Description
Course info
Level
Intermediate
Updated
Aug 5, 2020
Duration
1h 59m
Description

There is a tremendous skill shortage in the cybersecurity sector of IT that is hindering operations at organizations. In this course, Cisco CyberOps: Security Monitoring, you’ll learn some of the foundational concepts needed to start your journey into the SOC operations realm. First, you’ll explore attacks and how they can be used to infiltrate the assets. Next, you’ll learn about security monitoring and visibility, and how you can use the various data types to monitor your environment. You’ll understand how evasion and obfuscation techniques impact visibility. Finally, you’ll discover certificates and how they impact the security of the environment. When you’re finished with this course, you’ll be one step closer to having a solid understanding of cybersecurity concepts and be able to continue learning how to identify problems and perform tasks in a SOC environment.

About the author
About the author

Joe is a Network Consulting Engineer and has worked in the IT industry since 2010. He has experience in teaching and mentoring IT professionals in both DoD environments and in the civilian sector, in both the networking and IT security fields.

More from the author
Cisco CyberOps: Exploring Security Concepts
Intermediate
1h 37m
May 29, 2020
More courses by Joe Abraham
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Hi, everyone. My name's Joe Abraham, and welcome to my course, Cisco CyberOps: Security Monitoring. I'm currently a cybersecurity consultant and a Pluralsight author with courses in IT operations and cybersecurity domains. Are you new to cybersecurity or learning more about the topic? Do you want to learn about cybersecurity concepts and operations? Well, in this course we'll work on getting you that knowledge. I'll help you learn all about cybersecurity and many of the concepts that you should know. Some of the major topics that we will cover include, learning about various attacks and attack types, exploring data visibility and restrictions, and securing the infrastructure using certificates. By the end of this course, you'll know about cyber operations and will be able to understand attacks and the technology securing our environments. Before beginning this course, you should be familiar with basic IT terminology and have a desire to learn more about cybersecurity. From here, you should feel comfortable diving further into the Cisco CyberOps path and other cybersecurity courses at Pluralsight to help solidify your knowledge and push you to increase your skills. I hope that you'll join me on this journey to learn more about cyber operations with the Cisco CyberOps: Security Monitoring course, at Pluralsight.