Cisco Certified CyberOps Associate (CBROPS 200-201)

Paths

Cisco Certified CyberOps Associate (CBROPS 200-201)

Author: Joe Abraham

With security becoming ever more important to technology and networking, these courses cover security fundamentals as presented by Cisco. You’ll learn security concepts, security... Read more

What you will learn

  • Explaining security concepts
  • Explaining the key components of basic security monitoring practices
  • Explaining the key principles of host-based analysis
  • Explaining the key facets of Network Intrusion Analysis
  • Explaining key security policies and procedures

Pre-requisites

You should be familiar with IT Operations and Networking principles.

Cisco Certified CyberOps Associate (CBROPS 200-201)

With security becoming ever more important to technology and networking, these courses cover security fundamentals as presented by Cisco. You’ll learn security concepts, security monitoring, host-based analysis, network intrusion analysis, and security policies and procedures all from the perspective of a Cisco expert. By the end of these courses, you’ll be well on your way to becoming a security expert.

In addition, these courses align with the objectives from the Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) 200-201 exam and can help you prepare for your certification as a Cisco Certified CyberOps Associate.

Cisco CyberOps: Exploring Security Concepts

by Joe Abraham

May 29, 2020 / 1h 37m

1h 37m

Start Course
Description

There is a tremendous skill shortage in the cybersecurity sector of IT that is hindering operations at organizations. In this course, Cisco CyberOps: Exploring Security Concepts, you’ll learn the some of the foundational concepts needed to start your journey into the SOC operations realm. First, you’ll explore common cybersecurity terminology and how it’s used within organizations. Next, you’ll learn about cybersecurity components and concepts, as well as pieces within your network that serve to provide different aspects of security in the organization. Finally, you’ll discover how to identify cybersecurity problems and how to isolate compromised hosts using logging. When you’re finished with this course, you’ll be one step closer to having a solid understanding of cybersecurity concepts and be able to continue learning how to identify problems and perform tasks in a SOC environment.

Table of contents
  1. Course Overview
  2. Defining Cybersecurity: What Is It Anyway?
  3. Identifying Common Cybersecurity Concepts
  4. Explaining Cybersecurity Challenges

Cisco CyberOps: Security Monitoring

by Joe Abraham

Aug 5, 2020 / 1h 59m

1h 59m

Start Course
Description

There is a tremendous skill shortage in the cybersecurity sector of IT that is hindering operations at organizations.

In this course, Cisco CyberOps: Security Monitoring, you’ll learn some of the foundational concepts needed to start your journey into the SOC operations realm.

First, you’ll explore attacks and how they can be used to infiltrate the assets.
Next, you’ll learn about security monitoring and visibility, and how you can use the various data types to monitor your environment. You’ll understand how evasion and obfuscation techniques impact visibility.
Finally, you’ll discover certificates and how they impact the security of the environment.

When you’re finished with this course, you’ll be one step closer to having a solid understanding of cybersecurity concepts and be able to continue learning how to identify problems and perform tasks in a SOC environment.

Table of contents
  1. Course Overview
  2. Learning About the Attack Surface
  3. Discovering Common Attacks
  4. Identifying Data Types and Uses
  5. Concealing the Attack
  6. Using Certificates for Security

Cisco CyberOps: Analyzing Hosts

by Joe Abraham

Oct 12, 2020 / 1h 59m

1h 59m

Start Course
Description

There is a tremendous skill shortage in the cybersecurity sector of IT that is hindering operations at organizations. In this course, Cisco CyberOps: Analyzing Hosts, you’ll learn the some of the concepts needed to start your journey into the SOC operations realm. First, you’ll explore the various endpoint technologies to secure a host. Next, you’ll discover about components of both Windows and Linux operating systems and how they can be compromised. We’ll also discuss investigation-related terminology and evidence with regards to investigations. Finally, you’ll learn about sandboxes and detonation chambers and the reports that they generate. When you’re finished with this course, you’ll be one step closer to having a solid understanding of cybersecurity concepts and be able to continue learning how to identify problems and perform tasks in a SOC environment.

Table of contents
  1. Course Overview
  2. Securing the Host
  3. Identifying and Interpreting Windows Components and Logs
  4. Understanding Linux Security Components and Log Usage
  5. Investigating an Attack
  6. Using Malware Analysis Tools

Cisco CyberOps: Analyzing the Network

by Joe Abraham

Dec 11, 2020 / 2h 1m

2h 1m

Start Course
Description

There is a tremendous skill shortage in the cybersecurity sector of IT that is hindering operations at organizations. In this course, Cisco CyberOps: Analyzing the Network, you’ll learn the some of the concepts needed to start your journey into the SOC operations realm. First, you’ll learn about the event sources and the data that they provide. Then, you'll dive into inspecting various network data types and see what they provide, highlighting NetFlow and raw packet data. You’ll break down datagrams and identify the key elements of the raw data, as well as interpret protocol headers. Finally, you’ll take a look at alerts and events and how to interpret them. When you’re finished with this course, you’ll be one step closer to having a solid understanding of cybersecurity concepts and be able to continue learning how to identify problems and perform tasks in a SOC environment.

Table of contents
  1. Course Overview
  2. Analyzing Network Events and Data
  3. Inspecting Network Traffic
  4. Analyzing Raw Data
  5. Interpreting Alerts and Event Elements

Cisco CyberOps: Managing Policies and Procedures

by Joe Abraham

Feb 25, 2021 / 1h 50m

1h 50m

Start Course
Description

There is a tremendous skill shortage in the cybersecurity sector of IT that is hindering operations at organizations. In this course, Cisco CyberOps: Managing Policies and Procedures, you’ll learn some of the concepts needed to start your journey into the SOC operations realm. First, you’ll learn about management concepts around assets and other elements. Then, you'll dive into how to profile the network and servers in order to better understand them from a security perspective. We’ll focus on the incident response process as defined in NIST SP800-61 and how cyber professionals interact with the process. Finally, you’ll learn about event classification and how they fit into the popular models such as the Cyber Kill Chain and Diamond Model. When you’re finished with this course, you’ll be one step closer to having a solid understanding of cybersecurity concepts and be able to continue learning how to identify problems and perform tasks in a SOC environment.

Table of contents
  1. Course Overview
  2. Understanding Cyber Management Concepts
  3. Identifying Assets and Critical Data
  4. Applying the Incident Response Process
  5. Classifying Intrusion Events

Knowledge is power

A Professional or Enterprise Pluralsight account is required to access Kaplan®* practice exams. Sign in below or sign up for a free team trial.