Über den Kurs
Dauer: 5 Tage
*Instructor-led Classroom Training &
*Instructor-led Online / hybrid training
The Performing CyberOps Using Cisco Security Technologies (CBRCOR) v1.0 course guides you through cybersecurity operations fundamentals, methods, and automation.
The knowledge you gain in this course will prepare you for the role of Information Security Analyst on a Security Operations Center (SOC) team. You will learn foundational concepts and their application in real-world scenarios, and how to leverage playbooks in formulating
an Incident Response (IR). The course teaches you how to use automation for security using cloud platforms and a SecDevOps methodology. You will learn the techniques for detecting cyberattacks, analyzing threats, and making appropriate recommendations to improve cybersecurity.
This course also earns you 40 Continuing Education (CE) credits towards recertification and prepares you for the 350-201 CBRCOR core exam.
Course duration
- Instructor-led training: 5 days in the classroom with hands on practice
How you’ll benefit
This course will help you:
- Gain an advanced understanding of the tasks involved for senior-level roles in a security operations center
- Configure common tools and platforms used by security operation teams via practical application
- Prepare you to respond like a hacker in real-life attack scenarios and submit recommendations to senior management
- Prepare for the 350-201 CBRCOR core exam
- Earn 40 CE credits toward recertification
The exam will test for knowledge in the following areas:
- Monitoring for cyberattacks
- Analyzing high volume of data using automation tools and platforms—both open source and commercial
- Accurately identifying the nature of attack and formulate a mitigation plan
- Scenario-based questions; for example, using a screenshot of output from a tool, you may be asked to interpret portions of output and establish conclusions
Objectives
● Describing the types of service coverage within a SOC and operational responsibilities associated with each.
● Comparing security operations considerations of cloud platforms.
● Describing the general methodologies of SOC platforms development, management, and automation.
● Explaining asset segmentation, segregation, network segmentation, micro-segmentation, and approaches to each, as part of asset controls and protections.
● Describing Zero Trust and associated approaches, as part of asset controls and protections.
● Performing incident investigations using Security Information and Event Management (SIEM) and/or security orchestration and automation (SOAR) in the SOC.
● Using different types of core security technology platforms for security monitoring, investigation, and response.
● Describing the DevOps and SecDevOps processes.
● Explaining the common data formats, for example, JavaScript Object Notation (JSON), HTML, XML, Comma-Separated Values (CSV).
● Describing API authentication mechanisms.
● Analyzing the approach and strategies of threat detection, during monitoring, investigation, and response.
● Determining known Indicators of Compromise (IOCs) and Indicators of Attack (IOAs).
Course overview
● Interpreting the sequence of events during an attack based on analysis of traffic patterns.
● Describing the different security tools and their limitations for network analysis (for example, packet capture
tools, traffic analysis tools, network log analysis tools).
● Analyzing anomalous user and entity behavior (UEBA).
● Performing proactive threat hunting following best practices.
Outline
● Understanding Risk Management and SOC Operations
● Understanding Analytical Processes and Playbooks
● Investigating Packet Captures, Logs, and Traffic Analysis
● Investigating Endpoint and Appliance Logs
● Understanding Cloud Service Model Security Responsibilities
● Understanding Enterprise Environment Assets
● Implementing Threat Tuning
● Threat Research and Threat Intelligence Practices
● Understanding APIs
● Understanding SOC Development and Deployment Models
● Performing Security Analytics and Reports in a SOC
● Malware Forensics Basics
● Threat Hunting Basics
● Performing Incident Investigation and Response
Lab outline
● Exploring Cisco SecureX Orchestration
● Exploring Splunk Phantom Playbooks
● Examining Cisco Firepower Packet Captures and PCAP Analysis
● Validating an Attack and Determine the Incident Response
● Submitting a Malicious File to Cisco Threat Grid for Analysis
● Endpoint-Based Attack Scenario Referencing MITRE ATTACK
● Evaluating Assets in a Typical Enterprise Environment
● Exploring Cisco Firepower NGFW Access Control Policy and Snort Rules
● Investigating IOCs from Cisco Talos Blog Using Cisco SecureX
● Exploring the ThreatConnect Threat Intelligence Platform
● Tracking the TTPs of a Successful Attack Using a TIP
● Querying Cisco Umbrella Using Postman API Client
● Fixing a Python API Script
● Creating Bash Basic Scripts
● Reversing Engineer Malware
● Performing Threat Hunting
● Conducting an Incident Response