About Course

Course overview:

The 'Understanding Cybersecurity Operations Fundamentals (CBROPS)' course provides a comprehensive understanding of the network infrastructure, operations and vulnerabilities of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite. You will gain fundamental knowledge of security concepts, common network applications and attacks, and the Windows and Linux operating systems. In addition, you will learn what types of data are used to investigate security incidents.

Course overview:
  • Understanding the devices and their role in the network infrastructure.
  • Operation and vulnerabilities of the TCP/IP protocol suite.
  • Basic information about security concepts.
  • Common network applications and attacks
  • Basics of the Windows and Linux operating systems.
  • Security aspects and specific threats.
  • Types of data used to investigate security incidents.
  • Practical skills for data analysis and interpretation.
 
Course objectives:

Upon completion of this course, you will have the foundational knowledge and skills to perform the duties of an associate-level cybersecurity analyst in a threat-centered security operations center. This includes:

This course prepares you to play a critical role in defending against cyber threats and ensuring business continuity.

Further recommendations: Combination of CCNA CyberOps, CCNA and CCNP

The combination of the CCNA CyberOps, CCNA and CCNP certificates offers numerous advantages and opens up a wide range of opportunities. Here are some reasons why this combination is advantageous:

  • CCNAThe CCNA course provides fundamental knowledge of networking, including routing and switching, network access, IP connectivity, IP services, security basics and automation.
  • CCNPCCNP course goes beyond the basics and covers advanced networking technologies, including advanced routing and switching techniques, network security protocols, network design and optimization.
  • CCNA CyberOpsThis course focuses on cybersecurity operations, threat analysis, network systems monitoring, and security incident response.
  • Broad expertiseWith the knowledge gained from all three certificates, you are ideally placed to fill a wide range of IT positions, from network specialists to security experts.
  • Recognized worldwideThese certificates are recognized and valued worldwide, which increases your attractiveness to international employers.
  • Diverse positionsWith these certificates you can apply for various positions, including network administrator, network technician, security specialist and security analyst.
  • Sustainable opportunitiesYour advanced knowledge and skills offer you sustainable opportunities on the job market.
  • Applicable knowledgeThe acquired knowledge is directly applicable in the administration and security of network systems.
  • Increase efficiencyWith the advanced skills from the CCNP course, you can solve complex network problems and make network systems more efficient and secure.
  • High demand95 % of advertised positions in the Cisco network sector remain unfilled for more than 6 months.
  • Over 3,000 unfilled vacanciesThis shows the strong demand for skilled workers in this area.
  • Few job seekersAccording to the Federal Employment Agency, there are fewer than 150 jobseekers in this field across Germany.
  • High chances of employmentWith so few competitors, the chances of finding a job are very good.
  • Comprehensive supportWe help you with the preparation of your application documents and accompany you through to successful employment.
  • Network and contactsUse our extensive network of company contacts to find suitable job offers.
Further information:

This course will help you gain the foundational knowledge and practical skills needed to succeed as an associate-level cybersecurity analyst in a modern security operations center.

Before attending this course, you should have knowledge and skills from the CCNA:

  • Classroom Training - Berlin: Class room instruction in our Training Center with direct exchange.
  • Hybrid training: Combination of face-to-face and online participation via platforms such as WebEx/Zoom.
  • Online training: Live lessons with VPN access for practical exercises.
  • PC with Internet connection
  • Headset
  • Camera

We will provide you with the necessary hardware if required.

Regular course dates. Contact us for the next start date.

Support with the application is possible. We will guide you through the entire process and look forward to helping you achieve your professional goals.

The combination of CCNA, CCNP and CCNA CyberOps provides a strong foundation and significantly expands your skills in the areas of networking and security. These certificates will make you a versatile IT professional and increase your chances of sustainable employment in the IT industry.

  • Teaching materials/books
  • Certificate of completion
  • Hardware exercises on our laboratory infrastructure
  • Instructor-led training
  • Exam
  • Entry-Level Network Engineer
  • Network Administrator
  • Network Support Technician
  • Helpdesk Technician
  • Junior Network Specialist

With this comprehensive qualification, you will be ideally prepared to meet the demands of the modern IT market and successfully advance your career.

Show More

Course Content

Detailed course content

  • Definition of the Security Operations Center (SOC): Introduction and understanding of the role and function of a SOC.
  • Understanding network infrastructure and network security monitoring tools: Overview of network infrastructure components and monitoring tools.
  • Exploration of data type categories: Identification and categorization of data for security analysis.
  • Understanding basic concepts of cryptography: Introduction to cryptographic techniques and their applications.
  • Understanding common TCP/IP attacks: Analyze and defend against common attacks on the TCP/IP protocol.
  • Understanding endpoint security technologies: Overview of endpoint protection technologies.
  • Understanding incident analysis in a threat-centric SOC: methods and techniques for analyzing security incidents.
  • Identification of resources for hunting cyber threats: Tools and techniques for identifying and tracking cyber threats.
  • Understanding event correlation and normalization: Techniques for correlating and normalizing security events.
  • Identification of common attack vectors: Detection and analysis of common methods used by attackers.
  • Identification of malicious activities: Methods for identifying and analyzing malicious activity on the network.
  • Detection of suspicious behavior patterns: Analysis and detection of suspicious patterns and anomalies.
  • Conducting security incident investigations: Step-by-step guide to investigating and documenting security incidents.
  • Use of a playbook model to organize security monitoring: Creation and use of playbooks for structured security monitoring.
  • Understanding SOC metrics: Overview of key metrics for evaluating the performance of a SOC.
  • Understanding SOC workflow and automation: Introduction to the workflow and automation within a SOC.
  • Describe the response to incidents: Processes and protocols to respond effectively to security incidents.
  • Understanding the use of VERIS: Application of the Vocabulary for Event Recording and Incident Sharing (VERIS) for standardized reporting of security incidents.
  • Fundamentals of the Windows operating system: Introduction and security-relevant aspects of the Windows operating system.
  • Basics of the Linux operating system: Introduction and security-relevant aspects of the Linux operating system.

Laboratory exercises

Conclusion