Über den Kurs

Dauer: 5 Tage

*Instructor-led Classroom Training &
*Instructor-led Online / hybrid training

The Performing CyberOps Using Cisco Security Technologies (CBRCOR) v1.0 course guides you through cybersecurity operations fundamentals, methods, and automation.

The knowledge you gain in this course will prepare you for the role of Information Security Analyst on a Security Operations Center (SOC) team. You will learn foundational concepts and their application in real-world scenarios, and how to leverage playbooks in formulating
an Incident Response (IR). The course teaches you how to use automation for security using cloud platforms and a SecDevOps methodology. You will learn the techniques for detecting cyberattacks, analyzing threats, and making appropriate recommendations to improve cybersecurity.

This course also earns you 40 Continuing Education (CE) credits towards recertification and prepares you for the 350-201 CBRCOR core exam.

Course duration

  • Instructor-led training: 5 days in the classroom with hands on practice

How you’ll benefit

This course will help you:

  • Gain an advanced understanding of the tasks involved for senior-level roles in a security operations center
  • Configure common tools and platforms used by security operation teams via practical application
  • Prepare you to respond like a hacker in real-life attack scenarios and submit recommendations to senior management
  • Prepare for the 350-201 CBRCOR core exam
  • Earn 40 CE credits toward recertification

The exam will test for knowledge in the following areas:

  • Monitoring for cyberattacks
  • Analyzing high volume of data using automation tools and platforms—both open source and commercial
  • Accurately identifying the nature of attack and formulate a mitigation plan
  • Scenario-based questions; for example, using a screenshot of output from a tool, you may be asked to interpret portions of output and establish conclusions

Objectives

● Describing the types of service coverage within a SOC and operational responsibilities associated with each.
● Comparing security operations considerations of cloud platforms.
● Describing the general methodologies of SOC platforms development, management, and automation.
● Explaining asset segmentation, segregation, network segmentation, micro-segmentation, and approaches to each, as part of asset controls and protections.
● Describing Zero Trust and associated approaches, as part of asset controls and protections.
● Performing incident investigations using Security Information and Event Management (SIEM) and/or security orchestration and automation (SOAR) in the SOC.
● Using different types of core security technology platforms for security monitoring, investigation, and response.
● Describing the DevOps and SecDevOps processes.
● Explaining the common data formats, for example, JavaScript Object Notation (JSON), HTML, XML, Comma-Separated Values (CSV).
● Describing API authentication mechanisms.
● Analyzing the approach and strategies of threat detection, during monitoring, investigation, and response.
● Determining known Indicators of Compromise (IOCs) and Indicators of Attack (IOAs).

Course overview

Outline

Lab outline

Mehr anzeigen