue a career in the Security Operation Center (SOC). Learners in this course are exposed to all of the foundational knowledge required to detect, analyze, and escalate basic cybersecurity threats using common open-source tools. This course aligns with the Cisco Certified CyberOps Associate (CBROPS) certification. Candidates need to pass the 200-201 CBROPS exam to achieve the Cisco Certified CyberOps Associate certification.

Course Audience

Null

Course Outline
  • Module 1: Course Introduction/The Danger
  • Module 2: Fighters in the War Against Cybercrime
  • Module 3: The Windows Operating System
  • Module 4: Linux Overview
  • Module 5: Network Protocols
  • Module 6: Ethernet and Internet Protocol (IP)
  • Module 7: Principles of Network Security
  • Module 8: Address Resolution Protocol
  • Module 9: The Transport Layer
  • Module 10: Network Services
  • Module 11: Network Communication Devices
  • Module 12: Network Security Infrastructure
  • Module 13: Attackers and Their Tools
  • Module 14: Common Threats and Attacks
  • Module 15: Observing Network Operation
  • Module 16: Attacking the Foundation
  • Module 17: Attacking What We Do
  • Module 18: Understanding Defense
  • Module 19: Access Control
  • Module 20: Cryptography
  • Module 21: Endpoint Protection
  • Module 22: Endpoint Vulnerability Assessment
  • Module 23: Technologies and Protocols
  • Module 24: Network Security Data
  • Module 25: Evaluating Alerts
  • Module 26: Working with Network Security Data
  • Module 27: Digital Forensics and Incident Analysis and Response
Course Completion

By the end of the course, students will be able to:
● Install virtual machines to create a safe environment for implementing and analyzingcybersecurity threat events.
● Explain the role of the Cybersecurity Operations Analyst in the enterprise.
● Explain the Windows Operating System features and characteristics needed to supportcybersecurity analyses.
● Explain the features and characteristics of the Linux Operating System.
● Analyze the operation of network protocols and services.
● Explain the operation of the network infrastructure.
● Classify the various types of network attacks.
● Use network monitoring tools to identify attacks against network protocols and services.
● Explain how to prevent malicious access to computer networks, hosts, and data.
● Explain the impacts of cryptography on network security monitoring.
● Explain how to investigate endpoint vulnerabilities and attacks.
● Evaluate network security alerts.
● Analyze network intrusion data to identify compromised hosts and vulnerabilities.
● Apply incident response models to manage network security incidents.

Course Prerequisites

Null

Course Schedule