Cisco CyberOps
Направление
- CBROPS — Understanding Cisco Cybersecurity Operations Fundamentals
- Длительность: 5 дней (40 часов)
- Код курса: CBROPS
- Стоимость
- Очный формат: 1 022 500 ₸
- Онлайн формат: 938 000 ₸
Описание курса
Course Objectives
After taking this course, you should be able to:
Explain how a Security Operations Center (SOC) operates and describe the different types of services that are performed from a Tier 1 SOC analyst’s perspective.
Explain Network Security Monitoring (NSM) tools that are available to the network security analyst.
Explain the data that is available to the network security analyst.
Describe the basic concepts and uses of cryptography.
Describe security flaws in the TCP/IP protocol and how they can be used to attack networks and hosts.
Understand common endpoint security technologies.
Understand the kill chain and the diamond models for incident investigations, and the use of exploit kits by threat actors.
Identify resources for hunting cyber threats.
Explain the need for event data normalization and event correlation.
Identify the common attack vectors.
Identify malicious activities.
Identify patterns of suspicious behaviors.
Conduct security incident investigations.
Explain the use of a typical playbook in the SOC.
Explain the use of SOC metrics to measure the effectiveness of the SOC.
Explain the use of a workflow management system and automation to improve the effectiveness of the SOC.
Describe a typical incident response plan and the functions of a typical Computer Security Incident Response Team (CSIRT).
Explain the use of Vocabulary for Event Recording and Incident Sharing (VERIS) to document security incidents in a standard format.Course Prerequisites
Before taking this course, you should have the following knowledge and skills:
Familiarity with Ethernet and TCP/IP networking
Working knowledge of the Windows and Linux operating systems
Familiarity with basics of networking security concepts
The following Cisco course can help you gain the knowledge you need to prepare for this course:Implementing and Administering Cisco Solutions (CCNA®)
Course Outline
Defining the Security Operations Center
Understanding Network Infrastructure and Network Security Monitoring Tools
Exploring Data Type Categories
Understanding Basic Cryptography Concepts
Understanding Common TCP/IP Attacks
Understanding Endpoint Security Technologies
Understanding Incident Analysis in a Threat-Centric SOC
Identifying Resources for Hunting Cyber Threats
Understanding Event Correlation and Normalization
Identifying Common Attack Vectors
Identifying Malicious Activity
Identifying Patterns of Suspicious Behavior
Conducting Security Incident Investigations
Using a Playbook Model to Organize Security Monitoring
Understanding SOC Metrics
Understanding SOC Workflow and Automation
Describing Incident Response
Understanding the Use of VERIS
Understanding Windows Operating System Basics
Understanding Linux Operating System BasicsLab Outline
Use NSM Tools to Analyze Data Categories
Explore Cryptographic Technologies
Explore TCP/IP Attacks
Explore Endpoint Security
Investigate Hacker Methodology
Hunt Malicious Traffic
Correlate Event Logs, Packet Captures (PCAPs), and Alerts of an Attack
Investigate Browser-Based Attacks
Analyze Suspicious Domain Name System (DNS) Activity
Explore Security Data for Analysis
Investigate Suspicious Activity Using Security Onion
Investigate Advanced Persistent Threats
Explore SOC Playbooks
Explore the Windows Operating System
Explore the Linux Operating System - CBRTHD — Conducting Threat Hunting and Defending using Cisco Technologies for CyberOps
- Длительность: 5 дней (40 часов)
- Код курса: CBRTHD
- Стоимость
- Очный формат: 1 022 500 ₸
- Онлайн формат: 938 000 ₸
Описание курса
Course Objectives
Define threat hunting and identify core concepts used to conduct threat hunting investigations
Examine threat hunting investigation concepts, frameworks, and threat models
Define cyber threat hunting process fundamentals
Define threat hunting methodologies and procedures
Describe network-based threat hunting
Identify and review endpoint-based threat hunting
Identify and review endpoint memory-based threats and develop endpoint-based threat detection
Define threat hunting methods, processes, and Cisco tools that can be utilized for threat hunting
Describe the process of threat hunting from a practical perspective
Describe the process of threat hunt reportingCourse Prerequisites
There are no prerequisites for this training. However, the knowledge and skills you are recommended to have before attending this training are:
General knowledge of networks and network security
These skills can be found in the following Cisco Learning Offerings:
Implementing and Administering Cisco Solutions (CCNA)
Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)
Performing CyberOps Using Cisco Security Technologies (CBRCOR)Course Outline
Threat Hunting Theory
Threat Hunting Concepts, Frameworks, and Threat Models
Threat Hunting Process Fundamentals
Threat Hunting Methodologies and Procedures
Network-Based Threat Hunting
Endpoint-Based Threat Hunting
Endpoint-Based Threat Detection Development
Threat Hunting with Cisco Tools
Threat Hunting Investigation Summary: A Practical Approach
Reporting the Aftermath of a Threat Hunt InvestigationLab Outline
Categorize Threats with MITRE ATTACK Tactics and Techniques
Compare Techniques Used by Different APTs with MITRE ATTACK Navigator
Model Threats Using MITRE ATTACK and D3FEND
Prioritize Threat Hunting Using the MITRE ATTACK Framework and Cyber Kill Chain
Determine the Priority Level of Attacks Using MITRE CAPEC
Explore the TaHiTI Methodology
Perform Threat Analysis Searches Using OSINT
Attribute Threats to Adversary Groups and Software with MITRE ATTACK
Emulate Adversaries with MITRE Caldera
Find Evidence of Compromise Using Native Windows Tools
Hunt for Suspicious Activities Using Open-Source Tools and SIEM
Capturing of Network Traffic
Extraction of IOC from Network Packets
Usage of ELK Stack for Hunting Large Volumes of Network Data
Analyzing Windows Event Logs and Mapping Them with MITRE Matrix
Endpoint Data Acquisition
Inspect Endpoints with PowerShell
Perform Memory Forensics with Velociraptor
Detect Malicious Processes on Endpoints
Identify Suspicious Files Using Threat Analysis
Conduct Threat Hunting Using Cisco Secure Firewall, Cisco Secure Network Analytics, and Splunk
Conduct Threat Hunt Using Cisco XDR Control Center and Investigate
Initiate, Conduct, and Conclude a Threat Hunt - CBRCOR — Performing CyberOps Using Cisco Security Technologies
- Длительность: 5 дней (40 часов)
- Код курса: CBRCOR
- Стоимость
- Очный формат: 1 022 500 ₸
- Онлайн формат: 938 000 ₸
Описание курса
Course Objectives
After taking this course, you should be able to:
Describe the types of service coverage within a SOC and operational responsibilities associated with each.
Compare security operations considerations of cloud platforms.
Describe the general methodologies of SOC platforms development, management, and automation.
Explain asset segmentation, segregation, network segmentation, micro-segmentation, and approaches to each, as part of asset controls and protections.
Describe Zero Trust and associated approaches, as part of asset controls and protections.
Perform incident investigations using Security Information and Event Management (SIEM) and/or security orchestration and automation (SOAR) in the SOC.
Use different types of core security technology platforms for security monitoring, investigation, and response.
Describe the DevOps and SecDevOps processes.
Explain the common data formats, for example, JavaScript Object Notation (JSON), HTML, XML, Comma-Separated Values (CSV).
Describe API authentication mechanisms.
Analyze the approach and strategies of threat detection, during monitoring, investigation, and response.
Determine known Indicators of Compromise (IOCs) and Indicators of Attack (IOAs).
Interpret the sequence of events during an attack based on analysis of traffic patterns.
Describe the different security tools and their limitations for network analysis (for example, packet capture tools, traffic analysis tools, network log analysis tools).
Analyze anomalous user and entity behavior (UEBA).
Perform proactive threat hunting following best practices.Course Prerequisites
Although there are no mandatory prerequisites, to fully benefit from this course, you should have the following knowledge:
Familiarity with UNIX/Linux shells (bash, csh) and shell commands
Familiarity with the Splunk search and navigation functions
Basic understanding of scripting using one or more of Python, JavaScript, PHP or similar.Recommended Cisco offerings that may help you prepare for this course:
Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)
Implementing and Administering Cisco Solutions (CCNA)Recommended third-party resources:
Splunk Fundamentals 1
Blue Team Handbook: Incident Response Edition by Don Murdoch
Threat Modeling- Designing for Security y Adam Shostack
Red Team Field Manual by Ben Clark
Blue Team Field Manual by Alan J White
Purple Team Field Manual by Tim Bryant
Applied Network Security and Monitoring by Chris Sanders and Jason SmithCourse Outline
Enterprise Network Assurance Overview
Introduction to Cisco Catalyst Center Assurance
Introduction to Cisco AppDynamics
Introduction to Cisco Catalyst SD-WAN Assurance
Introduction to Cisco ThousandEyes
Enterprise Agents Deployment
BGP, Network, DNS, and Voice Tests Configuration
Web Tests Configuration
Endpoint Agent
System Administration
Network Troubleshooting with Cisco ThousandEyes
Internet Insights
Alerts and Dashboards Configuration
Monitoring Solutions
Cisco Meraki Network Assurance
Cisco Meraki InsightsLab Outline
Troubleshoot the Health of Network Devices
Explore Cisco Catalyst SD-WAN Analytics
Schedule a Test
Deploy Enterprise Agent
Configure Network, DNS, and Voice Tests
Configure Web Tests
Deploy and Configure an Endpoint Agent
Configure Account Administration
Examine Internet Insights
Configure Alerts
Build a Dashboard
Implementing Network Assurance with Cisco Meraki
Examine Cisco Meraki Insight
Записаться на курс
Контакты
LinkedIn
Email
Web