Cybersecurity concepts are fundamental pieces of knowledge necessary to have a career in the industry. This course will detail the network data that we can use for cyber operations and how to use it within your environment.
There is a tremendous skill shortage in the cybersecurity sector of IT that is hindering operations at organizations. In this course, Cisco CyberOps: Analyzing the Network, you’ll learn the some of the concepts needed to start your journey into the SOC operations realm. First, you’ll learn about the event sources and the data that they provide. Then, you'll dive into inspecting various network data types and see what they provide, highlighting NetFlow and raw packet data. You’ll break down datagrams and identify the key elements of the raw data, as well as interpret protocol headers. Finally, you’ll take a look at alerts and events and how to interpret them. When you’re finished with this course, you’ll be one step closer to having a solid understanding of cybersecurity concepts and be able to continue learning how to identify problems and perform tasks in a SOC environment.
Joe is a Network Consulting Engineer and has worked in the IT industry since 2010. He has experience in teaching and mentoring IT professionals in both DoD environments and in the civilian sector, in both the networking and IT security fields.
Course Overview Hi, everyone. My name is Joe Abraham, and welcome to my course, Cisco CyberOps: Analyzing the Network. I'm currently a cybersecurity consultant and a Pluralsight course author with courses in the IT operations and cybersecurity domains. Are you new to cybersecurity or trying to learn more about the topic? Do you want to learn about cybersecurity concepts and operations for analyzing network data? Well, in this course, we're going to get you that knowledge. I'll help you learn all about cybersecurity and many of the concepts that you should know. Some of the major topics in this course that we will cover include analyzing events from the network, inspecting network traffic using NetFlow and PCAPs, and extracting key information from events for investigations. By the end of this course, you'll know more about cyber operations and will be able to dig deep into events and datagrams to find the information that you're looking for. Before beginning this course, you should be familiar with basic IT terminology and have a desire to learn more about cybersecurity. From here, you should feel comfortable diving further into the Cisco CyberOps path and other cybersecurity courses at Pluralsight to help solidify your knowledge and push you to increase your skills. I hope that you'll join me on this journey to learn more about cyber operations with the Cisco CyberOps: Analyzing the Network course, at Pluralsight.